Вы находитесь на странице: 1из 36

INSTRUCTIONS/INSTRUCCIONES

PRINT THESE POWERPOINT SLIDES AND ORGANIZE IN


YOUR PORTFOLIOS. (4 SLIDES PER PAGE). STUDY THEM
FOR THE QUIZ.
IMPRIMA LAS DIAPOSITIVAS Y ORGANIZARLAS EN SUS
PORTAFOLIOS (4 DIAPOSITIVAS POR PGINA). REPASAR
LAS DIAPOSITIVAS PARA LA LECCIN.

COMPUTER SECURITY

Back - door
Abackdoorin acomputer system (orcryptosystem or algorithm is a
method of bypassing normalauthentication, securing unauthorized remote
access to a computer, obtaining access toplaintext , and so on, while
attempting to remain undetected. The backdoor may take the form of an
installed program (e.g.,Back Orifice) or may subvert the system through
arootkit
Default passwords an function as backdoors if they are not changed by the
user. Somedebugging features can also act as backdoors if they are not
removed in the release version.

BACKDOOR

is a computer system is a special


sequence in the programming code,
by which you can avoid the security
systems of the algorithm
(authentication) to access the
system. Although these doors can
be used for malicious purposes and
espionage are not always a mistake,
they may have been designed with
the intention of having a secret
entrance.

Fuente:hptt.www.Wikipedia.com

backdoor
In computing, a back door (or backdoor English) in a computer system is a special sequence
in the programming code ,
by which you can avoid the security systems of the algorithm (authentication ) to access the
system.
Although these dosis can be used for malicious purposes and espionage are not always a
mistake ,
they may have been designed with the intention of having a secret entrance .

PHISHIN
G

ITS THE ATTEMPT TO ACQUIRE SENSITIVE


INFOMATION SUCH AS USERNAMES,
PASSWORDS, AND CREDIT CARD DETAILS BY
MASQUERADING AS A TRUSTWORTHY ENTITY
IN AN ELECTRONIC COMMUNICATION.
BESIDES PHISHING IS TYPICALLY CARRIED
OUT BY EMAIL SPOOFING OR INSTANT
MESSAGING.

SUPLANTACIN DE IDENTIDAD
ES EL INTENTO DE ADQUIRIR INFORMACION CONFIDENCIAL
COMO NOMBRES DE USUARIOS, CONTRASEAS, Y
DETALLES DE TARJETAS DE CRDITOS POR MEDIO DE LA
SUPLANTACIN DE SUPUESTAS ENTIDADES FIDEDIGNAS EN
UNA COMUNICACIN ELECTRNICA.
LA SUPLANTACIN DE IDENTIDAD LA REALIZAN POR MEDIO
DE CORREOS ELECTRONICOS O MENSAJERIA INSTANTNEA.

Among the most


common virus
have:
WORMS,
TROJANS,
SPYWARE
Are types of software
which are usually
implemented without
the consent (or even
knowledge) of the user
or owner of a computer
and meet various
harmful functions for the
system. These include
theft and data loss,
impaired functioning,
disruption of the system
and spread to other
computers.

A virus is a computer
program that is
designed to detect
and remove viruses
and other harmful
before or after
entering the system
programs.

ANTIVIRUS MORE
KNOWN

ANTIVIRUS
INGLES
That detects the presence
of a computer virus on a
floppy disk or computer
and delete it.

ESPAOL

Que detecta la presencia de un


virus informtico en un disquete o
en una computadora y lo elimina.

USERNAME
In computing, a user is an individual who uses a
computer, operating system, service or any
computer system. Usually it is a unique person.

ESPAOL: USUARIO

En informtica, un usuario es un individuo que utiliza


una computadora, sistema operativo, servicio o
cualquier sistema informtico. Por lo general es una
nica persona.
Thanks very much for attention.

Counterfeiting (Falsificacin)
Intentional and calculated reproduction of a genuine article
(such as money or trademark) for the purpose of misleading the recipient or
buyer into believing he or she is receiving or buying the genuine article itself.

BACKUP
COPIA DE SEGURIDAD.

