6. Remedies:
◎Network layer security: secured with cryptographic methods
and security protocols.
◎ Internet Protocol Security (IPsec):It provides security and
authentication at the IP layer by transforming data using
encryption.
◎ Security token: Some online sites offer customers the ability
to use a six digit code which randomly changes every 30–60
seconds on a security token.
◎ Electronic mail security: Email messages are composed,
delivered, and stored in a multiple step process.
◎Firewalls : Firewalls also screen network traffic and are able to
block traffic that is dangerous.
7. Hackers???
◎One who uses a computer to gain
unauthorised access to data , or to carry out
malicious attacks.
8. Tips :
• Always lock your personal computer and mobile phones.
• Never ever log Into your personal accounts(email ,bank) from
anyone else’s computer unless necessary.
• Always update your anti-virus
• Never open unnecessary mails or websites which you are not
aware of they may contain bots or spyware which could steal
your personal data.
• Always Have backup data of most important things.
9. “
I think computer viruses should count as life. I think it
says something about human nature that the only form
of life we have created so far is purely
destructive. We’ve created life in our own image.
-stephen hawking.