Internet security

Disponível somente no TrabalhosFeitos
  • Páginas : 2 (348 palavras )
  • Download(s) : 0
  • Publicado : 16 de dezembro de 2012
Ler documento completo
Amostra do texto
Good morning everyone iam going to a little bit about computer security, subjects like firewalls and antivirus and the people who go against those securitys, the hackers.
I will answer yourquestions after the presentation if there’s any.
What Firewall Software Does is
A firewall is simply a program or hardware ( Firewalls can be implemented in both hardware and software, or a combination ofboth ) that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is notallowed through.
All messages entering or leaving the intranet pass through the firewall, which examines each one of them and blocks those that do not meet the specified security criteria.
Basically, afirewall is a barrier to keep destructive forces away from your property. In fact, that's why it’s called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from onearea to the next.
Of course there are ways to get hands into your files and information, by breaching the security. The people who do this are often hackers.
A Hacker is somebody who findsweaknesses in a computer or computer network and exploits them . They may be motivated by a multitude of reasons such as profit, protest, challenge, or to aid security by pointing out vulnerabilities. A fewhighly skilled hackers work for commercial firms with the job to protect that company's software and data from outside hacking.
Some hackers do things like Identity Theft, Steal credit card numbersand other personal information. Others just creating worms and antivirus and send them to our computer.
Antivirus software are programs which can detect, prevent and clean up computer viruses which mayattempt to infect your computer system. It will scan downloaded files as well as your entire computer system in order to detect the presence of an infection.

To conclude the most important...