Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Societal Impacts Of IT (Class X)

This PPT is a summary of the chapter 'Societal Impacts Of IT'.

  • Login to see the comments

Societal Impacts Of IT (Class X)

  1. 1. Arush Vatsal Unadkat
  2. 2. Malicious Software are the programs that generate threats to the computer system and stored data.
  3. 3. Virus Worm s Trojan Horses Spyware Malicious Software
  4. 4. • Virus (Vital Information Recourses Under Seize) is a small program or a small code segment that is capable of attaching itself to existing programs of files and infect them as well as replicate itself without users knowledge or permission. It spreads by external devices like CDs, pen drives, or email and executes when an infected program is executed. If an infected computer gets in contact gets in contact with an un infected computer virus may pass onto the uninfected system and destroy the files.
  5. 5. Viruses Boot Sector File Infecting PolymorphicStealth Multipartite
  6. 6. This type of virus infects the master boot record of the system by either moving to another sector or replacing it with infected one.
  7. 7. This type of virus infects the executable files or files containing executable code such as .exe, .com, .dll, .sys, etc. I N F E C T I N G V I R U SThese viruses add their code to executables, which when infected may send viral code other executables. When the infected file is opened or used the virus may overwrite the file and cause permanent damage to the content of the overwritten file.
  8. 8. This type of virus changes its code as it propagates from one file to another. Therefore, each copy that is generated appears different from others. This makes the polymorphic virus difficult to be detected by the antivirus.
  9. 9. Stealth VirusThis type of virus attempts to conceal its presence from the user and/or antivirus software by using various techniques.
  10. 10. A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. V I R U S It attempts to attack both the boot sector and the executable, or programs, files at the same time. This type of virus can re-infect a system over and over again if all parts of the virus are not
  11. 11. Worms A computer worm is a standalone malware co mputer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Both worms and viruses tend to fill computer memory with useless data thereby preventing you from using memory space for legal applications or programs.
  12. 12. T R O J A N Trojan horse is a program that appears to be legal and useful but concurrently does something unexpected like destroying existing programs and files . As it does not replicate itself in the computer it is not a virus. However it usually opens a way for the other malicious software like viruses to enter into the computer system. It may also allow unauthorized users access the information stored in the computer. h o r s e s
  13. 13. Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.
  14. 14. Spam refers to the unsolicited or unwanted mail or message sent to a large number of individuals. It is forced on to the people who would otherwise choose not to receive such mails. In addition it may also be used to spreading viruses or
  15. 15. It may flood the e-mails box due to which no other mail can be received. The recipient time is wasted in reading a the unwanted e- mails. Network bandwidth is wasted in sending such mails.
  16. 16. A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The hackers that break into the computer security with non-malicious reasons are known as The hackers who break into the computer security without administration for ulterior purposes such as theft, terrorism, etc. are
  17. 17. An antivirus program scans the hard the hard disc for viruses. After scanning the software removes the viruses, so that the computer is able to perform efficiently again. Most anti- virus software have an auto update feature that enables the computer to download the definition of new viruses. The updating of a antivirus software is important because the virus 'creators’ are always in the process of developing The updated virus definitions is should always be maintained so that users can operate their computers without any problem.
  18. 18. Data loss is very common to all Some failure such as hardware failure, software failure, or natural disaster may occur resulting in data loss. Data backup refers to making duplicate copies of your data and storing them onto some permanent storage device such as pen drive, portable hard disc, DVD, CD, etc. The data backup is essential for recovering the data as quickly, and with as little damaging impact on users, as possible.
  19. 19. Full Backup Method Incremental Backup Method Differential Backup Method Mirror Backup Method
  20. 20. Full Backup Method This is the basic backup method that backups up all the files on the computer the computer system. Generally performed on a weekly or monthly basis. Consumes a lot of time as of time as well as secondary memory.
  21. 21. Incremental Backup Method This method backs up only those files that have been modified since the most recent backup, thereby making each backup an increment to the last backup. A single backup is not sufficient to restore all the files, which makes the restoring process slower. It consumes less time and memory space to take a backup.
  22. 22. Differential Backup Method This method backs up all the files that have any difference from the last backup. Restoring files require the full backup and only the last differential backup. This makes restoring little faster than incremental backup. Backing up is slower and storage requirement is higher than incremental backup.
  23. 23. Mirror Backup Method The mirror backup method copies the files or folders being backed up without any compressions. It keeps each file separate in the destination thereby making the destination a mirror of the source. The feature makes this methods fastest of all methods. However, it requires more storage space as compared to other methods.
  24. 24. Firstly, this method not only enables you to recover data after file corruption or computer failure, but you can also recover data even if a natural disaster has destroyed everything at your place. Secondly, you can access your data anywhere in the world and at anytime. In addition, the files to be backed up are encrypted by your computer before being sent to the remote This ensures the protection of your data from unauthorized access. However, it is not affordable for individual users or small business to subscribe for online backup services.
  25. 25. Sometimes, you lose important data because of disk failure, accidental deletion of files, etc A recover tool enables you to recover lost data. The situation even becomes worse if you are not having backup of data.
  26. 26. Suppose you friend forgot his passport at your house and went away. You want to send it to him but you don’t want anyone else to steal the passport. How will you do it? This picture is a hint to the puzzle. This picture is a hint to the puzzle.
  27. 27. You will put the passport in a box and lock it with a lock and key. This key will Remain with you. Then you send the box to your friend. Your friend will put another lock on it with another key that will remain with him. He will send it back. You will unlock your lock with your key and send it back to him. He will unlock his lock with his key and take his passport. Encryption and decryption works in the same way.
  28. 28. A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Many personal computer oper ating systems includ e software- based firewalls to protect against threats from the public Internet. Many routers t hat pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
  29. 29. All Traffic in either direction must pass through the firewall. The firewall itself is immune to penetration. Only traffic authorized by the local security policy must be allowed to
  30. 30. Social Networking refers to the grouping of individuals to share their common interests or activities Nowadays, online social networking is gaining popularity and a number of websites (known as social sites) are available for creating online communities.
  31. 31. Introduction To ICT ICT has become the integral part of our working and living environments and will continue to be a powerful resource for business. ICT stands for Information and Communication Technologies. These technologies include computers, internet, broadcasting technologies (radio and television) and telephony. Due to globalization and other factors, these technologies are changing and improving dad by day.
  32. 32. Benefits of ICT ICT provides several significant benefits and today , it has been used everywhere and in every field including education, healthcare, governance, etc. Some important benefits of ICT are as follows:- • Education • Healthcare • Governance
  33. 33. The use of sounds effects, comic characters and scripted act attracts the students and helps them to understand the lessons by getting involved with the lessons being delivered. This keeps the process of learning new concepts very lively. Education The introduction of ICT in education has made the learning fun and interesting for student now a days. Many illustrations are given in the form of video clips which help students to understand quickly.
  34. 34. This technology has made the scope for error very minor and helps the doctor to perform surgeries remotely The scanners process the data present in them in a readable format, microprocessors help to control many medical devices like pacemaker and the computer-guided lasers are used for various kinds of surgeries.
  35. 35. Governance All or most of the information generated by the government is easily accessible through the electronic media, such as Internet, mobile phones, etc. The use of ICT in governance practices offers better interaction between government, its institutions and people. This leads enhanced governance practices and effective This increases the transparency of government and administration to the business as well as its citizens.