SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
INFORMÁTICA: Amenazas



A firewall is a part of a computer system or network that is designed to block
unauthorized access while permitting authorized communications. It is a device or
set of devices configured to permit, deny, encrypts, decrypt all (in and out)
computer traffic between different security domains based upon a set of rules and
other criteria.

Firewalls can be implemented in either hardware or software, or a combination of
both. Firewalls are frequently used to prevent unauthorized Internet users from
accessing private networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security
criteria.

Antivirus (or anti-virus) software is used to prevent, detect, and remove
malware, including computer viruses, worms, and trojan horses. Such programs
may also prevent and remove adware, spyware, and other forms of malware.

A variety of strategies are typically employed. Signature-based detection involves
searching for known malicious patterns in executable code. However, it is possible
for a user to be infected with new malware in which no signature exists yet.

Some antivirus software can also predict what a file will do if opened/run by
emulating it in a sandbox and analyzing what it does to see if it performs any
malicious actions. If it does, this could mean the file is malicious.

However, no matter how useful antivirus software is, it can sometimes have
drawbacks. Antivirus software can degrade computer performance if it is not
designed efficiently. Inexperienced users may have trouble understanding the
prompts and decisions that antivirus software presents them with. An incorrect
decision may lead to a security breach.

Virus hoaxes are messages, usually sent by email, that amount to little more than
chain letters. They pretend to alert you to the latest "undetectable" virus and simply
waste your time and Internet bandwidth. The best course of action is to delete
these hoaxes - they can cause genuine fear and alarm in the disabled, elderly and
other vulnerable groups.

Signature based detection is the most common method. To identify viruses and
other malware, antivirus software compares the contents of a file to a dictionary of
virus signatures. Because viruses can embed themselves in existing files, the entire
file is searched, not just as a whole, but also in pieces.

Malicious activity detection is another approach used to identify malware. In this
approach, antivirus software monitors the system for suspicious program behavior.

Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz     Página 1
INFORMÁTICA: Amenazas



If suspicious behavior is detected, the suspect program may be further investigated,
using signature based detection or another method listed in this section. This type
of detection can be used to identify unknown viruses or variants on existing viruses.

Heuristic-based detection, like malicious activity detection, can be used to identify
unknown viruses. This can be accomplished in one of two ways: file analysis and file
emulation.

File analysis is the process of searching a suspect file for virus-like instructions. For
example, if a program has instructions to reformat the C drive, the antivirus
software might further investigate the file. One downside of this feature is the large
amount of computer resources needed to analyse every file, resulting in slow
operation.

File emulation is another heuristic approach. File emulation involves executing a
program in a virtual environment and logging what actions the program performs.
Depending on the actions logged, the antivirus software can determine if the
program is malicious or not and then carry out the appropriate disinfection actions.

Symptoms of a virus on your system:

   •   Slow PC performance
   •   Erratic computer behavior
   •   Unexplained data loss
   •   Frequent computer crashes



Anti-Spam: E-mail spam, also known as junk e-mail, is a subset of spam that
involves nearly identical messages sent to numerous recipients by e-mail.

To prevent e-mail spam, both end users and administrators of e-mail systems use
various anti-spam techniques. Some of these techniques have been embedded in
products, services and software.

Anti-Spyware: Spyware is a type of malware that is installed on computer and
collects information about users without their knowledge. The presence of spyware
is typically hidden from the user. Typically, spyware is secretly installed on the user's
personal computer. Sometimes, however, spywares such as keyloggers are installed
by the owner of a shared, corporate, or public computer on purpose in order to
secretly monitor other users.




Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz        Página 2
INFORMÁTICA: Amenazas



Programs such as Lavasoft's Ad-Aware SE y Spybot - Search & Destroy rapidly gained
popularity as effective tools to remove, and in some cases intercept, spyware
programs.

Anti-spyware programs can combat spyware in two ways:

   1. They can provide real time protection against the installation of spyware
      software on your computer. This type of spyware protection works the same
      way as that of anti-virus protection in that the anti-spyware software scans
      all incoming network data for spyware software and blocks any threats it
      comes across.
   2. Anti-spyware software programs can be used solely for detection and
      removal of spyware software that has already been installed onto your
      computer.

