SlideShare a Scribd company logo
1 of 17
Computer Security Risks
Computer Security Risks 
• A computer security risk is any event or 
• action that could cause a loss of or damage to 
• computer hardware, software, data, information, 
• or processing capability
Cybercrime 
Any illegal act involving a computer 
generally is referred to as a computer crime. 
The term cybercrime refers to online or 
Internet-based illegal acts. Software used by 
cybercriminals sometimes is called crimeware. 
Today, cybercrime is one of the FBI’s top three 
priorities.
Hacker 
• Someone who accesses a 
• computer or network illegally is called hacker. 
• Some hackers 
• claim the intent of their security breaches is 
• to improve security.
Cracker 
• A cracker also is someone who accesses 
• a computer or network illegally but has 
• the intent of destroying data, stealing 
• information, or other malicious action. 
• Both hackers and crackers have advanced 
• computer and network skills.
Script kiddie 
• A script kiddie has the same intent as a 
• cracker but does not have the technical skills
Cyberextortionist 
(CRIMINAL LAW obtaining something by illegal threats) 
A cyberextortionist is someone who uses 
e-mail as a vehicle for extortion. These 
perpetrators send an organization a 
threatening e-mail message indicating they 
will expose confidential information, exploit 
a security flaw, or launch an attack that will 
compromise the organization’s network — if 
they are not paid a sum of money.
Cyberterrorist 
• A cyberterrorist is someone who uses the 
• Internet or network to destroy or damage computers for political 
reasons. The 
• cyberterrorist might target the nation’s air 
• traffic control system, electricity-generating companies, or a 
telecommunications infrastructure. 
• The term, cyberwarfare, describes an attack whose goal ranges from 
disabling a government’s computer network to crippling 
• a country. Cyberterrorism and cyberwarfare usually require a team of 
highly skilled
Internet and Network Attacks 
• Information transmitted over networks has a 
• higher degree of security risk than information 
• kept on an organization’s premises. In an organization, 
• network administrators usually take 
• measures to protect a network from security 
• risks. On the Internet, where no central administrator 
• is present, the security risk is greater.
Security service 
• To determine if your computer is vulnerable 
• to an Internet or network attack, you 
• could use an online security service. An online 
• security service is a Web site that evaluates 
• your computer to check for Internet and e-mail 
• vulnera bilities
How virus can spread through Email Message
Safeguards against Computer Viruses 
and Other Malware 
• Methods that guarantee a computer or 
• network is safe from computer viruses and other 
• malware simply do not exist. Users can take several 
• precautions, however, to protect their home 
• and work computers and mobile devices from 
• these malicious infections
Precautions 
• Do not start a computer with removable media inserted in the drives or plugged in the ports. 
• For example, optical disc drives should be empty, and a USB port should not contain a USB 
flash 
• drive. During the startup process, a computer 
• may attempt to execute the boot sector on media 
• in certain drives and ports. Even if the attempt is 
• unsuccessful, a virus on the boot sector of removable 
• media can infect the computer’s hard disk. 
• If you must start the computer with media in a 
• drive or port, be certain the media are uninfected 
• or from a trusted source
Precautions 
• Never open an e-mail attachment unless you 
• are expecting the attachment and it is from a 
• trusted source. If the e-mail message is from an 
• unknown source or untrusted source, delete the 
• e-mail message immediately — without opening 
• or executing any attachments.
Precautions 
• Some viruses are hidden in macros, which 
• are instructions saved in software such as a word 
• processing or spreadsheet program. In programs 
• that allow users to write macros, you should set 
• the macro security level so that the application 
• software warns users that a document they are 
• attempting to open contains a macro
Precautions 
• Users should install an antivirus program and 
• update it frequently. 
• An antivirus program protects a computer against 
• viruses by identifying and removing any computer 
• viruses found in memory, on storage media, 
• or on incoming files.
Precautions 
• One technique that antivirus programs use to 
• identify a virus is to look for virus signatures. A 
• virus signature, also called a virus definition, is 
• a known specific pattern of virus code. Computer 
• users should update their antivirus program’s 
• signature files regularly

More Related Content

What's hot

4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma
 

What's hot (20)

Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Network security
Network securityNetwork security
Network security
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
Virus
VirusVirus
Virus
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Cyber security
Cyber security Cyber security
Cyber security
 

Viewers also liked

4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
badak sumbu
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
malik1972
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
chrispaul8676
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
mmagario
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
Miguel Rebollo
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (17)

Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the CorporateCyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the Corporate
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Hardware theft
Hardware theftHardware theft
Hardware theft
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Role of media in social awareness
Role of media in social awarenessRole of media in social awareness
Role of media in social awareness
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Software theft
Software theftSoftware theft
Software theft
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Computer security risks

BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
limsh
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
Kitkat Emoo
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 

Similar to Computer security risks (20)

Computer security risks
Computer security risksComputer security risks
Computer security risks
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Information security
Information securityInformation security
Information security
 
презентация1
презентация1презентация1
презентация1
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Computer security
Computer securityComputer security
Computer security
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 

More from Aasim Mushtaq

Quality Assurance and Inspection of Nestle QEC
Quality Assurance and Inspection of Nestle QECQuality Assurance and Inspection of Nestle QEC
Quality Assurance and Inspection of Nestle QEC
Aasim Mushtaq
 
110 mcqs of HR Management Solved
110 mcqs of HR Management Solved 110 mcqs of HR Management Solved
110 mcqs of HR Management Solved
Aasim Mushtaq
 
Cash conversion cycle
Cash conversion cycleCash conversion cycle
Cash conversion cycle
Aasim Mushtaq
 
Bond Valuation Financial Management
Bond Valuation Financial ManagementBond Valuation Financial Management
Bond Valuation Financial Management
Aasim Mushtaq
 
Tips for a Good Presentation
Tips for a Good PresentationTips for a Good Presentation
Tips for a Good Presentation
Aasim Mushtaq
 

More from Aasim Mushtaq (20)

Carmichael Coal Mine Case Study
Carmichael Coal Mine Case StudyCarmichael Coal Mine Case Study
Carmichael Coal Mine Case Study
 
Tally erp 9 notes and practice book
Tally erp 9 notes and practice bookTally erp 9 notes and practice book
Tally erp 9 notes and practice book
 
Quality Assurance and Inspection of Nestle QEC
Quality Assurance and Inspection of Nestle QECQuality Assurance and Inspection of Nestle QEC
Quality Assurance and Inspection of Nestle QEC
 
Impact of Dividend policy on Shareholders Wealth
Impact of Dividend policy on Shareholders WealthImpact of Dividend policy on Shareholders Wealth
Impact of Dividend policy on Shareholders Wealth
 
110 mcqs of HR Management Solved
110 mcqs of HR Management Solved 110 mcqs of HR Management Solved
110 mcqs of HR Management Solved
 
Growth model
Growth modelGrowth model
Growth model
 
Cash conversion cycle
Cash conversion cycleCash conversion cycle
Cash conversion cycle
 
Bond Valuation Financial Management
Bond Valuation Financial ManagementBond Valuation Financial Management
Bond Valuation Financial Management
 
Islamic Banking/ Financing Trends & Opportunities
Islamic Banking/ Financing Trends & OpportunitiesIslamic Banking/ Financing Trends & Opportunities
Islamic Banking/ Financing Trends & Opportunities
 
Monopoly, Monopolistic Competition and Oligopoly
Monopoly, Monopolistic Competition and OligopolyMonopoly, Monopolistic Competition and Oligopoly
Monopoly, Monopolistic Competition and Oligopoly
 
Financial Statement Analysis of Suzuki Motors
Financial Statement Analysis of Suzuki Motors Financial Statement Analysis of Suzuki Motors
Financial Statement Analysis of Suzuki Motors
 
Strategic Management
Strategic ManagementStrategic Management
Strategic Management
 
Utility Programs
Utility ProgramsUtility Programs
Utility Programs
 
Salient features of Pakistan's Budget 2014-15
Salient features of Pakistan's Budget 2014-15 Salient features of Pakistan's Budget 2014-15
Salient features of Pakistan's Budget 2014-15
 
Salient features of budget 2014
Salient features of budget 2014Salient features of budget 2014
Salient features of budget 2014
 
