SlideShare uma empresa Scribd logo
1 de 12
Information Security Lesson 3 Protecting information On your computer
computer security tools Security software Operating system firewalls
PC Magazine review
PC Magazine review
PC Magazine review
PC Magazine review
Firewalls Operating Systems
Lesson 4 What to do if your Identity is stolen

Mais conteúdo relacionado

Mais procurados

IO Learning Objectives
IO Learning ObjectivesIO Learning Objectives
IO Learning Objectivesthinkict
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authenticationEdgar Mwangangi
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9robsworld
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 

Mais procurados (11)

Aaa
AaaAaa
Aaa
 
IO Learning Objectives
IO Learning ObjectivesIO Learning Objectives
IO Learning Objectives
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 

Destaque

Lecture 10 between groups designs
Lecture   10   between groups designsLecture   10   between groups designs
Lecture 10 between groups designsBrittany Milbourn
 
Lecture 4--Research Questions I
Lecture 4--Research Questions ILecture 4--Research Questions I
Lecture 4--Research Questions IBrittany Milbourn
 
Lecture 5--Research Questions II
Lecture 5--Research Questions IILecture 5--Research Questions II
Lecture 5--Research Questions IIBrittany Milbourn
 
Lesson2 removing opportunities
Lesson2 removing opportunitiesLesson2 removing opportunities
Lesson2 removing opportunitiesRob Johnson
 
Lesson 4 What to do if your Identity Is Stolen
Lesson 4 What to do if your Identity Is StolenLesson 4 What to do if your Identity Is Stolen
Lesson 4 What to do if your Identity Is StolenRob Johnson
 
Lecture 2--Philosophy of Science
Lecture 2--Philosophy of ScienceLecture 2--Philosophy of Science
Lecture 2--Philosophy of ScienceBrittany Milbourn
 
Lecture 1--Research Theory & Philosophy
Lecture 1--Research Theory & PhilosophyLecture 1--Research Theory & Philosophy
Lecture 1--Research Theory & PhilosophyBrittany Milbourn
 
Lecture 12 unobtrusive designs and data collection
Lecture   12   unobtrusive designs and data collectionLecture   12   unobtrusive designs and data collection
Lecture 12 unobtrusive designs and data collectionBrittany Milbourn
 
Lecture 8 single subject designs i
Lecture   8   single subject designs iLecture   8   single subject designs i
Lecture 8 single subject designs iBrittany Milbourn
 
Lecture 9 single subject designs ii (in lab)
Lecture   9   single subject designs ii (in lab)Lecture   9   single subject designs ii (in lab)
Lecture 9 single subject designs ii (in lab)Brittany Milbourn
 

Destaque (18)

Lecture 10 between groups designs
Lecture   10   between groups designsLecture   10   between groups designs
Lecture 10 between groups designs
 
Lecture 4--Research Questions I
Lecture 4--Research Questions ILecture 4--Research Questions I
Lecture 4--Research Questions I
 
Lecture 5--Research Questions II
Lecture 5--Research Questions IILecture 5--Research Questions II
Lecture 5--Research Questions II
 
Lecture 7 measurement ii
Lecture   7   measurement iiLecture   7   measurement ii
Lecture 7 measurement ii
 
Lesson2 removing opportunities
Lesson2 removing opportunitiesLesson2 removing opportunities
Lesson2 removing opportunities
 
Lecture 6 measurement i
Lecture   6   measurement iLecture   6   measurement i
Lecture 6 measurement i
 
Fotosafari emma og nanna
Fotosafari emma og nannaFotosafari emma og nanna
Fotosafari emma og nanna
 
Goals setting
Goals settingGoals setting
Goals setting
 
Periodismo
PeriodismoPeriodismo
Periodismo
 
Lesson 4 What to do if your Identity Is Stolen
Lesson 4 What to do if your Identity Is StolenLesson 4 What to do if your Identity Is Stolen
Lesson 4 What to do if your Identity Is Stolen
 
Lecture 11 survey research
Lecture   11   survey researchLecture   11   survey research
Lecture 11 survey research
 
Lecture 2--Philosophy of Science
Lecture 2--Philosophy of ScienceLecture 2--Philosophy of Science
Lecture 2--Philosophy of Science
 
Goals setting
Goals settingGoals setting
Goals setting
 
Lecture 1--Research Theory & Philosophy
Lecture 1--Research Theory & PhilosophyLecture 1--Research Theory & Philosophy
Lecture 1--Research Theory & Philosophy
 
Lecture 12 unobtrusive designs and data collection
Lecture   12   unobtrusive designs and data collectionLecture   12   unobtrusive designs and data collection
Lecture 12 unobtrusive designs and data collection
 
Lecture 8 single subject designs i
Lecture   8   single subject designs iLecture   8   single subject designs i
Lecture 8 single subject designs i
 
Lecture 9 single subject designs ii (in lab)
Lecture   9   single subject designs ii (in lab)Lecture   9   single subject designs ii (in lab)
Lecture 9 single subject designs ii (in lab)
 
Lecture 3--Research Ethics
Lecture 3--Research EthicsLecture 3--Research Ethics
Lecture 3--Research Ethics
 

Lesson3 protect computer