SlideShare a Scribd company logo
1 of 10
IMPACT OF ICT

Made by: Ahmad Fazrin Bin Mat Johan
Class: 4 IT Epsilon
Bitdefender Antivirus Plus 2014
Kaspersky Anti-Virus 2014
Norton AntiVirus 2014
F-Secure Anti-Virus 2014
AVG Anti-Virus 2014
BullGuard Antivirus 2014
G Data AntiVirus 2014
Panda Antivirus Pro 2014
Avast! Pro Antivirus 8
McAfee AntiVirus Plus 2014
1. Antivirus protection is strongly recommended. If you are not an expert in
computer security, you should ensure that you employ proprietary antivirus
protection and a firewall. The majority of the current antivirus programs provide
protection against all types of computerized threats, including viruses, worms,
Trojans and adware, etc. Integrated security solutions are also capable of filtering
spam, preventing network attacks and restricting access to unwanted and
dangerous Internet resources.
2. Do not trust any information whose source cannot be guaranteed, whether in
email, hyperlink, IM or other format. Do not open files and links from unknown
sources. Even unexpected messages from friends or colleagues should be treated
with caution as a sender’s address can easily be forged. The Internet can be a
dangerous place and you need to remain constantly vigilant.
3. Do not neglect information from antivirus companies and IT security
experts. They usually provide an early warning about any new type of Internet
fraud, virus threat or epidemic that may be circulating.
First you need to determine if your computer has a virus at all. You might suspect
your computer of having a virus if it seems to be sluggish. If your Web browser
suddenly looks different or automatically goes to a site you don't recognize, that's
a good indication that you've got some malware. If your computer is unstable and
crashes fairly often, you may have a problem. And if you try to access files but
receive a message saying they're corrupted, that's another sign.
If you do think your computer has a virus, you need to run antivirus software to
weed it out. Some viruses disable antivirus software -- they're clever that way. If
you don't have any antivirus software, now's a good time to purchase or download
an application. A few malware variants will try to block you from downloading
antivirus software. If that's the case, you may need to download the software on
another computer and transfer it to disk or a flash drive.
Beside that, you can identify the virus. Run your antivirus software to identify
the name of the virus. If you don't have an antivirus program, or if your program
does not detect the virus, you can still identify the virus by looking for clues about
how it behaves. Write down the text in any messages displayed by the virus or, if
you received the virus in e-mail, write down the subject line or name of the file
attached to the message. Search the antivirus vendor's website for references to
those specific things you wrote down to try to find the name of the virus and
instructions for how to remove it.
There are lots of viruses in the world and new viruses are coming up everyday.
There are new anti-virus programs and techniques developed too. It is good to be

aware of viruses and other malware and it is cheaper to protect you environment
from them rather then being sorry.

This is a suitable place to remind you that when working with a computer, the
rule-of-thumb is "better safe than sorry". This means the following:
• always make backup copies of your files,
• check all floppy disks, CD-s and files downloaded from the internet for viruses,
• do not allow your computer to be used by random acquaintances,
• update your antivirus software at least once a month.
Impact of ICT on Security

More Related Content

What's hot

The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of ComputersGronHatchat
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-InteractiveGronHatchat
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against RansomwareSymantec
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your ComputerBikashPayeng
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Akhil Sharma
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Become a Penetration Tester
Become a Penetration TesterBecome a Penetration Tester
Become a Penetration TesterSagarMajzumdar
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 

What's hot (20)

The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of Computers
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
spyware
spywarespyware
spyware
 
False alarms
False alarmsFalse alarms
False alarms
 
False alarms
False alarmsFalse alarms
False alarms
 
Spyware
SpywareSpyware
Spyware
 
Unit6
Unit6Unit6
Unit6
 
Spyware
SpywareSpyware
Spyware
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Become a Penetration Tester
Become a Penetration TesterBecome a Penetration Tester
Become a Penetration Tester
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
Spyware
SpywareSpyware
Spyware
 