SPAM

Spam or are all those spam messages we receive from


strangers who have not requested information and
generally having a commercial purpose directly or
fraudulent.
In spanish spam o correo basura son todos aquellos
mensajes que recibimos de desconocidos con informacin
que no hemos solicitado y que generalmente tienen una

ANTISPAM
he spam is what is known as a
method to prevent spam.
Application or tool that is
responsible for detecting and
eliminating spam.

ANTI SPAM
Aplicacin o herramienta informtica que
se encarga de detectar y eliminar el spam
y los correos no deseados.
Algunos antivirus y firewalls (cortafuegos)
poseen
incorporadas
herramientas
antispam.
El principal objetivo de una herramienta
antispam, es lograr un buen porcentaje de
filtrado de correo no deseado

ANTI SPAM
Application or tool that is responsible for
detecting and eliminating spam and spam.
Some antivirus and firewall (firewall) have
incorporated anti-spam tools.
The main purpose of a spam tool, you get
a good percentage of filtering spam

Joffre Solano Franco


Informatica "D"

4to.

also called barware, malicious code, malware, or malicious software, is


software that is designed to infiltrate or damage a computer system or
information without the consent of the owner. The term malware is used by
computer professionals to mean a variety of hostile software annoying, or
intrusive. The term computer virus is often applied in a wrong to refer to all
types of malware, including true viruses.
Software is considered malware based on the effects, designed by the creator,
cause a computer. The term malware includes viruses, worms, Trojan horses,
most root kits, shareware, spyware, intrusive adware, crime ware and other
malicious and unwanted software.

MALWARE

Malware ( malicious software English ) , also called badware , malicious code , malware, or malicious
software, is software that is designed to infiltrate or damage a computer system or information without the
consent of the owner. The term malware is often used by computer professionals.
El malware (del ingls malicious software), tambin llamado badware, cdigo maligno, software
malicioso o software malintencionado, es un tipo de software que tiene como objetivo infiltrarse o daar
una computadora o sistema de informacin sin el consentimiento de su propietario. El
trmino malware es muy utilizado por profesionales de la informtica

UPDATE

Update, which involves modification of data in either


a file as a database or a eplicacin generally being
generally associated with the word "Patch" which
is also used as a synonym.

RAID

RAID

Redundant Array of Independent Disks ", refers to a data


storage system that uses multiple storage drives (hard
disks or SSD) between distributed or replicated data.

Conjunto redundante de discos


hace
independientes,
referencia a unsistema de
almacenamiento de datosque
usa mltiples unidades de
datos
de
almacenamiento
(discos duros oSSD) entre los
que se distribuyen o replican
losdatos.

SPYWARE
Or spyware is software that gathers
information from a computer and then
transmits this information to a foreign
entity without the knowledge or consent of
the computer owner . The term spyware
more broadly to refer to other products that
are not strictly spyware also used . These
products perform different functions , such
as displaying unsolicited advertisements
(pop -up) , collect private information,
redirect page requests and installing dialers
. A typical spyware auto installs on the
affected system so that it runs every time
you turn on the computer ( using CPU and
RAM , reducing the stability of the
computer) , and it works all the time ,
controlling the use made Internet and
showing ads related .

PROGRAMAS ESPIAS

El spyware o programa espa es un

software que recopila informacin de un


ordenador y despus transmite esta informacin a
una entidad externa sin el conocimiento o el
consentimiento del propietario del ordenador. El
trmino spyware tambin se utiliza ms
ampliamente para referirse a otros productos que
no son estrictamente spyware. Estos productos,
realizan diferentes funciones, como mostrar
anuncios no solicitados (pop-up), recopilar
informacin privada, redirigir solicitudes de
pginas e instalar marcadores de telfono.
Un spyware tpico se auto instala en el sistema
afectado de forma que se ejecuta cada vez que se
pone en marcha el ordenador (utilizando CPU y
memoria RAM, reduciendo la estabilidad del
ordenador), y funciona todo el tiempo,
controlando el uso que se hace de Internet y
mostrando anuncios relacionados.

