SlideShare a Scribd company logo
SOCIAL IMPACTS
OF IT
SOCIAL IMPACTS OF IT
 Computers and data have became the lifeline of any orgination. If
something goes wrong with them, business almost came to a standstill.
While the word torjan, warm and virus are often used interchangeably,
they are not cxactly the same.Viruses, worms and trojan horses are all
malicious programs that can cause damage to a computer, but there are
some differences between the three.
 Virus
COMPUTER WORMS
TROJANS
MALWARE
SPYWARE.
ANTIVIRUS
HACKER & CRACKER
VIRUS A computer virus is a program or sets of programs that disrupts the
normal functioning on a computer. A virus infects or destroys data.
It enters into a computer without the permission of the user.
 The full form of virus isVital Information Resource Under Seize.
The essential resource of a computer like memory, processing
speed, data and programs are hampered when a virus spreads into
the system.
 Virus programs are self replicating programs which continuously
expand their react by infecting more and more computer files,
resulting in lose of speed and destruction of data
Virus symptoms
1) Deleting or damaging files.
2) Reformatting the hard disk.
3) Showing abnormal write protect errors.
4) Frequent hanging of the system.
5) Decreasing the speed of computer.
Steps to prevent
virus
1) Always install good anti virus program.
2) Always scan the pen drive before copying
files.
3) Do not install pirated software.
4) Scan the hard disk twice a month.
A WORM IS SIMILAR TO A VIRUS IN DESIGN AND IS CONSIDERED TO BE A SUBCLASS OF
A VIRUS. A WORM SPREADS FROM COMPUTER TO COMPUTER, BUT UNLIKE A VIRUS, IT HAS
THE CAPABILITY TO TRAVEL WITHOUT ANY HUMAN ACTION. THE BIGGEST DANGER WITH A
WORM IS ITS CAPABILITY TO DUPLICATE ITSELF ON A SYSTEM. HENCE, RATHER THAN
YOUR COMPUTER SENDING OUT A SINGLE WORM, IT COULD SEND OUT HUNDRED OR
THOUSANDS OF COPIES OF ITSELF, CREATING A HUGE DIVESTING EFFECT. DUE TO THE
COPING NATURE OF A WORM AND ITS CAPABILITY TO TRAVEL ACROSS NETWORKS, THE END
RESULT IN MOST CASES IS HEAVY CONSUMPTION OF SYSTEM MEMORY, CAUSING WEB
SERVERS, NETWORK SERVERS AND INDIVIDUALS COMPUTERS TO STOP RESPONDING. IN
RECENT WORM ATTACK SUCH AS THE MUCH-TALKED- ABOUT BLASTER WORM, THE WORM WAS
DESIGNED TO TUNNEL INTO A SYSTEM AND HOLLOW MALICIOUS USERS TO CONTROL THE
COMPUTER REMOTELY.
COMPUTER WORM
A TROJAN HORSE IN FULL OF TRICKERY AS ITS
NAME REFLECTS. THE TROJAN HORSE, AT FIRST
GLANCE WILL APPEAR BE A USEFUL SOFTWARE BUT
WILL ACTUALLY DAMAGE THE COMPUTER ONCE IT IS
INSTALLED. USERS ON THE RECEIVING END OF A
TROJAN HORSE ARE USUALLY TRICKED INTO
OPENING THEM BECAUSE THEY APPEARS TO BE A
RECEIVING USEFUL SOFTWARE OR FILES FROM A
GENUINE SOURCE. WHEN A TROJAN HORSE IS
ACTIVATED ON A COMPUTER, THE RESULTS CAN
VARY. SOME TROJANS ARE DESIGNED TO BE A MORE
IRRITATING THAN MALICIOUS OR THEY CAN CAUSE
