SlideShare a Scribd company logo
1 of 19
Chapter Five
Computer Security and Viruses
1
Computer Security and Viruses
 Computer Security is the protection of computing systems
and the data that they store or access.
 Computer Security is the process of preventing and detecting
unauthorized use of your computer. It involves the process of
safeguarding against intruders from using your computer
resources for malicious intents or for their own gains (or
even gaining access to them accidentally).
2
Cont’d
 Computer security is a branch of Information Security
and is often used interchangeably with the term. It
encompasses several security measures such as software
programs like anti-virus suites, firewalls, and user
dependant measures.
 Computer security is the protection of data, networks and
computing power.
3
Cont’d
 Computer security is frequently associated with four core areas,
which can be conveniently summarized by the acronym "CIAA"
Computer Security is concerned with four main areas:
1. Confidentiality:- Only authorized users can access the data
resources and information.
2. Integrity:- Only authorized users should be able to modify the data
when needed.
3. Availability:- Data should be available to users when needed.
4. Authentication:- are you really communicating with whom you
think you are communicating with.
4
Cont’d
 What are the consequences for security violations?
 Risk to security and integrity of personal or confidential information.
 e.g. identity theft, data corruption or destruction, unavailability of
critical information in an emergency
 Loss of valuable business information.
 Loss of employee and public trust, embarrassment, bad publicity, media
coverage, news reports.
 Costly reporting requirements in the case of a compromise of certain
types of personal, financial and health information.
 Internal disciplinary action(s) up to and including termination of
employment, as well as possible penalties, prosecution and the potential
for sanctions / lawsuits.
5
Cont’d
 Some key steps that everyone can take include:
 Use good, cryptic passwords that can't be easily guessed - and keep
your passwords secret
 Make sure your computer, devices and applications (apps) are current
and up to date
 Make sure your computer is protected with up-to-date antivirus and
anti-spyware software
 Don't click on unknown links or attachments, and don't download
unknown files or programs onto your computer or other devices
 Remember that information and passwords sent via standard,
unencrypted wireless are especially easy for hackers to intercept
6
Cont’d
Why is Computer Security Important?
 Computer Security allows the University to carry out its
mission by:
 Enabling people to carry out their jobs, education, and
research
 Supporting critical business process
 Protecting personal and sensitive information
7
Internet Privacy
 Internet privacy is the privacy and security level of
personal data published via the Internet. It is a broad term
that refers to a variety of factors, techniques and
technologies used to protect sensitive and private data,
communications, and preferences.
 Internet privacy is cause for concern for any user
planning to make an online purchase, visit a social
networking site, participate in online games or attend
forums. If a password is compromised and revealed, a
victim's identity may be fraudulently used or stolen.
8
Cont’d
 Internet privacy risks include:
 Phishing: An Internet hacking activity used to steal secure user
data, including username, password, bank account number,
security PIN or credit card number.
 Pharming: An Internet hacking activity used to redirect a
legitimate website visitor to a different IP address.
 Spyware: An offline application that obtains data without a
user's consent. When the computer is online, previously
acquired data is sent to the spyware source.
 Malware: An application used to illegally damage online and
offline computer users through Trojans, viruses and spyware.
9
Cont’d
 Internet privacy violation risks may be minimized, as follows:
 Always use preventative software applications, such as
anti-virus, anti-malware, anti-spam and firewalls
 Avoid shopping on unreliable websites
 Avoid exposing personal data on websites with lower
security levels
 Clear the browser's cache and browsing history on a
consistent basis
 Always use very strong passwords consisting of letters,
numerals and special characters.
10
Cont’d
 The methods to ensure Internet security
1.Use a firewall
 Network firewalls (whether software or hardware-
based) can provide some degree of protection against
these attacks.
2. Don't open unknown email attachments
 Before opening any email attachments, be sure you
know the source of the attachment
11
Cont’d
 If you must open an attachment before you can verify the
source, we suggest the following procedure:
A.Save the file to your hard disk.
B.Scan the file using your antivirus software.
C.Open the file.
 For additional protection, you can disconnect or lock your
computer's network connection before opening the file.
12
Cont’d
 Don't run programs of unknown origin
 Disable hidden filename extensions
 Keep all applications, including your operating system,
patched
 Turn off your computer or disconnect from the network
when not in use
13
Computer Viruses
 A computer virus is a malware program that, when executed,
replicates by inserting copies of itself (possibly modified) into
other computer programs, data files, or the boot sector of the
hard drive; when this replication succeeds, the affected areas
are then said to be "infected".
 Are a self replicating/ copying computer program that
interferes with a computer’s hardware or operating system and
duplicates itself without the user’s knowledge.
14
Cont’d
 It is means of causes of disaster on a computer system.
 It may damage, corrupt/destroy data or degrade system
performance
15
Cont’d
 Classification of computer viruses
1. File viruses: file infecting viruses search out executable files
located on a disk or hard drive and physically attach them.
When the files run, the virus is activated, often infecting
other files in the process.
2. Memory resident viruses: these viruses attach themselves to
executable files, but when the file runs, load themselves into
memory where they stay as long as the computer is on. While
in memory they spread the infection to other files.
16
Cont’d
3. Boot sector viruses: these are sometimes called partition
table viruses. They attach the boot sector of a floppy disk or
the master boot record on a hard drive (which hold
instructions that get your computer’s operating system up and
running).
4.Stealth viruses: a computer virus that actively hides itself
from antivirus software by either masking the size of the file
that it hides in or temporary removing itself from the infected
file and place a copy of itself in another location on the drive,
replacing the infected file with an uninfected one that it has
stored on the hard drive.
17
18
Cont’d
5. Polymorphic viruses: A type of computer virus that has the
capability of changing its own code, allowing the virus to
have hundreds/thousands of d/t variants, making it much
more difficult to notice/detect.
19

