11ICT General ApplicationsICT General Applications
Malicious Software ,Good Internet
Habits and ICT General Application
Usage
ByBy
Adedayo O.SAdedayo O.S
A Paper Delivered During the New Staff Training for Energy Commission of
Nigeria (ECN) Abuja, 14th to 22nd April 2008.
22ICT General ApplicationsICT General Applications
Virus SourcesVirus Sources
1.1. Simply visiting a compromised Web site canSimply visiting a compromised Web site can
cause infection if certain browsercause infection if certain browser vulnerabilitiesvulnerabilities
are not patched.are not patched.
2.2. Indiscriminate downloading of software fromIndiscriminate downloading of software from
InternetInternet..
3.3. Over liberality with visitors. That is inOver liberality with visitors. That is in thethe use ofuse of
your Internet facility and in use of foreignyour Internet facility and in use of foreign
storage mediastorage media..
4.4. Through e-mail both from friends and strangersThrough e-mail both from friends and strangers
(as attachments).(as attachments).
5.5. Software piracy can sometimes lead to virus infection.Software piracy can sometimes lead to virus infection.
33ICT General ApplicationsICT General Applications
CHARACTERISTICCHARACTERISTIC
SSMALWARE AND SPYWARESMALWARE AND SPYWARES
1.1. Viruses can also replicate themselves (worms).Viruses can also replicate themselves (worms).
2.2. They use up memory and often bring the system to aThey use up memory and often bring the system to a
halt. This can be noticed initiallyhalt. This can be noticed initially by the considerableby the considerable
slowness in operation (booting, running etc)slowness in operation (booting, running etc)..
3.3. Viruses are capable of transmitting themselves acrossViruses are capable of transmitting themselves across
networks and bypassing securitynetworks and bypassing security systems.systems.
44.. They are capable of using up bandwidth very quickly.They are capable of using up bandwidth very quickly.
5.5. They usually fulfil whatever their designer(s) had inThey usually fulfil whatever their designer(s) had in
mind whenmind when produced. E.gproduced. E.g deletion, theft, truncation,deletion, theft, truncation,
falsification, duplication, copy, DoSfalsification, duplication, copy, DoS, corruption, corruption etc.etc.
44ICT General ApplicationsICT General Applications
Updating AntivirusUpdating Antivirus
55ICT General ApplicationsICT General Applications
Storage DevicesStorage Devices
Removable Hard DriveRemovable Hard Drive
Internal Hard DriveInternal Hard Drive
FlashFlash
PC CardsPC Cards
Storage TapesStorage Tapes
Memory SticksMemory Sticks
Floppy DisksFloppy Disks
Zip DisksZip Disks
CD /DVDCD /DVD
66ICT General ApplicationsICT General Applications
Internet Best PracticesInternet Best Practices
Reduce the risk of viruses. Use of anti-virus softwareReduce the risk of viruses. Use of anti-virus software
and keeping it current.and keeping it current.
Never open suspicious e-mail messages or fileNever open suspicious e-mail messages or file
attachmentsattachments
Use Windows Security Centre to manage yourUse Windows Security Centre to manage your
settings. Adjust to the level of protection you aresettings. Adjust to the level of protection you are
comfortable with.comfortable with.
Download internet files from trusted sources only andDownload internet files from trusted sources only and
scan the files with your virus scanner.scan the files with your virus scanner.
Use a firewall, Install a Microsoft Internet ConnectionUse a firewall, Install a Microsoft Internet Connection
firewall as a basic line of defence against outsidefirewall as a basic line of defence against outside
intruders.intruders.
Use strong passwords that are at least eightUse strong passwords that are at least eight
characters long and a combination of lower and uppercharacters long and a combination of lower and upper
case letters, numbers and symbols.case letters, numbers and symbols.
77ICT General ApplicationsICT General Applications
Block Pop-upsBlock Pop-ups
88ICT General ApplicationsICT General Applications
How to download CorrectlyHow to download Correctly
99ICT General ApplicationsICT General Applications
THANK YOU.THANK YOU.
99ICT General ApplicationsICT General Applications
THANK YOU.THANK YOU.

Malicious Software ,Good Internet Habits and ICT general Application usage

  • 1.
