Cosejo 1
18
-
Upload
elisabethynicole -
Category
Documents
-
view
66 -
download
0
Transcript of Cosejo 1
![Page 1: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/1.jpg)
![Page 2: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/2.jpg)
virus
![Page 3: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/3.jpg)
![Page 4: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/4.jpg)
gusanos
![Page 5: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/5.jpg)
troyanos
![Page 6: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/6.jpg)
spyware
![Page 7: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/7.jpg)
![Page 8: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/8.jpg)
hijackers
![Page 9: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/9.jpg)
hoaxes
![Page 10: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/10.jpg)
![Page 11: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/11.jpg)
![Page 12: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/12.jpg)
![Page 13: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/13.jpg)
![Page 14: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/14.jpg)
Lee las políticas de uso y privacidad de los diferentes servicios antes de utilizarlos.
![Page 15: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/15.jpg)
Piensa antes de publicar, no sea que luego te arrepientas.
![Page 16: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/16.jpg)
Valora que información deseas revelar y controla quien puede acceder a ella.
![Page 17: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/17.jpg)
Controla tu lista de contactos, y antes de agregar a alguien tomate tu tiempo para asegurarte de su confianza.
![Page 18: Cosejo 1](https://reader033.fdocuments.co/reader033/viewer/2022052413/559f88251a28abbe158b4689/html5/thumbnails/18.jpg)
Las redes sociales contienen las mismas aplicaciones que utilizan los atacantes para propagar los virus –correo, mensajería, navegación, etc.-, mantén las mismas recomendaciones.