This document provides a learning module on computer security. It discusses topics like antivirus software, anti-spyware, cryptography, and data backup. The module is intended for ICT students and others interested in learning about computer security. It explains security threats like viruses and spyware, and teaches methods to identify and address these threats, including using antivirus and anti-spyware software to scan for and remove infections. It also covers cryptography techniques for secure communication and the importance of regular data backups to protect valuable files and information. The module aims to help students understand and apply proper security procedures.
A practical guide to IT security-Up to University projectUp2Universe
This booklet is meant to help teachers and system administrators in high schools when it comes to IT security, digital identity and cybersecurity. The content is universal although it was elaborated under the Up to University project.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are impor
http://www.removemalwarethreats.com/2014/10/11/uninstall-clickhoofind-com-from-windows-system Clickhoofind.com is nasty ad ware that destroys your system and steal your all information from your system.
"How To Defeat Advanced Malware: New Tools for Protection and Forensics" is a FREE continuing education class that has been designed specifically for CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection.
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
1RUNNING HEAD: MANAGING HOST BASED SECURITY IN WINDOWS 8.1
Lab Deliverable for Lab 2
a. Procedure to Manage Windows Defender
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Description:
This window configuration project will require the sytem admin permission so as to access the programs and get to know how it is commanded to the action it should peform. Also, to use a virtual box one should have knowledge in how to operate the virtual box and explore the virtual programs
Notes, Warnings and Restrictions:
1. Windows Defender come with windows 8.1 software and are found in the control panel.
2. The application is used only when you login your system as an administarator or have permitted to act as the administrator.
3. For windows defender to run in the system it should be turned on and no other antivirus should be active
4. Scanning the system with windows defender deletes infected files. Also ensure you do the required scanning
5. If a different anti virus has been previously deleted, then windows defender needs to be turned off and to be restarted
Resources (Futher Reading):
Firewalls. (n.d.). Retrieved from https://technet.microsoft.com/en-us/library/cc700820.aspx
Microsoft Baseline Security Analyzer. (2011). Retrieved from https://dougvitale.wordpress.com/2011/11/18/microsoft-baseline-security-analyzer/
CloudFlare. (n.d.). Retrieved from https://www.winhelp.us/configure-windows-defender-in-windows-8.html
Procedures:
Windows defender
Window defender protects a computer system against any form of malware by running in the background of the computer system and gives notification if any suspicious item is found in the syatem for the user to take action. It can also be used by a computer to scan the system if the system has issues e.g becomes slow, switches off when not commanded to, hanging among other things. Windows defender should be updated over time so that it is not outdated and also to improve its performance.
Windows defender is found in the control panel icon, steps of opening are
i. Open control panel and select “windows defender”
ii. While you click on windows defender, the following page appears
a) To update the system click on “update”
b) Real time scanning
c) For the full scan results it will appear in the table as shown below
d) For quick results check the button just before you click on scan. Then the results will appear as shown below.
e) To scan removable device, select “setting” and click on advance
Then check the box just before removing any removable drivers and click save
b. Procedure to configure Windows Firewall for Windows 8.1
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Descriptions:
Windows firewall is a protection application that protects against suspicious items, It helps in blocking suspicious programs .
Computer security introduction lecture. Introduction
Network Security
Basic Components Of Computer Security
Online Security Vs Online Safety
Risks & Threats
Steps to protect information
Steps to protect computer
Ethical Impact
Case study
Statistics about Internet Crime
survey
conclusion
A practical guide to IT security-Up to University projectUp2Universe
This booklet is meant to help teachers and system administrators in high schools when it comes to IT security, digital identity and cybersecurity. The content is universal although it was elaborated under the Up to University project.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are impor
http://www.removemalwarethreats.com/2014/10/11/uninstall-clickhoofind-com-from-windows-system Clickhoofind.com is nasty ad ware that destroys your system and steal your all information from your system.
"How To Defeat Advanced Malware: New Tools for Protection and Forensics" is a FREE continuing education class that has been designed specifically for CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection.
