SlideShare a Scribd company logo
1 of 14
INFORMATION AND COMPUTER SECURITY
Q. What is information and computer security?
 Information & computer security: is the protection
of computer systems & networks from information
disclosure, theft of or damage to their hardware,
software, or electronic data, as well as from the
disruption or misdirection of the services they provide .
1
INFORMATION AND COMPUTER …
Responsible Behavior in the Computer Lab
 A computer laboratory is a special place which contains
delicate and expensive equipment .
2
Fig1: Students in a
computer lab
INFORMATION AND COMPUTER …
 We need to follow some guidelines for responsible
behavior in the Computer Lab. These are:
3
i. Students are not allowed in computer lab unless
directly supervised by a computer teacher or any
other staff member.
ii. Never share your password, even with your best
friend.
iii. Listen to directions given by your computer
teacher.
iv. Only use the Internet as instructed. Do not click
on links that seem suspicious or are offers of
“free” anything.
v. Do not use the mouse or keyboard as a toy.
INFORMATION AND COMPUTER …
NOTE:
Do not give own or another’s data to anyone .
E-mail address should not be given to anyone.
Always stick to safe on-line behaviour.
4
INFORMATION AND COMPUTER …
CHALLENGES OF COMPUTER & INFORMATION
TECHNOLOGY
5
INFORMATION AND COMPUTER …
 When we use internet, share file & download
files malicious software may get in to our
device . Some of them are :
6
1. Viruses
 A computer virus is a program usually hidden within
another simple program.
 It produces copies of itself and inserts them into other
programs or files, in turn destroying the data and
performing other malicious actions.
INFORMATION AND COMPUTER …
Macro Viruses
 is series of programming steps that are stored in
single location.
 allows automation of many actions with only a
single keystroke.
 The virus using macro files are most popular as
they are:
 Easy to write
 Can infect more people faster as they exchange
documents and data frequently
 Can easily infect any computer capable of running Office
and Internet
7
 Macro viruses can do a lot of different damage in a
lot of different ways.
INFORMATION AND COMPUTER …
2. Worms
 A computer worm is a type of malware that spreads
copies of itself from computer to computer.
8
A worm can replicate itself without any human
interaction (usually to other computer systems via
network connections) and,
 it does not need to attach itself to a software
program in order to cause damage.
INFORMATION AND COMPUTER …
2. Trojan horses
 It is a program that claims to rid your computer
of viruses but instead introduces viruses into
the system.
9
Since they look like sincere programs they are
referred as Trojan like the “Trojan Horse” of Greek
mythology .
They are mostly spread through internet
downloads and online gaming programs .
INFORMATION AND COMPUTER …
4. Spyware
 As its name suggests, it is a program used to spy
on the computer system.
 It tries to get all confidential & sensitive information
such as your bank account numbers, passwords etc.
 Then, this confidential data is misused to access user’s
accounts.
10
5. Malware
 Malware is short for “malicious software.”
 It is any kind of unwanted software that is installed
without your adequate consent.
In fact all the threats mentioned above such as
Virus, Trojans etc are examples of Malware
INFORMATION AND COMPUTER …
6. Spams
 The term “spam” refers to unsolicited
commercial email (UCE) or unsolicited bulk
email (UBE).
 The most common spams are:
 “Get Rich Quick” and
 “Make Money Fast” (MMF) schemes
11
 Spam emails is not only unwanted, it clogs
your email accounts and uses unnecessary
server space.
INFORMATION AND COMPUTER …
7. Hackers and crackers
 Hackers & crackers: software programmers who
use dubious ways to get control over your
computer and systems.
 Intent of both is to gain control over your
computer so that they can get the sensitive
confidential information .
12
So we can see that our computer may be
affected by many malicious software so we
will see how to prevent our computer from
this malicious software .
INFORMATION AND COMPUTER …
HOW TO PREVENT MALICIOUS SOFTWARES FROM OUR
DIVICE ?
 Install Anti-virus software
 Regularly update software
 Only buy Apps from trusted sources
 Don’t click on suspicious links or download
attachments from unknown sources
 Back up data regularly & Install Firewall
13
14

