SlideShare a Scribd company logo
PROTECT COMPUTER
FROM MALWARE
Chapter 6
Computer Security and Ethics
• HOW TO PROTECT COMPUTER SYSTEM FROM
VIRUS ATTACK
There are many ways to protect
computer system from virus attacks.
Here are some simple steps to protect
your computer.
• INSTALL FIREWALL
A firewall enacts the role of a security
guard.
INSTALL ANTIVIRUS SOFTWARE
It helps to protect the computer from
any unauthorized code or software
that creates a threat to the system.
INSTALL ANTI-SPYWARE SOFTWARE
Anti-spyware is a computer program
that detects infection on computer
and removes them.
• The following are common methodologies
used for authentication purpose.
USERNAME AND PASSWORD
• A user name is a name that identifies a
person on a computer system.
• Username and password are used to
authorize users to have access to computer
system, e-mail account, bank account and
other services available on computer.
COMMON METHODOLOGIES USED FOR
AUTHENTICATION
PERSONAL IDENTIFICATION NUMBER [PIN]
• Personal identification number [PIN] is a
confidential numeric password used to
authenticate a user to get access to computer
system.
• ACCESS CARD
Access cards are very similar in appearance to
credit cards. They areused to open security gates,
parking barriers and doors of hotel rooms.
• BIOMETRICS
Biometrics is a method based on measurement
of features of face, fingerprints, hand geometry,
signature and voice for authentication of
individuals.
COMPUTER ETHICS
• Computer ethics means an acceptable
behavior for using computer technology. It is a
code of behavior for moral and social issues
while using computer technology, particularly
internet. Computer use should be honest
respect the rights of others on the internet
and obey laws that apply online behavior.
ETHICAL USE OF COMPUTER
• Computer should not be used to harm other
people.
• Computer user should not break into other’s
computer system to steal, change or destroy
information.
• Computer should not read documents and e-
mails of other users without their consent.
• People should not commit any type of crime with
the help of computer technology.
• Computer users should respect the privacy of
others.
Assignment
Solve the following questions :
1. What are common methodologies used for authentication?
2. Define computer ethics and write some important moral guidelines for
ethical use of computer technology .
3. Name any three places where authentication of people is required .
4. What types of problems may be faced if computer users do not comply
with the moral guidelines of computer ethics?
5. You have learned four common methodologies used for authentication
purpose Explain any two of them .
6. Define authorized and unauthorized access with example .
Refer Textbook
•Review Key points of
the chapter Review
•Review MCQs

More Related Content

What's hot

System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
Kushagr sharma
 
Security in Banks and ATM's
Security in Banks and ATM'sSecurity in Banks and ATM's
Security in Banks and ATM's
Inttelix
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
samina khan
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
Dr. B T Sampath Kumar
 
Evote and associated risks
Evote and associated risksEvote and associated risks
Evote and associated risks
premdeshmane
 
Software Security
Software SecuritySoftware Security
Software Security
AkNirojan
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Automation
AutomationAutomation
Automation
Mphasis
 
Internet
InternetInternet
Internet
youssefchefcher
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Computer Security
Computer SecurityComputer Security
Computer Security
AkNirojan
 
Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
Aksum Institute of Technology(AIT, @Letsgo)
 
A dummies guide to security
A dummies guide to securityA dummies guide to security
A dummies guide to security
dnbsystems
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Sahil Daw
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 

What's hot (19)

System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
Security
SecuritySecurity
Security
 
Security in Banks and ATM's
Security in Banks and ATM'sSecurity in Banks and ATM's
Security in Banks and ATM's
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Evote and associated risks
Evote and associated risksEvote and associated risks
Evote and associated risks
 
Software Security
Software SecuritySoftware Security
Software Security
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Resume Modified
Resume ModifiedResume Modified
Resume Modified
 
Automation
AutomationAutomation
Automation
 
Internet
InternetInternet
Internet
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
A dummies guide to security
A dummies guide to securityA dummies guide to security
A dummies guide to security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 

Similar to Protect computer from malware

ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
MuruganS82
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
Arti Parab Academics
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
Alefya1
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
rizwanshafique4321
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
SATYAJIT58
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
Arthur Landry
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
Aarush59
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
Dibyesh1
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
GooglePay16
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
MamthaMam1
 
INTERNT.ppt
INTERNT.pptINTERNT.ppt
INTERNT.ppt
AdilRehman54
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
Asia Pasific University
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
Nikki Shree
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Security Basics
Security BasicsSecurity Basics
Security Basics
Rishi Prasath
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 

Similar to Protect computer from malware (20)

ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Information security management
Information security managementInformation security management
Information security management
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
 
INTERNT.ppt
INTERNT.pptINTERNT.ppt
INTERNT.ppt
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 

