SlideShare a Scribd company logo
1 of 14
INFORMATION AND COMPUTER SECURITY
Q. What is information and computer security?
 Information & computer security: is the protection
of computer systems & networks from information
disclosure, theft of or damage to their hardware,
software, or electronic data, as well as from the
disruption or misdirection of the services they provide .
1
INFORMATION AND COMPUTER …
Responsible Behavior in the Computer Lab
 A computer laboratory is a special place which contains
delicate and expensive equipment .
2
Fig1: Students in a
computer lab
INFORMATION AND COMPUTER …
 We need to follow some guidelines for responsible
behavior in the Computer Lab. These are:
3
i. Students are not allowed in computer lab unless
directly supervised by a computer teacher or any
other staff member.
ii. Never share your password, even with your best
friend.
iii. Listen to directions given by your computer
teacher.
iv. Only use the Internet as instructed. Do not click
on links that seem suspicious or are offers of
“free” anything.
v. Do not use the mouse or keyboard as a toy.
INFORMATION AND COMPUTER …
NOTE:
Do not give own or another’s data to anyone .
E-mail address should not be given to anyone.
Always stick to safe on-line behaviour.
4
INFORMATION AND COMPUTER …
CHALLENGES OF COMPUTER & INFORMATION
TECHNOLOGY
5
INFORMATION AND COMPUTER …
 When we use internet, share file & download
files malicious software may get in to our
device . Some of them are :
6
1. Viruses
 A computer virus is a program usually hidden within
another simple program.
 It produces copies of itself and inserts them into other
programs or files, in turn destroying the data and
performing other malicious actions.
INFORMATION AND COMPUTER …
Macro Viruses
 is series of programming steps that are stored in
single location.
 allows automation of many actions with only a
single keystroke.
 The virus using macro files are most popular as
they are:
 Easy to write
 Can infect more people faster as they exchange
documents and data frequently
 Can easily infect any computer capable of running Office
and Internet
7
 Macro viruses can do a lot of different damage in a
lot of different ways.
INFORMATION AND COMPUTER …
2. Worms
 A computer worm is a type of malware that spreads
copies of itself from computer to computer.
8
A worm can replicate itself without any human
interaction (usually to other computer systems via
network connections) and,
 it does not need to attach itself to a software
program in order to cause damage.
INFORMATION AND COMPUTER …
2. Trojan horses
 It is a program that claims to rid your computer
of viruses but instead introduces viruses into
the system.
9
Since they look like sincere programs they are
referred as Trojan like the “Trojan Horse” of Greek
mythology .
They are mostly spread through internet
downloads and online gaming programs .
INFORMATION AND COMPUTER …
4. Spyware
 As its name suggests, it is a program used to spy
on the computer system.
 It tries to get all confidential & sensitive information
such as your bank account numbers, passwords etc.
 Then, this confidential data is misused to access user’s
accounts.
10
5. Malware
 Malware is short for “malicious software.”
 It is any kind of unwanted software that is installed
without your adequate consent.
In fact all the threats mentioned above such as
Virus, Trojans etc are examples of Malware
INFORMATION AND COMPUTER …
6. Spams
 The term “spam” refers to unsolicited
commercial email (UCE) or unsolicited bulk
email (UBE).
 The most common spams are:
 “Get Rich Quick” and
 “Make Money Fast” (MMF) schemes
11
 Spam emails is not only unwanted, it clogs
your email accounts and uses unnecessary
server space.
INFORMATION AND COMPUTER …
7. Hackers and crackers
 Hackers & crackers: software programmers who
use dubious ways to get control over your
computer and systems.
 Intent of both is to gain control over your
computer so that they can get the sensitive
confidential information .
12
So we can see that our computer may be
affected by many malicious software so we
will see how to prevent our computer from
this malicious software .
INFORMATION AND COMPUTER …
HOW TO PREVENT MALICIOUS SOFTWARES FROM OUR
DIVICE ?
 Install Anti-virus software
 Regularly update software
 Only buy Apps from trusted sources
 Don’t click on suspicious links or download
attachments from unknown sources
 Back up data regularly & Install Firewall
13
14