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
1RUNNING HEAD: MANAGING HOST BASED SECURITY IN WINDOWS 8.1
Lab Deliverable for Lab 2
a. Procedure to Manage Windows Defender
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Description:
This window configuration project will require the sytem admin permission so as to access the programs and get to know how it is commanded to the action it should peform. Also, to use a virtual box one should have knowledge in how to operate the virtual box and explore the virtual programs
Notes, Warnings and Restrictions:
1. Windows Defender come with windows 8.1 software and are found in the control panel.
2. The application is used only when you login your system as an administarator or have permitted to act as the administrator.
3. For windows defender to run in the system it should be turned on and no other antivirus should be active
4. Scanning the system with windows defender deletes infected files. Also ensure you do the required scanning
5. If a different anti virus has been previously deleted, then windows defender needs to be turned off and to be restarted
Resources (Futher Reading):
Firewalls. (n.d.). Retrieved from https://technet.microsoft.com/en-us/library/cc700820.aspx
Microsoft Baseline Security Analyzer. (2011). Retrieved from https://dougvitale.wordpress.com/2011/11/18/microsoft-baseline-security-analyzer/
CloudFlare. (n.d.). Retrieved from https://www.winhelp.us/configure-windows-defender-in-windows-8.html
Procedures:
Windows defender
Window defender protects a computer system against any form of malware by running in the background of the computer system and gives notification if any suspicious item is found in the syatem for the user to take action. It can also be used by a computer to scan the system if the system has issues e.g becomes slow, switches off when not commanded to, hanging among other things. Windows defender should be updated over time so that it is not outdated and also to improve its performance.
Windows defender is found in the control panel icon, steps of opening are
i. Open control panel and select “windows defender”
ii. While you click on windows defender, the following page appears
a) To update the system click on “update”
b) Real time scanning
c) For the full scan results it will appear in the table as shown below
d) For quick results check the button just before you click on scan. Then the results will appear as shown below.
e) To scan removable device, select “setting” and click on advance
Then check the box just before removing any removable drivers and click save
b. Procedure to configure Windows Firewall for Windows 8.1
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Descriptions:
Windows firewall is a protection application that protects against suspicious items, It helps in blocking suspicious programs .
Computer security introduction lecture. Introduction
Network Security
Basic Components Of Computer Security
Online Security Vs Online Safety
Risks & Threats
Steps to protect information
Steps to protect computer
Ethical Impact
Case study
Statistics about Internet Crime
survey
conclusion
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxgidmanmary
Use speaker notes on each slide I need 6 slides EXCLUDING cover pages and refe slide.
Assignment 2: Cybersecurity
We use computers and electronic systems to run and store just about everything. Personal computers and the Internet are now included as part of the Department of Homeland Security's cybersecurity issues.
Cybersecurity involves protecting the information by preventing, detecting, and responding to attacks on information that is housed in technology.
There are many levels of risks in cybersecurity, some more serious and damaging than others. Among these dangers are:
Viruses erasing the entire system.
Individuals breaking into personal computer systems and altering the systems' files.
Individuals using personal computers to attack others' computer systems.
Individuals stealing credit card information and making unauthorized purchases.
Unfortunately, there is no 100% guarantee that even with the best precautions some of these things won't happen. Risk reduction steps exist to minimize vulnerability to information.
Tasks:
Create a PowerPoint Presentation containing 6–8 slides to address the following:
Analyze and discuss the vulnerabilities and recommend what security management can do to minimize the potential of a government or private organization being at risk for cybersecurity damage.
Outline the steps you recommend and identify any impediments to successfully implementing the suggested cybersecurity program.
Support your presentation with at least three outside scholarly resources using APA in-text citations. Add detailed speaker notes for each of the slides.
.
CSS LESSON Application software or App is a program or group of programs designed for end-users. This contrasts with system software, which is mainly involved with running the computer. Some examples of these applications are spreadsheet, word processor, web browser, accounting application, email client, media player, file viewer, simulators, console game, a photo editor. Applications may be classified as proprietary, open-source, or projects and may be bundled with the computer and its system software or published separately. Apps built for mobile platforms are called mobile apps.