Such programs inspect the contents of the Windows registry, the operating system
files, and installed programs, and remove files and entries which match a list of
known spyware components. Real-time protection from spyware works identically
to real-time anti-virus protection: the software scans disk files at download time,
and blocks the activity of components known to represent spyware.

Phising: Masquerading as a trustworthy person or business, phishers attempt to
steal sensitive financial or personal information through fraudulent email or instant
messages. How can you tell the difference between a legitimate message and a
phishing scam? Educate yourself on the latest tricks and scams.

What can phishing do to me?

After you’ve responded to a phishing scam, the attacker can:

   •   Hijack your usernames and passwords
   •   Steal your money and open credit card and bank accounts in your name
   •   Request new account Personal Identification Numbers (PINs) or additional
       credit cards
   •   Make purchases
   •   Add themselves or an alias that they control as an authorized user so it’s
       easier to use your credit
   •   Obtain cash advances
   •   Use and abuse your Social Security number
   •   Sell your information to other parties who will use it for illicit or illegal
       purposes




Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz    Página 3
INFORMÁTICA: Amenazas



How will I know?

Phishers often pretend to be legitimate companies. Their messages may sound
genuine and their sites can look remarkably like the real thing. It can be hard to tell
the difference, but you may be dealing with a phishing scam if you see the
following:

   •   Requests for confidential information via email or instant message
   •   Emotional language using scare tactics or urgent requests to respond
   •   Misspelled URLs, spelling mistakes or the use of sub-domains
   •   Links within the body of a message
   •   Lack of a personal greeting or customized information within a message.
       Legitimate emails from banks and credit card companies will often include
       partial account numbers, user name or password.



Hackers & Predators: People, not computers, create computer security threats
and malware. Hackers and predators are programmers who victimize others for
their own gain by breaking into computer systems to steal, change or destroy
information as a form of cyber-terrorism. What scams are they using lately? Learn
how to combat dangerous malware and stay safe online.

What can hackers and predators do to me?

While your computer is connected to the Internet, the malware a hacker has
installed on your PC quietly transmits your personal and financial information
without your knowledge or consent. Or, a predator may pounce on the private
information you unwittingly revealed. In either case, they can do the same as a
Phising attack.




Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz      Página 4

Contenu connexe

Tendances

IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Data Security
Data SecurityData Security
Data Securitybackdoor
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?EC-Council
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Malicion software
Malicion softwareMalicion software
Malicion softwareA. Shamel
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID SystemGayathridevi120
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRameesha1
 

Tendances (20)

internet security
internet securityinternet security
internet security
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Data Security
Data SecurityData Security
Data Security
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Security communication
Security communicationSecurity communication
Security communication
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Ransomware
RansomwareRansomware
Ransomware
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Computer security
Computer securityComputer security
Computer security
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 

Similaire à Amenazas Informática

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smartKanha Sahu
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 

Similaire à Amenazas Informática (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 

Plus de Dani Díaz

Internet con google
Internet con googleInternet con google
Internet con googleDani Díaz
 
Photoshop atajos de teclado
Photoshop  atajos de tecladoPhotoshop  atajos de teclado
Photoshop atajos de tecladoDani Díaz
 
2. photoshop piel de piedra
2. photoshop  piel de piedra2. photoshop  piel de piedra
2. photoshop piel de piedraDani Díaz
 
1. photoshop retoque facial
1. photoshop  retoque facial1. photoshop  retoque facial
1. photoshop retoque facialDani Díaz
 
Premiere conceptos básicos
Premiere  conceptos básicosPremiere  conceptos básicos
Premiere conceptos básicosDani Díaz
 
Wordpress Consejos
Wordpress ConsejosWordpress Consejos
Wordpress ConsejosDani Díaz
 
Navegadores Web
Navegadores WebNavegadores Web
Navegadores WebDani Díaz
 
Carpetas Y Win Rar
Carpetas Y Win RarCarpetas Y Win Rar
Carpetas Y Win RarDani Díaz
 
Propiedad Intelectual Oficial
Propiedad Intelectual OficialPropiedad Intelectual Oficial
Propiedad Intelectual OficialDani Díaz
 
