We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKenia Millis
Modified about 1 year ago
Cyber Security Quiz By: Alex Alberg
Q. A good password is: A. 8 characters or more B. Contains upper and lower case letters C. Contains special characters D. All on the above
Q. A firewall: A. Is harmful to you computer B. Is default set ON C. Blocks harmful data from entering your computer D. Is worthless and should be ignored
Q. True or false: Virus protection software never needs to be updated. A. True B. False
Q. Spam: A. Is harmless and does not need to be deleted B. Should not be replied to and deleted immediately C. Is genuine and should be trusted D. Should be stored for reference
Q. A.exe postfix stands for: A. Executable B. Excel file C. Extension D. Extra
Q. Hackers are: A. A joke made to scare people B. A growing and genuine threat C. Real, but harmless D. Hopelessly incompetent
Q. A virus can be attached to the following: A. Email B..exe C. Website D. All of the above
Q. Malware is: A. Designed to help defend your computer against viruses B. Software designed to extract information from your computer C. Harmless D. Undetectable
Q. True or False: A worm will help located and destroy viruses. A. True B. False
Q. Trojans: A. Are attached to useful tools B. Can act like worms or viruses C. Are often installed without the users knowledge D. All of the above
Correct! Click the button in the bottom right hand corner of the question slide to continue.
Computer Security The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
A viruses is a program that can harm or track your computer. E.g. browser hijacker. When a viruses accesses the computer it can accesses the HDD and.
Threats to I.T Internet security By Cameron Mundy.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
2/11/ Dela Cruz. Trojan Horses Worms Viruses Piggyback software Attachments with viruses 2/11/2016 Dela Cruz 2.
Computer Viruses. Malware Malicious software Programs designed to infiltrate or damage a computer system without the owner's informed consent. Viruses,
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Cyber Safety Jamie Salazar. Cyber Safety Concerns Computer Safety – how to protect your computer against hackers, viruses, spam, and bugs. Identity Theft.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
By Tilly Gerlack. THREATS Data theft is a problem where people are stealing information. Office workers have a better chance of committing a theft of.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 2-2 VIRUSES & DESTRUCTIVE PROGRAMS.
1.1 System Performance Security Module 1 Version 5.
Internet Security and Your Computer Welcome to Boot Camp.
IT Security for Users By Matthew Moody. 1.1 Security issues that may threaten system performance A weak password is easy access for hackers because they.
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Internet Safety Learn about the dangers associated with the internet: Viruses Spyware Cookies Spam Hackers Phishing Identity theft LPMInternet Safety.
Creating a Zip File with a Password. 1.Right Click on the File or Folder you want to Zip. 2.Choose “Add to Zip”
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Internet safety By Lydia Snowden. Intro internet safety Staying safe on the internet. It involves protecting Your computer: Viruses Spyware Phishing Spam.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
UNIT 4 VIRUSES & DESTRUCTIVE PROGRAMS. COMPUTER VIRUS Small software programs that are designed to spread from one computer to another and to interfere.
Information Technology Resource Use Quiz! Information Security Office Adapted with permission from the Educause and Internet 2 Information Security Task.
© 2017 SlidePlayer.com Inc. All rights reserved.