Nowadays, the most common way to get new software is to download it from the Internet like Microsoft Office and Adobe Photoshop. You can also install free software like Google Chrome web browser by visiting download sites and clicking the Download button. The installation file will then be saved to your computer in .exe (pronounced dot e-x-e) format, this is the standard extension for installation files on Windows computers.
Nowadays, the most common way to get new software is to download it from the Internet like Microsoft Office and Adobe Photoshop. You can also install free software like Google Chrome web browser by visiting download sites and clicking the Download button. The installation file will then be saved to your computer in .exe (pronounced dot e-x-e) format, this is the standard extension for installation files on Windows computers.
Nowadays, the most common way to get new software is to download it from the Internet like Microsoft Office and Adobe Photoshop. You can also install free software like Google Chrome web browser by visiting download sites and clicking the Download button. The installation file will then be saved to your computer in .exe (pronounced dot e-x-e) format, this is the standard extension for installation files on Windows computers.
Nowadays, the most common way to get new software is to download it from the Internet like Microsoft Office and Adobe Photoshop. You can also install free software like Google Chrome web browser by visiting download sites and clicking the Download button. The installation file will then be saved to your computer in .exe (pronounced dot e-x-e) format, this is the standard extension for installation files on Windows computers.
Nowadays, the most common way to get new software is to download it from the Internet like Microsoft Office and Adobe Photoshop. You can also install free software like Google Chrome web browser by visiting download sites and clicking the Download button. The installation file will then be saved to your computer in .exe (pronounced dot e-x-e) format, this is the standard extension for installation files on Windows computers.
Nowadays, the most common way to get new software is to download it from the Internet like Microsoft Office and Adobe Photoshop. You can also install free software like Google Chrome web browser by visiting download sites and clicking the Download button. The
This is a presentation of the fundamentals of cybersecurity. It is well planned and presented. It offers a great deal of information to both the novice and the professional.
I strongly advise those who want to learn about Cybersecurity to view this work. It is done with a professional accuracy and with a touch of good learning objectives.
Similar to Learning area 1 information and communication technology and society (20)
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
3. Learning Module: ICT and Society
www.ppk.kpm.my < 1 >
1. What is it?
This is a learning module for a specific Learning Outcome as stipulated in
the HSP that is :
€ 1.3 Computer Security
2. Who is it for?
This module is for students who are taking the ICT subject as their elective
and for those who are interested in ICT.
3. What can be achieved?
Upon completion of this module, you should be able to :
€ identify security threats
€ know what measurements should be taken to overcome the threats
4. Is previous knowledge necessary?
No. The content of this module will enable you to acquire the knowledge.
4. Learning Module: ICT and Society
www.ppk.kpm.my < 2 >
TOPIC : 1.3 COMPUTER SECURITY
SUBTOPIC : 1.3.3 Security measures
LEARNING OUTCOMES
You should be able to:
1.3.3.3 Apply the correct security procedures.
A. Antivirus
B. Anti-Spyware
C. Cryptography
D. Firewall
E. Data backup
F. Human aspects
DURATION : 6 periods
5. Learning Module: ICT and Society
www.ppk.kpm.my < 3 >
REFERENCES
A. Books
1. Capron H.L, J.A. Johnson (2005) Computers: Tools For An Information Age.
Complete. Eight Edition.
2. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J. (2004) Discovering
Computers 2005 : A Gateway to Information, Course Technology.
3. Stallings W. (2003) Cryptography and Network Security: Principles and
Practices. Third Edition.