Propiedad Intelectual Documento Oficial
Propiedad Intelectual Documento OficialPropiedad Intelectual Documento Oficial
Propiedad Intelectual Documento OficialDani Díaz
 
Imagen Digital
Imagen DigitalImagen Digital
Imagen DigitalDani Díaz
 
EvolucióN De Los Sistemas Operativos
EvolucióN De Los Sistemas OperativosEvolucióN De Los Sistemas Operativos
EvolucióN De Los Sistemas OperativosDani Díaz
 
Diseño Web Y Estructuras
Diseño Web Y EstructurasDiseño Web Y Estructuras
Diseño Web Y EstructurasDani Díaz
 
Mantenimiento Pc
Mantenimiento PcMantenimiento Pc
Mantenimiento PcDani Díaz
 
1º Bach Web 2.0 Y Servicios Asociados
1º Bach Web 2.0 Y Servicios Asociados1º Bach Web 2.0 Y Servicios Asociados
1º Bach Web 2.0 Y Servicios AsociadosDani Díaz
 
1º Bach Tema 1 TecnologíAs De La InformacióN
1º Bach Tema 1   TecnologíAs De La InformacióN1º Bach Tema 1   TecnologíAs De La InformacióN
1º Bach Tema 1 TecnologíAs De La InformacióNDani Díaz
 
Trabajar Con Win Rar
Trabajar Con Win RarTrabajar Con Win Rar
Trabajar Con Win RarDani Díaz
 
Trabajar En Word
Trabajar En WordTrabajar En Word
Trabajar En WordDani Díaz
 

Plus de Dani Díaz (20)

Internet con google
Internet con googleInternet con google
Internet con google
 
Photoshop atajos de teclado
Photoshop  atajos de tecladoPhotoshop  atajos de teclado
Photoshop atajos de teclado
 
2. photoshop piel de piedra
2. photoshop  piel de piedra2. photoshop  piel de piedra
2. photoshop piel de piedra
 
1. photoshop retoque facial
1. photoshop  retoque facial1. photoshop  retoque facial
1. photoshop retoque facial
 
Premiere conceptos básicos
Premiere  conceptos básicosPremiere  conceptos básicos
Premiere conceptos básicos
 
Wordpress Consejos
Wordpress ConsejosWordpress Consejos
Wordpress Consejos
 
Navegadores Web
Navegadores WebNavegadores Web
Navegadores Web
 
Carpetas Y Win Rar
Carpetas Y Win RarCarpetas Y Win Rar
Carpetas Y Win Rar
 
Propiedad Intelectual Oficial
Propiedad Intelectual OficialPropiedad Intelectual Oficial
Propiedad Intelectual Oficial
 
Propiedad Intelectual Documento Oficial
Propiedad Intelectual Documento OficialPropiedad Intelectual Documento Oficial
Propiedad Intelectual Documento Oficial
 
Redes
RedesRedes
Redes
 
Imagen Digital
Imagen DigitalImagen Digital
Imagen Digital
 
EvolucióN De Los Sistemas Operativos
EvolucióN De Los Sistemas OperativosEvolucióN De Los Sistemas Operativos
EvolucióN De Los Sistemas Operativos
 
Diseño Web Y Estructuras
Diseño Web Y EstructurasDiseño Web Y Estructuras
Diseño Web Y Estructuras
 
Mantenimiento Pc
Mantenimiento PcMantenimiento Pc
Mantenimiento Pc
 
Diseño Web
Diseño WebDiseño Web
Diseño Web
 
1º Bach Web 2.0 Y Servicios Asociados
1º Bach Web 2.0 Y Servicios Asociados1º Bach Web 2.0 Y Servicios Asociados
1º Bach Web 2.0 Y Servicios Asociados
 
1º Bach Tema 1 TecnologíAs De La InformacióN
1º Bach Tema 1   TecnologíAs De La InformacióN1º Bach Tema 1   TecnologíAs De La InformacióN
1º Bach Tema 1 TecnologíAs De La InformacióN
 
Trabajar Con Win Rar
Trabajar Con Win RarTrabajar Con Win Rar
Trabajar Con Win Rar
 
Trabajar En Word
Trabajar En WordTrabajar En Word
Trabajar En Word
 

Dernier

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 

Dernier (20)

