Want to create interactive content? It’s easy in Genially!
Cyber security
alba gomez
Created on June 5, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Psychedelic Presentation
View
Chalkboard Presentation
View
Witchcraft Presentation
View
Sketchbook Presentation
View
Genial Storytale Presentation
View
Vaporwave presentation
View
Animated Sketch Presentation
Transcript
cyber security
Alba Gomez 2D
Índice
6. ramsomeware
1. virus
12. Contenido insertado
7. personal attacks
10. Texto + iconos
2. trojan
11. Audio
8. other
3. pharming
9. Vídeo
14. Conclusiones
13. Pregunta interactiva
4. phising
15. Cierre
5. man-in-the-middle
virus attack
A virus is a program that installs itself on a computer without the user's permission for the purpose of causing damage. It can self-replicate and infect other computers. It can use flash drives, software and even the Internet to propagate.
trojan attack
A Trojan is a type of virus in which instructions camouflaged in another program are introduced to destroy information stored on drives or to collect information. The term Tojan takes its name from the Trojan horse concept. These viruses are often hidden inside seemingly harmsless elements like a program or a music file and are installed on the system when the file that contains them is opened.
pharming attack
Pharming is the practice of redirecting a domain name to a different machine so that a user visiting the URL actually accesses the attacker's website. This can be done, for example, to impersonate a banking website to obtain passwords from the victim.
phising attack
Phishing is a type of computer fraud that uses trickery to obtain information about a user (bank details, passwords, etc.) to use it fraudulently. The word phishing alludes to the idea of "fishing" (catching a fish with a hook and a line) for passwords. The most common example are e-mails that pretend to be from a bank and ask for the user's passwords, claiming that there is a security threat (when there is none).
man-in-the-middle-attack
+190
Datos relevantes
+45k
Public access points can be risky. Attackers can imitate the name of a nearby network with a known name. When someone mistakenly connects to that network, the attacker can intercept their communications and steal information without being noticed. This type of attack is known as a man-in-the-middle attack. To keep yourself safe, it is recommended that you access secure websites with a certificate.
...Aunque luego lo expliques oralmente
(checking in the browser that the address begins with "https" and that the certificate is from the website to which it belongs) and also avoid open networks (or , at the very least, do not carry out certaing processes through them, such as connecting to social media).
Así mantendrás la atención de tu audiencia
+85k
ransomewareattack
This type of attack consists of hijacking usr files (in other words, preventing the user from accessing those files until they send a ransom to the attacker) Ransoms can be demanded in cryptocurrencies or through a credit card, but the victim should always report it (and never pay).
Damage to machines is only material damage, but when people are hurt, it stays with them and affects other aspects of their lives. The main threats to individuals include:
personal attack
Seres digitales. Evitamos formar parte de la saturación de contenido en elmundo digital.
Aunque no debes abusar de los bulletpoints, los iconos y esquemas pueden ser grandes aliados.
Somos seres visuales. Somos capaces de entender imágenes de hace millones de años, incluso de otras culturas.
Mantendrás la atención de tu audiencia y los datos quedarán grabados ensu cerebro.
Seres narrativos. Contamos miles ymiles de historias. ⅔ de nuestras conversaciones son historias.
Damage to machines is only material damage, but when people are hurt, it stays with them and affects other aspects of their lives. The main threats to individuals include:
personal attack
Cyberbulling, which is a type of harassment that uses threats, blackmail, etc., between peers on the Internet, mobile phones or video games.
Fake news and hoaxes.
Access to dangerous communities that publish risk contents.
Hate speech.
Indentity impersonation.
Escribe untitular genial
- Genera experiencias con tu contenido.
- Mide resultados y experimenta.
- Tiene efecto WOW. Muy WOW.
Con esta función...
Puedes añadir un contenido adicional que emocione al cerebro de tu audiencia: vídeos, imágenes, enlaces, interactividad... ¡Lo que tú quieras!
¿Tienes una idea?
Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras!¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.