You're about to create your best presentation ever

Cyber Security Powerpoint Template

Create your presentation by reusing a template from our community or transition your PowerPoint deck into a visually compelling Prezi presentation.

Cyber Security

Transcript: Don’t give out your personal information. E.g. Name, address, phone number or school. Phishing is email messages designed to steal your identity. our final stop In order to avoid phishing, do not give out your personal details, such as school, full name, phone number and age. Malware Personal information-where its not needed The email might appear to be from someone in your online address book. Internet filters can keep unwanted emails (spam) out of your email inbox. A Trojan horse is a type of malware that disguises itself as a helpful program but whose real purpose is to grant a hacker access to a computer. By Sophie, Noelle and Tiana Watch out... Obstacle 1 Obstacle 2 Internet filters can warn you about and block you from suspicious websites. They can give out your private information to others. THEY ARE VERY DANGEROUS...... Internet filters are designed to protect children like you from the dangers on the internet. Cyber Security Don't forget the world is watching... Once you have put your info on the internet it will effectively be there forever and ANYONE can track you down. Start A computer worm is a computer program that can spread to other computers. Obstacle 3 It is so easy to give out your information by simply just taking an online survey or signing up for a fun game to play. For example club penguin or moshi monsters. The word ‘Hacker’ means someone who can find the weaknesses in computers, they are very smart when it comes to computers. It is very simple for someone who knows a lot about computers to access anyone’s information and use it to carry out actions you have no idea about. Internet Filters Hackers can easily find your personal information online and steal your identity. Schools can block websites that are not useful or trustworthy. Adware or advertising software is any software package which automatically allows advertisements. These advertisements can be in the form of a pop up. Parents and guardians can block some websites that are inappropriate or don't want children to see. Up we go!!! The email might include a web address that looks familiar but has been changed slightly. e.g. www.micorsoft.com or www. Goggle .com Over we go!!! They try to break into the security of networks, web servers, and email servers. Always tell a responsible adult if you are sent one of these emails to stop it from happening again. Spyware is a type of malware installed on computers that collects information about users without them knowing. Malware Is short for malicious software. Hackers Includes computer viruses, Trojans, worms, unwanted programs etc. Malware can end up being quite costly. Malware is designed to access credit card details and stop computers from running programs. Phishing

Cyber security

Transcript: Team Uh-Oh Oreo A computer without virus protection is like a castle without a moat. There are a variety of viruses that can infect a computer. The basic computer virus is a program that self replicates and performs a malicious function. A Trojan is a virus disguised as something benign, but when activated, reveals its true nature. One of the worst types of virus is the logic bomb. Logic bombs are set off when certain conditions are met, time or a specific action, and then procede to do any number of malicious things. A logic bomb is essentially a time delayed virus. While it is impossible to guarantee protection from all computer viruses, it is possible to block a great number of them. It is the opinion of your IT department that the school invest in one of the following virus protection plans. •Search Advisor failed to search every site •Average length of installation duration •Does not really speed up your PC •Parental Control on IM is easily evaded •Large download file •Anti-phishing does not work well with IE 8 •Smart memory management does not work very well and will slow down your computer if you do not reach the recommended specification BitDefender may classify some safe programs as viral, and may either remove them or quarantine what it perceives as a virus threat. No phone number is given to call for support without making you jump through hoops, always referring you back to their knowledgebase to troubleshoot problems before contacting them. Very frustrating. We need Virus Protection! Either of these choices is better than having no protection at all. The costs of implementing a security package is far smaller than the worst case scenario of having to replace computers after an attack. With virus protesction, the liklihood of such attacks are diminished. Security is a must! THE END! Eric Daniel Denver Governor Jared Jackson Why Have Virus Protection? Pros hi Cons BitDefender Pros Panda Antivirus Simple installation User friendly Strong malware detection test results Good disinfection and cleanup Panda Antivirus is an effective defender, though it's one of the slower antivirus products we tested. A pricier option at $49.95 Support cost extra Some odd interface quirks Slow scanner speed Easy to use Affordable Easy installation Backup options Advanced data security tools Parental control Laptop mode and Game mode Easy to use firewall Effective spam control Configurable UI Comes with performance monitor Smart memory and CPU management Good product support Bottom Line Cons

Cyber security

Transcript: lets enjoy the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages. END Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. Identity theft the co-option of another person's personal information (e.g., name, Social Security number, credit card number, passport) without that person's filter dm bookmark In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames. Phishing Peer-to-peer involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others. -Bill Belsey". remove by passing through a filter; "filter out the impurities" Cyber security measures taken to protect computers and computer networks from accidental or malicious harm. "Cyber Security." Wikipedia. Wikipedia, 16 Sept. 2010. Web. 21 Sept. 2010. <en.wikipedia.org/wiki/Cyber_security>. A virus (from the Latin virus meaning toxin or poison) is a small infectious agent that can replicate only inside the cells of other organisms. Firewall Spamming computer software that obtains information from a user's computer without the user's knowledge or consent. Viruses Cyberbullying Cyberstalking a marker (a piece of paper or ribbon) placed between the pages of a book to mark the reader's place. Malicious code practice of distributing or providing access to digitally stored information, such as computer program. File sharing the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Spyware computing or networking is a distributed application. (colloquial) the application of maximum thrust; "he moved the throttle to the firewall"

Now you can make any subject more engaging and memorable