Your SlideShare is downloading. ×
0
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Computer
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Computer

785

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
785
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
34
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. <ul><li>To know how technology affects society To understand the meaning of computer abuse To list some examples of computer crimes To explain the need for computer security To know the characteristic of the different types of computer and how to prevents virus attacks To practice backing up data </li></ul>Faisal Mahmood Objectives
  • 2. <ul><li>Technology refers the use of tools and resources to solve problems and extend human capabilities. </li></ul><ul><li>Technology has helped us to improve our standard of living in many ways.We can see its influence in many areas: </li></ul><ul><li>Transportation </li></ul><ul><li>Communication </li></ul><ul><li>Manufacturing </li></ul><ul><li>Space exploration </li></ul><ul><li>Health </li></ul><ul><li>Education </li></ul><ul><li>Entertainment </li></ul><ul><li>Design </li></ul><ul><li>Information processing </li></ul>
  • 3. <ul><li>Technology Abuse means the misuse of technology </li></ul><ul><li>Technology has many positive effects and helps us to solve problems. Sometimes, however, technology can cause negative effects if we do not use it properly. </li></ul>
  • 4. <ul><li>A skilled computer user who breaks into other people’s computers to steal information and corrupt data is called a hacker. </li></ul><ul><li>Hacker create programs that can: </li></ul><ul><li>Access a remote computer </li></ul><ul><li>Destroy data or programs in the remote computer. </li></ul><ul><li>Infect a remote computer with a virus </li></ul><ul><li>Hacker can be fined and jailed for their crimes </li></ul><ul><li>Country fine jail term </li></ul><ul><li>Singapore $10000 2 years </li></ul><ul><li>Mauritius Rs10000 10 years </li></ul>
  • 5. <ul><li>We are said to be living in the age of technology. </li></ul><ul><li>Computer, radios and clothing are product of technology. </li></ul><ul><li>Technology abuse means the misuse of technology. </li></ul><ul><li>Hackers create and destroy programs. </li></ul><ul><li>2. </li></ul><ul><li>Technology allows us to solve problems. TRUE </li></ul><ul><li>A hacker need a printer and a personal computer for his work. FALSE </li></ul><ul><li>Hacker are like thieves who access computer without permission. TRUE </li></ul><ul><li>The wheel is an important development in the history of technology. TRUE </li></ul><ul><li>3. What is technology? List some product of technology that you use every day. </li></ul><ul><li>Technology refers to use the tools and resources to solve problems and external human capabilities. </li></ul><ul><li>Ex : </li></ul><ul><li>Transportation </li></ul><ul><li>Communication </li></ul><ul><li>Manufacturing </li></ul><ul><li>Space exploration </li></ul><ul><li>Health </li></ul><ul><li>Education </li></ul><ul><li>Enternaiment </li></ul><ul><li>Design </li></ul><ul><li>Information processing </li></ul><ul><li>4. </li></ul><ul><li>Air coon </li></ul><ul><li>Aeroplanes </li></ul><ul><li>Grains </li></ul><ul><li>Cars </li></ul><ul><li>5. A hacker is a skilled computer users who breaks into other people’s computers to steal information and corrupt data. </li></ul>
  • 6. <ul><li>Computer crimes means dishonest practices involving computers </li></ul><ul><li>Software and hardware design. By stealing a large program or a design, a rival computer manufacturer or software company can save itself money and time. </li></ul><ul><li>Software piracy. Every software package must be legally acquired by the users. There is a license fee for each package which users must pay. Any original software package bought legally comes with a license. If it does not, it is pirate software. Illegal use or copying of software is called software piracy or simply, piracy. </li></ul><ul><li>The illegal copying or use of software is called piracy. </li></ul><ul><li>Information. Some people steal information which is confidential and costly to collect. It is easier to copy or alter data in a computer file than on paper. When an unauthorized person accessed a computer system, he can do a lot of damage. He can delete, change, transfer or copy important data. </li></ul>
  • 7. <ul><li>Complete the following sentences. </li></ul><ul><li>Computer crime means dishonest practises involving computers. </li></ul><ul><li>Computer crime is also known as computer criminals. </li></ul><ul><li>Software packages that are not licensed are called pirated software. </li></ul><ul><li>The illegal we or copying of software is called piracy. </li></ul><ul><li>2. Indicate whether the following statements are true or false. </li></ul><ul><li>FALSE: We can freely copy any software of our interest. </li></ul><ul><li>TRUE: Accessing unauthorized data is one form of computer crime. </li></ul><ul><li>TRUE: All computer crimes are reported to the police. </li></ul><ul><li>TRUE: It is difficult to change data with computers without other knowing. </li></ul><ul><li>3. What is computer crime? </li></ul><ul><li>Computer crime is someone used to commit crime. </li></ul><ul><li>4. What do you understand by software piracy? </li></ul><ul><li>Software piracy is that every software package must be legally acquired by the users. </li></ul>
