SlideShare a Scribd company logo
COMPUTER SECURITY
     BY RJ FARRAJ
HISTORY OF HACKING

• Hacking has been going on since the 1930’s when
  Polish cryptologists broke the Enigma machine
  code.

• It proved to be the start of a long history of
  computer hacking.
PROTECTION FROM HACKERS

• One way of protect your computer from hackers is
  you get anti virus protection for your computer.

• Most are free but they still work very well

• http://www.online-tech-tips.com/computer-
  tips/how-to-protect-your-computer-from-hackers-
  spyware-and-viruses/
LAWS AGAINST HACKERS

• One law on hackers is that hackers can not a hack
  a government computer and can be punished if
  the law is broken
• Punishments could be a hefty fine to jail time
• Other countries like Germany have similar laws
  about hacking as well

• http://computer.howstuffworks.com/hacker3.htm
AUTHENTICATION

• If you have a Facebook or MySpace or a file that
  holds business data make sure u have a password
  or some type of security.
• But also make sure that the password has a lot of
  letters so it is more secured.
• Other ways of protection that is used for a
  computer could b a finger print or voice print
THE END

More Related Content

PPTX
Ethical Hacking
PDF
Hacking
PPTX
ACESnWS cyber security tips
PPTX
Hacking (1)
KEY
Computer crime hacking
PPT
Hacking
PPTX
CYBER ETHICS, CRIMES AND SAFTY
Ethical Hacking
Hacking
ACESnWS cyber security tips
Hacking (1)
Computer crime hacking
Hacking
CYBER ETHICS, CRIMES AND SAFTY

What's hot (18)

PPT
Ethical hacking-presentation-updated(1by )Rasheed
PPTX
Hacking (cs192 report )
PPT
All about Hacking
PPT
Threats to network
PPTX
Internet secutity ppt by vaishnavi khandelwal
PPTX
Hacking its types and the art of exploitation
PPT
PDF
Hacking
PPTX
Ethical Hacking
PPTX
Computing remotely in a secure manner
PPT
Basic penetration testing & Ethical Hacking 2nd module
PPT
Introduction To Computer Security
PPTX
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
PPT
Computer security and malware by shahzad younas
PPTX
Final ppt
PPT
Hacking
PPTX
IT Security DOs and DON'Ts
PPTX
Ethical hacking-presentation-updated(1by )Rasheed
Hacking (cs192 report )
All about Hacking
Threats to network
Internet secutity ppt by vaishnavi khandelwal
Hacking its types and the art of exploitation
Hacking
Ethical Hacking
Computing remotely in a secure manner
Basic penetration testing & Ethical Hacking 2nd module
Introduction To Computer Security
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
Computer security and malware by shahzad younas
Final ppt
Hacking
IT Security DOs and DON'Ts
Ad

Similar to Computer security (20)

PPTX
Im260 computer hacking powerpoint
PPTX
Technology in a global society presentation
PPTX
Personal Internet Security System
PPTX
Network security
PPT
Chapter 1.ppt
PDF
Introduction of hacking and cracking
PPTX
Hacking and its types
PPTX
HACKING presentation by Team Shivam.pptx
PPT
Ch # 10 computer security risks and safe guards
PPTX
Ethical Hacking Redefined
PDF
The History of Cybersecurity - Servnet.pdf
PPTX
Computer-Security.pptx
PPT
Ethical hacking
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPT
PPTX
Hacking & its types
PPTX
HACKING
PDF
What-is-computer-security
PPTX
Hacking and cracking
PPTX
Internet Security in Web 2.0
Im260 computer hacking powerpoint
Technology in a global society presentation
Personal Internet Security System
Network security
Chapter 1.ppt
Introduction of hacking and cracking
Hacking and its types
HACKING presentation by Team Shivam.pptx
Ch # 10 computer security risks and safe guards
Ethical Hacking Redefined
The History of Cybersecurity - Servnet.pdf
Computer-Security.pptx
Ethical hacking
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking & its types
HACKING
What-is-computer-security
Hacking and cracking
Internet Security in Web 2.0
Ad

Recently uploaded (20)

PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Mushroom cultivation and it's methods.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Getting Started with Data Integration: FME Form 101
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
project resource management chapter-09.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Heart disease approach using modified random forest and particle swarm optimi...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
cloud_computing_Infrastucture_as_cloud_p
Mushroom cultivation and it's methods.pdf
A Presentation on Touch Screen Technology
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A novel scalable deep ensemble learning framework for big data classification...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Getting Started with Data Integration: FME Form 101
A comparative analysis of optical character recognition models for extracting...
Chapter 5: Probability Theory and Statistics
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Tartificialntelligence_presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Hindi spoken digit analysis for native and non-native speakers
project resource management chapter-09.pdf
OMC Textile Division Presentation 2021.pptx
Heart disease approach using modified random forest and particle swarm optimi...

Computer security

  • 1. COMPUTER SECURITY BY RJ FARRAJ
  • 2. HISTORY OF HACKING • Hacking has been going on since the 1930’s when Polish cryptologists broke the Enigma machine code. • It proved to be the start of a long history of computer hacking.
  • 3. PROTECTION FROM HACKERS • One way of protect your computer from hackers is you get anti virus protection for your computer. • Most are free but they still work very well • http://www.online-tech-tips.com/computer- tips/how-to-protect-your-computer-from-hackers- spyware-and-viruses/
  • 4. LAWS AGAINST HACKERS • One law on hackers is that hackers can not a hack a government computer and can be punished if the law is broken • Punishments could be a hefty fine to jail time • Other countries like Germany have similar laws about hacking as well • http://computer.howstuffworks.com/hacker3.htm
  • 5. AUTHENTICATION • If you have a Facebook or MySpace or a file that holds business data make sure u have a password or some type of security. • But also make sure that the password has a lot of letters so it is more secured. • Other ways of protection that is used for a computer could b a finger print or voice print