More Related Content

Similar to INFORMATION AND COMPUTER SECURITY.pptx

Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Suman Mia
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 

Similar to INFORMATION AND COMPUTER SECURITY.pptx (20)

Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Hamza
HamzaHamza
Hamza
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
IT viruses
 IT viruses IT viruses
IT viruses
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

INFORMATION AND COMPUTER SECURITY.pptx

  • 1. INFORMATION AND COMPUTER SECURITY Q. What is information and computer security?  Information & computer security: is the protection of computer systems & networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide . 1
  • 2. INFORMATION AND COMPUTER … Responsible Behavior in the Computer Lab  A computer laboratory is a special place which contains delicate and expensive equipment . 2 Fig1: Students in a computer lab
  • 3. INFORMATION AND COMPUTER …  We need to follow some guidelines for responsible behavior in the Computer Lab. These are: 3 i. Students are not allowed in computer lab unless directly supervised by a computer teacher or any other staff member. ii. Never share your password, even with your best friend. iii. Listen to directions given by your computer teacher. iv. Only use the Internet as instructed. Do not click on links that seem suspicious or are offers of “free” anything. v. Do not use the mouse or keyboard as a toy.
  • 4. INFORMATION AND COMPUTER … NOTE: Do not give own or another’s data to anyone . E-mail address should not be given to anyone. Always stick to safe on-line behaviour. 4
  • 5. INFORMATION AND COMPUTER … CHALLENGES OF COMPUTER & INFORMATION TECHNOLOGY 5
  • 6. INFORMATION AND COMPUTER …  When we use internet, share file & download files malicious software may get in to our device . Some of them are : 6 1. Viruses  A computer virus is a program usually hidden within another simple program.  It produces copies of itself and inserts them into other programs or files, in turn destroying the data and performing other malicious actions.
  • 7. INFORMATION AND COMPUTER … Macro Viruses  is series of programming steps that are stored in single location.  allows automation of many actions with only a single keystroke.  The virus using macro files are most popular as they are:  Easy to write  Can infect more people faster as they exchange documents and data frequently  Can easily infect any computer capable of running Office and Internet 7  Macro viruses can do a lot of different damage in a lot of different ways.
  • 8. INFORMATION AND COMPUTER … 2. Worms  A computer worm is a type of malware that spreads copies of itself from computer to computer. 8 A worm can replicate itself without any human interaction (usually to other computer systems via network connections) and,  it does not need to attach itself to a software program in order to cause damage.
  • 9. INFORMATION AND COMPUTER … 2. Trojan horses  It is a program that claims to rid your computer of viruses but instead introduces viruses into the system. 9 Since they look like sincere programs they are referred as Trojan like the “Trojan Horse” of Greek mythology . They are mostly spread through internet downloads and online gaming programs .
  • 10. INFORMATION AND COMPUTER … 4. Spyware  As its name suggests, it is a program used to spy on the computer system.  It tries to get all confidential & sensitive information such as your bank account numbers, passwords etc.  Then, this confidential data is misused to access user’s accounts. 10 5. Malware  Malware is short for “malicious software.”  It is any kind of unwanted software that is installed without your adequate consent. In fact all the threats mentioned above such as Virus, Trojans etc are examples of Malware
  • 11. INFORMATION AND COMPUTER … 6. Spams  The term “spam” refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE).  The most common spams are:  “Get Rich Quick” and  “Make Money Fast” (MMF) schemes 11  Spam emails is not only unwanted, it clogs your email accounts and uses unnecessary server space.
  • 12. INFORMATION AND COMPUTER … 7. Hackers and crackers  Hackers & crackers: software programmers who use dubious ways to get control over your computer and systems.  Intent of both is to gain control over your computer so that they can get the sensitive confidential information . 12 So we can see that our computer may be affected by many malicious software so we will see how to prevent our computer from this malicious software .
  • 13. INFORMATION AND COMPUTER … HOW TO PREVENT MALICIOUS SOFTWARES FROM OUR DIVICE ?  Install Anti-virus software  Regularly update software  Only buy Apps from trusted sources  Don’t click on suspicious links or download attachments from unknown sources  Back up data regularly & Install Firewall 13
  • 14. 14