代写范文

留学资讯

写作技巧

论文代写专题

服务承诺

资金托管
原创保证
实力保障
24小时客服
使命必达

51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。

51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标

私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展

积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈

Information_Technology

2013-11-13 来源: 类别: 更多范文

11/19/2009 Topic: Information Security and Browsing the Internet safely. Purpose: After listening to my speech students will have basic knowledge on Information Security Thesis: With the knowledge acquired from this presentation you will know how to protect your system, protect your information, and to browse the internet safely. Introduction I. How much do you know about internet security' Are you aware that every single one of us is vulnerable for some kind of information security attack' a) Information security means protecting information and information systems from unauthorized access, use, modification or destruction. b) Information security focuses on protecting data resources from malware attacks or simply mistakes from people like you and me. II. Information security is composed by these three qualities known as “CIA”. “CIA” is known as the core of information security. a) Confidentiality To prevent the disclosure of information to unauthorized individuals or systems. b) Integrity Data cannot be modified without authorization. c) Availability Ensures reliable and timely access to data. For any information system to serve its purpose the information must be available when it is needed. (Transition: Let’s move on to more interesting stuff. Does anyone know what a hacker is' , what do they do' The general use of the word hacker refers to someone who attacks computers, what about malware' , malware is software that enters a computer system without the owner’s knowledge. Viruses, worms, spyware are examples of malware. But what are the chances of my system getting infected and how do I protect it) Body According to a study by CompTIA (Computing Technology Information Association) over 25% of end users reported their productivity was affected by a spyware infection. Approximately 9 out of 10 computers are infected with some type of spyware. I. What are the risks of poor system security' a) Your computer might become infected with a virus, spyware or spam. b) Your identity might get stolen. c) Somebody might take over your computer and use it to attack other people d) You might loss of data e) Affects productivity II. How do I protect my system' a) Having the latest Security Software: anti-viruses, anti-spyware, and a firewall. b) Installing the latest system updates, I recommend having automatic updates turned on. c) Using an up to date web browser. d) Backing up your information in an external location, such as an external hard drive or in an online backup services source. e) Do not use your computer in administrator mode. It’s better to make a user account and log in under it for a day to day use. f) If using a wireless router, make sure is password protected. (Transition: Now that we described what information security is and that we discussed the risks of having an infected system let’s talk about some of the dangers of social networking. Does anyone here has a facebook, myspace or twitter account' What kind of information do you post on your profile' Is it private' How many friends do you have that you actually know') III. Social Networking security risks: a) You become vulnerable to Identity theft. Identity theft is literally a way of stealing someone else's identity and using it for a variety of purposes including financial. b) Provide useful information to cybercriminals, most of the information on profiles describe interests, family members, and birthdates. This information pieced together could lead to somebody hacking into any of your accounts or systems. c) Gives criminals potential information. Would you stand up in the middle of a crowd of strangers and announce that you’re leaving on vacation for three days and then tell everyone your address' Of course not, but that’s exactly what you are doing if you share such information online. IV. How to stay safe: a) Be careful about who you befriend. b) Evaluate your social networking account and postings. c) Do not post private information, including your cell phone number, home address, etc. d) Adjust security settings. (Conclusion) In conclusion, now that we know that if we take the measures to protect our system, and follow the advice included in my presentation we could prevent any damage to be done to our systems or to ourselves, we need to be wise on the information we disclose and remember you don’t know who is on the other end. Cybercriminals are out there looking for an opportunity to get you. Have a safe browsing!
上一篇:Interclean 下一篇:Immigration_and_Exclusion_in_W