Similar to Impact of ICT on Security

Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spywaredragaunus14
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Computer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesComputer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesRozell Sneede
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
Tips to Protect Your Devices from Cyber Threats - HenkTek.pdf
Tips to Protect Your Devices from Cyber Threats - HenkTek.pdfTips to Protect Your Devices from Cyber Threats - HenkTek.pdf
Tips to Protect Your Devices from Cyber Threats - HenkTek.pdfhenktek
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 
Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2maranan_zyra
 

Similar to Impact of ICT on Security (20)

Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
Virus
VirusVirus
Virus
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Computer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesComputer saftey adware, spyware & viruses
Computer saftey adware, spyware & viruses
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
Tips to Protect Your Devices from Cyber Threats - HenkTek.pdf
Tips to Protect Your Devices from Cyber Threats - HenkTek.pdfTips to Protect Your Devices from Cyber Threats - HenkTek.pdf
Tips to Protect Your Devices from Cyber Threats - HenkTek.pdf
 
Internet security
Internet securityInternet security
Internet security
 
anti_virus
anti_virusanti_virus
anti_virus
 
Sowmya
SowmyaSowmya
Sowmya
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 

Recently uploaded

Lighting the Way Understanding Jaguar Car Check Engine Light Service
Lighting the Way Understanding Jaguar Car Check Engine Light ServiceLighting the Way Understanding Jaguar Car Check Engine Light Service
Lighting the Way Understanding Jaguar Car Check Engine Light ServiceImport Car Center
 
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!Mint Automotive
 
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道7283h7lh
 
Mastering Mercedes Engine Care Top Tips for Rowlett, TX Residents
Mastering Mercedes Engine Care Top Tips for Rowlett, TX ResidentsMastering Mercedes Engine Care Top Tips for Rowlett, TX Residents
Mastering Mercedes Engine Care Top Tips for Rowlett, TX ResidentsRowlett Motorwerks
 
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILES
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILESABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILES
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILESsriharshaganjam1
 
Control-Plan-Training.pptx for the Automotive standard AIAG
Control-Plan-Training.pptx for the Automotive standard AIAGControl-Plan-Training.pptx for the Automotive standard AIAG
Control-Plan-Training.pptx for the Automotive standard AIAGVikrantPawar37
 
Human Resource Practices TATA MOTORS.pdf
Human Resource Practices TATA MOTORS.pdfHuman Resource Practices TATA MOTORS.pdf
Human Resource Practices TATA MOTORS.pdfAditiMishra247289
 
Welcome to Auto Know University Orientation
Welcome to Auto Know University OrientationWelcome to Auto Know University Orientation
Welcome to Auto Know University Orientationxlr8sales
 
Pros and cons of buying used fleet vehicles.pptx
Pros and cons of buying used fleet vehicles.pptxPros and cons of buying used fleet vehicles.pptx
Pros and cons of buying used fleet vehicles.pptxjennifermiller8137
 
A Comprehensive Exploration of the Components and Parts Found in Diesel Engines
A Comprehensive Exploration of the Components and Parts Found in Diesel EnginesA Comprehensive Exploration of the Components and Parts Found in Diesel Engines
A Comprehensive Exploration of the Components and Parts Found in Diesel EnginesROJANE BERNAS, PhD.
 

Recently uploaded (10)

Lighting the Way Understanding Jaguar Car Check Engine Light Service
Lighting the Way Understanding Jaguar Car Check Engine Light ServiceLighting the Way Understanding Jaguar Car Check Engine Light Service
Lighting the Way Understanding Jaguar Car Check Engine Light Service
 
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!
Can't Roll Up Your Audi A4 Power Window Let's Uncover the Issue!
 
