SlideShare uma empresa Scribd logo
Physical Issues
 Environmental factors
   Your computer should be kept in a
      Dust free
      Dry (moisture free)
      Smoke free environment
Physical Issues
 Hardware protection
 Your computer should be equipped with
   A UPS (Uninterrupted Power Supplier) to avoid
    risk of sudden power failure and fluctuations.
   Surge protection to protect against lightning
    and thunder.
   Stabilizer to control voltage.
Logical security
  The software and the data in your
  computer can be protected through the
  use of
      Password
      Backups
Malicious codes
 A common misconception is that other
 kinds of electronic nastiest such as worms
 and Trojan horse applications are viruses.


 Viruses, worms and Trojan horse belong to a
 broader category called “malicious codes”.
Virus
 A program or piece of code that is loaded
 onto your computer without your knowledge
 and runs against your wishes. Like any other
 program, it contains instructions that tell
 your computer what to do.
Virus
 Viruses can also replicate themselves.
 All computer viruses are man made.
 A simple virus that can make a copy of itself over again is
  relatively easy to produce.
 A virus can be destructive; it could format your hard drive,
  overwrite your hard drive boot sector or delete files and render
  your machine inoperative.
 Even such a simple virus is dangerous because it will quickly use
  all available memory and bring the system to a halt.
 An even more dangerous type of virus is one capable of
  transmitting itself across networks and bypassing security
  systems.
Virus
  How do viruses invade a machine?
  E-mail or an e-mail attachment
  Downloads
  Shared infected floppy disks
  Hacking (Occasionally)
Virus
   Trojan Horse
   A destructive program that masquerades as a
    benign application. Unlike viruses, Trojan horses
    do not replicate themselves.
Virus
   Worm
   A program or algorithm that replicates itself over a
    computer network and usually performs malicious
    actions.
Virus
   Virus
   A program or piece of code that is loaded onto
    your computer without your knowledge and runs
    against your wishes.
Virus
   Blended program
   Blended threats combine the characteristics of
    viruses, worms, Trojan Gorses and malicious code
    with server and Internet vulner abilities.
Virus
   Combating Viruses, Worms and Trojan Horses
     The first step to protecting your computer is to ensure
      your operating system (OS) is up-to-date
     you should have anti-virus software installed on your
      system and ensure you download updates frequently to
      ensure your software has the latest fixes for new viruses,
      worms and Trojan horses.
     You should also install a firewall as well.
Antivirus Software
   Antivirus software can detect nearly all types of
    known viruses, but it must be updated regularly to
    maintain effectiveness.
Firewall
   A firewall is a system that prevents unauthorized
    use and access to your computer.
   A firewall can be either hardware or software.
Firewall
   Hardware firewalls provide a strong degree of
    protection from most forms of attack from the
    outside world can be purchased as a stand alone
    product or in broadband routers.
   For individual home users, the most popular
    firewall choice is a software firewall

Mais conteúdo relacionado

Mais procurados

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
ILAKIA
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
Athena Catindig
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
Satyam Sangal
 

Mais procurados (20)

Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Anti virus
Anti virusAnti virus
Anti virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
 
information about virus
information about virusinformation about virus
information about virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus
virusvirus
virus
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Semelhante a Issues and precautions related to ict

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
Anuj Pawar
 

Semelhante a Issues and precautions related to ict (20)

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus
VirusVirus
Virus
 
Virus project
Virus projectVirus project
Virus project
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Virus
VirusVirus
Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

Último

ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
ashishpaul799
 

Último (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 

Issues and precautions related to ict

  • 1.
  • 2. Physical Issues  Environmental factors  Your computer should be kept in a  Dust free  Dry (moisture free)  Smoke free environment
  • 3. Physical Issues  Hardware protection  Your computer should be equipped with  A UPS (Uninterrupted Power Supplier) to avoid risk of sudden power failure and fluctuations.  Surge protection to protect against lightning and thunder.  Stabilizer to control voltage.
  • 4. Logical security  The software and the data in your computer can be protected through the use of  Password  Backups
  • 5. Malicious codes  A common misconception is that other kinds of electronic nastiest such as worms and Trojan horse applications are viruses.  Viruses, worms and Trojan horse belong to a broader category called “malicious codes”.
  • 6. Virus  A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Like any other program, it contains instructions that tell your computer what to do.
  • 7. Virus  Viruses can also replicate themselves.  All computer viruses are man made.  A simple virus that can make a copy of itself over again is relatively easy to produce.  A virus can be destructive; it could format your hard drive, overwrite your hard drive boot sector or delete files and render your machine inoperative.  Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.  An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
  • 8. Virus  How do viruses invade a machine?  E-mail or an e-mail attachment  Downloads  Shared infected floppy disks  Hacking (Occasionally)
  • 9. Virus  Trojan Horse  A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves.
  • 10. Virus  Worm  A program or algorithm that replicates itself over a computer network and usually performs malicious actions.
  • 11. Virus  Virus  A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
  • 12. Virus  Blended program  Blended threats combine the characteristics of viruses, worms, Trojan Gorses and malicious code with server and Internet vulner abilities.
  • 13. Virus  Combating Viruses, Worms and Trojan Horses  The first step to protecting your computer is to ensure your operating system (OS) is up-to-date  you should have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms and Trojan horses.  You should also install a firewall as well.
  • 14. Antivirus Software  Antivirus software can detect nearly all types of known viruses, but it must be updated regularly to maintain effectiveness.
  • 15. Firewall  A firewall is a system that prevents unauthorized use and access to your computer.  A firewall can be either hardware or software.
  • 16. Firewall  Hardware firewalls provide a strong degree of protection from most forms of attack from the outside world can be purchased as a stand alone product or in broadband routers.  For individual home users, the most popular firewall choice is a software firewall