cyber security by:jerusa miller july 7, 2008. what is cyber security? the protection of data and...

12
Cyber Security Cyber Security By:Jerusa Miller By:Jerusa Miller July 7, 2008 July 7, 2008

Upload: eunice-moore

Post on 29-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

Cyber SecurityCyber Security

By:Jerusa MillerBy:Jerusa Miller

July 7, 2008July 7, 2008

Page 2: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

What Is Cyber Security?What Is Cyber Security?

•The protection of The protection of data and systems in data and systems in networks that are networks that are connected to the connected to the Internet .Internet .

Page 3: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

Internet IssuesInternet IssuesVirusesViruses

WormsWorms

Trojan HorsesTrojan Horses

HackersHackers

What are they all?

What do they do?

Page 4: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

VirusesViruses

A small piece of A small piece of manmade code manmade code that is loaded that is loaded onto your onto your computer without computer without your knowledge your knowledge and runs without and runs without granted accesgranted acces

Viruses can replicate Viruses can replicate itself over and over itself over and over againagain

Rapidly use all your Rapidly use all your memorymemory

Slow down system Slow down system and/or bring to a haltand/or bring to a halt

Transmit itself across Transmit itself across networks and bypass networks and bypass security systemssecurity systems

What is a Virus What do they do

Page 5: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

WormsWorms A special type of A special type of

Virus that Virus that replicates itself replicates itself over a computer over a computer network and network and usually performs usually performs malicious malicious actions.actions.

Use computer Use computer memorymemory

Use computer Use computer resourcesresources

Bring system to a Bring system to a halthalt

Possibly shut the Possibly shut the entire system down entire system down in other terms crash in other terms crash your computeryour computer

What is a WORM? What does a WORM do?

Page 6: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

Trojan HorsesTrojan Horses

A destructive A destructive program that program that masquerades as a masquerades as a benign application benign application that does not that does not replicate itselfreplicate itself

A program that A program that claims it rids your claims it rids your computer or viruses computer or viruses but in actuality but in actuality introduces viruses introduces viruses onto your computeronto your computer

Remote acces tojans Remote acces tojans Date Sending TrojansDate Sending Trojans Destrcutive TrojansDestrcutive Trojans Proxy TrojansProxy Trojans FTP TrojansFTP Trojans Security Software Security Software

disabler Trojansdisabler Trojans Denial-of-Service Attck Denial-of-Service Attck

TrojansTrojans

Types of TrojansWhat is a Trojan

Page 7: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

Computer HackersComputer Hackers

An individual An individual that gains that gains unauthorized unauthorized access to access to computer computer systems for the systems for the purpose of purpose of stealing and stealing and corrupting data.corrupting data.

Page 8: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

What Is a PasswordWhat Is a Password

A password is A password is a private a private series of series of characters that characters that enables a user enables a user to access files, to access files, computer, computer, and/or and/or programs.programs.

Page 9: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

Is your Password Strong?Is your Password Strong?

6-12 characterts6-12 characterts Uppercase lettersUppercase letters Lower Case lettersLower Case letters NumbersNumbers Special CharactersSpecial Characters (*%$#)(*%$#)

A strong password should consist of,

Page 10: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

Methods to Prevent Malicious objectsPurchase or download spywareMake sure you are protected by firewareTurn on pop-up blockersBe cautious of what information you submit and who you submit it to.

Create strong passwordsBe cautious of the sites and programs that your enterPay attention of ALL warnings directed at you

Page 11: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

HAPPY BROWSING!!!!!HAPPY BROWSING!!!!!

Page 12: Cyber Security By:Jerusa Miller July 7, 2008. What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet

Work Citations Work Citations http://www.pcmag.com/encyclopedia_term/0,254http://www.pcmag.com/encyclopedia_term/0,254

2,t=2,t=cybersecurity&icybersecurity&i=40643,00.asp=40643,00.asp

http://www.ssqq.com/information/images/computhttp://www.ssqq.com/information/images/computer%20girl%20gary.jpger%20girl%20gary.jpg

http://www.webopedia.com/TERM/V/virus.htmlhttp://www.webopedia.com/TERM/V/virus.html http://www.webopedia.com/TERM/w/worm.htmlhttp://www.webopedia.com/TERM/w/worm.html http://www.webopedia.com/TERM/T/http://www.webopedia.com/TERM/T/

Trojan_horse.htmlTrojan_horse.html http://instructors.cwrl.utexas.edu/jbrown/files/http://instructors.cwrl.utexas.edu/jbrown/files/

hackers_cartoons.jpghackers_cartoons.jpg http://www.webopedia.com/TERM/h/hacker.htmlhttp://www.webopedia.com/TERM/h/hacker.html http://www.webopedia.com/TERM/p/http://www.webopedia.com/TERM/p/

password.htmlpassword.html