Académique Documents
Professionnel Documents
Culture Documents
By: Albert
Spencer
Jenny
Computer Virus
A computer virus is a program that spreads malicious code by
coping itself and infecting host computers.
Spyware
Spyware is a type of malware that is installed on a computer
without the knowledge of the owner in order to collect the
owner's private information.
Protect computer
- Install Anti-Virus Soft ware
- Update All Software
- Install only Trusted Software
- Avoid P2P File Sharing Software
- Delete Unknown Emails
- Do not click on Ads
- Run Virus Scans Regularly
- Be careful what you attach to your computer
- Avoid Shady Web Sites
- Turn On Install a Firewall
- Secure Your Wireless Network
- Use a complex Password for login
Why it is important
1. They infect your file allocation tables causing
corruption
2. they spread from one file to another and at
times mutate into more evil and malicious viruses
3. cause excess CPU usage
4. destroy your registry
PHISHING
When internet fraudsters
impersonate a business to
trick you into giving out your
personal information, its
called phishing.
INDENTITY THEFT
Identity theft is a crime in which an imposter obtains key pieces of
personal information
HOW TO PROTECT?
1. Destroy private records and
statements. Tear up credit cards
statements and other documents that
contain private financial information.
Why it is important?
Encryption
Encrypt
Encryption
History
Importance
preventing trespassers
Cyberstalking
- the use of the Internet or other electronic
- to stalk or harass an individual, a group, or an organization.
False accusations
Defamation
Slander
Libel
Monitoring
Identity theft
Threats
Vandalism
Solicitation for sex
Gathering information that
may be used to threaten or
harass.
Serious
Destroy Victim
Friendships
Credit
Careers
Self-image
Confidence
Mental ans physical danger
Help Them
Talk with the victim
Contact the police
Resources:
http://winarticles.net/wp-content/uploads/2013/06/infected-computer.jpg
http://www.pctools.com/security-news/what-do-computer-viruses-do/
http://www.whoishostingthis.com/blog/2015/06/01/8-worst-viruses/
http://www.computerhope.com/issues/ch001045.htm
sources
P1-P2
https://austinisafecker.wordpress.com/2014/04/09/eek-windows-xp-has-died/
Larry M,2009,https://answers.yahoo.com/question/index?qid=20090212180009AABcoVW
P3
Rouse M,2009,http://searchsecurity.techtarget.com/defnition/identity-theft
Lord N,2016,
https://digitalguardian.com/blog/phishing-attack-prevention-how-identify-avoid-phishing-scams
P4
Rouse M,2009,http://searchsecurity.techtarget.com/defnition/identity-theft
P5-P6
https://www.iconfnder.com/icons/415064/email_password_key_locked_private_protect_email_safety_security_icon
http://www.teclasap.com.br/tear-apart-x-tear-x-tear-qual-e-diferenca/
City of Houston.2016, http://www.houstontx.gov/police/crime_prevention/id_theft.htm
VIAWIT,2013 https://pearlsofprofundity.wordpress.com/2013/06/27/identity-theft/
P7
How to greek,2006,
http://www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-it/
P8
http://unwire.pro/2015/07/14/unsecure-public-wif-hacking/security/
Dratch D,2011,
http://www.creditcards.com/credit-card-news/8-tips-keep-cards-safe-shopping-online-1280.php
Norcie G,2015, https://cdt.org/blog/make-your-password-exponentially-more-secure/
P9
US-Cert,2015,https://www.us-cert.gov/ncas/tips/ST07-001
Sources
Cambridge University Press. (May 18, 2016). Encrypt.
Retrieved from http://dictionary.cambridge.org/search/english/direct/?q=encryption
Packetworks Blog Editor. (May 25, 2015). Importance of Encryption for Corporate
Data Security.
Retrieved from http://www.packetworks.net/blog/encryption.htm
(April 17, 2016). Cyberstalking.
Retrieved from https://en.wikipedia.org/wiki/Cyberstalking
Techopedia. (May 18, 2016). Cyberstalking.
Retrieved from https://www.techopedia.com/definition/14326/cyberstalking
Duhaime, Lloyd. (October 31, 2011). Stalking.
Retrieved from http://www.duhaime.org/LegalResources/CriminalLaw/LawArticle95/Stalking.aspx