B. Web Addresses
1. Ad-Aware SE Personal ~ http://www.lavasoft.com
2. Antivirus ~ http://www.primode.com/glossary.html
3. Anti-spyware ~ http://www.antispywarecoalition.org/definitions.pdf
4. AVG Free Edition Antivirus ~ http://www.grisoft.com
5. Cryptography ~ http://privacy.getnetwise.org/browsing
6. Cryptography ~ http://www.faqs.org/faqs/cryptography-faq/
7. Cryptography ~ http://www.shodor.org/interactivate/discussions/cipher.html
8. Cryptography ~ http://www.signalguard.com/security/encryption.htm
C. Other sources
1. Windows Help and Support Center.
6. Learning Module: ICT and Society
www.ppk.kpm.my < 4 >
A. ANTIVIRUS
Situation
Your computer displays strange behaviour. For instance, you discover that
“myhomework.doc” has suddenly been renamed to “myhomework.exe”.
Discuss :
i) What do you think is the cause of this problem?
ii) Determine the appropriate measures to overcome this threat.
iii) Apply the correct security procedures to solve this problem.
7. Learning Module: ICT and Society
www.ppk.kpm.my < 5 >
What is antivirus software?
Antivirus software is a program that detects viruses in your computer memory,
storage media or incoming files. It will identify, prevent and eliminate computer
viruses and other malicious software. Examples of antivirus software are McAfee
VirusScan, Norton AntiVirus, Trend Micro PC-cillin, and Doctor Solomon.
Why do we need an antivirussoftware?
Antivirus software protects a computer against viruses by identifying and
removing any computer viruses found.
8. Learning Module: ICT and Society
www.ppk.kpm.my < 6 >
How do you scan your file?
To scan selected area in your personal computer:
1. You may use the antivirus software installed in your computer to scan
selected area, disk or the entire computer. In this module we use AVG Free
Edition antivirus software.
2. Start the antivirus software by clicking Start then go to All Programs. Next,
select AVG Free Edition followed by AVG Free Control Center (Figure 1).
Figure 1
9. Learning Module: ICT and Society
www.ppk.kpm.my < 7 >
3. Click Scan Selected Areas (Figure 2).
Figure 2
4. Select Drive C: and click Scan Selected Areas (Figure 3).
Figure 3
10. Learning Module: ICT and Society
www.ppk.kpm.my < 8 >
5. Scanning process in progress (Figure 4). You may Stop or Pause the
process at any time and resume by restarting or reopen the antivirus software.
Figure 4
6. During the progress report, you will be notified if your computer is infected
(Figure 5).
Figure 5
11. Learning Module: ICT and Society
www.ppk.kpm.my < 9 >
7. The program will try to heal the infected file(s) automatically. Dialogue box
(Figure 6) will appear if the virus is detected. Click Continue to proceed
scanning another file.
Figure 6
Table 1 shows the actions of help, Info, Heal, Delete file and Move to Vault
buttons.
Option Action
AVG Free Edition Help – Basic.
Proceed with what you are doing and the antivirus will ignore the
virus.
12. Learning Module: ICT and Society
www.ppk.kpm.my < 10 >
Option Action
Call up the dialogue with information on the detected virus if
available.
Heal the infected object if possible.
Remove the infected object.
13. Learning Module: ICT and Society
www.ppk.kpm.my < 11 >
Option Action
If you do not want to delete the file, you can quarantine the file by
sending it to the AVG Virus Vault. Click Move to Vault.
Table 1
8. Figure 7 displays scanning statistics. The virus statistics box shows 1 object
is infected. This program will delete the object. Click Close to finish the
scanning process. You may also repeat the above process by clicking Scan
again.
Figure 7
14. Learning Module: ICT and Society
www.ppk.kpm.my < 12 >
Assessment
1. Below are steps in scanning antivirus Rearrange them in the correct
sequence.
a. Scan the selected file
b. Choose an antivirus program
c. Wait while the program is scanning and the result is produced
d. Select file that need to be scanned
2. Antivirus is a software which ______________, _______________ and
______________ computer viruses and other malicious software.
3. Which of the following is an antivirus software?
A Microsoft Office
B Trend Micro PC-cillin
C Windows XP
D Microsoft Word
Enrichment
1. Repeat the above processes to scan other files or areas in your computer.
Write down the infected file name and virus if any.
15. Learning Module: ICT and Society
www.ppk.kpm.my < 13 >
B. ANTI-SPYWARE
What is spyware?
