Ana y angela
-
Upload
estoesunamierdabiengrande -
Category
Documents
-
view
167 -
download
0
Transcript of Ana y angela
![Page 1: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/1.jpg)
Seguridad de la máquina.
![Page 2: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/2.jpg)
Virus
![Page 3: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/3.jpg)
¿Qué son?
![Page 4: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/4.jpg)
¿Qué hacen?
![Page 5: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/5.jpg)
¿Cómo sé si tengo un virus?
![Page 6: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/6.jpg)
Keylogger
![Page 7: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/7.jpg)
¿ Qué son ?
![Page 8: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/8.jpg)
GUSANOS
![Page 9: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/9.jpg)
¿ Que son ?
![Page 10: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/10.jpg)
TROYANOS.
![Page 11: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/11.jpg)
¿ Qué son ?
![Page 12: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/12.jpg)
SPYWARE
![Page 13: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/13.jpg)
¿ Qué son ?
![Page 14: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/14.jpg)
ADWARE
![Page 15: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/15.jpg)
¿ Qué es ?
![Page 16: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/16.jpg)
HIJACKERS
![Page 17: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/17.jpg)
¿ Qué es ?
![Page 18: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/18.jpg)
![Page 19: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/19.jpg)
¿ Qué es ?
![Page 20: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/20.jpg)
¿ Cuál e
s su
objetivo ?
![Page 21: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/21.jpg)
SEGURiDAD EN LA
MÁQUiNA
![Page 22: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/22.jpg)
PHISHING
![Page 23: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/23.jpg)
¿ Qué es ?
![Page 24: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/24.jpg)
¿ En que consiste ?
![Page 25: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/25.jpg)
¿Cómo lo realizan?
![Page 26: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/26.jpg)
CIBERACOSO
![Page 27: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/27.jpg)
¿ Qué es ?
![Page 28: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/28.jpg)
FORMAS DE PROTEGERNOS
![Page 29: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/29.jpg)
Consejos :
1) AGREGA SOLO A LA GENTE QUE
CONOZCAS.
![Page 30: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/30.jpg)
Consejos :
2) Subir fotos en las que la gente que sale , teconcede su permiso .
![Page 31: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/31.jpg)
Consejos :
3) INTENTAR PRIVATIZARTU CUENTA LO MÁXIMO
POSIBLE.
![Page 32: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/32.jpg)
Consejos :
4 )Recuedas que cualquier cosa que publiques se
puede copiar, modificar, pegar y enviar
![Page 33: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/33.jpg)
Consejos :
5) Es preferible conocera todos tus contactos en persona , ya que no
Sabes quien tiene un per-fil falso .
![Page 34: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/34.jpg)
Consejos :
6) LAS CONTRASEÑAS ,SON PRIVADAS.
7) LEE ENTRE LÍNEAS
![Page 35: Ana y angela](https://reader035.fdocuments.ec/reader035/viewer/2022062503/58f0c1da1a28abae5f8b45f5/html5/thumbnails/35.jpg)
Certificado Digital