threats to it security jordan pilcher. phishing phishing is when companies or people from other...

10
Threats to IT security Jordan pilcher

Upload: andrea-kelly

Post on 19-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for

Threats to IT security

Jordan pilcher

Page 2: Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for

phishing• Phishing is when companies or people from

other people who think they can get away with scamming you for money.

Page 3: Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for

precautions

• Phishing -the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.

Page 4: Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for

viruses

a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.Viruses only work on the specific design of operating systems as the code is differentExample… windows viruses may not work on IOS

Page 5: Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for

hacking

• Hacking is someone who is trying to hack into your account or someone who is trying to enter a network of accounts or information (etc a bank)

Page 6: Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for

access

• “dark net” is a perfect example of VIP access. There are many ways of accessing something on the internet.

Page 7: Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for

Secure passwords

• G3r!4ck420wrektm8 • GERLACK2000 • Gerlack

Page 8: Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for

Firewall

• Firewall is a protection scheme to viruses for a network or system or unauthorized access with a firewall

Page 9: Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for

Spam

• Is an email that is sent without the receivers permission. it can be linked to a phishing email

Page 10: Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for

Public Wi-Fi

You might think public wifi is free but its not. It is dangerous to your phone. Public wifi pics up data from your phone if you enter a building or even if you just walk past. They can access your bank accounts with out you even knowing