Situation
While you are surfing the Internet, your computer displays a lot of pop-up
windows and disturbs your surfing.
Discuss :
i) What do you think is the cause of this problem?
ii) Determine the appropriate measures to overcome this threat.
iii) Apply the correct security procedures to solve this problem.
16. Learning Module: ICT and Society
www.ppk.kpm.my < 14 >
Spyware is a program placed in a computer without the user’s knowledge that
secretly collects information about the user. Spyware can enter a computer as a
virus or as a result of a user installing a new program. The spyware program
communicates information it collects to others while you are online.
Effects and risks
€ Stealing of confidential data (e.g. passwords)
€ Violation of privacy
€ Unsolicited advertising
Symptoms of spyware infection
The most common symptoms or warning signs of presence of spyware on a
system include:
- Unusual slowness of the system.
- System instability.
- Slow Internet connection.
- Reception of an unusual amount of spam or junk mail.
- Endless pop-ups.
- Windows error messages.
- Computer crashes with no warning.
- Computer screen freezes.
- “Blue screen of death”.
- Hijacked home page.
- Computer takes much longer to boot up or shut down.
- Unexplained and unauthorized charges on your credit card.
- Extremely slow and frustrating to work on your computer.
What is anti-spyware software?
Anti-spyware software is a program that detects, quarantines and removes
spyware to prevent them from getting into your computer. Examples of anti-
spyware software are Lavasoft Ad-Aware SE Personal, PC Health Plan, and
Malware Scanner.
How to detect and remove spyware?
17. Learning Module: ICT and Society
www.ppk.kpm.my < 15 >
1. Choose an anti-spyware program. In this module we use Lavasoft Ad-Aware
SE Personal.
2. Click Start, next click All Programs then click Lavasoft Ad-Aware SE
Personal and then click Ad-Aware SE Personal (Figure 1).
Figure 1
2. Click Start to begin the process (Figure 2).
Figure 2
3. The Preparing System Scan dialogue box will be displayed. Click Next to
start scanning (Figure 3).
18. Learning Module: ICT and Society
www.ppk.kpm.my < 16 >
Figure 3
4. The program will perform system scanning (Figure 4). During this process,
the program is detecting and tracking the spywares in your computer.
Figure 4
5. After the scanning completes, the Scan Complete dialogue box will be
displayed.
Click Next (Figure 5).
19. Learning Module: ICT and Society
www.ppk.kpm.my < 17 >
Figure 5
6. The program will display all the identified objects to be removed. Select the
object you wish to delete or quarantine. Click Next (figure 6).
Figure 6
7. The remove confirmation dialogue box will be displayed. Click OK to remove
the object(s) (Figure 7).
20. Learning Module: ICT and Society
www.ppk.kpm.my < 18 >
Figure 7
8. The object(s) will be removed and the spyware scanning process is
completed.
Assessment
1. Which of the following refers to a spyware program?
A. It lets you secretly read other people's e-mail.
B. It blocks advertisements from popping up while you surf the Internet.
C. It performs tasks on your computer without your consent and control.
D. It performs scheduled tasks on your computer.
2. Which of the following is a symptom if a computer is infected by
sypware?
A. Pop-up advertisements will be seen and your computer slows down.
B. Your web browser contains unwanted additional components.
C. Your settings have changed (for example, your browser default home
page) and you cannot change them back to the way they were.
D. All of the above.
3. Which of the following actions will help to protect your computer
against spyware?
A. Using a firewall.
B. Installing anti-spyware protection.
C. Only downloading programs from Web sites you trust.
D. All the above.
4. You may be infected by spyware when you
A. play music CD.
B. download programs from sources you don't know.
C. install new software from a trusted source
D. all of the above.
Enrichment
How often do you need to scan your personal computer using anti-spyware?
Discuss this with your friend(s). Repeat the above processes to detect spyware
in your computer. Write down the infected objects if any.
21. Learning Module: ICT and Society
www.ppk.kpm.my < 19 >
C. CRYPTOGRAPHY
What is cryptography?