  • 8. <ul><li>What is privacy? </li></ul><ul><li>Privacy means keeping one’ s personal affairs to oneself. We generally consider these details as personal: </li></ul><ul><li>Personal particulars such as identification card number, marital status, age </li></ul><ul><li>Studies/qualifications </li></ul><ul><li>Business/income/travel details </li></ul><ul><li>Health information </li></ul><ul><li>Criminal/legal matters </li></ul><ul><li>Place information who uses the information? </li></ul><ul><li>Hospital Diseases, drugs, Doctor and nursers </li></ul><ul><li>surgery, accidents, </li></ul><ul><li>and allergies </li></ul><ul><li>Police station /courts Legal and criminals Police and lawyers </li></ul><ul><li>School/colleges studies, disciplines Teacher and lecturers </li></ul><ul><li>Government departments business and financial Officers and managers </li></ul><ul><li>And business organization matters </li></ul>
  • 9. <ul><li>All computer system should have good security. Computer security involves safeguarding computer resources against abuse, accidental loss of data and unauthorized use. </li></ul><ul><li>Computer system are usually kept safe by: </li></ul><ul><li>Backing up data as backup files. </li></ul><ul><li>Restricting the people who can enter computer rooms. </li></ul><ul><li>Issuing access codes (secret code) to authorized computer users only. </li></ul><ul><li>Backing up data means transferring data on the hard disk to tape or floppy disk. Backup files can be used in case of computer failure. </li></ul><ul><li>Issuing security passes for authorized users restrict unauthorized persons from entering computer room. Another way is to install electronically-controlled doors to computer room. The key of this type of door looks like an ATM card reader near the door and then keys in the access code on the reader. If the authorized user uses the correct access code, the door opens; otherwise an alarm off. </li></ul><ul><li>A password is a special word, code or symbol that must be presented to the computer to gain access into it. </li></ul>
  • 10. <ul><li>Complete the following sentences. </li></ul><ul><li>Privacy means not revealing anything to do with one’s personal affairs. </li></ul><ul><li>Personal data such as criminal records is considered to be private data. </li></ul><ul><li>Computer system should be provided with good security to protect them against unauthorized users. </li></ul><ul><li>A password is a special word, code or symbol used to gain access into a computer. </li></ul><ul><li>2. Indicate whether the following statement are true or false. </li></ul><ul><li>Every citizen has no right to protect his or her personal data. FALSE </li></ul><ul><li>Information collectors can distribute personal data to anyone. FALSE </li></ul><ul><li>One way to prevent unauthorized entry to a computer room is by installing an electronic door. TRUE </li></ul><ul><li>We can stop unauthorized people from getting access into our computer by issuing password to users only. </li></ul><ul><li>3. What is privacy? </li></ul><ul><li>Privacy means keeping one’s personal affairs to oneself. </li></ul><ul><li>4. How do you protects computers against unauthorized users. </li></ul><ul><li>We can protect our computer without a password or a code security. </li></ul>
  • 11. <ul><li>A virus is a tiny program that can reproduce itself onto anoyher disk and destroy the user’s data. There are more than 10000 known computer viruses. </li></ul>
  • 12. <ul><li>INFECTOR </li></ul><ul><li>DETONATOR </li></ul><ul><li>Infector </li></ul><ul><li>The infector part of a virus program copies the whole virus from an infected computer onto a disk or into another computer through a network. </li></ul><ul><li>Detonator </li></ul><ul><li>The detonator part of a virus performs the intended nasty work. Here are some typical effects of detonators. </li></ul><ul><li>The system cannot be booted. </li></ul><ul><li>Funny and strange messages appear on the screen. </li></ul><ul><li>Character fall to the bottom of the screen. </li></ul><ul><li>Part of or all the data in the disk is deleted. </li></ul><ul><li>Files are renamed so that the user cannot recall them. </li></ul><ul><li>System performance slows down. </li></ul><ul><li>There is hardware malfunction or system hang. </li></ul><ul><li>The RAM memory suddenly becomes very small although there is no program in the system. </li></ul>
  • 13. <ul><li>Worm: </li></ul><ul><li>A worm virus simply reproduces itself rapidly, using up all available storage space leaving no space for your data or programs. This can lead system slowdown or total system failure. Worms generally infect computers through e-mail attachment. For example, the ‘I LOVE U’ worm is spread through internet e-mail attachment and opening the attached file will immediately occupy the entire hard disk. </li></ul><ul><li>A logic bomb: </li></ul><ul><li>A logic bomb is a virus that is executed when specific conditions occur such as at a certain date and time. For example, michelangelo virus will destroy hard disk data on march 6 the artist michelangelo’s bithday. </li></ul><ul><li>Trojan horse: </li></ul><ul><li>Trojan horse is a virus </li></ul>

×