SERIOUS DAMAGE BY DELETING FILES AND
DESTROYING INFORMATION ON A SYSTEM. TROJAN
ARE ALSO KNOWN TO CREATE A BACKDOOR ON A
COMPUTER THAT GIVES AN EASY ACCESS TO
MALICIOUS USERS, THUS ALLOWING YOU
CONFIDENTIAL OR PERSONAL INFORMATION BE
COMPROMISED. UNLIKE VIRUS AND WORMS, TROJANS
DO NOT REPRODUCE BY INFECTING OTHER FILES
NOR DO THEY SELF REPLICATE.
TROJANS
THE TERM MALWARE IS MADE UP OF TWO WORDS, MALICIOUS AND
SOFTWARE. IT IS A SOFTWARE THAT ENTERS INTO A COMPUTER AND
DAMAGE IT WITHOUT THE USERS KNOWLEDGE. MALWARE ARE TROUBLE
CAUSING PROGRAMS. IT MAY BE A VIRUS, WORM, TROJAN HORSE OR
SPYWARE. MALWARE NOT ONLY INTERRUPT THE NORMAL WORKING OF A
COMPUTER BUT ALSO STEAL IMPORTANT INFORMATION.
MALWARE
SPYWARE IS A TYPE OF MALWARE THAT IS INSTALLED ON COMPUTERS
AND COLLECTS INFORMATION ABOUT USERS WITHOUT THEIR KNOWLEDGE.
SPYWARE PROGRAMS SECRETLY MONITOR THE USERS COMPUTING. THEY
CAN COLLECT VARIOUS TYPES OF PERSONAL INFORMATION SUCH AS
INTERNET SURFING HABITS, VISITED WEB PAGES, AND TRANSMIT THIS
INFORMATION IN THE BACKGROUND TO SOMEONE ELSE. THEY CAN ALSO
INTERFERE WITH USERS CONTROL OF THE COMPUTER IN OTHER WAYS,
SUCH AS INSTALLING ADDITIONAL SOFTWARE AND REDIRECTING THE
WEB BROWSER ACTIVITY TO OTHER PAGES. SOMETIMES THEY ALSO
CHANGE THE COMPUTER SETTING THAT RESULTS IN SLOW CONNECTION
SPEED, AND WRONG FUNCTIONALITY OF OTHER PROGRAMS. SPYWARE CAN
ALSO GATHER INFORMATION ABOUT E-MAIL ADDRESSES, PASSWORDS AND
EVEN CREDIT CARD NUMBERS.
Spyware
ANTI-VIRUS SOFTWARE ARE COMPUTER PROGRAMS
WHICH ARE DESIGNED TO IDENTIFY, PREVENT AND
REMOVE VIRUSES FROM A COMPUTER. THEY PERFORM
THE FOLLOWING TASKS IN A COMPUTER :
1) SCAN THE COMPUTER FILES TO LOOK THE KNOWN
VIRUS FROM VIRUS DICTIONARY.
2) IDENTIFY SUSPICIOUS BEHAVIOR FROM ANY
COMPUTER PROGRAM WHICH MIGHT INDICATE
INFECTION.
3) SCAN THE INCOMING E-MAIL WHICH MIGHT CAN
VIRUS IN ATTACHMENT.
SIMPLY INSTALLING A ANTI-VIRUS SOFTWARE IN
OUR COMPUTER DOES NOT GUARANTEE THE 100%
PROTECTION, AS THE INSTALLED ANTI-VIRUS
PROGRAM WOULD NOT BE ABLE TO DETECT ANY NEW
VIRUS PROGRAMS. WE SHOULD UPDATE OUR
COMPUTER WITH THE LATEST VERSIONS OF ANTI-
VIRUS DEFINITION. MOST OF THE ANTI-VIRUS
SOFTWARE COMPANIES PROVIDE THE FACILITY TO
DOWNLOAD THE LATEST UPDATES FROM THEIR
WEBSITES.
ANTI-VIRUS
HACKER
HACKERS ARE HIGHLY TECHNICAL PEOPLE WHO
SECRETLY BREAK INTO COMPUTERS TO STEAL
IMPORTANT DATA OR SOMETIMES TO DESTROY IT.
HACKER NOT ONLY STEAL THE IMPORTANT DATA BUT
ALSO HACK APPLICATIONS AND WEBSITES TO
CHANGE THE PROGRAMS LOGOS. HACKERS USUALLY
TEMPER WITH DATA FOR UNETHICAL PURPOSES,
JUST FOR OBSESSION TO BREAK SYSTEM
SECURITIES. ALTHOUGH HACKING IS DONE WITHOUT
ANY CONSENT FOR THE USERS, BUT IT IS NOT
ALWAYS DESTRUCTITIVE. HACKING WHICH IS DONE
FOR GOOD CAUSE SUCH AS NATIONAL SECURITY
ETC. IS KNOWN AS ETHICAL HACKING.
ANKIT FADIA IS WELL KNOWN ETHICAL HACKER
FROM INDIA.
HACKER & CRACKER
PRESENTED BY-
AMIT JAGLAN
Thank You

