Consejo 4
18
-
Upload
elisabethynicole -
Category
Documents
-
view
91 -
download
0
Transcript of Consejo 4
![Page 1: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/1.jpg)
![Page 2: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/2.jpg)
virus
![Page 3: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/3.jpg)
![Page 4: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/4.jpg)
gusanos
![Page 5: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/5.jpg)
troyanos
![Page 6: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/6.jpg)
spyware
![Page 7: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/7.jpg)
![Page 8: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/8.jpg)
hijackers
![Page 9: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/9.jpg)
hoaxes
![Page 10: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/10.jpg)
![Page 11: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/11.jpg)
![Page 12: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/12.jpg)
![Page 13: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/13.jpg)
![Page 14: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/14.jpg)
Lee las políticas de uso y privacidad de los diferentes servicios antes de utilizarlos.
![Page 15: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/15.jpg)
Piensa antes de publicar, no sea que luego te arrepientas.
![Page 16: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/16.jpg)
Valora que información deseas revelar y controla quien puede acceder a ella.
![Page 17: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/17.jpg)
Controla tu lista de contactos, y antes de agregar a alguien tomate tu tiempo para asegurarte de su confianza.
![Page 18: Consejo 4](https://reader034.fdocuments.es/reader034/viewer/2022042602/559f87831a28abd8158b4610/html5/thumbnails/18.jpg)
Las redes sociales contienen las mismas aplicaciones que utilizan los atacantes para propagar los virus –correo, mensajería, navegación, etc.-, mantén las mismas recomendaciones.