Sie sind auf Seite 1von 17

 Awareness is the first step to good computer

security.

How Can You


Be Aware?
 Threat is anything that can cause harm to
our computer resources.
 In computer security, a threat can be a virus
infection or an attack by a hacker.
 How about applying a countermeasure?
 We can apply regular backup process of
our data.
 Putting a Firewall to our computer
network system is our countermeasure
against a possible attack by a serious hacker.
 Identity Theft is a technology term used when
someone impersonates you.
 An Identity Theft can stole your accounts and
even your money at the bank.
 How and why?
 By Shoulder Surfing! Because he or she wants
your money!
 What is shoulder surfing?
 Shoulder surfing is simply watching someone
who withdraws on the ATM machine. But they are
getting to know your PIN (Personal Identity
Number) number.
 What other tricks a theft can use in smuggling?
 Snagging
The Identity Theft could use wire tapping so that
he or she could listen to your conversation on the
telephone.
 Dumpster Diving
The Identity Theft use this technique where he or
she go to the trash bins to get slips regarding your
withdraw or deposit.
 Social Engineering
The Identity Theft will trick the victim into
providing critical information under pretext of
something legitimate.
Mechanics:
 Each group will have their representative
which will answer our questions oraly.
 We will have 10 questions and each question
is worth 1 candy.
 If your representative got all 10 questions in
the fastest way they can and got it all correct
he or she can share 10 flattops with his or
her groupmates.
 While others on seat will answer in their
notebook.
 What is a Computer Virus?
It is simply a tiny powerful program written
and developed by an intelligent and malicious
programmer. Pirated CD’s and USB’s is the
source of Computer virus.

 What can a virus do?


Well Virus can destroy data files, corrupt
software integrity, gobble up computer’s, etc.
 Like humans, viruses have brothers as well.
 There are 3 types of viruses
- Trojan Horses
- Worms and Logic Bombs
- Logic Bombs

 Trojan Horses introduce malicious software


under the pretension of being a useful
program.
 Worms are like viruses,
they can reproduce
themselves. The difference
is that they can travel
inside your computer.
 Logic Bombs are program
triggered to perform a task or
mission when it encounters
some sequence of events or
activities or after a certain
amount of time elapses or
when a date came.
 The software developers have created a lot of tracking programs that
continuously monitor our online activities in accessing the internet.

 Cookies
A cookie is a small code that a web server asks your web browser such as
internet explorer of Mozilla Firefox to place on your computer.
 Spyware

The spyware is also known as Adware. The


spyware collects and records secretly your email
address, web usage, individual key strokes and
even your personal information.
 Spam
A spam offers products or services that usually we don’t need or want.
 Any act of stealing hardware and software
resources are classified as cybercrime.
 Hacking is an illegal act of accessing the
computer resources of some people with their
knowledge or permission, or unauthorized access
into company’s network system.
 Hacker employs the sniffing technique where he
or she tries to guess the password of the hapless
victim.
 Another technique used by the hacker is called
Phising. In this technique, the hacker may contact
the unsuspecting victim by email and ask the
victim to provide password information of an
apparent legitimate reason.
 The other technique use by the hacker is the
IP Spoofing. In this technique, the hacker
intercepts the data while it is transmitted or
gain access to the computer network system
by posing as an authorize user.
 Cyberterrorism is an act of attacking the
mission-critical information technology
infrastructure and government network
system of a particular country.
 Putting firewalls in our computer system
network is our best defense against the
possible attack of a hacker.
 The firewall automatically drops or discards
any unsolicited data communications it
detected.
 There are some apps to be installed that can
protect or clean our computer. But there are
some that are automatically in there, some of
those are Virus scanner and cleaner. These
software is designed and programmed to
search and destroy computer viruses that
invade our computer.
 The computer subsystems that can be
scanned are the hard disk, external hard disk,
floppy disk, computer’s main memory,
CD/DVD ROM drive and USB drive.
Hello!
They can be aware of my bad
friends if they avoid buying
pirated disks, USB’s, and CD’s.
like this…
Your Welcome…
Bye!

Das könnte Ihnen auch gefallen