More from ShouaQureshi

touchscreens
touchscreenstouchscreens
touchscreens
ShouaQureshi
 
3D Priinters
3D Priinters 3D Priinters
3D Priinters
ShouaQureshi
 
2D and 3D Cutter
2D and 3D Cutter 2D and 3D Cutter
2D and 3D Cutter
ShouaQureshi
 
scanners touchscreen bar code readers
scanners touchscreen bar code readersscanners touchscreen bar code readers
scanners touchscreen bar code readers
ShouaQureshi
 
impact and non impact printers
impact and non impact printers impact and non impact printers
impact and non impact printers
ShouaQureshi
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
ShouaQureshi
 
2d and 3d cutters
2d and 3d cutters2d and 3d cutters
2d and 3d cutters
ShouaQureshi
 
Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship
ShouaQureshi
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
ShouaQureshi
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
ShouaQureshi
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
ShouaQureshi
 
Multiple choice questions chapter 1
Multiple choice questions  chapter 1Multiple choice questions  chapter 1
Multiple choice questions chapter 1
ShouaQureshi
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
ShouaQureshi
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
ShouaQureshi
 
Class ix ms word part 1
Class ix ms word part 1Class ix ms word part 1
Class ix ms word part 1
ShouaQureshi
 
Word processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updatedWord processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updated
ShouaQureshi
 
Spreadsheet new
Spreadsheet newSpreadsheet new
Spreadsheet new
ShouaQureshi
 
Manupulating and formatting data
Manupulating and formatting dataManupulating and formatting data
Manupulating and formatting data
ShouaQureshi
 

More from ShouaQureshi (18)

touchscreens
touchscreenstouchscreens
touchscreens
 
3D Priinters
3D Priinters 3D Priinters
3D Priinters
 
2D and 3D Cutter
2D and 3D Cutter 2D and 3D Cutter
2D and 3D Cutter
 
scanners touchscreen bar code readers
scanners touchscreen bar code readersscanners touchscreen bar code readers
scanners touchscreen bar code readers
 
impact and non impact printers
impact and non impact printers impact and non impact printers
impact and non impact printers
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
2d and 3d cutters
2d and 3d cutters2d and 3d cutters
2d and 3d cutters
 
Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Multiple choice questions chapter 1
Multiple choice questions  chapter 1Multiple choice questions  chapter 1
Multiple choice questions chapter 1
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
 
Class ix ms word part 1
Class ix ms word part 1Class ix ms word part 1
Class ix ms word part 1
 
Word processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updatedWord processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updated
 
Spreadsheet new
Spreadsheet newSpreadsheet new
Spreadsheet new
 
Manupulating and formatting data
Manupulating and formatting dataManupulating and formatting data
Manupulating and formatting data
 

Recently uploaded

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Protect computer from malware

  • 1. PROTECT COMPUTER FROM MALWARE Chapter 6 Computer Security and Ethics
  • 2. • HOW TO PROTECT COMPUTER SYSTEM FROM VIRUS ATTACK There are many ways to protect computer system from virus attacks. Here are some simple steps to protect your computer. • INSTALL FIREWALL A firewall enacts the role of a security guard.
  • 3. INSTALL ANTIVIRUS SOFTWARE It helps to protect the computer from any unauthorized code or software that creates a threat to the system. INSTALL ANTI-SPYWARE SOFTWARE Anti-spyware is a computer program that detects infection on computer and removes them.
  • 4. • The following are common methodologies used for authentication purpose. USERNAME AND PASSWORD • A user name is a name that identifies a person on a computer system. • Username and password are used to authorize users to have access to computer system, e-mail account, bank account and other services available on computer. COMMON METHODOLOGIES USED FOR AUTHENTICATION
  • 5. PERSONAL IDENTIFICATION NUMBER [PIN] • Personal identification number [PIN] is a confidential numeric password used to authenticate a user to get access to computer system. • ACCESS CARD Access cards are very similar in appearance to credit cards. They areused to open security gates, parking barriers and doors of hotel rooms. • BIOMETRICS Biometrics is a method based on measurement of features of face, fingerprints, hand geometry, signature and voice for authentication of individuals.
  • 6. COMPUTER ETHICS • Computer ethics means an acceptable behavior for using computer technology. It is a code of behavior for moral and social issues while using computer technology, particularly internet. Computer use should be honest respect the rights of others on the internet and obey laws that apply online behavior.
  • 7. ETHICAL USE OF COMPUTER • Computer should not be used to harm other people. • Computer user should not break into other’s computer system to steal, change or destroy information. • Computer should not read documents and e- mails of other users without their consent. • People should not commit any type of crime with the help of computer technology. • Computer users should respect the privacy of others.
  • 8. Assignment Solve the following questions : 1. What are common methodologies used for authentication? 2. Define computer ethics and write some important moral guidelines for ethical use of computer technology . 3. Name any three places where authentication of people is required . 4. What types of problems may be faced if computer users do not comply with the moral guidelines of computer ethics? 5. You have learned four common methodologies used for authentication purpose Explain any two of them . 6. Define authorized and unauthorized access with example .
  • 9. Refer Textbook •Review Key points of the chapter Review •Review MCQs