More Related Content

What's hot

Malware
MalwareMalware
Malware
Tuhin_Das
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
Mahamudul Hassan Niaz
 
Sowmya
SowmyaSowmya
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
Acageron
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
Putta Keyboard
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
Dom Mike
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
Buffalo Seminary
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
RobC76
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
San Diego Continuing Education
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Worm
WormWorm
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
Tejas Kolge
 
Malware
MalwareMalware
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
Ghazanfar Latif (Gabe)
 

What's hot (20)

Malware
MalwareMalware
Malware
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Sowmya
SowmyaSowmya
Sowmya
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Worm
WormWorm
Worm
 
Virus & Worms(20120628)
Virus & Worms(20120628)Virus & Worms(20120628)
Virus & Worms(20120628)
 
Malware
MalwareMalware
Malware
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 

Viewers also liked

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
ICT Training Municipality of Imus
ICT Training Municipality of ImusICT Training Municipality of Imus
ICT Training Municipality of Imus
Gener Luis Morada
 
G.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless OfficeG.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless Office
Gener Luis Morada
 
Social impacts of it
Social impacts of itSocial impacts of it
Social impacts of it
Deepansh Goel
 
Technology Vs Nature
Technology Vs NatureTechnology Vs Nature
Technology Vs Nature
Androo
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.
Monica Khatri
 
Impacts of social media
Impacts of social mediaImpacts of social media
Impacts of social media
HaxNain BalGhari
 
Role of information technology on environment and human health
Role of information technology on environment and human healthRole of information technology on environment and human health
Role of information technology on environment and human health
Roger Gomes
 
Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technology
Rimple Darra
 
Seminar
SeminarSeminar
Seminar
Navjyot Singh
 
Information Technology
Information TechnologyInformation Technology
Information Technology
Viraj Kansara
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the Future
Melanie Swan
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt
Babasab Patil
 
Impact of ict in education
Impact of ict in educationImpact of ict in education
Impact of ict in education
Sanika Deshmukh
 
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIAThesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Seun Otukoya
 

Viewers also liked (15)

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
ICT Training Municipality of Imus
ICT Training Municipality of ImusICT Training Municipality of Imus
ICT Training Municipality of Imus
 
G.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless OfficeG.ho.st Cloud Computing Paperless Office
G.ho.st Cloud Computing Paperless Office
 
Social impacts of it
Social impacts of itSocial impacts of it
Social impacts of it
 
Technology Vs Nature
Technology Vs NatureTechnology Vs Nature
Technology Vs Nature
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.
 
Impacts of social media
Impacts of social mediaImpacts of social media
Impacts of social media
 
Role of information technology on environment and human health
Role of information technology on environment and human healthRole of information technology on environment and human health
Role of information technology on environment and human health
 
Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technology
 
Seminar
SeminarSeminar
Seminar
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Blockchain: The Information Technology of the Future
Blockchain: The Information Technology of the FutureBlockchain: The Information Technology of the Future
Blockchain: The Information Technology of the Future
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt
 
Impact of ict in education
Impact of ict in educationImpact of ict in education
Impact of ict in education
 
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIAThesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
 

Similar to Social impacts of it

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
actanimation
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
Computer Science
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
SiddeshGowda8
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Aman Chaudhary
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
Mahmud Hasan Tanvir
 
Computervirus
ComputervirusComputervirus
Computervirus
kishan alagiya
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
Malware
MalwareMalware
Computer virus
Computer virusComputer virus
Computer virus
karniksingh
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
Athena Catindig
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
Dr. Mazin Mohamed alkathiri
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Virus
VirusVirus
Virus
dddaou
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 

Similar to Social impacts of it (20)

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 

More from Amit Jaglan

Carbohydrates
CarbohydratesCarbohydrates
Carbohydrates
Amit Jaglan
 
Carbohydrates 130513135303-phpapp01
Carbohydrates 130513135303-phpapp01Carbohydrates 130513135303-phpapp01
Carbohydrates 130513135303-phpapp01
Amit Jaglan
 
Tourism in india (indian tourism)
Tourism in india (indian tourism)Tourism in india (indian tourism)
Tourism in india (indian tourism)
Amit Jaglan
 
Qualities of leadership & leadership skills
Qualities of leadership & leadership skillsQualities of leadership & leadership skills
Qualities of leadership & leadership skills
Amit Jaglan
 
Parts of a computer
Parts of a computerParts of a computer
Parts of a computer
Amit Jaglan
 
Mcq (questions) of physics science (part 1)
Mcq (questions) of physics science (part 1)Mcq (questions) of physics science (part 1)
Mcq (questions) of physics science (part 1)
Amit Jaglan
 
