+ All Categories
Home > Documents > Setting Up a Desktop Computer

Setting Up a Desktop Computer

Date post: 21-Jul-2016
Category:
Upload: patrick-jorge-sibayan
View: 16 times
Download: 2 times
Share this document with a friend
Description:
Setting Up a Desktop Computerhow to set up a computersetting up a computer guideguide to assemble a computer
74
SETTING UP A DESKTOP COMPUTER
Transcript
Page 1: Setting Up a Desktop Computer

SETTING UPA

DESKTOP COMPUTER

Page 2: Setting Up a Desktop Computer
Page 3: Setting Up a Desktop Computer
Page 4: Setting Up a Desktop Computer
Page 5: Setting Up a Desktop Computer
Page 6: Setting Up a Desktop Computer
Page 7: Setting Up a Desktop Computer
Page 8: Setting Up a Desktop Computer
Page 9: Setting Up a Desktop Computer
Page 10: Setting Up a Desktop Computer
Page 11: Setting Up a Desktop Computer
Page 12: Setting Up a Desktop Computer
Page 13: Setting Up a Desktop Computer
Page 14: Setting Up a Desktop Computer
Page 15: Setting Up a Desktop Computer
Page 16: Setting Up a Desktop Computer
Page 17: Setting Up a Desktop Computer

COMPUTER SECURITY RISKS

AND SAFETY

Page 18: Setting Up a Desktop Computer

COMPUTER SECURITY RISKS

- is any event or action that could cause a loss of or damage to computer hardware, software,

data, information or processing capability

Page 19: Setting Up a Desktop Computer

COMPUTER CRIME

- any illegal act involving a computer

Page 20: Setting Up a Desktop Computer

CYBERCRIME

- refers to online or Internet-based illegal acts

Page 21: Setting Up a Desktop Computer

CRIMEWARE

- software used by cybercriminals

Page 22: Setting Up a Desktop Computer

HACKER

- someone who accesses a computer or network illegally

Page 23: Setting Up a Desktop Computer

CRACKER

- someone who accessesa computer or network illegally

but has the intent of destroying data, stealing information

or other malicious action

Page 24: Setting Up a Desktop Computer

CYBEREXTORTIONIST

- someone who usese-mail as a vehicle for extortion

Page 25: Setting Up a Desktop Computer

CYBERTERRORIST

- someone who uses the Internet or network

to destroy or damage computers for political reasons

Page 26: Setting Up a Desktop Computer

CYBERWARFARE

- describes an attack whose goal ranges from disabling

a government’s computer network to crippling a country

Page 27: Setting Up a Desktop Computer

1. MALWARE

Page 28: Setting Up a Desktop Computer

1. MALWARE

- short for malicious software

- programs that act without a user’s knowledge and deliberately

alter the computer’s operations

Page 29: Setting Up a Desktop Computer

VIRUS

- is a potentially damagingcomputer program that affects

or infects a computer negatively by altering the way the computer works

without the user’s knowledge or permission

Page 30: Setting Up a Desktop Computer

WORM

- is a program that copies itself repeatedly

Page 31: Setting Up a Desktop Computer

TROJAN HORSE

- is a program that hides within or looks like a legitimate program

Page 32: Setting Up a Desktop Computer

SYMPTOMS OF INFECTED COMPUTER

Operating system runs much slower than usual

Available memory is less than expected

Files become corrupted Screen displays unusual message

or image Music or unusual sound plays

randomly

Page 33: Setting Up a Desktop Computer

SYMPTOMS OF INFECTED COMPUTER

Existing programs and files disappear

Programs or files do not work properly

Unknown programs or files mysteriously appear

System properties change Operating system does not start up

Operating system shuts down unexpectedly

Page 34: Setting Up a Desktop Computer

MALWARE INFECTS COMPUTER WHEN…

(1) Opens an infected file. (2) Runs an infected program.

(3) Boots the computer with infected removable media inserted in a

drive or plugged in a port.(4) Connects an unprotected

computer to a network.(5) When a certain condition or

event occurs, such as the computer’s clock changing to

a specific date.