Financial Statement Analysis Engro Foods, Ratios
Financial Statement Analysis Engro Foods, RatiosFinancial Statement Analysis Engro Foods, Ratios
Financial Statement Analysis Engro Foods, Ratios
 
Impact of Branding on consumer buying behaviour
Impact of Branding on consumer buying behaviour Impact of Branding on consumer buying behaviour
Impact of Branding on consumer buying behaviour
 
Tips for a Good Presentation
Tips for a Good PresentationTips for a Good Presentation
Tips for a Good Presentation
 
Team Work
Team WorkTeam Work
Team Work
 
Input devices
Input devicesInput devices
Input devices
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscaping
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 

Computer security risks

  • 2. Computer Security Risks • A computer security risk is any event or • action that could cause a loss of or damage to • computer hardware, software, data, information, • or processing capability
  • 3. Cybercrime Any illegal act involving a computer generally is referred to as a computer crime. The term cybercrime refers to online or Internet-based illegal acts. Software used by cybercriminals sometimes is called crimeware. Today, cybercrime is one of the FBI’s top three priorities.
  • 4. Hacker • Someone who accesses a • computer or network illegally is called hacker. • Some hackers • claim the intent of their security breaches is • to improve security.
  • 5. Cracker • A cracker also is someone who accesses • a computer or network illegally but has • the intent of destroying data, stealing • information, or other malicious action. • Both hackers and crackers have advanced • computer and network skills.
  • 6. Script kiddie • A script kiddie has the same intent as a • cracker but does not have the technical skills
  • 7. Cyberextortionist (CRIMINAL LAW obtaining something by illegal threats) A cyberextortionist is someone who uses e-mail as a vehicle for extortion. These perpetrators send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network — if they are not paid a sum of money.
  • 8. Cyberterrorist • A cyberterrorist is someone who uses the • Internet or network to destroy or damage computers for political reasons. The • cyberterrorist might target the nation’s air • traffic control system, electricity-generating companies, or a telecommunications infrastructure. • The term, cyberwarfare, describes an attack whose goal ranges from disabling a government’s computer network to crippling • a country. Cyberterrorism and cyberwarfare usually require a team of highly skilled
  • 9. Internet and Network Attacks • Information transmitted over networks has a • higher degree of security risk than information • kept on an organization’s premises. In an organization, • network administrators usually take • measures to protect a network from security • risks. On the Internet, where no central administrator • is present, the security risk is greater.
  • 10. Security service • To determine if your computer is vulnerable • to an Internet or network attack, you • could use an online security service. An online • security service is a Web site that evaluates • your computer to check for Internet and e-mail • vulnera bilities
  • 11. How virus can spread through Email Message
  • 12. Safeguards against Computer Viruses and Other Malware • Methods that guarantee a computer or • network is safe from computer viruses and other • malware simply do not exist. Users can take several • precautions, however, to protect their home • and work computers and mobile devices from • these malicious infections
  • 13. Precautions • Do not start a computer with removable media inserted in the drives or plugged in the ports. • For example, optical disc drives should be empty, and a USB port should not contain a USB flash • drive. During the startup process, a computer • may attempt to execute the boot sector on media • in certain drives and ports. Even if the attempt is • unsuccessful, a virus on the boot sector of removable • media can infect the computer’s hard disk. • If you must start the computer with media in a • drive or port, be certain the media are uninfected • or from a trusted source
  • 14. Precautions • Never open an e-mail attachment unless you • are expecting the attachment and it is from a • trusted source. If the e-mail message is from an • unknown source or untrusted source, delete the • e-mail message immediately — without opening • or executing any attachments.
  • 15. Precautions • Some viruses are hidden in macros, which • are instructions saved in software such as a word • processing or spreadsheet program. In programs • that allow users to write macros, you should set • the macro security level so that the application • software warns users that a document they are • attempting to open contains a macro
  • 16. Precautions • Users should install an antivirus program and • update it frequently. • An antivirus program protects a computer against • viruses by identifying and removing any computer • viruses found in memory, on storage media, • or on incoming files.
  • 17. Precautions • One technique that antivirus programs use to • identify a virus is to look for virus signatures. A • virus signature, also called a virus definition, is • a known specific pattern of virus code. Computer • users should update their antivirus program’s • signature files regularly