SlideShare a Scribd company logo
1 of 11
DISCOVERING COMPUTER 2016
CHAPTER NO 4 (PROGRAM AND APPS)
CHAPTER NO 5 (DIGITAL SECURITY, ETHICS AND PRIVACY)
MUHAMMAD FAROOQ
22-NTU-BA-1784
CONTENTS
• Identify the general categories of programs and apps.
• Describe how an operating system interacts with application and hardware.
• Identify the personal uses of interest application.
• Define digital security risks and describe types of cybercriminals.
• Describe various types internet attacks and explain ways to save against these
attacks.
PROGRAM AND APPS
• A program or software consist of a series of related instruction, organized for a
common purpose, that tells the computer what tasks to perform and how to
perform them.
• An application or app, sometimes called application software, consists of
programs designed to make users more productive or assist them with personal
tasks.
OPERATING SYSTEM
• An operating system is a set of programs that coordinates all the activities among
computer or mobile device hardware.
• Tools and activities.
• System software.
PROGRAMS AND APPS
• Software is available in a variety of forms:
< Mobile app
< Shareware
< Public domain
< Mobile web app
PERSONAL INTERSECT APPLICATIONS
Lifestyle
Application
Medical
Application
Entertainment
Application
Convenience
Application
Educational
Application
DIGITAL SECURITY RISKS
• A digital security risks is any event or action that could cause a loss of damage to
a computer or mobile device hardware, software, data, information or processing
capability.
• Any illegal act involving the use of a computer or related devices generally is
referred to as a computer crime.
• A cybercrime is an online or Internet-based illegal act.
DIGITAL SECURITY RISKS
Hacker Cracker
Script
kiddie
Corporate
spies
Unethical
employees
Cyberterrorist Cyberextortion
INTERNET AND NETWORK ATTACKS
• Information transmitted over networks has a higher degree of security risks than
information kept on an organizations premises.
• Malware, short for malicious software, consist of programs that act without a user
knowledge and deliberately alter the operation of computers and mobile devices.
INTERNET AND NETWORK ATTACKS
• A botnet is a group of compromised computers or mobile devices connected to
network. ( A compromise computer or device is known as zombie)
• A back door is a program or set of instruction in a program that allow user to
bypass security controls.
• Spoofing is a technique intruders use to make their network or Internet
transmission appear legitimate.
• A denial of service attacks (DOS attacks) disrupts computer access to an Internet
services.
The End

More Related Content

Similar to 22-NTU-BA-1784.pptx

BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.pptAnshikaGoel42
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxhimanshuratnama
 
Network security
Network securityNetwork security
Network securityhajra azam
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
Information security
 Information security Information security
Information securityJin Castor
 

Similar to 22-NTU-BA-1784.pptx (20)

CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
презентация1
презентация1презентация1
презентация1
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Network security
Network securityNetwork security
Network security
 
ehadjasd
ehadjasdehadjasd
ehadjasd
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
security of information systems
 security of information systems security of information systems
security of information systems
 
Information security
 Information security Information security
Information security
 

More from MuhammadZeeshanAnwar5

More from MuhammadZeeshanAnwar5 (10)

Oral Presentations.pptx
Oral Presentations.pptxOral Presentations.pptx
Oral Presentations.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
ufone-161229053455.pdf
ufone-161229053455.pdfufone-161229053455.pdf
ufone-161229053455.pdf
 
DC16 Chapter 2 (2).pdf
DC16 Chapter 2 (2).pdfDC16 Chapter 2 (2).pdf
DC16 Chapter 2 (2).pdf
 
og st 42.pptx
og st 42.pptxog st 42.pptx
og st 42.pptx
 
Maslow’s Theory of Hierarchy of Needs.pptx
Maslow’s Theory of Hierarchy of Needs.pptxMaslow’s Theory of Hierarchy of Needs.pptx
Maslow’s Theory of Hierarchy of Needs.pptx
 
MONOPLISTIC COMPETITION.pptx
MONOPLISTIC COMPETITION.pptxMONOPLISTIC COMPETITION.pptx
MONOPLISTIC COMPETITION.pptx
 
social media presentation (7).pptx
social media presentation (7).pptxsocial media presentation (7).pptx
social media presentation (7).pptx
 
Effects of media on our psyche.pptx
Effects of media on our psyche.pptxEffects of media on our psyche.pptx
Effects of media on our psyche.pptx
 
GENERALLY ACCEPTED ACCOUNTING PRINCIPLES.pptx
GENERALLY ACCEPTED ACCOUNTING PRINCIPLES.pptxGENERALLY ACCEPTED ACCOUNTING PRINCIPLES.pptx
GENERALLY ACCEPTED ACCOUNTING PRINCIPLES.pptx
 

Recently uploaded

Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...amitlee9823
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Researchmichael115558
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...amitlee9823
 

Recently uploaded (20)

Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 

22-NTU-BA-1784.pptx

  • 1. DISCOVERING COMPUTER 2016 CHAPTER NO 4 (PROGRAM AND APPS) CHAPTER NO 5 (DIGITAL SECURITY, ETHICS AND PRIVACY) MUHAMMAD FAROOQ 22-NTU-BA-1784
  • 2. CONTENTS • Identify the general categories of programs and apps. • Describe how an operating system interacts with application and hardware. • Identify the personal uses of interest application. • Define digital security risks and describe types of cybercriminals. • Describe various types internet attacks and explain ways to save against these attacks.
  • 3. PROGRAM AND APPS • A program or software consist of a series of related instruction, organized for a common purpose, that tells the computer what tasks to perform and how to perform them. • An application or app, sometimes called application software, consists of programs designed to make users more productive or assist them with personal tasks.
  • 4. OPERATING SYSTEM • An operating system is a set of programs that coordinates all the activities among computer or mobile device hardware. • Tools and activities. • System software.
  • 5. PROGRAMS AND APPS • Software is available in a variety of forms: < Mobile app < Shareware < Public domain < Mobile web app
  • 7. DIGITAL SECURITY RISKS • A digital security risks is any event or action that could cause a loss of damage to a computer or mobile device hardware, software, data, information or processing capability. • Any illegal act involving the use of a computer or related devices generally is referred to as a computer crime. • A cybercrime is an online or Internet-based illegal act.
  • 8. DIGITAL SECURITY RISKS Hacker Cracker Script kiddie Corporate spies Unethical employees Cyberterrorist Cyberextortion
  • 9. INTERNET AND NETWORK ATTACKS • Information transmitted over networks has a higher degree of security risks than information kept on an organizations premises. • Malware, short for malicious software, consist of programs that act without a user knowledge and deliberately alter the operation of computers and mobile devices.
  • 10. INTERNET AND NETWORK ATTACKS • A botnet is a group of compromised computers or mobile devices connected to network. ( A compromise computer or device is known as zombie) • A back door is a program or set of instruction in a program that allow user to bypass security controls. • Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate. • A denial of service attacks (DOS attacks) disrupts computer access to an Internet services.