Back-Door
English
are designed to open a "back door" in our system so as to allow the creator of backdoor
access to the system and do what you want with it.
Spanish
son diseados para abrir una "puerta trasera" en nuestro sistema de modo tal de permitir al
creador del backdoor tener acceso al sistema y hacer lo que desee con

* UPTADE

IS that task or activity


that involves the
updating of something
that was delayed for
some reason.

BROWSER
In Spanish: Es un software que permite el
acceso a Internet.

ADWARE
IT IS A SOFTWARE THAT SHOWS PUBLICITY IN THE
EQUIPMENT OR ANIMATES TO THE USERS TO INSTALL
FALSE
PROGRAMS
ANTIVIRUS.
ADWARE
SETTLES
GENERALLY WITHOUT WE WISH IT.
ADWARE USUALLY TRACKS THE USE OF THE COMPUTER
TO SHOW TO PUBLICITY RELATED TO THE WEB SITES
THAT VISITS. THEREFORE, THESE ADWARE HAVE A LITTLE
SPY.
es un software que muestra publicidad en el equipo o
anima a los usuarios a instalar falsos programas antivirus.
Los adware se instalan generalmente sin que nosotros lo
deseemos.
Los adware suelen rastrear el uso del ordenador para
mostrar publicidad relacionada con los sitios web que
visitas. Por lo tanto, estos adware tienen un poco de
espa.

ADWARE

These are programs that display advertising using any means,


for example, pop-ups, banners, changes to the home, etc.
Adware means notice in Spanish.

Qu es Raid?
RAID It stands for Redundant Array of Independent Disks. it is a
technology that combines multiple hard disks (HD) to form a single logical unit,
where the same data is stored on all disks (redundancy).
Su definicin en espaol sera "Matriz Redundante de Discos
Independientes"
Se trata de una tecnologa que combina varios discos rgidos (HD) para formar
una nica unidad lgica, donde los mismos datos son almacenados en todos
los discos (redundancia).
Ejemplo
The raid is a consolidated technology.

DIGITAL SIGNATURE FIRMA ELECTRONICA

The digital signature is applied in those areas where


it is important to be able to verify the authenticity
and the integrity of certain data, for example
electronic documents or software, since it provides a
tool to detect the forgery y the manipulation of the
content.
La firma digital se aplica en aquellas reas donde es
importante poder verificar la autenticidad y la
integridad de ciertos datos, por ejemplo documentos
electrnicos o software, ya que proporciona una
herramienta para detectar lafalsificacin y la
manipulacin del contenido.

THE PASSWORD
IT'S A SECRET CHARACTER SERIES THAT ALLOWS A
USER ACCESS TO A FILE, TO A COMPUTER OR A
PROGRAM. THESE HELP ENSURE THAT USERS HAVE NO
UNAUTHORIZED ACCESS TO COMPUTER

HACKER

A hacker is a person skilled in a branch of technology,


often computer dedicated to intervene and / or make
technical alterations with good or bad intentions about
a product or device.

GOOD MORNING TEACHER RUTH


AND CLASS MATES, MY NAME
IS.ESTEFANIA REZABALA
MY TOPIC IS PRYVATE-KEY
The secret half of a
cryptographic key pair that is
used with a public key
algorithm. Private keys are
typically used to decrypt a
symmetric session key, digitally
sign data, or decrypt data that
IN SPANISH
has been encrypted with the
corresponding
key de un par de claves criptogrfica
CLAVE PRIVADA Lapublic
mitad secreta
que se utiliza con un algoritmo de clave pblica. Las claves privadas
se utilizan tpicamente para descifrar una clave de sesin simtrica,
firmar digitalmente datos o descifrar los datos que ha sido cifradas
con la clave pblica correspondiente.

ENCRYPTION
Encryption allows us to hide the message
content so that only the intended recipient
can read it. They are not mutually exclusive ,
can be used to create an email message
signed and encrypted .

How Phishing Work?


Phishing involves
the theft of
personal and / or
financial user
through the
forging of a
trusted entity.
Thus, the user
creates the data
into their trusted
site when in fact,
they are sent
directly to the

FIREWALL

Defining firewall
A firewall is a defense system based on the
fact that all traffic in a network must
necessarily pass through a security system
capable of allowing, denying, and take note of
everything that happens, according to an
access control policy between networks.

Вам также может понравиться