Presentation is loading. Please wait.

Presentation is loading. Please wait.

We are here to help you… Fight something like this Brownies !

Similar presentations


Presentation on theme: "We are here to help you… Fight something like this Brownies !"— Presentation transcript:

1 We are here to help you… Fight something like this Brownies !

2 A computer virus is a programme which enables itself to infect computers. A virus can spread through computers when the host (of the virus) has taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD or USB drive. - Information from http://en.wikipedia.org/wiki/ Computer_virus http://en.wikipedia.org/wiki/ Computer_virus

3 Trojan Horse: A trojan horse program has the appearance of having a useful and desired function. While it may advertise its activity after launching, this information is not apparent to the user beforehand. Secretly the program performs other, undesired functions. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. Worms: A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. Bootsector Virus: A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks. Information from - http://antivirus-software.topchoicereviews.com/types-of- viruses.html http://antivirus-software.topchoicereviews.com/types-of- viruses.html

4 Hacking is unauthorised use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.) Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might engage in any of the following activities: Vandalism—Destruction or digital defacement of a computer or its data for destruction’s sake. Sometimes this is ego-driven. They break in and leave their mark to show they’ve been there. Theft—Gaining access to intellectual or proprietary technology or information, sometimes for resale.

5 1 Use anti-virus software and keep it current. Installing an anti-virus program can keep viruses and other nasty programs out of your computer. 2 Activate a firewall. Many people use software or hardware firewalls to prevent hackers from gaining access to their files through ports or other points of entry. Windows comes with a firewall, which you can find out how to set up by going to the control panel and clicking on "Windows Firewall."  2 Keep track of system events. Check your system log often to find out what your computer is doing. If you're getting notices about any programs you don't remember starting or installing, then be alert.  3 Make sure your operating system is up to date. Windows updates are crucial to protecting your computer from recently discovered security holes. Updating stops hackers from exploiting these vulnerabilities.  4 Install patches when they arrive. When hackers discover a new way to enter your computer, its usually through a common program such as Adobe Acrobat. Stop hackers by installing security fixes and patches when they become available, as many of these are developed to fix security issues.

6 In Information Technology, a backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. It is important to have a backup so if your main computer breaks down or is burnt in a fire etc … You have a spare piece of technology that has all your photos, memories and all your personal, private stuff.

7 You can use a USB Floppy disk Send an email to yourself

8 Make sure your backup is no where near your main source and that it is in a secure safe place, for example, a safe, your jewellery box or purse.

9


Download ppt "We are here to help you… Fight something like this Brownies !"

Similar presentations


Ads by Google