Situation
Your brother who is studying abroad needs some money. He asks your
father to bank in some money into his bank account. He must email his
account information to you. Your father is worried that someone else may
obtain this information and commit fraud.
Discuss :
i) What is your advice to your father to overcome this matter?
ii) Apply the correct security procedures to solve this problem.
22. Learning Module: ICT and Society
www.ppk.kpm.my < 20 >
Cryptography is a process associated with encryption and decryption. Encryption
is the process of transforming information from an unsecured form (ordinary text,
cleartext or plaintext) into coded information (ciphertext), which cannot be easily
read by outside parties. The transformation process is controlled by an algorithm
and a key. The process must be reversible so that the intended recipient can
return the information to its original, readable form, but reversing the process
without the appropriate encryption information is difficult. This means that details
of the key must also be kept secret.
How to use cryptography?
Cryptography is used when we want to send secured information. We want the
information to be understood by only the recipient.
In order to use cryptography, we need to understand how it works (Diagram 1).
Diagram 1
Sender will encrypt a message (plaintext) by using an encryption algorithm and a
key. This encrypted message is called ciphertext.
Recipient will decrypt the ciphertext by using decryption algorithm and a key that
is agreed upon. This decrypted ciphertext is called plaintext (message).
Plaintext
(P)
Ciphertext
(C)
Plaintext
(P)
encryption
by using
Encryption
Algorithm and
a key (K)
by using
Decryption
Algorithm and
a key (K)
decryption
23. Learning Module: ICT and Society
www.ppk.kpm.my < 21 >
Mod = balance of a
division
Let us try a classical cryptography that was used by Julius Caesar during his time
called Caesar Cipher.
Encryption algorithm: C = (P + K) mod 26 with K = 3
Decryption algorithm: P = (C € K) mod 26 with K = 3
1. Before using the algorithm, we need to number the entire alphabet (A • Z)
with 0 • 25 in order (Table 2).
Table 2
2. Let us encrypt the phrase ‚ATTACKƒ, with the encryption algorithm given.
Plaintext Number
Representation
(P + 3) mod 26
= C
Number
Representation
Ciphertext
A 0 0 + 3 = 3 3 D
T 19 19 + 3 = 22 22 W
T 19 19 + 3 = 22 22 W
A 0 0 + 3 = 3 3 D
C 2 2 + 3 = 5 5 F
K 10 10 + 3 = 13 13 N
3. Try to decrypt the ciphertext by using the decryption algorithm given.
Ciphertext Number
Representation
(C – 3) mod 26
= P
Number
Representation
Plaintext
D 3 3 € 3 = 0 0 A
W 22 22 € 2 = 19 19 T
W 22 22 € 3 = 19 19 T
D 3 3 € 3 = 0 0 A
F 5 5 € 3 = 2 2 C
N 13 13 € 3 = 10 10 K
Assessment
A B C D E F G H
0 1 2 3 4 5 6 7
I J K L M N O P
8 9 10 11 12 13 14 15
Q R S T U V W X
16 17 18 19 20 21 22 23
Y Z
24 25
24. Learning Module: ICT and Society
www.ppk.kpm.my < 22 >
1. Encryption and decryption are processes involved in a _______________.
2. An encrypted ordinary text is called _______________.
3. A reversing process to retrieve the message sent is called
________________.
4. Decrypt the ciphertext given by using Caeser Cipher.
ciphertext : ZRUOG
plaintext: ___________
Enrichment
Create your own cryptography.
1. Develop the encryption and decryption algorithm.
2. Show how your cryptography works by using a table with plaintext heading,
encryption technique, ciphertext, decryption technique and plaintext.
25. Learning Module: ICT and Society
www.ppk.kpm.my < 23 >
D. DATA BACKUP
What is data backup?
Situation
You have spent one week typing your 24 page long assignment. You
are worried your data would be lost if something bad happens to your
computer
i) How would you ensure the safety and protection of your valuable
data?
ii) Apply the correct security procedures to prevent this from
happening. (skill-based)
26. Learning Module: ICT and Society
www.ppk.kpm.my < 24 >
A data backup is a duplication of a file, program or disk that can be used if the
original source is lost, damaged or destroyed.
