• Inicio
  • Sobre Nosotros
  • Curso 25D100
  • Ciber Terrorismo
  • Delitos Ciberneticos
  • Noticias Ciberneticas
  • Smartphones
  • Contacto
Picture

Cadet cybernetwork specialist
25d100 / cns
april 2015 - june 2015

El ciberterrorismo o terrorismo electrónico es el uso de medios de tecnologías de información, comunicación, informática, electrónica o similar con el propósito de generar terror o miedo generalizado en una población, clase dirigente o gobierno, causando con ello una violación a la libre voluntad de las personas. Los fines pueden ser económicos, políticos o religiosos principalmente - Definicion de Wikipedia.
  1. Introduction
    1. Welcome
  2. 1. Securing Your Computer
    1. Enabling automatic updates on Windows
    2. Installing updates on a Mac
    3. Installing and maintaining antivirus software
    4. Enabling the Windows Firewall
    5. Physically protecting a computer and laptop
    6. Using password-management software
    7. Encrypting files that contain sensitive data
  3. 2. Securing Your Wireless Network
    1. Securing a router
    2. Protecting the service set identifier (SSID)
    3. Setting the wireless encryption level
  4. 3. Securing Your Internet Browser
    1. Checking settings for Internet Explorer
    2. Checking settings for Mozilla Firefox
    3. Checking settings for Google Chrome
    4. Checking settings for Safari
    5. Understanding the signs of a secure website
  5. 4. Staying Safe on the Internet
    1. Protecting against viruses and malware
    2. Avoiding phishing scams
    3. Evaluating links
    4. Using public Wi-Fi safely
    5. Reading installation instructions carefully
    6. Unsubscribing from email subscriptions
    7. Periodically maintaining your settings
    8. Enabling two-factor authentication for your logins
  6. 5. Protecting Your Privacy Online
    1. Choosing better usernames
    2. Keeping security answers private
    3. Reviewing site privacy settings
    4. Creating an online account safely
    5. Browsing on a public computer
    6. Understanding tracking cookies
    7. Turning on Do Not Track requests
    8. Changing Google and Amazon targeted ads
  7. 6. Protecting the Privacy of Others
    1. Blurring sensitive data from photos
    2. Checking emails for contact info before sending
    3. Protecting other people's names and locations
    4. Fact-checking email warnings
    5. Creating a privacy policy if your website collects data
  8. Conclusion
    1. Next steps
Powered by Create your own unique website with customizable templates.