More Related Content

Similar to Chapter 5.pptx

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyYhal Htet Aung
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.MarianaGilMartnez1
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 

Similar to Chapter 5.pptx (20)

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Network security
Network securityNetwork security
Network security
 
Presentation about security I.T.
Presentation about security I.T.Presentation about security I.T.
Presentation about security I.T.
 
Presentation about security i.t.
Presentation about security i.t.Presentation about security i.t.
Presentation about security i.t.
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 

More from Wollo UNiversity

More from Wollo UNiversity (6)

grade 11-ict_fetena_net_c954.pdf
grade 11-ict_fetena_net_c954.pdfgrade 11-ict_fetena_net_c954.pdf
grade 11-ict_fetena_net_c954.pdf
 
Chapter 3.pptx
Chapter 3.pptxChapter 3.pptx
Chapter 3.pptx
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Chapter 4.pptx
Chapter 4.pptxChapter 4.pptx
Chapter 4.pptx
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
 
Chapter 2 - Introduction to Data Science.pptx
Chapter 2 - Introduction to Data Science.pptxChapter 2 - Introduction to Data Science.pptx
Chapter 2 - Introduction to Data Science.pptx
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Chapter 5.pptx

  • 2. Computer Security and Viruses  Computer Security is the protection of computing systems and the data that they store or access.  Computer Security is the process of preventing and detecting unauthorized use of your computer. It involves the process of safeguarding against intruders from using your computer resources for malicious intents or for their own gains (or even gaining access to them accidentally). 2
  • 3. Cont’d  Computer security is a branch of Information Security and is often used interchangeably with the term. It encompasses several security measures such as software programs like anti-virus suites, firewalls, and user dependant measures.  Computer security is the protection of data, networks and computing power. 3
  • 4. Cont’d  Computer security is frequently associated with four core areas, which can be conveniently summarized by the acronym "CIAA" Computer Security is concerned with four main areas: 1. Confidentiality:- Only authorized users can access the data resources and information. 2. Integrity:- Only authorized users should be able to modify the data when needed. 3. Availability:- Data should be available to users when needed. 4. Authentication:- are you really communicating with whom you think you are communicating with. 4
  • 5. Cont’d  What are the consequences for security violations?  Risk to security and integrity of personal or confidential information.  e.g. identity theft, data corruption or destruction, unavailability of critical information in an emergency  Loss of valuable business information.  Loss of employee and public trust, embarrassment, bad publicity, media coverage, news reports.  Costly reporting requirements in the case of a compromise of certain types of personal, financial and health information.  Internal disciplinary action(s) up to and including termination of employment, as well as possible penalties, prosecution and the potential for sanctions / lawsuits. 5
  • 6. Cont’d  Some key steps that everyone can take include:  Use good, cryptic passwords that can't be easily guessed - and keep your passwords secret  Make sure your computer, devices and applications (apps) are current and up to date  Make sure your computer is protected with up-to-date antivirus and anti-spyware software  Don't click on unknown links or attachments, and don't download unknown files or programs onto your computer or other devices  Remember that information and passwords sent via standard, unencrypted wireless are especially easy for hackers to intercept 6
  • 7. Cont’d Why is Computer Security Important?  Computer Security allows the University to carry out its mission by:  Enabling people to carry out their jobs, education, and research  Supporting critical business process  Protecting personal and sensitive information 7
