Want to create interactive content? It’s easy in Genially!

Get started free

Cyber security

alba gomez

Created on June 5, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Psychedelic Presentation

Chalkboard Presentation

Witchcraft Presentation

Sketchbook Presentation

Genial Storytale Presentation

Vaporwave presentation

Animated Sketch Presentation

Transcript

cyber security

Alba Gomez 2D

Índice

6. ramsomeware

1. virus

12. Contenido insertado

7. personal attacks

10. Texto + iconos

2. trojan

11. Audio

8. other

3. pharming

9. Vídeo

14. Conclusiones

13. Pregunta interactiva

4. phising

15. Cierre

5. man-in-the-middle

virus attack

A virus is a program that installs itself on a computer without the user's permission for the purpose of causing damage. It can self-replicate and infect other computers. It can use flash drives, software and even the Internet to propagate.

trojan attack

A Trojan is a type of virus in which instructions camouflaged in another program are introduced to destroy information stored on drives or to collect information. The term Tojan takes its name from the Trojan horse concept. These viruses are often hidden inside seemingly harmsless elements like a program or a music file and are installed on the system when the file that contains them is opened.

pharming attack

Pharming is the practice of redirecting a domain name to a different machine so that a user visiting the URL actually accesses the attacker's website. This can be done, for example, to impersonate a banking website to obtain passwords from the victim.

phising attack

Phishing is a type of computer fraud that uses trickery to obtain information about a user (bank details, passwords, etc.) to use it fraudulently. The word phishing alludes to the idea of "fishing" (catching a fish with a hook and a line) for passwords. The most common example are e-mails that pretend to be from a bank and ask for the user's passwords, claiming that there is a security threat (when there is none).

man-in-the-middle-attack

+190

Datos relevantes

+45k

Public access points can be risky. Attackers can imitate the name of a nearby network with a known name. When someone mistakenly connects to that network, the attacker can intercept their communications and steal information without being noticed. This type of attack is known as a man-in-the-middle attack. To keep yourself safe, it is recommended that you access secure websites with a certificate.

...Aunque luego lo expliques oralmente

(checking in the browser that the address begins with "https" and that the certificate is from the website to which it belongs) and also avoid open networks (or , at the very least, do not carry out certaing processes through them, such as connecting to social media).

Así mantendrás la atención de tu audiencia

+85k

ransomewareattack

This type of attack consists of hijacking usr files (in other words, preventing the user from accessing those files until they send a ransom to the attacker) Ransoms can be demanded in cryptocurrencies or through a credit card, but the victim should always report it (and never pay).

Damage to machines is only material damage, but when people are hurt, it stays with them and affects other aspects of their lives. The main threats to individuals include:

personal attack

Seres digitales. Evitamos formar parte de la saturación de contenido en elmundo digital.

Aunque no debes abusar de los bulletpoints, los iconos y esquemas pueden ser grandes aliados.

Somos seres visuales. Somos capaces de entender imágenes de hace millones de años, incluso de otras culturas.

Mantendrás la atención de tu audiencia y los datos quedarán grabados ensu cerebro.

Seres narrativos. Contamos miles ymiles de historias. ⅔ de nuestras conversaciones son historias.

Damage to machines is only material damage, but when people are hurt, it stays with them and affects other aspects of their lives. The main threats to individuals include:

personal attack

Cyberbulling, which is a type of harassment that uses threats, blackmail, etc., between peers on the Internet, mobile phones or video games.

Fake news and hoaxes.

Access to dangerous communities that publish risk contents.

Hate speech.

Indentity impersonation.

Escribe untitular genial

  • Genera experiencias con tu contenido.
  • Mide resultados y experimenta.
  • Tiene efecto WOW. Muy WOW.

Con esta función...

Puedes añadir un contenido adicional que emocione al cerebro de tu audiencia: vídeos, imágenes, enlaces, interactividad... ¡Lo que tú quieras!

¿Tienes una idea?

Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras!¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.