Presentation is loading. Please wait.

Presentation is loading. Please wait.

the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

Similar presentations


Presentation on theme: "the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same."— Presentation transcript:

1

2

3

4

5 the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment. E.g=

6

7 Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it. Viruses can be displayed as attachments of funny images, greeting cards, or audio and video files.

8 There are many different types of viruses and all of these behave in slightly different ways. They will all affect your computer differently. Viruses commonly cause your computer to slow down and can also result in the loss of important files. Some viruses can also access the security of your computer. These allow hackers to view your personal information which could leave you open to identity theft.

9 E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually spreads itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e- mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it. Trojan horses have no way to replicate automatically. Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts spreading from there.

10 Resident Viruses Direct Action Viruses Overwrite Viruses Boot Virus Macro Virus Taken from:http://www.buzzle.com/articles/different -types-of-computer-viruses.html Directory Virus Polymorphic Virus File Infectors Companion Viruses FAT Virus Worms Trojan Horses Logic Bombs

11 1.Install quality antivirus 2.Install anti-spyware protection 3.Keep anti-malware current 4.Perform daily scans 5.Disable auto run 6.Beware of email attachments 7.Scan devices before copy or open any files from it 8.Download files only from reliable sources. 9.Back up your files! 10.execute programs or files you find in newsgroups and chat rooms

12 Disadvantages Cant fully prevent: computer worm Trojan horses spyware Adware Cost a lot of money Can’t impair a computers’ performance Unexpected renewal cost Takes up storage space

13

14 Breaking into unauthorised: computers computer network Computer security This could be done using a computer, phone system, network, internet

15 On the Internet-connected system : 1.Network enumeration: Discovering information about the intended target. 2.Vulnerability analysis: Identifying potential ways of attack. 3.Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis. Security exploits Password cracking Packet sniffer Spoofing attack Rootkit Social engineering Viruses Worms Trojan horses Key loggers  School: crashes work  Teachers: delete work  Home: deletes personal stuff Students: delete work people: identity theft people:credit card fraud WIKIPEDIA-HACKING MY DOCUMENTS

16 Anti virus software Firewall Anti-spyware Keep informed about network security Don't run unnecessary network services Create a strong password: Numbers Characters symbols http://www.detroitchamber.com/i ndex.php?option=com_content& menuid=206&id=2799

17 GOOGLE IMAGES SEACH- BACKUP

18 When…. Computer crashes computer freezes physical failure lose a piece of work you can recover it because you have a back up which has the file saved on it.

19 USB FLOPPY DISK HARD- DRIVE MAGNETIC TAPE CDS DVDS FLASH MEMORY CD- ROM DVD- RAM http://en.wikipedia.org/wiki/Backup

20 What should you backup? You should only backup things that can not be replaced or done again because your storage space is limited. E.G: Documents: You should backup your entire documents folder all the time. Music: If you’ve paid lots of money for MP3 downloads Pictures & Videos: memories Desktop Email: If using outlook or windows live mail. There’s simply no reason to backup….. Windows, program Files http://www.howtogeek.com/howto/4905/backup- windows-mail-messages-and-contacts-in-vista/

21 It is important to back up all your files and documents because you could lose it permanently at anytime. Back up your documents on a hard ware disk, USB or floppy disk etc. The best places to keep your back up storage is somewhere safe and secure so that you can find it easily when you need it.For example; your bag, in your bedroom- somewhere in your shelves, your jewellery box if you have one and also in your pocket. This could happen at any moment if you don ’ t listen to this simple command … BACK UP YOUR FILES!!

22 Where my backup is going to be saved-on my USB Where my work would have originally saved- in my documents Save!!!!!! File name A back up is a copy of data!!! So now I have backed up my work just in case something happens to my laptop


Download ppt "the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same."

Similar presentations


Ads by Google