Sean Nagelski, Kristina Klima, and Kelly Sipko.

13
Internet Securtiy Sean Nagelski, Kristina Klima, and Kelly Sipko

Transcript of Sean Nagelski, Kristina Klima, and Kelly Sipko.

Internet Securtiy

Internet SecurtiySean Nagelski, Kristina Klima, and Kelly Sipko

Internet SecurityEstablish rules and measure to use against attacks over the InternetPrivacy SettingsFirewalls

SchoolsPros:Cons:Kids stay focusedSafetyLearn how to use academic search enginesCant researchReduces teaching optionsLess options for resources

Businesses Pros:Cons:Helps prevent fraud/hackingIncrease costumer satisfactionStay focusedAffordability Too much security

Privacy SettingsSettings that allow the administrator to control the collection, use, and distribution of personal data FacebookTwitterTumblrYouTube

Facebook/Twitter Activity

Real Life StoriesYouTube VideoVirusesAccording to Microsoft.com, viruses are small software programs...that interfere with computer operationHarm data, spread to others through email, destroy hard driveContracted through emails, downloads, CDs, etccan be instantaneous or dormant

VirusesSome types:Worm: replicates self through email attachmentsFile infectors: attached to files; when program loads, so does virusMacro viruses: attack Word; inserts unwanted words/phrasesSpyware: pop-up windows that literally spy on your computer by sending out private info

VirusesThe best way to guard against viruses is to know the origin of every program and everything you download

FirewallsHardware or software that slows the invasion of a computer system by blocking viruses and hackers (Gil)Monitors traffic and blocks certain ports while only allowing specified program and servicesRouters: limit traffic from certain IP addresses

AntivirusMost protect against more than just viruses, such as any malicious softwareSecurity SuitesNeed to be updated because viruses and other malicious software are constantly updated