Internet security
description
Transcript of Internet security
English for Computing•Trần Thị Mai
•Nguyễn Thị Hồng Ngọc•Dương Thị Thanh Thúy•Nguyễn Thị Anh Thư•Vũ Thị Trâm
INTERNET SECURITY
1. Security on the Web
Security is crucial when you send confidential information online
Buying a book
Set all security alerts to high on your web browser
Web browser: software
application for retrieving,
presenting, and traversing
information resources on
the WWW
Lock disable or delete cookies
A cookie (web cookie, browser cookie, and HTTP cookie) is a piece of text stored on a user's computer by their web browser
Digital certificate files that are like digital identification cards to identify users & servers
Secure Sockets Layer (SSL)
is a commonly-used protocol for managing the security of a message transmission on the Internet
2. Email privacy
Email travels across the Net
Can be copied temporarily onto many computers
Can be read by others
Encode it with some form of encryption
Pretty Good Privacy (PGP) A freeware program
written by Phil Zimmerman
3. Network security
Passwords for access control
Firewalls
A system designed to prevent unauthorized access to or from a private network
Application gateway
Several types of firewall techniques:
Packet filter
Proxy server
Circuit-level gateway
Encryption and decryption systems
4. Malware protection
• Malware (malicious software) : programs designed to infiltrate or damage our computer• For example: viruses
wormsTrojansspywareadware
Viruses • A program or piece of code that is loaded onto your computer via a disc drive or the Internet without your knowledge
• Attaches itself to a program or file enabling it to spread from one computer to another
• Can copy itself
• Cannot infect your computer unless you run or open the malicious program
Worms • Similar to a virus by design and is considered to be a sub-class of a virus.
• Has the capability to spread from computer to computer without any human action
• Has the capability to replicate itself and use memory
• Cannot attach itself to other programs
Trojans horse• A destructive program that masquerades as a benign application
• Do not replicate themselves
One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
Spyware A type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity
Adware Software application in which advertising banners are displayed while the program is running
SOME ANTI- VIRUS SOFTWARE:
BkavPro Internet Security is antivirus software pioneer in the use of cloud technology (công nghệ điện toán đám mây )
Kaspersky Internet Security 2011 provides comprehensive protection for your computer from known and emerging threats, network attacks and phishing, spam and other unwanted information
5. Types of computer crimes
Computer crimes: criminal activities, involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data
Some types:• Hacking: The activity of breaking into a computer system to gain an unauthorized access
• Phishing: Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source
• Computer Viruses: Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users
• Cyberstalking: The use of communication technology, mainly the Internet, to torture other individuals is known as cyberstalking
• Identity Theft: This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity
34
56
78
21
H A C K E R3
V I R U S E S4
F R E E W A R E5
N C R Y P T I OE N6
E C R Y P T I OD N7
S P Y W A R E8
F I R E W A L L2P A S S W O R D1
PUZZLE1. Users have to enter a _____ to gain
access to a network.2. A _____ Protects a company intranet
from outside attacks.3. A ____ is a person who uses computer
skills to enter computers and network illegally.
4. _____ can infect your files and corrupt your hard drive
5. You can download ____ from the net; this type of software is available free of charge but protected by copyright.
6. Encoding data so that unauthorized users can’t read it is know as_____.
7. This company uses _____ techniques to decode secret data.
8. Most____ is designed to obtain personal information without the user’s permission.
THANKS FOR LISTENING
THANKS FOR LISTENING