Keylogger
-
Upload
elisabethynicole -
Category
Documents
-
view
173 -
download
0
Transcript of Keylogger
![Page 1: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/1.jpg)
LA SEGURIDAD EN INTERNET
![Page 2: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/2.jpg)
virus
![Page 3: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/3.jpg)
![Page 4: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/4.jpg)
gusanos
![Page 5: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/5.jpg)
troyanos
![Page 6: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/6.jpg)
spyware
![Page 7: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/7.jpg)
adw
are
![Page 8: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/8.jpg)
hijackers
![Page 9: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/9.jpg)
hoaxes
![Page 10: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/10.jpg)
Para proteger la maquina :
Antivirus :
Firewire :
![Page 11: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/11.jpg)
Seguridad en las personas :
![Page 12: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/12.jpg)
Amenazas :
Phising :
Ciberacoso :
![Page 13: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/13.jpg)
Formas de protegernos..
Consejos :
![Page 14: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/14.jpg)
Consejo 1 :Lee las políticas de uso y privacidad de los diferentes servicios antes de utilizarlos.
![Page 15: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/15.jpg)
Consejo 2 :Piensa antes de publicar, no sea que luego te arrepientas.
![Page 16: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/16.jpg)
Consejo 3 :
Valora que información deseas revelar y controla quien puede acceder a ella.
![Page 17: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/17.jpg)
Consejo 4 :Controla tu lista de contactos, y antes de agregar a alguien tomate tu tiempo para asegurarte de su confianza.
![Page 18: Keylogger](https://reader036.fdocuments.co/reader036/viewer/2022083003/55935c6a1a28ab69648b45ae/html5/thumbnails/18.jpg)
Consejo 5 :Las redes sociales contienen las mismas aplicaciones que utilizan los atacantes para propagar los virus –correo, mensajería, navegación, etc.-, mantén las mismas recomendaciones.