Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.

Similar presentations

Presentation on theme: "Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes."— Presentation transcript:



3 Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes

4  A virus is a program that attach itself in a real program. It can corrupt and destroy a computer system without the user notice. The viruses can replicate themselves to infect other systems. How do viruses spread? A piece of software that contain virus (called host program) someone share the program (E-mail, Floppy Disk, CD-Rom) The virus will copied to that computer. The software in the computer will be inflected Home

5  The virus will hide in the computer for weeks or even months. It lead us can't detect the viruses immediately. Characteristic:  A virus usually is activated as soon as a program or file is used or at the specific times.  The virus code will often display a message letting you know that the virus has done its damage. Some types of viruses exist now: boot sector viruses, file viruses, macro viruses. Home

6  Hardware theft present a difficult security challenge.  It means that someone stole the hardware of the computer, for example:  Hardware theft usually exists in large companies or schools.  In the case of desktop and larger computers at home, hardware theft generally is not a problem. Home CPU, RAM, Hard Disk etc

7  Software theft can take many forms-- from someone physically stealing a DVD-ROM, CD-ROM, or floppy disk to intentional piracy of software.  Software piracy is the unauthorized and illegal duplication of copy-righted software, which is the most common form of software theft. That means without Software License.  Download or use illegal software from the web or CDs. Home

8  Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.  It can range from a student send personal e-mail by school computer to someone gaining access to a bank computer and performing an unauthorized transfer.  Hackers are the one who try to break into a computer with the intention of stealing or corrupting its data. Home

9 Information theft typically occurs for a variety of reasons: e.g. An organization stealing or buying stolen information to learn about its competitor. Someone steal others’ credit card information to make purchases on the web. Information theft often involves the data privacy issue and is linked to other types of computer crimes.

10 Computer viruses: Destroy or corrupt data stored in the infected computer. The symptom or damage caused by a virus can be harmless or cause significant damage, as planned by the creator. Then, your computer may hang or even can't be used. Hardware theft: It will cause the loss of properties -> money. Then, Your computer can't run properly. Home

11 Software theft:  Using illegal Software will increase the chance of viruses infection.  Poor quality of software and reduces your ability to receive technical support from the software producer.  Drives up the price of original software for all users. Unauthorized use by hackers and Information Theft: Your information, data, programs will be stolen. you will loss your privacy … Home`

12 Computer Viruses  Use the anti-virus program to check and remove viruses in your computer regularly.  Update the anti-virus list regularly.  Scanning all floppy disk, downloaded programs by anti-virus program.  Back up files regularly  Check all downloaded programs for virus and do not open the e-mails come from an unknown source. Methods to safeguard computer systems

13 Hardware theft  Install additional physical security devices such as alarm system that lock the equipment in a room.  Common sense and a constant awareness of the risk are the best preventive measures against theft of laptop computer and other equipment.  Physical access controls,such as locked doors,windows usually are adequate to protect the equipment. Methods to safeguard computer systems

14 Software Theft  To reduce software piracy, “educate the users to respect the original creation, don’t use pirated software.” is important.  Using software with license Methods to safeguard computer systems

15 Unauthorized Access of Hackers  Access control is a security measure that defines who can access a computer,when and what they can take while accessing the computer. Two techniques are used: Identification----verifies that you are a valid user by Setting Password to log in the computer system. Authentication----verifies that who you are ( Giving Authority) and the user right. SSet up Fire-wall in network servers to prevent unauthorized access to the computer network. Methods to safeguard computer systems

16 Information theft Encryption is one way to protect sensitive data. Sender will convert data to codes which are unreadable and the receiver must get the password and key in order to convert the codes back to meaningful data. Methods to safeguard computer systems

17  Do not open / download files from an unknown source on the internet.  Do not disclose your account and passwords to others.  Log out the computer network when you leave.  Use the copyrighted software and do not install illegal software.  Do not steal the hardware of the computer. Home

Download ppt "Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes."

Similar presentations

Ads by Google