SlideShare a Scribd company logo
COMPUTER SAFETY AND
SECURITY
1
11:05:31 AM
Threats of a computer System
Threat is a source of attack to a system that
could cause losses. One of the threats in
computer system is Computer Virus.
Computer viruses are software programs that
are able to reproduce themselves.
Computer virus is a program that is
intentionally done to harm users’ program
without permission.
2
11:05:31 AM
Dangers of computer viruses
 Change: computer viruses can change actual data
or text causing different sense
 Slackness: many viruses cause slow computing
operation because of the load that their
reproductive activity imposes.
 Theft: viruses can steal data, and stolen data can
be used to re-steal other more data
 Scramble (mix): virus can scramble data and files
3
Types of computer viruses
 Boot sector viruses
attach themselves to the system code and
hides behind the boot sector of hard disk
 File infectors/program infectors
attach themselves to executable files or
programs.
file infectors affect system performance.
These viruses are the most widely spread
viruses as executable files or programs run
4
Types of computer viruses
 Macro viruses
Macro viruses are hosted in user documents.
Macro viruses represent a larger threat as
they attack data files rather than executable.
 System infectors
Attach themselves to the specific system
files. E.g. command.com, etc
5
Potential Paths for Virus
 Storage devices. E.g. Hard disk, floppy disk,
flash disk, CD-ROM
 Internet connection- e-mail attachments,
sharing infected files
 Direct cabling between PCs (network). etc.
6
Rules for safe computing
 These simple rules will protect /secure/ your system from
computer virus infection
 Never load unknown disks into system unless the disks are
virus free
 Do not use infected software (executable files) unless they
are free of virus infection
 Backup your data regularly to protect the data loss from any
cause
 Prevent unauthorized access
 Lock your computer when not in use
 Install antivirus program on to your computer and update
regularly/configure to update itself automatically if there is
internet connection
7
Safety of the computer system
 Computers require uniform and uninterrupted power supply, no
noise interference and suitable environmental conditions for
reliable operation
Power line problem/disturbances
 Common power problems are:
 Voltage spikes –unrecognized and quick power OFF and
ON
 Voltage surges – over voltage
 Voltage sages – under voltage
These Power problems can be solved through the use of
uninterrupted power supply (UPS) because UPS stand
between the utility power and the system, conditioning AC
power and eliminating over voltage, under voltage, and
spikes.
8
Environmental factors
Temperature:
Integrated circuits and other devices in the
computer systems are sensitive to temperature.
During normal operation, the computer generates
heat, which is tolerable to the circutry.
Measures:
Keep the cooling ventilator cleans
Keep the system disk in cool and dry place
If possible install air conditioner in the room
9
Cont…
 Dust:
 The static electrical charge that builds up in the computer
systems and the monitor attracts dust.
 Dust is a major contributor for integrated circuits failure in
the system.
 Electro mechanical devices such as printers and disk drives
have a number of moving parts that get dirty causing
overheating and early failures
Measures:
 Clean computer systems and its peripherals periodically
 Use dust covers
 Keep computer room windows closed
 Do not touch the surface of disk drives and other internal components
10
THANK YOU!!
11
11:05:31 AM

More Related Content

Similar to Computer security.pptx

Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
tapan_sengupta
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
lnatanzenebe21
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx
PurnaBahadurRana1
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
makanaya
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
Lokesh Kumar N
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
Rahman_Hussain
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
Pranjal Mishra
 
Computer networking
Computer networking Computer networking
Computer networking
Sukrant Chandna
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
Information Technology
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
casyrichard
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Aman Chaudhary
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
Danny Doobay
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
GovandJamal
 
INT 1010 05-3.pdf
INT 1010 05-3.pdfINT 1010 05-3.pdf
INT 1010 05-3.pdf
Luis R Castellanos
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
Sejahtera Affif
 

Similar to Computer security.pptx (20)

Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Computer power point presentation
Computer power point presentationComputer power point presentation
Computer power point presentation
 
Computer networking
Computer networking Computer networking
Computer networking
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Computer security.pptx
Computer security.pptxComputer security.pptx
Computer security.pptx
 
INT 1010 05-3.pdf
INT 1010 05-3.pdfINT 1010 05-3.pdf
INT 1010 05-3.pdf
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 

Recently uploaded

Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
Severalnines
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
Envertis Software Solutions
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLESINTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
anfaltahir1010
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
kalichargn70th171
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 

Recently uploaded (20)

Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLESINTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
INTRODUCTION TO AI CLASSICAL THEORY TARGETED EXAMPLES
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
The Key to Digital Success_ A Comprehensive Guide to Continuous Testing Integ...
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 

Computer security.pptx

  • 2. Threats of a computer System Threat is a source of attack to a system that could cause losses. One of the threats in computer system is Computer Virus. Computer viruses are software programs that are able to reproduce themselves. Computer virus is a program that is intentionally done to harm users’ program without permission. 2 11:05:31 AM
  • 3. Dangers of computer viruses  Change: computer viruses can change actual data or text causing different sense  Slackness: many viruses cause slow computing operation because of the load that their reproductive activity imposes.  Theft: viruses can steal data, and stolen data can be used to re-steal other more data  Scramble (mix): virus can scramble data and files 3
  • 4. Types of computer viruses  Boot sector viruses attach themselves to the system code and hides behind the boot sector of hard disk  File infectors/program infectors attach themselves to executable files or programs. file infectors affect system performance. These viruses are the most widely spread viruses as executable files or programs run 4
  • 5. Types of computer viruses  Macro viruses Macro viruses are hosted in user documents. Macro viruses represent a larger threat as they attack data files rather than executable.  System infectors Attach themselves to the specific system files. E.g. command.com, etc 5
  • 6. Potential Paths for Virus  Storage devices. E.g. Hard disk, floppy disk, flash disk, CD-ROM  Internet connection- e-mail attachments, sharing infected files  Direct cabling between PCs (network). etc. 6
  • 7. Rules for safe computing  These simple rules will protect /secure/ your system from computer virus infection  Never load unknown disks into system unless the disks are virus free  Do not use infected software (executable files) unless they are free of virus infection  Backup your data regularly to protect the data loss from any cause  Prevent unauthorized access  Lock your computer when not in use  Install antivirus program on to your computer and update regularly/configure to update itself automatically if there is internet connection 7
  • 8. Safety of the computer system  Computers require uniform and uninterrupted power supply, no noise interference and suitable environmental conditions for reliable operation Power line problem/disturbances  Common power problems are:  Voltage spikes –unrecognized and quick power OFF and ON  Voltage surges – over voltage  Voltage sages – under voltage These Power problems can be solved through the use of uninterrupted power supply (UPS) because UPS stand between the utility power and the system, conditioning AC power and eliminating over voltage, under voltage, and spikes. 8
  • 9. Environmental factors Temperature: Integrated circuits and other devices in the computer systems are sensitive to temperature. During normal operation, the computer generates heat, which is tolerable to the circutry. Measures: Keep the cooling ventilator cleans Keep the system disk in cool and dry place If possible install air conditioner in the room 9
  • 10. Cont…  Dust:  The static electrical charge that builds up in the computer systems and the monitor attracts dust.  Dust is a major contributor for integrated circuits failure in the system.  Electro mechanical devices such as printers and disk drives have a number of moving parts that get dirty causing overheating and early failures Measures:  Clean computer systems and its peripherals periodically  Use dust covers  Keep computer room windows closed  Do not touch the surface of disk drives and other internal components 10