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 

Amenazas Informática

  • 1. INFORMÁTICA: Amenazas A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypts, decrypt all (in and out) computer traffic between different security domains based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware in which no signature exists yet. Some antivirus software can also predict what a file will do if opened/run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious. However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance if it is not designed efficiently. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. Virus hoaxes are messages, usually sent by email, that amount to little more than chain letters. They pretend to alert you to the latest "undetectable" virus and simply waste your time and Internet bandwidth. The best course of action is to delete these hoaxes - they can cause genuine fear and alarm in the disabled, elderly and other vulnerable groups. Signature based detection is the most common method. To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures. Because viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but also in pieces. Malicious activity detection is another approach used to identify malware. In this approach, antivirus software monitors the system for suspicious program behavior. Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz Página 1
  • 2. INFORMÁTICA: Amenazas If suspicious behavior is detected, the suspect program may be further investigated, using signature based detection or another method listed in this section. This type of detection can be used to identify unknown viruses or variants on existing viruses. Heuristic-based detection, like malicious activity detection, can be used to identify unknown viruses. This can be accomplished in one of two ways: file analysis and file emulation. File analysis is the process of searching a suspect file for virus-like instructions. For example, if a program has instructions to reformat the C drive, the antivirus software might further investigate the file. One downside of this feature is the large amount of computer resources needed to analyse every file, resulting in slow operation. File emulation is another heuristic approach. File emulation involves executing a program in a virtual environment and logging what actions the program performs. Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate disinfection actions. Symptoms of a virus on your system: • Slow PC performance • Erratic computer behavior • Unexplained data loss • Frequent computer crashes Anti-Spam: E-mail spam, also known as junk e-mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail. To prevent e-mail spam, both end users and administrators of e-mail systems use various anti-spam techniques. Some of these techniques have been embedded in products, services and software. Anti-Spyware: Spyware is a type of malware that is installed on computer and collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users. Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz Página 2
  • 3. INFORMÁTICA: Amenazas Programs such as Lavasoft's Ad-Aware SE y Spybot - Search & Destroy rapidly gained popularity as effective tools to remove, and in some cases intercept, spyware programs. Anti-spyware programs can combat spyware in two ways: 1. They can provide real time protection against the installation of spyware software on your computer. This type of spyware protection works the same way as that of anti-virus protection in that the anti-spyware software scans all incoming network data for spyware software and blocks any threats it comes across. 2. Anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed onto your computer. Such programs inspect the contents of the Windows registry, the operating system files, and installed programs, and remove files and entries which match a list of known spyware components. Real-time protection from spyware works identically to real-time anti-virus protection: the software scans disk files at download time, and blocks the activity of components known to represent spyware. Phising: Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. How can you tell the difference between a legitimate message and a phishing scam? Educate yourself on the latest tricks and scams. What can phishing do to me? After you’ve responded to a phishing scam, the attacker can: • Hijack your usernames and passwords • Steal your money and open credit card and bank accounts in your name • Request new account Personal Identification Numbers (PINs) or additional credit cards • Make purchases • Add themselves or an alias that they control as an authorized user so it’s easier to use your credit • Obtain cash advances • Use and abuse your Social Security number • Sell your information to other parties who will use it for illicit or illegal purposes Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz Página 3
  • 4. INFORMÁTICA: Amenazas How will I know? Phishers often pretend to be legitimate companies. Their messages may sound genuine and their sites can look remarkably like the real thing. It can be hard to tell the difference, but you may be dealing with a phishing scam if you see the following: • Requests for confidential information via email or instant message • Emotional language using scare tactics or urgent requests to respond • Misspelled URLs, spelling mistakes or the use of sub-domains • Links within the body of a message • Lack of a personal greeting or customized information within a message. Legitimate emails from banks and credit card companies will often include partial account numbers, user name or password. Hackers & Predators: People, not computers, create computer security threats and malware. Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change or destroy information as a form of cyber-terrorism. What scams are they using lately? Learn how to combat dangerous malware and stay safe online. What can hackers and predators do to me? While your computer is connected to the Internet, the malware a hacker has installed on your PC quietly transmits your personal and financial information without your knowledge or consent. Or, a predator may pounce on the private information you unwittingly revealed. In either case, they can do the same as a Phising attack. Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz Página 4