Unit A: Exploring Computer Systems

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Stole it Straight from Wilkes County. Questions from 1.01.
Security, Privacy, and Ethics Online Computer Crimes.
Nasca Internet Networking and Security viruses.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Viruses & Destructive Programs
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Video Following is a video of what can happen if you don’t update your security settings! security.
VIRUSES and DESTRUCTIVE PROGRAMS
D. Beecroft Fremont High School VIRUSES.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Types of Electronic Infection
Technology Competency Computer Infestations Mr. Locke.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
VIRUS.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Chapter 1 Describe the purpose, components, and use of a computer system.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
bitdefender virus protection
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Information Technology
COMPUTER VIRUSES Computer Technology.
Computing Issues that Affect Us All
Related to data, hardware, and software
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Computer Ethics.
Computer Technology Day 21
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Unit 6 Digital Literacy Study S3 Obj 2-2
Part 3.
Viruses.
King Saud University- College OF Applied Studies
Computer Viruses Standard A-4 (Safety Unit)
What is Information Security?
Unit 6 Digital Literacy Study S3 Obj 2-2
Chap 10 Malicious Software.
Computing Issues that Affect Us All
Technology Mrs. Huddleston
Computing Issues that Affect Us All
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Worms, Viruses and Other Creepy Computer Things:
Presentation transcript:

Unit A: Exploring Computer Systems 1.03 ~ How do you describe the security and confidentiality issues and ethics-related to data, hardware, and software.

Classifying Software Commercial Shareware Freeware Public Domain Software

Commercial Software Considered to be proprietary software Copyrighted by an individual or business Permission needed in order to copy Software is usually disabled after a specified number of uses if not registered

Shareware Copyright protected Distributed free on a trial basis Payment by the honor system for satisfied users Owner retains the copyright

Freeware Given away free of charge Owner retains the copy right Program cannot be sold or altered without permission Not necessarily free to copy and distribute

Public Domain Software Not copyrighted Donated for public use Free to copy and distribute

Types of Viruses Bomb Hoax Phage Trojan Horse Virus Worm

Bomb Destructive computer code or virus designed to activate at a specific time.

Hoax A program intended to scare users into thinking they have a virus.

Phage A program that modifies other programs, operating systems, and databases on a Personal Digital Assistant (PDA)

Trojan Horse A virus designed as a useful piece of software

Virus A computer program designed to cause damage to computer files.

Worm Destructive computer program that bores its way through a computer network.

Safe Computing Tips Make back-up copies of all files on a regular basis. Don’t share disks from other computers. This will increase the chance of catching a virus.   Don’t boot from a floppy disk. Write-protect your disks. Use an anti-virus program to scan your files on a regular basis. Use caution when downloading files from the Internet — many are virus infected.

Never open an e-mail attachment unless you are expecting it and it is from a trusted source.   Use an anti-virus program that will automatically detect viruses downloaded from the Internet. File sharing on a local area network (LAN) may also expose your files to a virus. Change passwords frequently. Do not use common names; instead use a combination of text, numbers, and symbols for passwords.

WHO AM I? __________________ 1. The Michelangelo virus was to take effect on infected computers on March 8. ____________________ 2. The Jerusalem virus was one of the earliest found. Its trigger date was Friday the 13th. ____________________ 3. This virus was introduced to a single computer. It infected thousands of computers as it traveled through networks. ____________________ 4. The MacMag virus infected computers that accessed a certain bulletin board. The trigger date was March 2, 1988.

____________________ 5 ____________________ 5. IBM had a major virus problem outbreak called Christmas Tree which slowly worked its way through the company’s computers. ____________________ 6. The Password virus was disguised as a log-in screen. The virus screen captured and stole the user’s log-in and password. ____________________ 7. A freeware program called Homework Helper was intended to destroy computer systems rather than helping students with homework. ____________________ 8. The screen appears as a dark gray box terminating applications that are running. Once terminated the virus modifies other programs, databases and operating systems.

____________________ 9 ____________________ 9. A program called Stupid Mack Tricks could fool a user into thinking the computer was infected by a virus. This program is loved by many practical jokers. ____________________ 10. An AIDS information program was distributed on disk to thousands of users. The disk was supposed to provide information, but instead it took over the computer system. ____________________ 11. The “Good Times” E-mail message was widely reported as a virus affecting computers by opening E-mail. Experts agree that viruses cannot be spread through e-mail. ____________________ 12. A program that infects applications downloaded to a PDA by connection to a PC.