SlideShare a Scribd company logo
SECURITY I.T.
Made by: Hugo Barrionuevo and Mariana Gil.
SECURITY I.T.
Index
Slide 1: Computer security.
Slide 2: Active and passive security.
Slides 3,4 & 5: Malware and silent threats.
Slide 6 & 7: Computer security software.
Slide 8: Web Security.
Slide 9: News related to cybersecurity or computer attacks.
Computer security
Set of actions, tools and devices. Its objective is to provide a computer system with
integrity, confidentiality and availability.
Protect us from:
● Ourselves
● Accidents and breakdowns
● Intrusive users
● Malicious software and malware
Some active security techniques are:
-Use an adequate password.
-Encrypt your data.
-Use a security I.T. software.
Active and passive security
Some passive security techniques are:
-Use an adequate hardware.
-Back up your data.
Malware and silent threats
Virus: program in the PC without the user’s knowledge.
Worms: infects all nodes on a computer network. Accompany malicious emails.
Spies: programme installed in the computer without user's knowledge.
Trojans: small application that has an input to our computer.
There are two types of Fraud by social
engineering.
-Phishing: Consists of asking for
confidential information persuading people
with money or other stuff.
-Rogue software: It’s a fake antivirus
system that contains a virus.
Malware and silent threats
Some applications alter the way we access
internet. They make us navigate through
fake websites and use telephone billing.
The different applications are:
-Dialer: Makes calls that give economic
benefits to the creator of the modem and
makes the user lose money. This can be
avoid using an ADSL router.
-Pharming: Impersonates the web pages to
get bank data.
-Hijacking: Consists of hijacking any
computer element.
Malware and silent threats
Spam: bulk email marketing
Keylogger: record every keystroke made by a user.
Obtaining sensitive information (passwords, bank data, etc)
New mobile devices: appearance of new mobile devices makes malware grow up.
Computer security hardware
Antivirus: detects malicious software, stops it from running, and removes it.
Compares the scanned files on the computer with their own signatures.
Heuristic systems: analyzes the internal code of the file and determines if it is a virus.
Levels: resident level or complete analisis level.
Firewall: allows or prohibits communication between the applications of our team and
the Network through the protocol TCP/IP.
Antispyware: collects information about our browsing habits and the ability to hijack our
browser home page by hijacking it by sending us to another page.
Computer security hardware
There are different security hardwares. The most recommendable Antivirus are:
For Windows: Avast and McAfee.
For Android: Avast Mobile.
For Apple: Sophos.
Web security
Advices for a safer navigation:
- Avoid suspicious web pages (http).
- Download from an official website.
- Update antivirus.
- Don’t click links from unknowns.
- Don’t put personal information.
- Inform about a product before buying.
- Be careful with .exe files.
- Use strong passwords.
- Read terms and services.
Advices for a safer smartphone:
- Use a strong password.
- Update the system.
- Install security programs.
- Don’t install unknown applications.
- Deactivate Bluetooth if it’s not in use.
- Avoid rooting.
- Avoid talking with unknowns.
News related to cybersecurity or computer
attacks.
● The cyber attacks of 2021 and those that will arrive in 2022
● 79% of Spaniards believe they are tracked by cybercriminals
● The UOC suffers a cyber attack that blocks its virtual campus
● Theft of more than 34 million dollars in Bitcoin and Ethereum occurs
● Ukraine denounces a large-scale cyber attack against the
government's computer system
● Drones, another option that cybercriminals use to steal
information
● The next-gen of cybercriminals starts from an early age
SECURITY I.T.
Made by: Hugo Barrionuevo and Mariana Gil.
SECURITY I.T.

More Related Content

PPTX
Computer security
DOCX
CLASS VII COMPUTER SECURITY
Β 
PPT
Digital Security Slide Show
PPTX
Adware
PPTX
Computer Security Presentation
PPTX
Jorge gil martΓ­nez presentation about security i.t.
PPTX
security issues
PPTX
Network basic security
Computer security
CLASS VII COMPUTER SECURITY
Β 
Digital Security Slide Show
Adware
Computer Security Presentation
Jorge gil martΓ­nez presentation about security i.t.
security issues
Network basic security

What's hot (19)

PPTX
Network security (syed azam)
PPTX
Spyware powerpoint
PDF
What is Network Security?
PDF
Presentation about security i.t. by antonio espiga and sergio gΓ³mez
PPTX
Basics of Network Security
PPTX
Computer Security 101
PPTX
Spyware
PDF
Network Security Presentation
PPTX
Malware
PDF
Cyber Security Awareness (Reduce Personal & Business Risk)
PPT
Computer security overview
Β 
PPT
Jeopardy
PPTX
INTERNET SAFETY FOR KIDS
PPT
Tutorial 9 - Security on the Internet
Β 
PPTX
Computer and network security
PPTX
Internet security software
PPT
S P Y W A R E4 S I K
PPTX
Cyber Security 03
Β 
PDF
Tip sheet
Network security (syed azam)
Spyware powerpoint
What is Network Security?
Presentation about security i.t. by antonio espiga and sergio gΓ³mez
Basics of Network Security
Computer Security 101
Spyware
Network Security Presentation
Malware
Cyber Security Awareness (Reduce Personal & Business Risk)
Computer security overview
Β 
Jeopardy
INTERNET SAFETY FOR KIDS
Tutorial 9 - Security on the Internet
Β 
Computer and network security
Internet security software
S P Y W A R E4 S I K
Cyber Security 03
Β 
Tip sheet
Ad

Similar to Presentation about security i.t. (20)