  • 8. Internet Privacy  Internet privacy is the privacy and security level of personal data published via the Internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences.  Internet privacy is cause for concern for any user planning to make an online purchase, visit a social networking site, participate in online games or attend forums. If a password is compromised and revealed, a victim's identity may be fraudulently used or stolen. 8
  • 9. Cont’d  Internet privacy risks include:  Phishing: An Internet hacking activity used to steal secure user data, including username, password, bank account number, security PIN or credit card number.  Pharming: An Internet hacking activity used to redirect a legitimate website visitor to a different IP address.  Spyware: An offline application that obtains data without a user's consent. When the computer is online, previously acquired data is sent to the spyware source.  Malware: An application used to illegally damage online and offline computer users through Trojans, viruses and spyware. 9
  • 10. Cont’d  Internet privacy violation risks may be minimized, as follows:  Always use preventative software applications, such as anti-virus, anti-malware, anti-spam and firewalls  Avoid shopping on unreliable websites  Avoid exposing personal data on websites with lower security levels  Clear the browser's cache and browsing history on a consistent basis  Always use very strong passwords consisting of letters, numerals and special characters. 10
  • 11. Cont’d  The methods to ensure Internet security 1.Use a firewall  Network firewalls (whether software or hardware- based) can provide some degree of protection against these attacks. 2. Don't open unknown email attachments  Before opening any email attachments, be sure you know the source of the attachment 11
  • 12. Cont’d  If you must open an attachment before you can verify the source, we suggest the following procedure: A.Save the file to your hard disk. B.Scan the file using your antivirus software. C.Open the file.  For additional protection, you can disconnect or lock your computer's network connection before opening the file. 12
  • 13. Cont’d  Don't run programs of unknown origin  Disable hidden filename extensions  Keep all applications, including your operating system, patched  Turn off your computer or disconnect from the network when not in use 13
  • 14. Computer Viruses  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".  Are a self replicating/ copying computer program that interferes with a computer’s hardware or operating system and duplicates itself without the user’s knowledge. 14
  • 15. Cont’d  It is means of causes of disaster on a computer system.  It may damage, corrupt/destroy data or degrade system performance 15
  • 16. Cont’d  Classification of computer viruses 1. File viruses: file infecting viruses search out executable files located on a disk or hard drive and physically attach them. When the files run, the virus is activated, often infecting other files in the process. 2. Memory resident viruses: these viruses attach themselves to executable files, but when the file runs, load themselves into memory where they stay as long as the computer is on. While in memory they spread the infection to other files. 16
  • 17. Cont’d 3. Boot sector viruses: these are sometimes called partition table viruses. They attach the boot sector of a floppy disk or the master boot record on a hard drive (which hold instructions that get your computer’s operating system up and running). 4.Stealth viruses: a computer virus that actively hides itself from antivirus software by either masking the size of the file that it hides in or temporary removing itself from the infected file and place a copy of itself in another location on the drive, replacing the infected file with an uninfected one that it has stored on the hard drive. 17
  • 18. 18 Cont’d 5. Polymorphic viruses: A type of computer virus that has the capability of changing its own code, allowing the virus to have hundreds/thousands of d/t variants, making it much more difficult to notice/detect.
  • 19. 19