Your SlideShare is downloading. ×
0
Physical Issues Environmental factors   Your computer should be kept in a      Dust free      Dry (moisture free)    ...
Physical Issues Hardware protection Your computer should be equipped with   A UPS (Uninterrupted Power Supplier) to avo...
Logical security  The software and the data in your  computer can be protected through the  use of      Password      B...
Malicious codes A common misconception is that other kinds of electronic nastiest such as worms and Trojan horse applicat...
Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. L...
Virus Viruses can also replicate themselves. All computer viruses are man made. A simple virus that can make a copy of ...
Virus  How do viruses invade a machine?  E-mail or an e-mail attachment  Downloads  Shared infected floppy disks  Hac...
Virus   Trojan Horse   A destructive program that masquerades as a    benign application. Unlike viruses, Trojan horses ...
Virus   Worm   A program or algorithm that replicates itself over a    computer network and usually performs malicious  ...
Virus   Virus   A program or piece of code that is loaded onto    your computer without your knowledge and runs    again...
Virus   Blended program   Blended threats combine the characteristics of    viruses, worms, Trojan Gorses and malicious ...
Virus   Combating Viruses, Worms and Trojan Horses     The first step to protecting your computer is to ensure      your...
Antivirus Software   Antivirus software can detect nearly all types of    known viruses, but it must be updated regularly...
Firewall   A firewall is a system that prevents unauthorized    use and access to your computer.   A firewall can be eit...
Firewall   Hardware firewalls provide a strong degree of    protection from most forms of attack from the    outside worl...
Issues and precautions related to ict
Upcoming SlideShare
Loading in...5
×

Issues and precautions related to ict

804

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
804
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
23
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Issues and precautions related to ict"

  1. 1. Physical Issues Environmental factors  Your computer should be kept in a  Dust free  Dry (moisture free)  Smoke free environment
  2. 2. Physical Issues Hardware protection Your computer should be equipped with  A UPS (Uninterrupted Power Supplier) to avoid risk of sudden power failure and fluctuations.  Surge protection to protect against lightning and thunder.  Stabilizer to control voltage.
  3. 3. Logical security  The software and the data in your computer can be protected through the use of  Password  Backups
  4. 4. Malicious codes A common misconception is that other kinds of electronic nastiest such as worms and Trojan horse applications are viruses. Viruses, worms and Trojan horse belong to a broader category called “malicious codes”.
  5. 5. Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Like any other program, it contains instructions that tell your computer what to do.
  6. 6. Virus Viruses can also replicate themselves. All computer viruses are man made. A simple virus that can make a copy of itself over again is relatively easy to produce. A virus can be destructive; it could format your hard drive, overwrite your hard drive boot sector or delete files and render your machine inoperative. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
  7. 7. Virus  How do viruses invade a machine?  E-mail or an e-mail attachment  Downloads  Shared infected floppy disks  Hacking (Occasionally)
  8. 8. Virus  Trojan Horse  A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves.
  9. 9. Virus  Worm  A program or algorithm that replicates itself over a computer network and usually performs malicious actions.
  10. 10. Virus  Virus  A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
  11. 11. Virus  Blended program  Blended threats combine the characteristics of viruses, worms, Trojan Gorses and malicious code with server and Internet vulner abilities.
  12. 12. Virus  Combating Viruses, Worms and Trojan Horses  The first step to protecting your computer is to ensure your operating system (OS) is up-to-date  you should have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms and Trojan horses.  You should also install a firewall as well.
  13. 13. Antivirus Software  Antivirus software can detect nearly all types of known viruses, but it must be updated regularly to maintain effectiveness.
  14. 14. Firewall  A firewall is a system that prevents unauthorized use and access to your computer.  A firewall can be either hardware or software.
  15. 15. Firewall  Hardware firewalls provide a strong degree of protection from most forms of attack from the outside world can be purchased as a stand alone product or in broadband routers.  For individual home users, the most popular firewall choice is a software firewall
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×