Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes
A virus is a program that attach itself in a real program. It can corrupt and destroy a computer system without the user notice. The viruses can replicate themselves to infect other systems. How do viruses spread? A piece of software that contain virus (called host program) someone share the program (E-mail, Floppy Disk, CD-Rom) The virus will copied to that computer. The software in the computer will be inflected Home
The virus will hide in the computer for weeks or even months. It lead us can't detect the viruses immediately. Characteristic: A virus usually is activated as soon as a program or file is used or at the specific times. The virus code will often display a message letting you know that the virus has done its damage. Some types of viruses exist now: boot sector viruses, file viruses, macro viruses. Home
Hardware theft present a difficult security challenge. It means that someone stole the hardware of the computer, for example: Hardware theft usually exists in large companies or schools. In the case of desktop and larger computers at home, hardware theft generally is not a problem. Home CPU, RAM, Hard Disk etc
Software theft can take many forms-- from someone physically stealing a DVD-ROM, CD-ROM, or floppy disk to intentional piracy of software. Software piracy is the unauthorized and illegal duplication of copy-righted software, which is the most common form of software theft. That means without Software License. Download or use illegal software from the web or CDs. Home
Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities. It can range from a student send personal e-mail by school computer to someone gaining access to a bank computer and performing an unauthorized transfer. Hackers are the one who try to break into a computer with the intention of stealing or corrupting its data. Home
Information theft typically occurs for a variety of reasons: e.g. An organization stealing or buying stolen information to learn about its competitor. Someone steal others’ credit card information to make purchases on the web. Information theft often involves the data privacy issue and is linked to other types of computer crimes.
Computer viruses: Destroy or corrupt data stored in the infected computer. The symptom or damage caused by a virus can be harmless or cause significant damage, as planned by the creator. Then, your computer may hang or even can't be used. Hardware theft: It will cause the loss of properties -> money. Then, Your computer can't run properly. Home
Software theft: Using illegal Software will increase the chance of viruses infection. Poor quality of software and reduces your ability to receive technical support from the software producer. Drives up the price of original software for all users. Unauthorized use by hackers and Information Theft: Your information, data, programs will be stolen. you will loss your privacy … Home`
Computer Viruses Use the anti-virus program to check and remove viruses in your computer regularly. Update the anti-virus list regularly. Scanning all floppy disk, downloaded programs by anti-virus program. Back up files regularly Check all downloaded programs for virus and do not open the e-mails come from an unknown source. Methods to safeguard computer systems
Hardware theft Install additional physical security devices such as alarm system that lock the equipment in a room. Common sense and a constant awareness of the risk are the best preventive measures against theft of laptop computer and other equipment. Physical access controls,such as locked doors,windows usually are adequate to protect the equipment. Methods to safeguard computer systems
Software Theft To reduce software piracy, “educate the users to respect the original creation, don’t use pirated software.” is important. Using software with license Methods to safeguard computer systems
Unauthorized Access of Hackers Access control is a security measure that defines who can access a computer,when and what they can take while accessing the computer. Two techniques are used: Identification----verifies that you are a valid user by Setting Password to log in the computer system. Authentication----verifies that who you are ( Giving Authority) and the user right. SSet up Fire-wall in network servers to prevent unauthorized access to the computer network. Methods to safeguard computer systems
Information theft Encryption is one way to protect sensitive data. Sender will convert data to codes which are unreadable and the receiver must get the password and key in order to convert the codes back to meaningful data. Methods to safeguard computer systems
Do not open / download files from an unknown source on the internet. Do not disclose your account and passwords to others. Log out the computer network when you leave. Use the copyrighted software and do not install illegal software. Do not steal the hardware of the computer. Home
Your consent to our cookies if you continue to use this website.