How It Works The user enters his or her creden- tials The system accepts or denies If validated, the serves saves the user object into the session This allows the user to obtain an account solely for him or herself Advantages A single sign on It will be easy to remember your password if you have one for all your accounts Newer technologies are in the pro- cess of figuring out if the user is a hacker or not Disadvantages Many users use the same password, so theres a greater chance of get- ting hacked Everything is on the internet so its easier for information to be stolen Must have a good password to avoid problems LOGIN AND PASSWORD B Y : E M I L I A M A R I A F U R I 0 - R A M O S How It Works Used to scan files to get rid of computer viruses and malware Looks for known viruses Looks for unusual behavior from computer programs Looking for unusual behavior pro- tects the computer more as it stops the virus before it can attack Advantages Protects your computer from virus- es and malware The software will notify you if you have a virus and will remove it right away Disadvantages The good software are high in cost Sometimes you would have to run virus scans or the viruses will not be r e - moved Anti-Virus Software Firewall Encryption How It Works A software program that keeps out hackers, viruses, and worms that are found on the Internet It will decide who can connect to the Internet, and what kind of connec- tions can be made All traffic both ways are monitored to secure the computer Advantages It can be used to trigger alarms when something is wrong They can use complicated rules to see if the data should be let through Disadvantages Cant prevent users with modems, so the firewall is useless at this point How careless an employee acts cant be stopped by firewalls Cant stop people from being tricked into re- vealing personal information How It Works Secures communication on the Internet To properly conduct public key encryption, one should generate large numbers so only you and your computer know them An encryption algorithm and key are used together to make your information unrecognizable Advantages Protects your personal information on the Internet Beneficial to those who shop online, who chat on Skype and iMessage, and all the people who use the Internet It isnt that easy to deconstruct and encryption code Disadvantages If bad people get a hold of your encryption code, all the information encrypted is theirs Professional hackers can disregard encrypted information all together and use graphics to obtain the data