PDF
Seguridad informatica
PDF
Seguridad informatica
PDF
Seguridad informatica
PDF
IT Security.pdf
PPTX
CSC103 Digital Security
PPTX
Computer Security and Ethics
PDF
Information security
PPTX
Computing safety
PPTX
Cyber Security
PPTX
BCE L-3omputer security Basics.pptx
PPT
COMPUTER SECURITY
PPTX
Computer security and
DOCX
Cyber crime
PPTX
Cyber security
PPTX
Cyber security
PDF
Sec0001 .pdf
PPT
Computers.ppt
PPTX
Internet Security in Web 2.0
PDF
Unit14-Computer Security and ethics -downloaded.pdf
PPTX
Computer security & ethics
Seguridad informatica
Seguridad informatica
Seguridad informatica
IT Security.pdf
CSC103 Digital Security
Computer Security and Ethics
Information security
Computing safety
Cyber Security
BCE L-3omputer security Basics.pptx
COMPUTER SECURITY
Computer security and
Cyber crime
Cyber security
Cyber security
Sec0001 .pdf
Computers.ppt
Internet Security in Web 2.0
Unit14-Computer Security and ethics -downloaded.pdf
Computer security & ethics
Ad

Recently uploaded (20)

PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
Internet___Basics___Styled_ presentation
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PDF
Testing WebRTC applications at scale.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
innovation process that make everything different.pptx
PPTX
Digital Literacy And Online Safety on internet
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
QR Codes Qr codecodecodecodecocodedecodecode
international classification of diseases ICD-10 review PPT.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Job_Card_System_Styled_lorem_ipsum_.pptx
Paper PDF World Game (s) Great Redesign.pdf
PptxGenJS_Demo_Chart_20250317130215833.pptx
Internet___Basics___Styled_ presentation
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
Testing WebRTC applications at scale.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
SAP Ariba Sourcing PPT for learning material
The New Creative Director: How AI Tools for Social Media Content Creation Are...
innovation process that make everything different.pptx
Digital Literacy And Online Safety on internet
Sims 4 Historia para lo sims 4 para jugar
An introduction to the IFRS (ISSB) Stndards.pdf
Slides PPTX World Game (s) Eco Economic Epochs.pptx
presentation_pfe-universite-molay-seltan.pptx

Presentation about security i.t.

  • 1. SECURITY I.T. Made by: Hugo Barrionuevo and Mariana Gil. SECURITY I.T.
  • 2. Index Slide 1: Computer security. Slide 2: Active and passive security. Slides 3,4 & 5: Malware and silent threats. Slide 6 & 7: Computer security software. Slide 8: Web Security. Slide 9: News related to cybersecurity or computer attacks.
  • 3. Computer security Set of actions, tools and devices. Its objective is to provide a computer system with integrity, confidentiality and availability. Protect us from: ● Ourselves ● Accidents and breakdowns ● Intrusive users ● Malicious software and malware
  • 4. Some active security techniques are: -Use an adequate password. -Encrypt your data. -Use a security I.T. software. Active and passive security Some passive security techniques are: -Use an adequate hardware. -Back up your data.
  • 5. Malware and silent threats Virus: program in the PC without the user’s knowledge. Worms: infects all nodes on a computer network. Accompany malicious emails. Spies: programme installed in the computer without user's knowledge. Trojans: small application that has an input to our computer.
  • 6. There are two types of Fraud by social engineering. -Phishing: Consists of asking for confidential information persuading people with money or other stuff. -Rogue software: It’s a fake antivirus system that contains a virus. Malware and silent threats Some applications alter the way we access internet. They make us navigate through fake websites and use telephone billing. The different applications are: -Dialer: Makes calls that give economic benefits to the creator of the modem and makes the user lose money. This can be avoid using an ADSL router. -Pharming: Impersonates the web pages to get bank data. -Hijacking: Consists of hijacking any computer element.
  • 7. Malware and silent threats Spam: bulk email marketing Keylogger: record every keystroke made by a user. Obtaining sensitive information (passwords, bank data, etc) New mobile devices: appearance of new mobile devices makes malware grow up.
  • 8. Computer security hardware Antivirus: detects malicious software, stops it from running, and removes it. Compares the scanned files on the computer with their own signatures. Heuristic systems: analyzes the internal code of the file and determines if it is a virus. Levels: resident level or complete analisis level. Firewall: allows or prohibits communication between the applications of our team and the Network through the protocol TCP/IP. Antispyware: collects information about our browsing habits and the ability to hijack our browser home page by hijacking it by sending us to another page.
  • 9. Computer security hardware There are different security hardwares. The most recommendable Antivirus are: For Windows: Avast and McAfee. For Android: Avast Mobile. For Apple: Sophos.
  • 10. Web security Advices for a safer navigation: - Avoid suspicious web pages (http). - Download from an official website. - Update antivirus. - Don’t click links from unknowns. - Don’t put personal information. - Inform about a product before buying. - Be careful with .exe files. - Use strong passwords. - Read terms and services. Advices for a safer smartphone: - Use a strong password. - Update the system. - Install security programs. - Don’t install unknown applications. - Deactivate Bluetooth if it’s not in use. - Avoid rooting. - Avoid talking with unknowns.
  • 11. News related to cybersecurity or computer attacks. ● The cyber attacks of 2021 and those that will arrive in 2022 ● 79% of Spaniards believe they are tracked by cybercriminals ● The UOC suffers a cyber attack that blocks its virtual campus ● Theft of more than 34 million dollars in Bitcoin and Ethereum occurs ● Ukraine denounces a large-scale cyber attack against the government's computer system ● Drones, another option that cybercriminals use to steal information ● The next-gen of cybercriminals starts from an early age
  • 12. SECURITY I.T. Made by: Hugo Barrionuevo and Mariana Gil. SECURITY I.T.