SlideShare une entreprise Scribd logo
1  sur  16
Adware
 Software that displays pop-up
  advertising
 Adware can also track what you are
  searching for to give you more relevant
  adverts
Antivirus
 A piece of software which protects your
  computer from viruses.
 You can often download some reliable
  free internet security which will protect
  your computer from harm.
Cookies
 Files that are saved to your computer
  when you visit websites
 They normally contain information about
  your browsing habits
 Because of cookies, webpages are often
  customised to your previous searches
 Cookies also automatically fill in forms
  with previously entered information from
  other forms
Firewall
 Your first line of defence when you are
  online
 Protects your computer from hackers
 Usually programmed in your hardware
  but can also be software
 All messages from the internet are fed
  through the firewall to ensure they are
  safe
Hacker
 An experienced computer user who
  attempts to gain access to your computer
  and data without your permission
 Hackers call themselves ‘crackers’
Keylogging
 Malicious programmers, called a
  keylogger, which is used to track your
  usage of your keyboard in an attempt to
  learn your usernames and passwords
 Keyloggers can even record instant
  messages and e-mails
Trojan
 A virus that attaches itself to another
  program in order to gain access to your
  computer
 Can be known as a Trojan Horse
 Examples of these include adverts that
  claim to clear your computer of such
  viruses
Spyware
 Software which is installed on your
  computer to monitor your computer
  usage
 Spyware is often bundled in another
  piece of software you want to download
 It can also find out your e-mail
  addresses and even your bank details
Spam
 Unwanted e-mails such as advertising
 Newsletters from brands can also be
  identified as Spam
 Most e-mail account suppliers will have
  Spam filters to help you organise what
  you want and don’t want to read
Strong Password
 A strong password is one with capital
  letters, numbers and symbols
 You should have a number of secure
  passwords which you rotate when you
  join a new website
 A strong password should be as random
  as possible, therefore making it difficult
  for hackers to guess
Phishing
 The sending out of genuine looking e-
  mails in an attempt to gain personal
  details from you
 An example of this is fake e-mails from
  the bank asking you to authenticate your
  account by inputting your account
  details
Malware
   General term used for software that is
    intended to do harm to your
    computer, such as viruses, Trojans etc
Virus
 A file which tries to harm your computer
  or allow a hacker to gain access to your
  information
 Viruses are created by hackers and can
  easily bring your computer to a stand-
  still as well as using up your remaining
  memory space
How to protect your PC
1.   Download a trusted free internet security
     package
2.   Create some strong passwords and vary
     them between sites
3.   Change your passwords every 6 months
4.   Log out of a site as soon as you are
     finished
5.   Don’t click on a link if it looks dangerous
Need more help?
   Are there more terms you don’t
    understand? Check out an online jargon
    buster such as Webopedia to learn more
    what these terms mean and what you
    can do to protect yourself against them.

Contenu connexe

En vedette

Egipte jorge i mario
Egipte jorge i marioEgipte jorge i mario
Egipte jorge i mariojorgito98
 
Greg mortenson
Greg mortensonGreg mortenson
Greg mortensonNathan Ong
 
Getting to Digital Self-Governance - A Proposal
Getting to Digital Self-Governance - A ProposalGetting to Digital Self-Governance - A Proposal
Getting to Digital Self-Governance - A ProposalSelf-employed
 
John wood( social entrepreneur)
John wood( social entrepreneur)John wood( social entrepreneur)
John wood( social entrepreneur)Nathan Ong
 
Saint presentation
Saint presentationSaint presentation
Saint presentationkayy2
 
AMA Phoenix -- Delivering Happiness | 11.02.10
AMA Phoenix -- Delivering Happiness | 11.02.10AMA Phoenix -- Delivering Happiness | 11.02.10
AMA Phoenix -- Delivering Happiness | 11.02.10AMA Phoenix
 
Zwiększ efektywność e-sklepu od początku jego założenia
Zwiększ efektywność e-sklepu od początku jego założeniaZwiększ efektywność e-sklepu od początku jego założenia
Zwiększ efektywność e-sklepu od początku jego założeniaCyberlaw Beata Marek
 
