Internet security

42
English for Computing Trần Thị Mai Nguyễn Thị Hồng Ngọc Dương Thị Thanh Thúy Nguyễn Thị Anh Thư Vũ Thị Trâm

description

 

Transcript of Internet security

Page 1: Internet security

English for Computing•Trần Thị Mai

•Nguyễn Thị Hồng Ngọc•Dương Thị Thanh Thúy•Nguyễn Thị Anh Thư•Vũ Thị Trâm

Page 2: Internet security

INTERNET SECURITY

Page 3: Internet security

1. Security on the Web

Page 4: Internet security

Security is crucial when you send confidential information online

Page 5: Internet security

Buying a book

Page 6: Internet security

Set all security alerts to high on your web browser

Page 7: Internet security

Web browser: software

application for retrieving,

presenting, and traversing

information resources on

the WWW

Page 8: Internet security

Lock disable or delete cookies

Page 9: Internet security

A cookie (web cookie, browser cookie, and HTTP cookie) is a piece of text stored on a user's computer by their web browser

Page 10: Internet security

Digital certificate files that are like digital identification cards to identify users & servers

Page 11: Internet security

Secure Sockets Layer (SSL)

is a commonly-used protocol for managing the security of a message transmission on the Internet

Page 12: Internet security

2. Email privacy

Page 13: Internet security

Email travels across the Net

Can be copied temporarily onto many computers

Can be read by others

Page 14: Internet security

Encode it with some form of encryption

Page 15: Internet security

Pretty Good Privacy (PGP) A freeware program

written by Phil Zimmerman

Page 16: Internet security
Page 17: Internet security

3. Network security

Page 18: Internet security

Passwords for access control

Page 19: Internet security

Firewalls

A system designed to prevent unauthorized access to or from a private network

Page 20: Internet security

Application gateway

Several types of firewall techniques:

Packet filter

Proxy server

Circuit-level gateway

Page 21: Internet security

Encryption and decryption systems

Page 22: Internet security

4. Malware protection

Page 23: Internet security

• Malware (malicious software) : programs designed to infiltrate or damage our computer• For example: viruses

wormsTrojansspywareadware

Page 24: Internet security

Viruses • A program or piece of code that is loaded onto your computer via a disc drive or the Internet without your knowledge

• Attaches itself to a program or file enabling it to spread from one computer to another

Page 25: Internet security

• Can copy itself

• Cannot infect your computer unless you run or open the malicious program

Page 26: Internet security

Worms • Similar to a virus by design and is considered to be a sub-class of a virus.

• Has the capability to spread from computer to computer without any human action

Page 27: Internet security

• Has the capability to replicate itself and use memory

• Cannot attach itself to other programs

Page 28: Internet security

Trojans horse• A destructive program that masquerades as a benign application

• Do not replicate themselves

Page 29: Internet security

One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

Page 30: Internet security

Spyware A type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge

Page 31: Internet security

Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity

Page 32: Internet security

Adware Software application in which advertising banners are displayed while the program is running

Page 33: Internet security

SOME ANTI- VIRUS SOFTWARE:

BkavPro Internet Security is antivirus software pioneer in the use of cloud technology (công nghệ điện toán đám mây )

Page 34: Internet security

Kaspersky Internet Security 2011 provides comprehensive protection for your computer from known and emerging threats, network attacks and phishing, spam and other unwanted information

Page 35: Internet security

5. Types of computer crimes

Page 36: Internet security

Computer crimes: criminal activities, involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data

Page 37: Internet security

Some types:• Hacking: The activity of breaking into a computer system to gain an unauthorized access

• Phishing: Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source

Page 38: Internet security

• Computer Viruses: Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users

• Cyberstalking: The use of communication technology, mainly the Internet, to torture other individuals is known as cyberstalking

Page 39: Internet security

• Identity Theft: This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity

Page 40: Internet security

34

56

78

21

H A C K E R3

V I R U S E S4

F R E E W A R E5

N C R Y P T I OE N6

E C R Y P T I OD N7

S P Y W A R E8

F I R E W A L L2P A S S W O R D1

PUZZLE1. Users have to enter a _____ to gain

access to a network.2. A _____ Protects a company intranet

from outside attacks.3. A ____ is a person who uses computer

skills to enter computers and network illegally.

4. _____ can infect your files and corrupt your hard drive

5. You can download ____ from the net; this type of software is available free of charge but protected by copyright.

6. Encoding data so that unauthorized users can’t read it is know as_____.

7. This company uses _____ techniques to decode secret data.

8. Most____ is designed to obtain personal information without the user’s permission.

Page 41: Internet security

THANKS FOR LISTENING

Page 42: Internet security

THANKS FOR LISTENING