Why do we need to backup data?
It is absolutely critical that you understand when corruption happens, hard disk
drives will fail, motherboards will short out, and data will be erased. Therefore
you will need data backup to ensure your data is saved.
How to backup your file to external storage device
1. Click My Documents folder (Figure1).
Figure 1
27. Learning Module: ICT and Society
www.ppk.kpm.my < 25 >
2. Highlight file or document from My Documents. For example, document
“Exercise 1” (Figure 2).
Figure 2
3. Insert a floppy disk (diskette) into your floppy drive. To copy the file to floppy
disk, click File Menu then click Send to, then click 3 1/2 Floppy ( A: )
(Figure 3).
Figure 3
28. Learning Module: ICT and Society
www.ppk.kpm.my < 26 >
During this process, your file or document is being copied to the Floppy Disk
(Figure4).
Figure 4
Note
Beside Floppy Disk, you may choose any external storage devices as a
destination such as CD-RW, flash disk, tape or network attach storage, to do your
data backup.
Assessment
1. Read the statements below. Answer T if True and F if False.
a. We can directly make a data backup without addressing the target or
destination to be copied
______
b. We can copy a few files at one time during backup ___-
___
c. We cannot select more than one folder at one time to do backup
______
d. We can do a few data backup to same destination.
______
2. Explain briefly how to prevent the data lost?
____________________________________________________________
____________________________________________________________
____________________________________________________________.
Enrichment
29. Learning Module: ICT and Society
www.ppk.kpm.my < 27 >
Repeat the above steps to backup data from a different folder or location in your
computer. You may backup your data in the same floppy disk or other
destinations in your computer.
E. FIREWALL
Situation
You are surfing the Internet to do your school assignment. When you want to
download a file, your computer does not allow it to happen.
Discuss :
i) Why does this situation occur?
30. Learning Module: ICT and Society
www.ppk.kpm.my < 28 >
What is Windows Firewall?
A firewall restricts information that comes to your computer from other computers.
It gives you more control over the data in your computer and provides a defence
against people or programs (including viruses and worms) that try to connect to
your computer without invitation.
How to set firewall?
Below is the example of setting up the firewall.
1. Click Start button, then click Control Panel (Figure 1).
Figure 1
31. Learning Module: ICT and Society
www.ppk.kpm.my < 29 >
2. Click Network and Internet Connections (Figure 2).
Figure 2
3. Highlight your current Connection. Go to File menu then click Properties.
Figure 3 is an example of the selected connection.
Figure 3
32. Learning Module: ICT and Society
www.ppk.kpm.my < 30 >
The Network Connection Properties will be displayed (Figure 4).
Figure 4
4. Click Advanced tab and check protect my computer and network by
limiting or preventing access to this computer from the internet to
enable the function (Figure 5).
Figure 5
5. Click OK to complete the process.
33. Learning Module: ICT and Society
www.ppk.kpm.my < 31 >
By doing so, you are enabling a security system that acts as a protective
boundary between a network and the outside world. The Internet Connection
Firewall (ICF) is a firewall software that is used to set restrictions on what
information is communicated from your network computer to and from the
Internet.
Assessment
1. A firewall helps to keep your computer more _______________. It
______________ information that comes to your computer from other
computers. It gives you more _____________ over the data on your computer
and provides a line of defense against people or programs (including viruses
and worms) that try to connect to your computer without invitation.
2. When turned on, firewall will ___________ the connection if any unrecognized
person on the Internet or a network tries to connect to your computer.
3. A firewall will
I. help block computer viruses and worms from reaching your computer.
II. ask for your permission to block or unblock certain connection requests.
III. detect or disable computer viruses and worms if they are already in your
computer.
IV. stop you from opening e-mail with dangerous attachments.
A. I and II
B. I and III
C. II and III
D. III and IV
34. Learning Module: ICT and Society
www.ppk.kpm.my < 32 >
F.HUMAN ASPECTS
What is a computer security?
