SlideShare a Scribd company logo
1 of 11
COMPUTER SAFETY AND
SECURITY
1
11:05:31 AM
Threats of a computer System
Threat is a source of attack to a system that
could cause losses. One of the threats in
computer system is Computer Virus.
Computer viruses are software programs that
are able to reproduce themselves.
Computer virus is a program that is
intentionally done to harm users’ program
without permission.
2
11:05:31 AM
Dangers of computer viruses
 Change: computer viruses can change actual data
or text causing different sense
 Slackness: many viruses cause slow computing
operation because of the load that their
reproductive activity imposes.
 Theft: viruses can steal data, and stolen data can
be used to re-steal other more data
 Scramble (mix): virus can scramble data and files
3
Types of computer viruses
 Boot sector viruses
attach themselves to the system code and
hides behind the boot sector of hard disk
 File infectors/program infectors
attach themselves to executable files or
programs.
file infectors affect system performance.
These viruses are the most widely spread
viruses as executable files or programs run
4
Types of computer viruses
 Macro viruses
Macro viruses are hosted in user documents.
Macro viruses represent a larger threat as
they attack data files rather than executable.
 System infectors
Attach themselves to the specific system
files. E.g. command.com, etc
5
Potential Paths for Virus
 Storage devices. E.g. Hard disk, floppy disk,
flash disk, CD-ROM
 Internet connection- e-mail attachments,
sharing infected files
 Direct cabling between PCs (network). etc.
6
Rules for safe computing
 These simple rules will protect /secure/ your system from
computer virus infection
 Never load unknown disks into system unless the disks are
virus free
 Do not use infected software (executable files) unless they
are free of virus infection
 Backup your data regularly to protect the data loss from any
cause
 Prevent unauthorized access
 Lock your computer when not in use
 Install antivirus program on to your computer and update
regularly/configure to update itself automatically if there is
internet connection
7
Safety of the computer system
 Computers require uniform and uninterrupted power supply, no
noise interference and suitable environmental conditions for
reliable operation
Power line problem/disturbances
 Common power problems are:
 Voltage spikes –unrecognized and quick power OFF and
ON
 Voltage surges – over voltage
 Voltage sages – under voltage
These Power problems can be solved through the use of
uninterrupted power supply (UPS) because UPS stand
between the utility power and the system, conditioning AC
power and eliminating over voltage, under voltage, and
spikes.
8
Environmental factors
Temperature:
Integrated circuits and other devices in the
computer systems are sensitive to temperature.
During normal operation, the computer generates
heat, which is tolerable to the circutry.
Measures:
Keep the cooling ventilator cleans
Keep the system disk in cool and dry place
If possible install air conditioner in the room
9
Cont…
 Dust:
 The static electrical charge that builds up in the computer
systems and the monitor attracts dust.
 Dust is a major contributor for integrated circuits failure in
the system.
 Electro mechanical devices such as printers and disk drives
have a number of moving parts that get dirty causing
overheating and early failures
Measures:
 Clean computer systems and its peripherals periodically
 Use dust covers
 Keep computer room windows closed
 Do not touch the surface of disk drives and other internal components
10
THANK YOU!!
11
11:05:31 AM

More Related Content

Similar to Computer security.pptx

Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptxlnatanzenebe21
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ictmakanaya
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentationPranjal Mishra
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protectionscasyrichard
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptxGovandJamal
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of securitySejahtera Affif
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 

Similar to Computer security.pptx (20)

Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
 
Computer networking
Computer networking Computer networking
Computer networking
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
 
INT 1010 05-3.pdf
INT 1010 05-3.pdfINT 1010 05-3.pdf
INT 1010 05-3.pdf
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 

Recently uploaded

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 

Recently uploaded (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 

Computer security.pptx

  • 2. Threats of a computer System Threat is a source of attack to a system that could cause losses. One of the threats in computer system is Computer Virus. Computer viruses are software programs that are able to reproduce themselves. Computer virus is a program that is intentionally done to harm users’ program without permission. 2 11:05:31 AM
  • 3. Dangers of computer viruses  Change: computer viruses can change actual data or text causing different sense  Slackness: many viruses cause slow computing operation because of the load that their reproductive activity imposes.  Theft: viruses can steal data, and stolen data can be used to re-steal other more data  Scramble (mix): virus can scramble data and files 3
  • 4. Types of computer viruses  Boot sector viruses attach themselves to the system code and hides behind the boot sector of hard disk  File infectors/program infectors attach themselves to executable files or programs. file infectors affect system performance. These viruses are the most widely spread viruses as executable files or programs run 4
  • 5. Types of computer viruses  Macro viruses Macro viruses are hosted in user documents. Macro viruses represent a larger threat as they attack data files rather than executable.  System infectors Attach themselves to the specific system files. E.g. command.com, etc 5
  • 6. Potential Paths for Virus  Storage devices. E.g. Hard disk, floppy disk, flash disk, CD-ROM  Internet connection- e-mail attachments, sharing infected files  Direct cabling between PCs (network). etc. 6
  • 7. Rules for safe computing  These simple rules will protect /secure/ your system from computer virus infection  Never load unknown disks into system unless the disks are virus free  Do not use infected software (executable files) unless they are free of virus infection  Backup your data regularly to protect the data loss from any cause  Prevent unauthorized access  Lock your computer when not in use  Install antivirus program on to your computer and update regularly/configure to update itself automatically if there is internet connection 7
  • 8. Safety of the computer system  Computers require uniform and uninterrupted power supply, no noise interference and suitable environmental conditions for reliable operation Power line problem/disturbances  Common power problems are:  Voltage spikes –unrecognized and quick power OFF and ON  Voltage surges – over voltage  Voltage sages – under voltage These Power problems can be solved through the use of uninterrupted power supply (UPS) because UPS stand between the utility power and the system, conditioning AC power and eliminating over voltage, under voltage, and spikes. 8
  • 9. Environmental factors Temperature: Integrated circuits and other devices in the computer systems are sensitive to temperature. During normal operation, the computer generates heat, which is tolerable to the circutry. Measures: Keep the cooling ventilator cleans Keep the system disk in cool and dry place If possible install air conditioner in the room 9
  • 10. Cont…  Dust:  The static electrical charge that builds up in the computer systems and the monitor attracts dust.  Dust is a major contributor for integrated circuits failure in the system.  Electro mechanical devices such as printers and disk drives have a number of moving parts that get dirty causing overheating and early failures Measures:  Clean computer systems and its peripherals periodically  Use dust covers  Keep computer room windows closed  Do not touch the surface of disk drives and other internal components 10