+ All Categories
Home > Documents > the protection of computer systerms and information from harm, theft, and unauthorized use. Computer...

the protection of computer systerms and information from harm, theft, and unauthorized use. Computer...

Date post: 26-Dec-2015
Category:
Upload: rafe-manning
View: 217 times
Download: 0 times
Share this document with a friend
Popular Tags:
22
Transcript
Page 1: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Page 2: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Page 3: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Page 4: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Page 5: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

• the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment.

• E.g=

Page 6: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Page 7: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

• Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.

• A virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.

• Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it.

• Viruses can be displayed as attachments of funny images, greeting cards, or audio and video files.

Page 8: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

• There are many different types of viruses and all of these behave in slightly different ways. They will all affect your computer differently. Viruses commonly cause your computer to slow down and can also result in the loss of important files.

• Some viruses can also access the security of your computer. These allow hackers to view your personal information which could leave you open to identity theft.

Page 9: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

• E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually spreads itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software

• Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it. Trojan horses have no way to replicate automatically.

• Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts spreading from there.

Page 10: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

Resident Viruses

Direct Action Viruses

Overwrite VirusesBoot Virus

Macro Virus

Taken from:http://www.buzzle.com/articles/different-types-of-computer-viruses.html

Directory Virus

Polymorphic Virus

File Infectors

File Infectors

Companion Viruses

FAT Virus

Worms

Trojan Horses

Logic Bombs

Page 11: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

1. Install quality antivirus2. Install anti-spyware protection3. Keep anti-malware current4. Perform daily scans5. Disable auto run6. Beware of email attachments7. Scan devices before copy or open

any files from it8. Download files only from reliable

sources. 9. Back up your files! 10. execute programs or files you find

in newsgroups and chat rooms

Page 12: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

Disadvantages•Cant fully prevent:computer worm Trojan horsesspyware Adware•Cost a lot of money •Can’t impair a computers’ performance•Unexpected renewal cost•Takes up storage space

Page 13: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Page 14: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

• Breaking into unauthorised:• computers

• computer network• Computer security

• This could be done using a computer, phone system, network, internet

Page 15: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

• On the Internet-connected system :1. Network enumeration: Discovering information about the intended target.

2. Vulnerability analysis: Identifying potential ways of attack. 3. Exploitation: Attempting to compromise the system by employing the

vulnerabilities found through the vulnerability analysis.• Security exploits• Password cracking • Packet sniffer • Spoofing attack • Rootkit• Social engineering • Viruses • Worms • Trojan horses • Key loggers

School: crashes workTeachers: delete work

Home: deletes personal stuff•Students: delete work•people: identity theft

•people:credit card fraud

WIKIPEDIA-HACKING

MY DOCUMENTS

Page 16: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

• Anti virus software• Firewall• Anti-spyware• Keep informed about network security• Don't run unnecessary network services• Create a strong password:

NumbersCharacters

symbolshttp://www.detroitchamber.com/index.php?option=com_content&menuid=206&id=2799

Page 17: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

GOOGLE IMAGES SEACH-BACKUP

Page 18: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

• When….• Computer crashes• computer freezes• physical failure

• lose a piece of work• you can recover it because you have a back up

which has the file saved on it.

Page 19: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

USB FLOPPY DISK

HARD-DRIVE MAGNETIC

TAPE

CDSDVDS FLASH

MEMORYCD-ROM

DVD- RAM

http://en.wikipedia.org/wiki/Backup

Page 20: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

What should you backup?

• You should only backup things that can not be replaced or done again because your storage space is limited.

E.G:Documents: You should backup your entire documents folder all the time. Music: If you’ve paid lots of money for MP3 downloads

Pictures & Videos: memoriesDesktop Email: If using outlook or windows live mail.

There’s simply no reason to backup…..

•Windows,

•program Files

http://www.howtogeek.com/howto/4905/backup-windows-mail-messages-and-contacts-in-vista/

Page 21: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

It is important to back up all your files and documents because you could lose it permanently at anytime. Back up your documents on a hard ware disk, USB or floppy disk etc. The best places to keep your back up storage is somewhere safe and secure so that you can find it easily when you need it.For example; your bag, in your bedroom- somewhere in your shelves, your jewellery box if you have one and also in your pocket.

This could happen at any moment if you don’t listen to this simple command…

BACK UP YOUR FILES!!

Page 22: the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.

Where my backup is going to be saved-on my USB

Where my work would have originally saved- in my documents

Save!!!!!!

File name

A back up is a copy of data!!!

So now I have backed up my work just in case something happens to my laptop


Recommended