Page 35: Setting Up a Desktop Computer

SAFEGUARDS AGAINST

MALWARE

Page 36: Setting Up a Desktop Computer

TRUSTED SOURCE

- is an organization or person you believe will not send

a virus infected file knowingly

Page 37: Setting Up a Desktop Computer

ANTIVIRUS PROGRAM

- protects a computer againstviruses by identifying and removing

any computer viruses found in memory on storage media or on incoming files

Page 38: Setting Up a Desktop Computer

VIRUS SIGNATURE /DEFINITION

- is a known specific pattern of virus code

- one technique that antivirus programs use to identify a virus

Page 39: Setting Up a Desktop Computer

QUARANTINE

- is a separate area of a hard disk that holds the infected file until

the infection can be removed

Page 40: Setting Up a Desktop Computer

VIRUS HOAX

- is an e-mail message that warns users of a nonexistent virus or other malware

Page 41: Setting Up a Desktop Computer

FIREWALL

- is hardware or software thatprotects a network’s resources

from intrusion by users on another network such as the Internet

Page 42: Setting Up a Desktop Computer

2. UNAUTHORIZED ACCESS AND USE

Page 43: Setting Up a Desktop Computer

UNAUTHORIZED ACCESS

- is the use of a computer or network without permission

Page 44: Setting Up a Desktop Computer

UNAUTHORIZED USE

- is the use of a computer or its data for unapproved or possibly

illegal activities

Page 45: Setting Up a Desktop Computer

SAFEGUARDS AGAINST

UNAUTHORIZED USE AND ACCESS

Page 46: Setting Up a Desktop Computer

ACCESS CONTROL

- is a security measure that defines who can access a computer,when they can access it and

what actions they can take while accessing the computer

Page 47: Setting Up a Desktop Computer

AUDIT TRAIL

- records in a file both successfuland unsuccessful access attempts

Page 48: Setting Up a Desktop Computer

IDENTIFICATION

- verifies that an individual is a valid user

- uses username (specifies a specific user)

Page 49: Setting Up a Desktop Computer

AUTHENTICATION

- verifies that the individual is the person he or she claims to be

- uses password (private combination of characters

associated with the user name that allows access to certain

computer resources)

Page 50: Setting Up a Desktop Computer

AUTHENTICATION

- uses possessed objects (any item that you must carry to gain access to a computer

or computer facility)

- uses PIN (personal identification number)

Page 51: Setting Up a Desktop Computer

AUTHENTICATION

- uses biometric devices (authenticates a person’s identity

by translating a personal characteristic, such as a fingerprint, into a digital code

that is compared with a digital code stored in the computer verifying a

physical or behavioral characteristic)

Page 52: Setting Up a Desktop Computer

3. HARDWARE THEFT AND VANDALISM

Page 53: Setting Up a Desktop Computer

HARDWARE THEFT

- is the act of stealing computer equipment

Page 54: Setting Up a Desktop Computer

HARDWARE VANDALISM

- is the act of defacing ordestroying computer equipment

Page 55: Setting Up a Desktop Computer

4. SOFTWARE THEFT

Page 56: Setting Up a Desktop Computer

4. SOFTWARE THEFT

- occurs when someone:(1) Steals software media

(2) intentionally erases programs(3) illegally copies a program

(4) illegally registers or activates a program

Page 57: Setting Up a Desktop Computer

SOFTWARE PIRACY

- is the unauthorized and illegal duplication of copyrighted software

Page 58: Setting Up a Desktop Computer

KEYGEN

- short for key generator

- creates software registration numbers and sometimes activation codes

Page 59: Setting Up a Desktop Computer

SAFEGUARDS AGAINST

SOFTWARE THEFT

Page 60: Setting Up a Desktop Computer

LICENSE AGREEMENT

- is the right to use the software

- provides specific conditions for use of the software which the user must accept before

using the software

Page 61: Setting Up a Desktop Computer

PRODUCT ACTIVATION

- conducted either online or by telephone

- users provide the software product’s 25-character identification number to receive an installation identification number unique to the computer on

which the software is installed

Page 62: Setting Up a Desktop Computer

5. INFORMATION THEFT

- occurs when someone steals personal or confidential information

Page 63: Setting Up a Desktop Computer

SAFEGUARDS AGAINST

INFORMATION THEFT

Page 64: Setting Up a Desktop Computer

ENCRYPTION

- is a process of convertingreadable data into unreadable

characters to preventunauthorized access

- to read the data, the recipient must decrypt or decipher

it into a readable form

Page 65: Setting Up a Desktop Computer

ENCRYPTION

- the encrypted (scrambled) data is called ciphertext

- an encryption algorithm or cypher is a set of steps that can convert

readable plaintext into unreadable ciphertext

Page 66: Setting Up a Desktop Computer

ENCRYPTION KEY

- is a set of characters that the originator of the data uses

to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext

Page 67: Setting Up a Desktop Computer

6. SYSTEM FAILURE

Page 68: Setting Up a Desktop Computer

6. SYSTEM FAILURE

- is the prolonged malfunction of a computer

- can cause loss of hardware, software, data or information

Page 69: Setting Up a Desktop Computer

SAFEGUARDS AGAINST

SYSTEM FAILURE

Page 70: Setting Up a Desktop Computer

UNINTERRUPTIBLE POWER SUPPLY

- is a device that contains surgeprotection circuits and one or more

batteries that can provide power during a temporary or permanent

loss of power

Page 71: Setting Up a Desktop Computer

BACKUP

- is a duplicate of a file, program or disk that can be used if the original

is lost, damaged or destroyed

Page 72: Setting Up a Desktop Computer

FULL BACKUP

- copies all of the files in the computer

Page 73: Setting Up a Desktop Computer

SELECTIVE BACKUP

- users choose which folders and files to include in a backup

Page 74: Setting Up a Desktop Computer

THANK YOU!


Recommended