the protection of computer systerms and information from harm, theft, and unauthorized use. computer...
TRANSCRIPT
• the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment.
• E.g=
• Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
• A virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.
• Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it.
• Viruses can be displayed as attachments of funny images, greeting cards, or audio and video files.
• There are many different types of viruses and all of these behave in slightly different ways. They will all affect your computer differently. Viruses commonly cause your computer to slow down and can also result in the loss of important files.
• Some viruses can also access the security of your computer. These allow hackers to view your personal information which could leave you open to identity theft.
• E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually spreads itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software
• Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it. Trojan horses have no way to replicate automatically.
• Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts spreading from there.
Resident Viruses
Direct Action Viruses
Overwrite VirusesBoot Virus
Macro Virus
Taken from:http://www.buzzle.com/articles/different-types-of-computer-viruses.html
Directory Virus
Polymorphic Virus
File Infectors
File Infectors
Companion Viruses
FAT Virus
Worms
Trojan Horses
Logic Bombs
1. Install quality antivirus2. Install anti-spyware protection3. Keep anti-malware current4. Perform daily scans5. Disable auto run6. Beware of email attachments7. Scan devices before copy or open
any files from it8. Download files only from reliable
sources. 9. Back up your files! 10. execute programs or files you find
in newsgroups and chat rooms
Disadvantages•Cant fully prevent:computer worm Trojan horsesspyware Adware•Cost a lot of money •Can’t impair a computers’ performance•Unexpected renewal cost•Takes up storage space
• Breaking into unauthorised:• computers
• computer network• Computer security
• This could be done using a computer, phone system, network, internet
• On the Internet-connected system :1. Network enumeration: Discovering information about the intended target.
2. Vulnerability analysis: Identifying potential ways of attack. 3. Exploitation: Attempting to compromise the system by employing the
vulnerabilities found through the vulnerability analysis.• Security exploits• Password cracking • Packet sniffer • Spoofing attack • Rootkit• Social engineering • Viruses • Worms • Trojan horses • Key loggers
School: crashes workTeachers: delete work
Home: deletes personal stuff•Students: delete work•people: identity theft
•people:credit card fraud
WIKIPEDIA-HACKING
MY DOCUMENTS
• Anti virus software• Firewall• Anti-spyware• Keep informed about network security• Don't run unnecessary network services• Create a strong password:
NumbersCharacters
symbolshttp://www.detroitchamber.com/index.php?option=com_content&menuid=206&id=2799
GOOGLE IMAGES SEACH-BACKUP
• When….• Computer crashes• computer freezes• physical failure
• lose a piece of work• you can recover it because you have a back up
which has the file saved on it.
USB FLOPPY DISK
HARD-DRIVE MAGNETIC
TAPE
CDSDVDS FLASH
MEMORYCD-ROM
DVD- RAM
http://en.wikipedia.org/wiki/Backup
What should you backup?
• You should only backup things that can not be replaced or done again because your storage space is limited.
E.G:Documents: You should backup your entire documents folder all the time. Music: If you’ve paid lots of money for MP3 downloads
Pictures & Videos: memoriesDesktop Email: If using outlook or windows live mail.
There’s simply no reason to backup…..
•Windows,
•program Files
http://www.howtogeek.com/howto/4905/backup-windows-mail-messages-and-contacts-in-vista/
It is important to back up all your files and documents because you could lose it permanently at anytime. Back up your documents on a hard ware disk, USB or floppy disk etc. The best places to keep your back up storage is somewhere safe and secure so that you can find it easily when you need it.For example; your bag, in your bedroom- somewhere in your shelves, your jewellery box if you have one and also in your pocket.
This could happen at any moment if you don’t listen to this simple command…
BACK UP YOUR FILES!!
Where my backup is going to be saved-on my USB
Where my work would have originally saved- in my documents
Save!!!!!!
File name
A back up is a copy of data!!!
So now I have backed up my work just in case something happens to my laptop