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道
 
Mastering Mercedes Engine Care Top Tips for Rowlett, TX Residents
Mastering Mercedes Engine Care Top Tips for Rowlett, TX ResidentsMastering Mercedes Engine Care Top Tips for Rowlett, TX Residents
Mastering Mercedes Engine Care Top Tips for Rowlett, TX Residents
 
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILES
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILESABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILES
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILES
 
Control-Plan-Training.pptx for the Automotive standard AIAG
Control-Plan-Training.pptx for the Automotive standard AIAGControl-Plan-Training.pptx for the Automotive standard AIAG
Control-Plan-Training.pptx for the Automotive standard AIAG
 
Human Resource Practices TATA MOTORS.pdf
Human Resource Practices TATA MOTORS.pdfHuman Resource Practices TATA MOTORS.pdf
Human Resource Practices TATA MOTORS.pdf
 
Welcome to Auto Know University Orientation
Welcome to Auto Know University OrientationWelcome to Auto Know University Orientation
Welcome to Auto Know University Orientation
 
Pros and cons of buying used fleet vehicles.pptx
Pros and cons of buying used fleet vehicles.pptxPros and cons of buying used fleet vehicles.pptx
Pros and cons of buying used fleet vehicles.pptx
 
A Comprehensive Exploration of the Components and Parts Found in Diesel Engines
A Comprehensive Exploration of the Components and Parts Found in Diesel EnginesA Comprehensive Exploration of the Components and Parts Found in Diesel Engines
A Comprehensive Exploration of the Components and Parts Found in Diesel Engines
 

Impact of ICT on Security

  • 1. IMPACT OF ICT Made by: Ahmad Fazrin Bin Mat Johan Class: 4 IT Epsilon
  • 2.
  • 3.
  • 4. Bitdefender Antivirus Plus 2014 Kaspersky Anti-Virus 2014 Norton AntiVirus 2014 F-Secure Anti-Virus 2014 AVG Anti-Virus 2014 BullGuard Antivirus 2014 G Data AntiVirus 2014 Panda Antivirus Pro 2014 Avast! Pro Antivirus 8 McAfee AntiVirus Plus 2014
  • 5.
  • 6. 1. Antivirus protection is strongly recommended. If you are not an expert in computer security, you should ensure that you employ proprietary antivirus protection and a firewall. The majority of the current antivirus programs provide protection against all types of computerized threats, including viruses, worms, Trojans and adware, etc. Integrated security solutions are also capable of filtering spam, preventing network attacks and restricting access to unwanted and dangerous Internet resources. 2. Do not trust any information whose source cannot be guaranteed, whether in email, hyperlink, IM or other format. Do not open files and links from unknown sources. Even unexpected messages from friends or colleagues should be treated with caution as a sender’s address can easily be forged. The Internet can be a dangerous place and you need to remain constantly vigilant. 3. Do not neglect information from antivirus companies and IT security experts. They usually provide an early warning about any new type of Internet fraud, virus threat or epidemic that may be circulating.
  • 7. First you need to determine if your computer has a virus at all. You might suspect your computer of having a virus if it seems to be sluggish. If your Web browser suddenly looks different or automatically goes to a site you don't recognize, that's a good indication that you've got some malware. If your computer is unstable and crashes fairly often, you may have a problem. And if you try to access files but receive a message saying they're corrupted, that's another sign. If you do think your computer has a virus, you need to run antivirus software to weed it out. Some viruses disable antivirus software -- they're clever that way. If you don't have any antivirus software, now's a good time to purchase or download an application. A few malware variants will try to block you from downloading antivirus software. If that's the case, you may need to download the software on another computer and transfer it to disk or a flash drive. Beside that, you can identify the virus. Run your antivirus software to identify the name of the virus. If you don't have an antivirus program, or if your program does not detect the virus, you can still identify the virus by looking for clues about how it behaves. Write down the text in any messages displayed by the virus or, if you received the virus in e-mail, write down the subject line or name of the file attached to the message. Search the antivirus vendor's website for references to those specific things you wrote down to try to find the name of the virus and instructions for how to remove it.
  • 8.
  • 9. There are lots of viruses in the world and new viruses are coming up everyday. There are new anti-virus programs and techniques developed too. It is good to be aware of viruses and other malware and it is cheaper to protect you environment from them rather then being sorry. This is a suitable place to remind you that when working with a computer, the rule-of-thumb is "better safe than sorry". This means the following: • always make backup copies of your files, • check all floppy disks, CD-s and files downloaded from the internet for viruses, • do not allow your computer to be used by random acquaintances, • update your antivirus software at least once a month.