SlideShare a Scribd company logo
1 of 17
Download to read offline
Computer Security Risks
Computer Security Risks
• A computer security risk is any event or
• action that could cause a loss of or damage to
• computer hardware, software, data, information,
• or processing capability
Cybercrime
Any illegal act involving a computer
generally is referred to as a computer crime.
The term cybercrime refers to online or
Internet-based illegal acts. Software used by
cybercriminals sometimes is called crimeware.
Today, cybercrime is one of the FBI’s top three
priorities.
Hacker
• Someone who accesses a
• computer or network illegally is called hacker.
• Some hackers
• claim the intent of their security breaches is
• to improve security.
Cracker
• A cracker also is someone who accesses
• a computer or network illegally but has
• the intent of destroying data, stealing
• information, or other malicious action.
• Both hackers and crackers have advanced
• computer and network skills.
Script kiddie
• A script kiddie has the same intent as a
• cracker but does not have the technical skills
Cyberextortionist
(CRIMINAL LAW obtaining something by illegal threats)
A cyberextortionist is someone who uses
e-mail as a vehicle for extortion. These
perpetrators send an organization a
threatening e-mail message indicating they
will expose confidential information, exploit
a security flaw, or launch an attack that will
compromise the organization’s network — if
they are not paid a sum of money.
Cyberterrorist
• A cyberterrorist is someone who uses the
• Internet or network to destroy or damage computers for political
reasons. The
• cyberterrorist might target the nation’s air
• traffic control system, electricity-generating companies, or a
telecommunications infrastructure.
• The term, cyberwarfare, describes an attack whose goal ranges from
disabling a government’s computer network to crippling
• a country. Cyberterrorism and cyberwarfare usually require a team of
highly skilled
Internet and Network Attacks
• Information transmitted over networks has a
• higher degree of security risk than information
• kept on an organization’s premises. In an organization,
• network administrators usually take
• measures to protect a network from security
• risks. On the Internet, where no central administrator
• is present, the security risk is greater.
Security service
• To determine if your computer is vulnerable
• to an Internet or network attack, you
• could use an online security service. An online
• security service is a Web site that evaluates
• your computer to check for Internet and e-mail
• vulnera bilities
How virus can spread through Email Message
Safeguards against Computer Viruses
and Other Malware
• Methods that guarantee a computer or
• network is safe from computer viruses and other
• malware simply do not exist. Users can take several
• precautions, however, to protect their home
• and work computers and mobile devices from
• these malicious infections
Precautions
• Do not start a computer with removable media inserted in the drives or plugged in the ports.
• For example, optical disc drives should be empty, and a USB port should not contain a USB
flash
• drive. During the startup process, a computer
• may attempt to execute the boot sector on media
• in certain drives and ports. Even if the attempt is
• unsuccessful, a virus on the boot sector of removable
• media can infect the computer’s hard disk.
• If you must start the computer with media in a
• drive or port, be certain the media are uninfected
• or from a trusted source
Precautions
• Never open an e-mail attachment unless you
• are expecting the attachment and it is from a
• trusted source. If the e-mail message is from an
• unknown source or untrusted source, delete the
• e-mail message immediately — without opening
• or executing any attachments.
Precautions
• Some viruses are hidden in macros, which
• are instructions saved in software such as a word
• processing or spreadsheet program. In programs
• that allow users to write macros, you should set
• the macro security level so that the application
• software warns users that a document they are
• attempting to open contains a macro
Precautions
• Users should install an antivirus program and
• update it frequently.
• An antivirus program protects a computer against
• viruses by identifying and removing any computer
• viruses found in memory, on storage media,
• or on incoming files.
Precautions
• One technique that antivirus programs use to
• identify a virus is to look for virus signatures. A
• virus signature, also called a virus definition, is
• a known specific pattern of virus code. Computer
• users should update their antivirus program’s
• signature files regularly

More Related Content

What's hot

Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Information security
Information securityInformation security
Information security
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer security
Computer securityComputer security
Computer security
 
Internet
InternetInternet
Internet
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 

