0% found this document useful (0 votes)
99 views

Internet Security

Internet security is important because the internet is riddled with malicious threats like viruses, trojans, and bots that can steal data and money. Data breaches are becoming more frequent and users are more vulnerable than ever. Following basic security tips like using strong passwords, updating software, backing up data, using two-factor authentication, connecting securely, and being cautious of links and downloads can help users stay alert and safe online.

Uploaded by

Bogdan Dan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views

Internet Security

Internet security is important because the internet is riddled with malicious threats like viruses, trojans, and bots that can steal data and money. Data breaches are becoming more frequent and users are more vulnerable than ever. Following basic security tips like using strong passwords, updating software, backing up data, using two-factor authentication, connecting securely, and being cautious of links and downloads can help users stay alert and safe online.

Uploaded by

Bogdan Dan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Why Internet Security is important?

The intern
et has bec
with malic ome a spa
ious links, ce riddled
Data breac trojans an
hes are be d viruses.
frequent, a coming m
nd unsusp o re
more vuln ecting use
erable tha rs are
one click c n ever bef
an cost tho ore. When
millions, u usands, an
sers need d even
that can he a c tionable to
lp them st -do’s
online. a y alert and
safe
o f i n t e r n e t
Ty pes

thre a t s
Botnet
A botnet is a network of private computers that have been compromised. Infected with malicious
software, these computers are controlled by a single user and are often prompted to engage in
nefarious activities, such as sending spam messages or denial-of-service (DoS) attacks.

00

01 02
Spam
Malware Spam refers to unwanted messages in
Short for "malicious software," your email inbox. In some cases, spam
can simply include junk mail that
malware comes in several
advertises goods or services you aren't
forms, including computer interested in. These are usually
viruses, worms, Trojans, and considered harmless, but some can
dishonest spyware. include links that will install malicious
04 03 software on your computer if they're
Computer worm
clicked on.
A computer worm is a software
program that copies itself from one Phishing
computer to the next. It does not Phishing scams are created by cybercriminals
require human interaction to create attempting to solicit private or sensitive information.
They can pose as your bank or web service and lure
these copies and can spread you into clicking links to verify details like account
rapidly and in great volume. information or passwords.
TIPS FOR

!
Clicking Without Thinking Is
Reckless

Just because you can click,


doesn’t mean you should.
Remember, it can cost you a
hefty sum. Malicious links can
do damage in several different
ways, so be sure to inspect
links and ensure they’re from
trusted senders before
clicking.
Secure Your Mobile Device

Security doesn’t end at your desktop. It’s


important to get into the habit of securing
your presence through your mobile device
as well. Use strong passwords and
biometric features, ensure you turn off your
Bluetooth, don’t automatically connect to
any public Wi-Fi, and download with
caution.
Back-Up Your Data

SECURITY

These days, storage doesn’t cost much. There’s no excuse not to


have a backup of important data. Back it up on a physical location
and on the cloud. Remember, malicious threats and hackers don’t
always want to steal your data, but sometimes the end-goal is to
encrypt or erase it. Back it up to have an ultimate recovery tool.
Use Two-Factor
Authentication

It’s important to have a strong


password, but it’s even more
imperative to have two-factor, or multi-
factor, authentication. This method
provides two layers of security
measures so if a hacker can accurately
guess your password, there is still an
additional security measure in place to
ensure that your account is not
breached.
Keep Up With Updates

Software patches can be issued


when security flaws are discovered.
If you find these software update
notifications to be annoying, you’re
not alone. But you can consider
them the lesser of two evils when
weighing up rebooting your device
versus putting yourself at risk for
malware and other types of
computer infection.
Connect Securely

Cyber security tips about this have


been dished out by nearly every
tech expert under the sun, but many
still don’t follow this advice. You
might be tempted to connect your
device to an unsecured connection,
but when you weigh the
consequences, it’s not worth it. Only
connect to private networks when
possible, especially when handling
sensitive information.
THANKS!

Internet

You might also like