More Related Content

Similar to INFORMATION AND COMPUTER SECURITY.pptx

Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Suman Mia
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 

Similar to INFORMATION AND COMPUTER SECURITY.pptx (20)

Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Hamza
HamzaHamza
Hamza
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
IT viruses
 IT viruses IT viruses
IT viruses
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

INFORMATION AND COMPUTER SECURITY.pptx

  • 1. INFORMATION AND COMPUTER SECURITY Q. What is information and computer security?  Information & computer security: is the protection of computer systems & networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide . 1
  • 2. INFORMATION AND COMPUTER … Responsible Behavior in the Computer Lab  A computer laboratory is a special place which contains delicate and expensive equipment . 2 Fig1: Students in a computer lab
  • 3. INFORMATION AND COMPUTER …  We need to follow some guidelines for responsible behavior in the Computer Lab. These are: 3 i. Students are not allowed in computer lab unless directly supervised by a computer teacher or any other staff member. ii. Never share your password, even with your best friend. iii. Listen to directions given by your computer teacher. iv. Only use the Internet as instructed. Do not click on links that seem suspicious or are offers of “free” anything. v. Do not use the mouse or keyboard as a toy.
  • 4. INFORMATION AND COMPUTER … NOTE: Do not give own or another’s data to anyone . E-mail address should not be given to anyone. Always stick to safe on-line behaviour. 4
  • 5. INFORMATION AND COMPUTER … CHALLENGES OF COMPUTER & INFORMATION TECHNOLOGY 5
  • 6. INFORMATION AND COMPUTER …  When we use internet, share file & download files malicious software may get in to our device . Some of them are : 6 1. Viruses  A computer virus is a program usually hidden within another simple program.  It produces copies of itself and inserts them into other programs or files, in turn destroying the data and performing other malicious actions.
  • 7. INFORMATION AND COMPUTER … Macro Viruses  is series of programming steps that are stored in single location.  allows automation of many actions with only a single keystroke.  The virus using macro files are most popular as they are:  Easy to write  Can infect more people faster as they exchange documents and data frequently  Can easily infect any computer capable of running Office and Internet 7  Macro viruses can do a lot of different damage in a lot of different ways.
  • 8. INFORMATION AND COMPUTER … 2. Worms  A computer worm is a type of malware that spreads copies of itself from computer to computer. 8 A worm can replicate itself without any human interaction (usually to other computer systems via network connections) and,  it does not need to attach itself to a software program in order to cause damage.
  • 9. INFORMATION AND COMPUTER … 2. Trojan horses  It is a program that claims to rid your computer of viruses but instead introduces viruses into the system. 9 Since they look like sincere programs they are referred as Trojan like the “Trojan Horse” of Greek mythology . They are mostly spread through internet downloads and online gaming programs .
  • 10. INFORMATION AND COMPUTER … 4. Spyware  As its name suggests, it is a program used to spy on the computer system.  It tries to get all confidential & sensitive information such as your bank account numbers, passwords etc.  Then, this confidential data is misused to access user’s accounts. 10 5. Malware  Malware is short for “malicious software.”  It is any kind of unwanted software that is installed without your adequate consent. In fact all the threats mentioned above such as Virus, Trojans etc are examples of Malware
  • 11. INFORMATION AND COMPUTER … 6. Spams  The term “spam” refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE).  The most common spams are:  “Get Rich Quick” and  “Make Money Fast” (MMF) schemes 11  Spam emails is not only unwanted, it clogs your email accounts and uses unnecessary server space.
  • 12. INFORMATION AND COMPUTER … 7. Hackers and crackers  Hackers & crackers: software programmers who use dubious ways to get control over your computer and systems.  Intent of both is to gain control over your computer so that they can get the sensitive confidential information . 12 So we can see that our computer may be affected by many malicious software so we will see how to prevent our computer from this malicious software .
  • 13. INFORMATION AND COMPUTER … HOW TO PREVENT MALICIOUS SOFTWARES FROM OUR DIVICE ?  Install Anti-virus software  Regularly update software  Only buy Apps from trusted sources  Don’t click on suspicious links or download attachments from unknown sources  Back up data regularly & Install Firewall 13
  • 14. 14