How to protect our data?
by Maciej Latus & Tymon Michalak
problem of people on the internet
Most people around the world don't know how to protect their data. In this presentation, we are going to tell you how to protect your data and how to avoid hackers.
Who's hacker?
A hacker is the kind of person stealing data from people and then gives it back after a big payment.
Helpful things that can help you protect your data.
antivirus
strong password
,, The Lock"
Two-step verification
VPN
Most popular types of virus
Backdoor
Worms
Trojan horse
a system blind-spot on purpose created to used later. For example, a backdoor in the system may be left by a cracker that has broken from another blind-spot
A self-replicating computer program. It's an individual program, not like normal computer virus
sort of software that pretends to be a usefull or interesing app, implements additional functions hidden from user, such as spyware or ransomware
How to be careful in internet: tips
Password
Suspicious links
never give your password to strangers!!!
Never click supsicious links! There can be virus inside them or it can be link to program that gets your IP.
downloading
never download supsicious files! There can be virus inside them.
THANKYOU!
How to protect our data
tymek
Created on June 4, 2022
For erasmus
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Corporate Christmas Presentation
View
Customer Service Manual
View
Business Results Presentation
View
Meeting Plan Presentation
View
Business vision deck
View
Economic Presentation
View
Tech Presentation Mobile
Explore all templates
Transcript
How to protect our data?
by Maciej Latus & Tymon Michalak
problem of people on the internet
Most people around the world don't know how to protect their data. In this presentation, we are going to tell you how to protect your data and how to avoid hackers.
Who's hacker?
A hacker is the kind of person stealing data from people and then gives it back after a big payment.
Helpful things that can help you protect your data.
antivirus
strong password
,, The Lock"
Two-step verification
VPN
Most popular types of virus
Backdoor
Worms
Trojan horse
a system blind-spot on purpose created to used later. For example, a backdoor in the system may be left by a cracker that has broken from another blind-spot
A self-replicating computer program. It's an individual program, not like normal computer virus
sort of software that pretends to be a usefull or interesing app, implements additional functions hidden from user, such as spyware or ransomware
How to be careful in internet: tips
Password
Suspicious links
never give your password to strangers!!!
Never click supsicious links! There can be virus inside them or it can be link to program that gets your IP.
downloading
never download supsicious files! There can be virus inside them.
THANKYOU!