Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer Viruses.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Format Scandisk Defragmentation Antivirus Compression Software
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
Viruses & Destructive Programs
VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Operating System Utility Programs & Stand-alone utility Programs.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Section 6 Theory Software Copyright, Viruses and Hacking.
PC Maintenance How to keep your computer healthy.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Software Utilities Pages 65 to 73 Looking After Your Computer Nick Sims.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Your Interactive Guide to the Digital World Discovering Computers 2012.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
For more notes and topics visit: eITnotes.com.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
VIRUS.
Computer Skills and Applications Computer Security.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Tech Level Cyber Security Lesson 7
Managing Windows Security
Discovering Computers 2012: Chapter 8
LO2: Understand Computer Software
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)  disk organisation (formatting, file transfer, and defragmentation)  system maintenance (system information and diagnosis, system cleanup tools, automatic updating) Slide 1 GCSE Computing Software 2

 Virus:  A computer program that attaches to existing files and can replicate itself and spread from one computer to another, often with user help.  A virus almost always corrupts or modifies files on a targeted computer.  Worm:  A self-replicating computer program which uses a computer network to send copies of itself to other computers on the network without any user intervention.  Unlike a computer virus, a worm does not need to attach itself to an existing program.  Worms almost always cause some harm to a network, even if only by consuming bandwidth.  Trojan:  A destructive program that pretends to be a harmless application.  Unlike viruses and worms, Trojans do not replicate themselves, but they can cause just as much harm. Slide 2 Computer security – malware types

 Spyware:  Software installed on a computers that collects information about users without their knowledge.  Spyware is secretly installed and its presence is typically hidden from the user and difficult to detect.  Many spyware programs are designed to capture usernames and passwords, for use in identity theft or fraud.  Unlike a virus or a worm, spyware does not usually self-replicate. Slide 3 Computer security – malware types

 This is software that is used to prevent, detect and remove malware:  It prevents the installation of malware onto the computer.  It protects the computer by preventing installed viruses from altering important files such as the boot sector or the operating system.  It detects installed malware by periodically scanning the computer.  It then deletes or quarantines any malware that it finds.  To be effective, the virus definitions file that the antivirus software uses to check for malware must be kept up-to- date. Slide 4 Computer security – antivirus software

 This is software or hardware that permits or denies network transmissions between networks based upon a set of rules.  It is often used to protect networks from external hacking attempts while allowing legitimate communications to pass. Slide 5 Computer security – firewall

 Formatting prepares a hard disk, floppy disk or flash memory for data storage.  The formatting process may:  create the file system (high level formatting)  delete any existing data and check and fix any errors in the storage media (low-level formatting).  Formatting deletes all the data stored on the storage media.  A low level format of a hard disk organises the surface into tracks and sectors.  The tracks form concentric circles that radiate outwards from the spindle in the centre to the edge of the disk.  A sector is a subdivision of a track that can hold a fixed amount of data. Slide 6 Disk organisation - formatting

 File transfer is a generic term for the act of transmitting files over a LAN or a WAN such as the Internet.  There are numerous ways and protocols to transfer files over a network.  Computers which provide a file transfer service are often called file servers.  Depending on the perspective, the file transfer is either called uploading or downloading. Slide 7 Disk organisation - file transfer

 Disk fragmentation occurs when the operating system:  splits up large files when saving them.  tries to fill the gaps created when other files are deleted or their size changes.  Defragmentation is carried out by software that reorganises files or parts of files so that the data is physically stored together  This has two benefits:  It speeds up file access.  It ensures that free disk space is maximised by collecting it together.  A simplified animation showing defragmentation. Slide 8 Disk organisation - defragmentation

System maintenance  System information and diagnosis  software that provides information on the hardware and software of a computer system and offers a diagnosis of any problems that are found.  System cleanup tools  software that searches the computer system for settings that are wrong and files which are no longer needed.  setting errors are corrected or deleted  files that are no longer needed are deleted to free up disk space and improve performance.  Automatic updating  software that searches the Internet for updated versions of the software on the computer and downloads and installs the updates so that the computer system always has the latest version, including fixes for known problems/security issues.  Backup software  software that assists in backing up selected files or even the entire computer hard drive.