Similar to Computer security risks

Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & ControlAdetula Bunmi
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptxlnatanzenebe21
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptxDibyesh1
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Complete notes security
Complete notes securityComplete notes security
Complete notes securityKitkat Emoo
 

Similar to Computer security risks (20)

Computer security risks
Computer security risksComputer security risks
Computer security risks
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
презентация1
презентация1презентация1
презентация1
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 

Recently uploaded

rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 

Recently uploaded (20)

rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 

Computer security risks

  • 2. Computer Security Risks • A computer security risk is any event or • action that could cause a loss of or damage to • computer hardware, software, data, information, • or processing capability
  • 3. Cybercrime Any illegal act involving a computer generally is referred to as a computer crime. The term cybercrime refers to online or Internet-based illegal acts. Software used by cybercriminals sometimes is called crimeware. Today, cybercrime is one of the FBI’s top three priorities.
  • 4. Hacker • Someone who accesses a • computer or network illegally is called hacker. • Some hackers • claim the intent of their security breaches is • to improve security.
  • 5. Cracker • A cracker also is someone who accesses • a computer or network illegally but has • the intent of destroying data, stealing • information, or other malicious action. • Both hackers and crackers have advanced • computer and network skills.
  • 6. Script kiddie • A script kiddie has the same intent as a • cracker but does not have the technical skills
  • 7. Cyberextortionist (CRIMINAL LAW obtaining something by illegal threats) A cyberextortionist is someone who uses e-mail as a vehicle for extortion. These perpetrators send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network — if they are not paid a sum of money.
  • 8. Cyberterrorist • A cyberterrorist is someone who uses the • Internet or network to destroy or damage computers for political reasons. The • cyberterrorist might target the nation’s air • traffic control system, electricity-generating companies, or a telecommunications infrastructure. • The term, cyberwarfare, describes an attack whose goal ranges from disabling a government’s computer network to crippling • a country. Cyberterrorism and cyberwarfare usually require a team of highly skilled
  • 9. Internet and Network Attacks • Information transmitted over networks has a • higher degree of security risk than information • kept on an organization’s premises. In an organization, • network administrators usually take • measures to protect a network from security • risks. On the Internet, where no central administrator • is present, the security risk is greater.
  • 10. Security service • To determine if your computer is vulnerable • to an Internet or network attack, you • could use an online security service. An online • security service is a Web site that evaluates • your computer to check for Internet and e-mail • vulnera bilities
  • 11. How virus can spread through Email Message
  • 12. Safeguards against Computer Viruses and Other Malware • Methods that guarantee a computer or • network is safe from computer viruses and other • malware simply do not exist. Users can take several • precautions, however, to protect their home • and work computers and mobile devices from • these malicious infections
  • 13. Precautions • Do not start a computer with removable media inserted in the drives or plugged in the ports. • For example, optical disc drives should be empty, and a USB port should not contain a USB flash • drive. During the startup process, a computer • may attempt to execute the boot sector on media • in certain drives and ports. Even if the attempt is • unsuccessful, a virus on the boot sector of removable • media can infect the computer’s hard disk. • If you must start the computer with media in a • drive or port, be certain the media are uninfected • or from a trusted source
  • 14. Precautions • Never open an e-mail attachment unless you • are expecting the attachment and it is from a • trusted source. If the e-mail message is from an • unknown source or untrusted source, delete the • e-mail message immediately — without opening • or executing any attachments.
  • 15. Precautions • Some viruses are hidden in macros, which • are instructions saved in software such as a word • processing or spreadsheet program. In programs • that allow users to write macros, you should set • the macro security level so that the application • software warns users that a document they are • attempting to open contains a macro
  • 16. Precautions • Users should install an antivirus program and • update it frequently. • An antivirus program protects a computer against • viruses by identifying and removing any computer • viruses found in memory, on storage media, • or on incoming files.
  • 17. Precautions • One technique that antivirus programs use to • identify a virus is to look for virus signatures. A • virus signature, also called a virus definition, is • a known specific pattern of virus code. Computer • users should update their antivirus program’s • signature files regularly