TEC118 – How Do You Manage the Configuration of Your Environments from Metal ...
TEC118 –How Do You Manage the Configuration of Your Environments from Metal ...TEC118 –How Do You Manage the Configuration of Your Environments from Metal ...
TEC118 – How Do You Manage the Configuration of Your Environments from Metal ...Chris Kernaghan
 
Basic Guide to Computers
Basic Guide to ComputersBasic Guide to Computers
Basic Guide to ComputersJames Steele
 
Presentation global 20111124_rev03
Presentation global 20111124_rev03Presentation global 20111124_rev03
Presentation global 20111124_rev03mediba_inc
 
Zacharova presentation 3
Zacharova presentation 3Zacharova presentation 3
Zacharova presentation 3Elen_present
 

En vedette (13)

A2 d laser
A2 d laserA2 d laser
A2 d laser
 
Egipte jorge i mario
Egipte jorge i marioEgipte jorge i mario
Egipte jorge i mario
 
Greg mortenson
Greg mortensonGreg mortenson
Greg mortenson
 
Getting to Digital Self-Governance - A Proposal
Getting to Digital Self-Governance - A ProposalGetting to Digital Self-Governance - A Proposal
Getting to Digital Self-Governance - A Proposal
 
John wood( social entrepreneur)
John wood( social entrepreneur)John wood( social entrepreneur)
John wood( social entrepreneur)
 
Saint presentation
Saint presentationSaint presentation
Saint presentation
 
html5
html5html5
html5
 
AMA Phoenix -- Delivering Happiness | 11.02.10
AMA Phoenix -- Delivering Happiness | 11.02.10AMA Phoenix -- Delivering Happiness | 11.02.10
AMA Phoenix -- Delivering Happiness | 11.02.10
 
Zwiększ efektywność e-sklepu od początku jego założenia
Zwiększ efektywność e-sklepu od początku jego założeniaZwiększ efektywność e-sklepu od początku jego założenia
Zwiększ efektywność e-sklepu od początku jego założenia
 
TEC118 – How Do You Manage the Configuration of Your Environments from Metal ...
TEC118 –How Do You Manage the Configuration of Your Environments from Metal ...TEC118 –How Do You Manage the Configuration of Your Environments from Metal ...
TEC118 – How Do You Manage the Configuration of Your Environments from Metal ...
 
Basic Guide to Computers
Basic Guide to ComputersBasic Guide to Computers
Basic Guide to Computers
 
Presentation global 20111124_rev03
Presentation global 20111124_rev03Presentation global 20111124_rev03
Presentation global 20111124_rev03
 
Zacharova presentation 3
Zacharova presentation 3Zacharova presentation 3
Zacharova presentation 3
 

Plus de James Steele

Business plan essentials
Business plan essentialsBusiness plan essentials
Business plan essentialsJames Steele
 
What is SIP Trunking?
What is SIP Trunking?What is SIP Trunking?
What is SIP Trunking?James Steele
 
The Most Iconic Vans of All Time
The Most Iconic Vans of All TimeThe Most Iconic Vans of All Time
The Most Iconic Vans of All TimeJames Steele
 
The Green Kitchen Guide
The Green Kitchen GuideThe Green Kitchen Guide
The Green Kitchen GuideJames Steele
 
A Guide to Biryani
A Guide to BiryaniA Guide to Biryani
A Guide to BiryaniJames Steele
 
Dos and don'ts of safe driving
Dos and don'ts of safe drivingDos and don'ts of safe driving
Dos and don'ts of safe drivingJames Steele
 
Guide to the brakes
Guide to the brakesGuide to the brakes
Guide to the brakesJames Steele
 
Halo 4 gaming build up 2012
Halo 4 gaming build up 2012Halo 4 gaming build up 2012
Halo 4 gaming build up 2012James Steele
 
Top 5 greatest inventions
Top 5 greatest inventionsTop 5 greatest inventions
Top 5 greatest inventionsJames Steele
 
Nintendo wii internet connection setup
Nintendo wii internet connection setupNintendo wii internet connection setup
Nintendo wii internet connection setupJames Steele
 
Understanding energy
Understanding energyUnderstanding energy
Understanding energyJames Steele
 
What are data networks?
What are data networks?What are data networks?
What are data networks?James Steele
 

Plus de James Steele (12)

Business plan essentials
Business plan essentialsBusiness plan essentials
Business plan essentials
 
What is SIP Trunking?
What is SIP Trunking?What is SIP Trunking?
What is SIP Trunking?
 
