VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
22-NTU-BA-1784.pptx
1. DISCOVERING COMPUTER 2016
CHAPTER NO 4 (PROGRAM AND APPS)
CHAPTER NO 5 (DIGITAL SECURITY, ETHICS AND PRIVACY)
MUHAMMAD FAROOQ
22-NTU-BA-1784
2. CONTENTS
• Identify the general categories of programs and apps.
• Describe how an operating system interacts with application and hardware.
• Identify the personal uses of interest application.
• Define digital security risks and describe types of cybercriminals.
• Describe various types internet attacks and explain ways to save against these
attacks.
3. PROGRAM AND APPS
• A program or software consist of a series of related instruction, organized for a
common purpose, that tells the computer what tasks to perform and how to
perform them.
• An application or app, sometimes called application software, consists of
programs designed to make users more productive or assist them with personal
tasks.
4. OPERATING SYSTEM
• An operating system is a set of programs that coordinates all the activities among
computer or mobile device hardware.
• Tools and activities.
• System software.
5. PROGRAMS AND APPS
• Software is available in a variety of forms:
< Mobile app
< Shareware
< Public domain
< Mobile web app
7. DIGITAL SECURITY RISKS
• A digital security risks is any event or action that could cause a loss of damage to
a computer or mobile device hardware, software, data, information or processing
capability.
• Any illegal act involving the use of a computer or related devices generally is
referred to as a computer crime.
• A cybercrime is an online or Internet-based illegal act.
9. INTERNET AND NETWORK ATTACKS
• Information transmitted over networks has a higher degree of security risks than
information kept on an organizations premises.
• Malware, short for malicious software, consist of programs that act without a user
knowledge and deliberately alter the operation of computers and mobile devices.
10. INTERNET AND NETWORK ATTACKS
• A botnet is a group of compromised computers or mobile devices connected to
network. ( A compromise computer or device is known as zombie)
• A back door is a program or set of instruction in a program that allow user to
bypass security controls.
• Spoofing is a technique intruders use to make their network or Internet
transmission appear legitimate.
• A denial of service attacks (DOS attacks) disrupts computer access to an Internet
services.