Está en la página 1de 13

Computer

Security
By: Ori, Adam, Karan
Table of
Contents
1. Definition of computer security

2. Facts about computer security

3. Legal and ethical consequences

4. Computer security statistics

5. Computer security video

6. Pie chart

7. Restrictions to computer security abuse


Definition of Computer
Security

Computer security is the protection of computer systems


and the data and information they hold. A common type of
computer security is known as the firewall, the firewall blocks
unauthorized network attempts to your computer.
Facts About Computer
Security
hacking computers and online devices is not a crime it is considered
a vulnerability in your device.

Computer security is important because it Enables people to carry


out their jobs, education, and research by Supporting critical
business process and Protecting personal and sensitive
information
How to Prevent Online
attacks

Having a strong password can prevent most


intruders from getting into your computer

Also having different passwords for different


accounts helps prevent hackers from getting into
any personal information
Some of the ethical consequences of
computer security are privacy, for example
looking at your fellow employees private

Legal and
messages. Another ethical consequence is
called the slippery slope which pertains
to an employee doing something like

Ethical looking at his employees emails to


changing them and sending them to other
people.
conseque
nces of Some of the legal consequences of
computer security are, cyber attacking,
where companies will get hacked and
Computer information could get released.

Security
Computer Security Statistics
Approximately 1 trillion dollars is to be spent over the next five years
just on cyber security programs to prevent hackers.
Computer Security Educational
Video

https://www.youtube.com/watch?v
=yeepZr64XjU
Restrictions
to Computer
Security Some restrictions that should
be put to prevent security
abuse can be, every computer
Abuse should have sort of tracking
information and if you try to
hack someone there should be
a script that can find your ip
address.
Thank
You
(n.d.). Retrieved May 18, 2017, from Adu-Wusu, K. (2012). Tank 26F-2F
http://its.ucsc.edu/security/training/intro.ht Sites Used Evaporator Study. doi:10.2172/1059829
ml

Newitz, A. (2015, August 09). 9 Morgan, S. (2016, December 29). Top 5


Shinder, D. (2005, August 02). Ethical
Facts About Computer Security cybersecurity facts, figures, and statistics
for 2017. Retrieved May 18, 2017, from issues for IT security professionals.
That Experts Wish You Knew.
http://www.csoonline.com/article/3153707 Retrieved May 18, 2017, from
Retrieved May 18, 2017, from
http://gizmodo.com/9-facs-about- /security/top-5-cybersecurity-facts- http://www.computerworld.com/article/25
computer-security-that-experts- figures-and-statistics-for-2017.html 57944/security0/ethical-issues-for-it-
wish-you-k-1686817774 security-professionals.html

También podría gustarte