    11ICT General ApplicationsICTGeneral Applications Malicious Software ,Good Internet Habits and ICT General Application Usage ByBy Adedayo O.SAdedayo O.S A Paper Delivered During the New Staff Training for Energy Commission of Nigeria (ECN) Abuja, 14th to 22nd April 2008.
  • 2.
    22ICT General ApplicationsICTGeneral Applications Virus SourcesVirus Sources 1.1. Simply visiting a compromised Web site canSimply visiting a compromised Web site can cause infection if certain browsercause infection if certain browser vulnerabilitiesvulnerabilities are not patched.are not patched. 2.2. Indiscriminate downloading of software fromIndiscriminate downloading of software from InternetInternet.. 3.3. Over liberality with visitors. That is inOver liberality with visitors. That is in thethe use ofuse of your Internet facility and in use of foreignyour Internet facility and in use of foreign storage mediastorage media.. 4.4. Through e-mail both from friends and strangersThrough e-mail both from friends and strangers (as attachments).(as attachments). 5.5. Software piracy can sometimes lead to virus infection.Software piracy can sometimes lead to virus infection.
  • 3.
    33ICT General ApplicationsICTGeneral Applications CHARACTERISTICCHARACTERISTIC SSMALWARE AND SPYWARESMALWARE AND SPYWARES 1.1. Viruses can also replicate themselves (worms).Viruses can also replicate themselves (worms). 2.2. They use up memory and often bring the system to aThey use up memory and often bring the system to a halt. This can be noticed initiallyhalt. This can be noticed initially by the considerableby the considerable slowness in operation (booting, running etc)slowness in operation (booting, running etc).. 3.3. Viruses are capable of transmitting themselves acrossViruses are capable of transmitting themselves across networks and bypassing securitynetworks and bypassing security systems.systems. 44.. They are capable of using up bandwidth very quickly.They are capable of using up bandwidth very quickly. 5.5. They usually fulfil whatever their designer(s) had inThey usually fulfil whatever their designer(s) had in mind whenmind when produced. E.gproduced. E.g deletion, theft, truncation,deletion, theft, truncation, falsification, duplication, copy, DoSfalsification, duplication, copy, DoS, corruption, corruption etc.etc.
  • 4.
    44ICT General ApplicationsICTGeneral Applications Updating AntivirusUpdating Antivirus
  • 5.
    55ICT General ApplicationsICTGeneral Applications Storage DevicesStorage Devices Removable Hard DriveRemovable Hard Drive Internal Hard DriveInternal Hard Drive FlashFlash PC CardsPC Cards Storage TapesStorage Tapes Memory SticksMemory Sticks Floppy DisksFloppy Disks Zip DisksZip Disks CD /DVDCD /DVD
  • 6.
    66ICT General ApplicationsICTGeneral Applications Internet Best PracticesInternet Best Practices Reduce the risk of viruses. Use of anti-virus softwareReduce the risk of viruses. Use of anti-virus software and keeping it current.and keeping it current. Never open suspicious e-mail messages or fileNever open suspicious e-mail messages or file attachmentsattachments Use Windows Security Centre to manage yourUse Windows Security Centre to manage your settings. Adjust to the level of protection you aresettings. Adjust to the level of protection you are comfortable with.comfortable with. Download internet files from trusted sources only andDownload internet files from trusted sources only and scan the files with your virus scanner.scan the files with your virus scanner. Use a firewall, Install a Microsoft Internet ConnectionUse a firewall, Install a Microsoft Internet Connection firewall as a basic line of defence against outsidefirewall as a basic line of defence against outside intruders.intruders. Use strong passwords that are at least eightUse strong passwords that are at least eight characters long and a combination of lower and uppercharacters long and a combination of lower and upper case letters, numbers and symbols.case letters, numbers and symbols.
  • 7.
    77ICT General ApplicationsICTGeneral Applications Block Pop-upsBlock Pop-ups
  • 8.
    88ICT General ApplicationsICTGeneral Applications How to download CorrectlyHow to download Correctly
  • 9.
    99ICT General ApplicationsICTGeneral Applications THANK YOU.THANK YOU.
  • 10.
    99ICT General ApplicationsICTGeneral Applications THANK YOU.THANK YOU.