SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
Computer Security
Made by:
Alejandro
INDEX
● Computer security. What should we protect ourselves?
● Active and passive security
● Malware and threats Silent
● Malware and silent threats
● Computer security software
● Web Security
● News related to cybersecurity or computer attacks
Computer security. What should we protect ourselves?
Use strong passwords.
Separate work from personal.
Keep the router in good condition.
Security tools.
Everything updated correctly.
Securing Io devices.
Protect wireless networks.
Opt for a VPN.
Active and passive security
Active security is
responsible for preventing
computer systems from
suffering any damage. The
objective of passive security
techniques is to minimize the
effects or disasters caused
by an accident, a user or
malware to computer
systems.
Malware and threats Silent
Malware is a general term to refer
to any type of “malicious software”
designed to infiltrate your device
without your knowledge. There are
many types of malware, and each
finds its targets in a different way.
However, all variants share two
defining features: they are
surreptitious and actively work
against the interests of the person
attacked.
Malware and silent threats
Our computer is exposed to a
series of small programs or
malicious software that can enter
the system through emails,
browsing false or infected web
pages, the transmission of
contaminated files from media
such as magnetic disks, memory,
CD, DVD, etc. We can find the
following types of malicious
software:
● Computer virus
● Computer worm
● Trojan
● Spy
● Dialers
● Pharming
● Phishing
Computer security software
A computer security
software is a program that
serves to protect the privacy
of the information contained
in a computer system. This
solution allows companies to
guarantee the security of
their data and protect
themselves against possible
computer attacks.
Web Security
Web security requires
vigilance in all aspects of the
design and use of a website.
This introductory article
won't make you a website
security guru, but it will help
you understand where
threats come from and what
you can do to harden your
web application against the
most common attacks.
News related to cybersecurity or computer attacks
A computer attack is an attempt to
access your computer equipment or
servers, by introducing viruses or
malware files, to alter its operation,
cause damage or steal sensitive
information for your company.
- Phishing attacks.
- Malware attacks.
- Web attacks.
Computer Security
Made by:
Alejandro
New:
https://elpais.com/tecnologia/transformacion-digital/2021-12-18
/tiene-cinco-euros-puede-entrar-al-internet-oscuro-a-comprar-u
n-virus-y-le-sobrara-dinero.html

Mais conteúdo relacionado

Mais procurados

Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 

Mais procurados (19)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
security issues
security issuessecurity issues
security issues
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malware
MalwareMalware
Malware
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Ps1
Ps1Ps1
Ps1
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 

Semelhante a Alejandro espiga noriega presentation about security i.t.

Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 

Semelhante a Alejandro espiga noriega presentation about security i.t. (20)

“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
SECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxSECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Beware of cyber security threats
Beware of cyber security threatsBeware of cyber security threats
Beware of cyber security threats
 

Último

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Último (20)

Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 

Alejandro espiga noriega presentation about security i.t.

  • 2. INDEX ● Computer security. What should we protect ourselves? ● Active and passive security ● Malware and threats Silent ● Malware and silent threats ● Computer security software ● Web Security ● News related to cybersecurity or computer attacks
  • 3. Computer security. What should we protect ourselves? Use strong passwords. Separate work from personal. Keep the router in good condition. Security tools. Everything updated correctly. Securing Io devices. Protect wireless networks. Opt for a VPN.
  • 4. Active and passive security Active security is responsible for preventing computer systems from suffering any damage. The objective of passive security techniques is to minimize the effects or disasters caused by an accident, a user or malware to computer systems.
  • 5. Malware and threats Silent Malware is a general term to refer to any type of “malicious software” designed to infiltrate your device without your knowledge. There are many types of malware, and each finds its targets in a different way. However, all variants share two defining features: they are surreptitious and actively work against the interests of the person attacked.
  • 6. Malware and silent threats Our computer is exposed to a series of small programs or malicious software that can enter the system through emails, browsing false or infected web pages, the transmission of contaminated files from media such as magnetic disks, memory, CD, DVD, etc. We can find the following types of malicious software: ● Computer virus ● Computer worm ● Trojan ● Spy ● Dialers ● Pharming ● Phishing
  • 7. Computer security software A computer security software is a program that serves to protect the privacy of the information contained in a computer system. This solution allows companies to guarantee the security of their data and protect themselves against possible computer attacks.
  • 8. Web Security Web security requires vigilance in all aspects of the design and use of a website. This introductory article won't make you a website security guru, but it will help you understand where threats come from and what you can do to harden your web application against the most common attacks.
  • 9. News related to cybersecurity or computer attacks A computer attack is an attempt to access your computer equipment or servers, by introducing viruses or malware files, to alter its operation, cause damage or steal sensitive information for your company. - Phishing attacks. - Malware attacks. - Web attacks.