logging in or signing up Internet Security (cagatay parlak) kalrap Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Copy Does not support media & animations WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 615 Category: Science & Tech.. License: All Rights Reserved Like it (2) Dislike it (0) Added: April 26, 2009 This Presentation is Public Favorites: 0 Presentation Description No description available. Comments Posting comment... Premium member Presentation Transcript Internet Security : Internet Security Millions of internet users in risky. Prepaired by Çagatay Parlak What is the internet security? : What is the internet security? When a computer connects to a network and begins communicating with others, it is taking a risk. Internet security involves the protection of a computer's internet account and files from intrusion of an unknown user. Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer's data. What are the risks? : What are the risks? Vulnerabilities Trojan horses Worms Viruses Keyloggers Sniffers Phishing Trojan Horses : Trojan Horses The Trojan horse, also known as trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine, giving them the ability to save their files on the user's computer or even watch the user's screen and control the computer. Phishing : Phishing In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting. Viruses : Viruses A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. Computer viruses can damage your computer software system even cause collapse your system. Its can delete your files. Keyloggers : Keyloggers Keyloggers are provide logging which you press on the keyboard buttons. Hackers can steal your passwords or your personal informations. Computer Worms : Computer Worms A computer worm differs from a computer virus in that a computer worm can run itself. A computer worm can spread without a host program, although some modern computer worms also use files to hide inside. It can damage your files and operation systems. It can spread rapidly on your system or lan to other computers. Sniffers : Sniffers is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. Hackers can sniff your packets with some softwares or hardwares and they can steal your creadit card numbers, paswords or e-mails. How can we protect treats? : How can we protect treats? We must use antiviurs softwares. We must use firewall for hacker attacks We shouldn’t open every files. When we receive an email, we should be carefully We shouldn’t share our personel information on the internet. We shouldn’t accept every file, when we talk our friends such as msn messenger. Slide 14: If we don’t obey protection rules, we can see some message on our websites by hackers. We can lose our esteem like on picture. References : References http://img208.imageshack.us/img208/1195/chart.jpg http://www.howdoigetridofspyware.com/wp-content/uploads/2009/03/isitsafecompressed.jpg http://computersafetytips.files.wordpress.com/2008/12/computer-virus-picturejpg.jpg http://wwwdelivery.superstock.com/WI/223/1614/PreviewComp/SuperStock_1614R-10559.jpg http://www.microsoft.com/protect/images/viruses/diagram.jpg http://www.gulfnews.com/images/08/09/16/16_bz_atm_bank_hacker01_5.gif http://www.terminally-incoherent.com/blog/wp-content/uploads/2007/12/hackers.png Thank you for your attention : Thank you for your attention If you wish more information about this topic, you can visit my personal web page or gemoodle blog. You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.