Sunteți pe pagina 1din 13

Security center

- is the place where you can set


additional protection from threat
to your computer, especially
when using the Internet.
Firewall
- it helps in protecting
your computer from
unauthorized entries,
viruses, or worms from
the Internet or network.
A selection box which
says Don’t allow
exceptions is
available. When this box
is checked, all incoming
programs will be
blocked.
Automatic
Updates
- is another feature of
Windows which
when turned on will
automatically
download updates
from Microsoft
Windows website.
Virus
Protection
- is usually about the
current antivirus
software installed in
your computer; this
option is recommended
to be turned on always.
Antivirus software is
meant to locate, find,
and remove virus
threats that are already
in your computer.
EMAIL SPAM
Also known as junk email, it is usually unsolicited
commercial email sent from one source with
identical message set to multiply recipients.
Dangerous spam carry virus like trojan horse and
other malicious software (malware).
Spammer is the term used to refer to a person
who create electronic spam. BACK
EMAIL
SPOOFING
This refers to deceitful email practice in
which the sender address is change. So
that it would appear to have come from a
different sources usually someone you
know. Usually, the reply to address is the
source of the email, and when you
unknowingly reply to it you would be BACK
PHISHING
This is deceitful practice of trying to get
confidential information such as passwords
and usernames, ad credit card details by
making it appear as if it comes from
trustworthy source. Phishing is usually done
by email or other similar means using a
popular entity such as Microsoft, Yahoo, BACK

Google, Amazon, and financial institutions to


PHARMING
This is dangerous hacker attack on
website which directs all traffic to the
website to another fictitious website. The
main object of pharming is to obtain
username and password, as well as
credit card and financial information, and
use these to steal their money
BACK
SPYWARE
This is a computer program that
installed covertly on a person
computer to collect information or
event take control over the computer
without the knowledge of the user. A
spyware program would be able to
monitor the collect information about
BACK
COMPUTER
WORM
This dangerous
computer program
that replicates itself
through a network.
BACK
TROJAN HORSE
This is from malware fronting
to perform a good task , but
covertly perform undesirable
function with the intention of
entering computer without the
user’s consent.BACK
COMPUTER VIRUS
This s a program that duplicates itself
and then infects the computer. The virus
can also be transferred by using of
removable storage media such as a
BACK
diskette, CF, flash drive, memory card,
and others.
HACKER
This is a person who is
able to enter and control
other people’s computer
without authorization.
BACK

S-ar putea să vă placă și