1 / 21

Infotech

Infotech. Unit 19 INTERNET SECURITY. Prepared by: JAWEED AHMED KHAN. Security and Privacy on the internet. Hackers Be Careful. Hacker. a person who secretly finds a way of looking at and/or changing information on sb else's computer system without permission .

lorne
Download Presentation

Infotech

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Infotech Unit 19 INTERNET SECURITY Prepared by: JAWEED AHMED KHAN

  2. Security and Privacy on the internet

  3. Hackers Be Careful

  4. Hacker a person who secretly finds a way of looking at and/or changing information on sb else's computer system without permission

  5. How to make safe transactions?

  6. Security on the web

  7. RELAX Set all security alerts to high on your web browser. Use the browsers that displays lock sign on the website and enables you to delete cookies.

  8. For online banking Make sure banks provide digital certificates. Use a browser that is compliant with SSL(Secure Sockets layer)

  9. Email Privacy Put it in virtual envelope- encode it with encryption. Use the freeware invented by Phil Zimmerman called PRETTY GOOD PRIVACY.

  10. Phil Zimmerman

  11. NETWORK SECURITY

  12. Methods of Protection

  13. Encryption Changes data into a secret code so that someone with a key can read it.

  14. Decryption Converts encrypted data back into its original form.

  15. Malware Protection

  16. Malware are malicious software designed to damage your computer . Example:- Viruses, Trojans, Worms, Spyware.

  17. A virus can enter PC via infected discs or internet. • A worm spreads through e- mail attachments. • A Trojan horse is disguised as useful program but may attack data security. • Spyware and adware collect information from your PC. They come with ads and free downloads.

  18. So, If You want to protect your PC

  19. Don’t open e-mail from strangers. Take care when downloading files. Update your anti – virus.

  20. Note

  21. Thank You

More Related