Situation
While working on your computer, you discover some of your files missing and
some altered. You realise that intruders have accessed your computer.
Discuss :
i) Determine the appropriate measures to overcome this threat.
ii) Apply the correct security procedures to solve this problem.
35. Learning Module: ICT and Society
www.ppk.kpm.my < 33 >
A computer security risk is a situation which can cause a loss or damage
computer hardware, software, data, information, or processing capability. Some
breaches to computer security are accidental. Others are planned intrusions. The
people involved are called perpetrators.
Category of perpetrators
Perpetrators of computer crime and other intrusions fall into seven basic
categories:-
Category Description
Hacker Someone who accesses a computer or network illegally,
with advanced computer skills and often claim the intent of
their security breaches is to improve security.
Cracker Someone who accesses a computer or network illegally,
with advanced computer skills but has the intent of
destroying data, stealing information, or other malicious
action.
Script Kiddie Someone who has the same intent as a cracker but does
not have the technical skills and knowledge, often
teenagers.
Corporate Spy Someone who is hired to break into a specific computer
and steal its proprietary data and information.
Unethical
Employee
Employees who break into their employers’ computers for
a variety of reasons.
Cyber Extortionist Someone who uses e-mail as a vehicle for extortion or
libeling.
Cyber Terrorist Someone who uses the Internet or network to destroy or
damage computers for political reasons.
Activity 1
36. Learning Module: ICT and Society
www.ppk.kpm.my < 34 >
Safeguard Against Hardware Theft and Vandalism
Situation
You were asked to check the security measurements in your computer lab by
your teacher. Complete the checklist below. You can add other security
measurement(s).
No Security Measurement Check
1. Locked Doors
2. Locked Windows
3. Locked Cabinets
4. Locked Grill
5. Double Lock
6. Alarm System
7. School Guard
8. Log Book
9. Implementing user identification
10.
11.
12.
13.
14.
15.
Activity 2
Safeguard Against Software Theft
Identify the originality of software being used in your computer lab. Complete the
checklist below. You can add other software.
No Software
Original?
(Check)
1. Server Operating System
2. Client operating System
3.
4.
5.
6.
7.
8.
9.
10.
Assessment
37. Learning Module: ICT and Society
www.ppk.kpm.my < 35 >
Match the category of perpetrator below with its description.
Category Description
Cyber
Extortionist
Someone who accesses a
computer or network illegally, with
advanced computer skills and
often claim the intent of their
security breaches is to improve
security.
Unethical
Employee
Someone who uses the Internet
or network to destroy or damage
computers for political reasons.
Cyber Terrorist
Someone who has the same
intent as a cracker but does not
have the technical skills and
knowledge, often teenagers.
Hacker
Someone who is hired to break
into a specific computer and steal
its proprietary data and
information.
Cracker
Employees who break into their
employers’ computers for a
variety of reasons.
Script Kiddie
Someone who uses e-mail as a
vehicle for extortion or libeling.
Corporate Spy
Someone who accesses a
computer or network illegally, with
advanced computer skills but has
the intent of destroying data,
stealing information, or other
malicious action.
38. Learning Module: ICT and Society
www.ppk.kpm.my < 36 >
Module Assessment
You are the president of your school computer club. Your club has successfully
conducted activities in helping teachers and educating the members. As a
respectable club, the club has been given a responsibility to help maintaining the
school computer lab.
Your teacher advisor wants you to help him in exercising an extra precautions in
the security measurement of the school’s computer lab.
Complete the table below with the correct security measurement for the sample
problem.
Problem Security Measurement
Unauthorized password duplication
Antivirus
Unwanted pop-up windows while surfing the
Internet.
Data backup
Students accidentally visit pornography site.
Lock doors and windows
CONGRATULATIONS !!
YOU HAVE SUCCESSFULLY COMPLETED THIS MODULE. YOU ARE NOW
ABLE TO APPLY THE NECESSARY SECURITY MEASURES AND PROTECT
YOUR COMPUTER.