SlideShare uma empresa Scribd logo
1 de 16
Physical Issues
 Environmental factors
   Your computer should be kept in a
      Dust free
      Dry (moisture free)
      Smoke free environment
Physical Issues
 Hardware protection
 Your computer should be equipped with
   A UPS (Uninterrupted Power Supplier) to avoid
    risk of sudden power failure and fluctuations.
   Surge protection to protect against lightning
    and thunder.
   Stabilizer to control voltage.
Logical security
  The software and the data in your
  computer can be protected through the
  use of
      Password
      Backups
Malicious codes
 A common misconception is that other
 kinds of electronic nastiest such as worms
 and Trojan horse applications are viruses.


 Viruses, worms and Trojan horse belong to a
 broader category called “malicious codes”.
Virus
 A program or piece of code that is loaded
 onto your computer without your knowledge
 and runs against your wishes. Like any other
 program, it contains instructions that tell
 your computer what to do.
Virus
 Viruses can also replicate themselves.
 All computer viruses are man made.
 A simple virus that can make a copy of itself over again is
  relatively easy to produce.
 A virus can be destructive; it could format your hard drive,
  overwrite your hard drive boot sector or delete files and render
  your machine inoperative.
 Even such a simple virus is dangerous because it will quickly use
  all available memory and bring the system to a halt.
 An even more dangerous type of virus is one capable of
  transmitting itself across networks and bypassing security
  systems.
Virus
  How do viruses invade a machine?
  E-mail or an e-mail attachment
  Downloads
  Shared infected floppy disks
  Hacking (Occasionally)
Virus
   Trojan Horse
   A destructive program that masquerades as a
    benign application. Unlike viruses, Trojan horses
    do not replicate themselves.
Virus
   Worm
   A program or algorithm that replicates itself over a
    computer network and usually performs malicious
    actions.
Virus
   Virus
   A program or piece of code that is loaded onto
    your computer without your knowledge and runs
    against your wishes.
Virus
   Blended program
   Blended threats combine the characteristics of
    viruses, worms, Trojan Gorses and malicious code
    with server and Internet vulner abilities.
Virus
   Combating Viruses, Worms and Trojan Horses
     The first step to protecting your computer is to ensure
      your operating system (OS) is up-to-date
     you should have anti-virus software installed on your
      system and ensure you download updates frequently to
      ensure your software has the latest fixes for new viruses,
      worms and Trojan horses.
     You should also install a firewall as well.
Antivirus Software
   Antivirus software can detect nearly all types of
    known viruses, but it must be updated regularly to
    maintain effectiveness.
Firewall
   A firewall is a system that prevents unauthorized
    use and access to your computer.
   A firewall can be either hardware or software.
Firewall
   Hardware firewalls provide a strong degree of
    protection from most forms of attack from the
    outside world can be purchased as a stand alone
    product or in broadband routers.
   For individual home users, the most popular
    firewall choice is a software firewall

Mais conteúdo relacionado

Mais procurados

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
ILAKIA
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
Athena Catindig
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
Satyam Sangal
 

Mais procurados (20)

Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Anti virus
Anti virusAnti virus
Anti virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
 
information about virus
information about virusinformation about virus
information about virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus
virusvirus
virus
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Semelhante a Issues and precautions related to ict

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
Anuj Pawar
 

Semelhante a Issues and precautions related to ict (20)

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus
VirusVirus
Virus
 
Virus project
Virus projectVirus project
Virus project
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Virus
VirusVirus
Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

Último

Último (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Issues and precautions related to ict

  • 1.
  • 2. Physical Issues  Environmental factors  Your computer should be kept in a  Dust free  Dry (moisture free)  Smoke free environment
  • 3. Physical Issues  Hardware protection  Your computer should be equipped with  A UPS (Uninterrupted Power Supplier) to avoid risk of sudden power failure and fluctuations.  Surge protection to protect against lightning and thunder.  Stabilizer to control voltage.
  • 4. Logical security  The software and the data in your computer can be protected through the use of  Password  Backups
  • 5. Malicious codes  A common misconception is that other kinds of electronic nastiest such as worms and Trojan horse applications are viruses.  Viruses, worms and Trojan horse belong to a broader category called “malicious codes”.
  • 6. Virus  A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Like any other program, it contains instructions that tell your computer what to do.
  • 7. Virus  Viruses can also replicate themselves.  All computer viruses are man made.  A simple virus that can make a copy of itself over again is relatively easy to produce.  A virus can be destructive; it could format your hard drive, overwrite your hard drive boot sector or delete files and render your machine inoperative.  Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.  An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
  • 8. Virus  How do viruses invade a machine?  E-mail or an e-mail attachment  Downloads  Shared infected floppy disks  Hacking (Occasionally)
  • 9. Virus  Trojan Horse  A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves.
  • 10. Virus  Worm  A program or algorithm that replicates itself over a computer network and usually performs malicious actions.
  • 11. Virus  Virus  A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
  • 12. Virus  Blended program  Blended threats combine the characteristics of viruses, worms, Trojan Gorses and malicious code with server and Internet vulner abilities.
  • 13. Virus  Combating Viruses, Worms and Trojan Horses  The first step to protecting your computer is to ensure your operating system (OS) is up-to-date  you should have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms and Trojan horses.  You should also install a firewall as well.
  • 14. Antivirus Software  Antivirus software can detect nearly all types of known viruses, but it must be updated regularly to maintain effectiveness.
  • 15. Firewall  A firewall is a system that prevents unauthorized use and access to your computer.  A firewall can be either hardware or software.
  • 16. Firewall  Hardware firewalls provide a strong degree of protection from most forms of attack from the outside world can be purchased as a stand alone product or in broadband routers.  For individual home users, the most popular firewall choice is a software firewall