
THEME 4
equipment protection
SESSIONS
S1 to S4-G- Make a presentation (VIDEOSCRIB, POWER POINT, PREZI,.....) where remain
_cc781905-5cde-3194 -bb3b-136bad5cf58d_ reflejadas los siguientes contenidos_cc781905-5cde-3194-bb3b -136bad5cf58d_(GROUP NAME - THEME4):
-
Concepts of integrity, availability and confidentiality.
-
Concept of malware and its classification.
-
Definition of passive safety and its types.
-
Active security and type of antimalware programs.
-
Wireless networks, how can we increase the level of security?
-
Pros and cons in virtual_environment security.
-
Make a Venn diagram with the similarities and differences between a hacker and a cracker.
send it by email.
S5-I - Explain why these terms are called that way: trojan, virus and worms. What name would you give to a
_cc781905-5cde-3194 -bb3b-136bad5cf58d_ malware that every time you empty the trash will delete ALL DOCUMENTS FROM YOUR
_cc781905-5cde-3194 -bb3b-136bad5cf58d_ COMPUTER, showing the following message on the screen: "I was very hungry and that's why I
_cc781905-5cde-3194 -bb3b-136bad5cf58d_ ate all your files".?.
Once you have searched for the information, you must complete the following form. Remember that you can only complete it once.
Do the activities in the section "The password expert" on page 60.
