Internet Security - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Internet Security

Description:

'Hacker' was originally a positive term for a person who was very skilled with ... Antivirus software such as: McAfee VirusScan, Norton Antivirus, Panda Software ... – PowerPoint PPT presentation

Number of Views:23
Avg rating:3.0/5.0
Slides: 13
Provided by: key64
Category:

less

Transcript and Presenter's Notes

Title: Internet Security


1
Internet Security
  • Group 6
  • James Richards, Kellie Yood, Ryan Ferer, Andrew
    Renton

2
Intro/Outline
  • History of Hacking
  • Operating Systems
  • Hacking Information
  • Cookies
  • Phishing
  • Viruses
  • Protection Against Viruses
  • Future of Hacking
  • Conclusion
  • References

3
History of Hacking
  • Hacker was originally a positive term for a
    person who was very skilled with computers and
    their programming systems.
  • In the 1980s government started a crackdown on
    computer hacking.
  • The Computer Fraud and Abuse Act law was created
    to reduce the hacking of computer systems.
  • Computer Emergency Response Team (CERT) was
    created by U.S. defense to investigate the
    attacks on computer networks.
  • In the 1990s Federal web sites are now the new
    target for the elite hackers.
  • In the late 1990s hackers are able to crack
    military and governmental codes.
  • In the early 2000s viruses and spamming are
    introduced.

4
Operating Systems
  • Different Operating Systems
  • Vulnerability of Operating Systems
  • Who is Vulnerable?

5
Hacking Information
  • Why Hackers do what they do?
  • How are Systems Vulnerable?
  • What can you do?

6
Cookies
  • What are Internet Cookies?
  • Should you be concerned?
  • What can you do?

7
Phishing
  • What is Phishing?
  • Is it a threat to internet security?
  • How to protect yourself.

8
Viruses
  • Are you safe?
  • Easily disguised
  • Also known as Trojan Horse, spiders, worms, bugs
    etc.
  • Can spread to other computers
  • Deletion of data

9
Protection Against Viruses
  • Antivirus software such as McAfee VirusScan,
    Norton Antivirus, Panda Software
  • Keep antivirus software up to date
  • Be smart!

10
Future of Hacking
  • Self Recovery Systems
  • A system that detects intrusions and
    simultaneously works on fixing it.
  • Digital Pearl Harbour
  • As technology gets smarter, will hackers
    ultimately get smarter?
  • Today's sloppiness will become tomorrow's
    chaos.
  • -Scott Berinato

11
Conclusion
12
References
  • Author Unknown. (January 1st, 2007). What is
    Antivirus Software? Retrieved May 23, 2007, from
    http//www.microsoft.com/protect/computer/basics/a
    ntivirus.mspx
  • Author Unknown. (October 23, 2006). What is a
    Computer Virus? Retrieved May 23rd, 2007, from
    http//www.microsoft.com/protect/computer/basics/v
    irus.mspx
  • Brain, M. (2002, March). How Computer Viruses
    Work. Plant Engineering, 56(3), 80. Retrieved May
    24, 2007, from Computers Applied Sciences
    Complete database.
  • Brain, M (2007). How Internet Cookies Work.
    Retrieved May 24, 2007, from How Stuff Works
    Website http//www.howstuffworks.com/cookie.htm
  • Denning, D. E. (1987). An intrusion-detection
    model. IEEE Transactions on Software Engineering,
    SE-13(2), 222-232. Retrieved May 24, 2007, from
    Computer and Information Systems database.
  • Lee, S. C., Davis, L. B. (2003). Learning from
    experience Operating system vulnerability
    trends. IT Professional, 5(1), 17-24. Retrieved
    May 24, 2007, from Computer and Information
    Systems database.
  • More, R. (2007, March). Internet Security.
    Presented at a MGIS 3351-Management Information
    Systems lecture at Dalton State College.
  • Mozilla (2007). Phishing Protection. Retrieved
    May 24, 2007, from Mozilla Firefox Website
    http//www.mozilla.com/en-US/firefox/phishing-prot
    ection/
Write a Comment
User Comments (0)
About PowerShow.com