The Most Iconic Vans of All Time
The Most Iconic Vans of All TimeThe Most Iconic Vans of All Time
The Most Iconic Vans of All Time
 
The Green Kitchen Guide
The Green Kitchen GuideThe Green Kitchen Guide
The Green Kitchen Guide
 
A Guide to Biryani
A Guide to BiryaniA Guide to Biryani
A Guide to Biryani
 
Dos and don'ts of safe driving
Dos and don'ts of safe drivingDos and don'ts of safe driving
Dos and don'ts of safe driving
 
Guide to the brakes
Guide to the brakesGuide to the brakes
Guide to the brakes
 
Halo 4 gaming build up 2012
Halo 4 gaming build up 2012Halo 4 gaming build up 2012
Halo 4 gaming build up 2012
 
Top 5 greatest inventions
Top 5 greatest inventionsTop 5 greatest inventions
Top 5 greatest inventions
 
Nintendo wii internet connection setup
Nintendo wii internet connection setupNintendo wii internet connection setup
Nintendo wii internet connection setup
 
Understanding energy
Understanding energyUnderstanding energy
Understanding energy
 
What are data networks?
What are data networks?What are data networks?
What are data networks?
 

Dernier

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Online security terms

  • 1.
  • 2. Adware  Software that displays pop-up advertising  Adware can also track what you are searching for to give you more relevant adverts
  • 3. Antivirus  A piece of software which protects your computer from viruses.  You can often download some reliable free internet security which will protect your computer from harm.
  • 4. Cookies  Files that are saved to your computer when you visit websites  They normally contain information about your browsing habits  Because of cookies, webpages are often customised to your previous searches  Cookies also automatically fill in forms with previously entered information from other forms
  • 5. Firewall  Your first line of defence when you are online  Protects your computer from hackers  Usually programmed in your hardware but can also be software  All messages from the internet are fed through the firewall to ensure they are safe
  • 6. Hacker  An experienced computer user who attempts to gain access to your computer and data without your permission  Hackers call themselves ‘crackers’
  • 7. Keylogging  Malicious programmers, called a keylogger, which is used to track your usage of your keyboard in an attempt to learn your usernames and passwords  Keyloggers can even record instant messages and e-mails
  • 8. Trojan  A virus that attaches itself to another program in order to gain access to your computer  Can be known as a Trojan Horse  Examples of these include adverts that claim to clear your computer of such viruses
  • 9. Spyware  Software which is installed on your computer to monitor your computer usage  Spyware is often bundled in another piece of software you want to download  It can also find out your e-mail addresses and even your bank details
  • 10. Spam  Unwanted e-mails such as advertising  Newsletters from brands can also be identified as Spam  Most e-mail account suppliers will have Spam filters to help you organise what you want and don’t want to read
  • 11. Strong Password  A strong password is one with capital letters, numbers and symbols  You should have a number of secure passwords which you rotate when you join a new website  A strong password should be as random as possible, therefore making it difficult for hackers to guess
  • 12. Phishing  The sending out of genuine looking e- mails in an attempt to gain personal details from you  An example of this is fake e-mails from the bank asking you to authenticate your account by inputting your account details
  • 13. Malware  General term used for software that is intended to do harm to your computer, such as viruses, Trojans etc
  • 14. Virus  A file which tries to harm your computer or allow a hacker to gain access to your information  Viruses are created by hackers and can easily bring your computer to a stand- still as well as using up your remaining memory space
  • 15. How to protect your PC 1. Download a trusted free internet security package 2. Create some strong passwords and vary them between sites 3. Change your passwords every 6 months 4. Log out of a site as soon as you are finished 5. Don’t click on a link if it looks dangerous
  • 16. Need more help?  Are there more terms you don’t understand? Check out an online jargon buster such as Webopedia to learn more what these terms mean and what you can do to protect yourself against them.