Leadership(qualities of leadership)
Leadership(qualities of leadership)Leadership(qualities of leadership)
Leadership(qualities of leadership)
Amit Jaglan
 
Electromagnetics
ElectromagneticsElectromagnetics
Electromagnetics
Amit Jaglan
 
Leadership & leadership skills
Leadership & leadership skillsLeadership & leadership skills
Leadership & leadership skills
Amit Jaglan
 
Introduction to computer
Introduction  to computerIntroduction  to computer
Introduction to computer
Amit Jaglan
 

More from Amit Jaglan (10)

Carbohydrates
CarbohydratesCarbohydrates
Carbohydrates
 
Carbohydrates 130513135303-phpapp01
Carbohydrates 130513135303-phpapp01Carbohydrates 130513135303-phpapp01
Carbohydrates 130513135303-phpapp01
 
Tourism in india (indian tourism)
Tourism in india (indian tourism)Tourism in india (indian tourism)
Tourism in india (indian tourism)
 
Qualities of leadership & leadership skills
Qualities of leadership & leadership skillsQualities of leadership & leadership skills
Qualities of leadership & leadership skills
 
Parts of a computer
Parts of a computerParts of a computer
Parts of a computer
 
Mcq (questions) of physics science (part 1)
Mcq (questions) of physics science (part 1)Mcq (questions) of physics science (part 1)
Mcq (questions) of physics science (part 1)
 
Leadership(qualities of leadership)
Leadership(qualities of leadership)Leadership(qualities of leadership)
Leadership(qualities of leadership)
 
Electromagnetics
ElectromagneticsElectromagnetics
Electromagnetics
 
Leadership & leadership skills
Leadership & leadership skillsLeadership & leadership skills
Leadership & leadership skills
 
Introduction to computer
Introduction  to computerIntroduction  to computer
Introduction to computer
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

Social impacts of it

  • 2. SOCIAL IMPACTS OF IT  Computers and data have became the lifeline of any orgination. If something goes wrong with them, business almost came to a standstill. While the word torjan, warm and virus are often used interchangeably, they are not cxactly the same.Viruses, worms and trojan horses are all malicious programs that can cause damage to a computer, but there are some differences between the three.  Virus COMPUTER WORMS TROJANS MALWARE SPYWARE. ANTIVIRUS HACKER & CRACKER
  • 3. VIRUS A computer virus is a program or sets of programs that disrupts the normal functioning on a computer. A virus infects or destroys data. It enters into a computer without the permission of the user.  The full form of virus isVital Information Resource Under Seize. The essential resource of a computer like memory, processing speed, data and programs are hampered when a virus spreads into the system.  Virus programs are self replicating programs which continuously expand their react by infecting more and more computer files, resulting in lose of speed and destruction of data
  • 4. Virus symptoms 1) Deleting or damaging files. 2) Reformatting the hard disk. 3) Showing abnormal write protect errors. 4) Frequent hanging of the system. 5) Decreasing the speed of computer. Steps to prevent virus 1) Always install good anti virus program. 2) Always scan the pen drive before copying files. 3) Do not install pirated software. 4) Scan the hard disk twice a month.
  • 5. A WORM IS SIMILAR TO A VIRUS IN DESIGN AND IS CONSIDERED TO BE A SUBCLASS OF A VIRUS. A WORM SPREADS FROM COMPUTER TO COMPUTER, BUT UNLIKE A VIRUS, IT HAS THE CAPABILITY TO TRAVEL WITHOUT ANY HUMAN ACTION. THE BIGGEST DANGER WITH A WORM IS ITS CAPABILITY TO DUPLICATE ITSELF ON A SYSTEM. HENCE, RATHER THAN YOUR COMPUTER SENDING OUT A SINGLE WORM, IT COULD SEND OUT HUNDRED OR THOUSANDS OF COPIES OF ITSELF, CREATING A HUGE DIVESTING EFFECT. DUE TO THE COPING NATURE OF A WORM AND ITS CAPABILITY TO TRAVEL ACROSS NETWORKS, THE END RESULT IN MOST CASES IS HEAVY CONSUMPTION OF SYSTEM MEMORY, CAUSING WEB SERVERS, NETWORK SERVERS AND INDIVIDUALS COMPUTERS TO STOP RESPONDING. IN RECENT WORM ATTACK SUCH AS THE MUCH-TALKED- ABOUT BLASTER WORM, THE WORM WAS DESIGNED TO TUNNEL INTO A SYSTEM AND HOLLOW MALICIOUS USERS TO CONTROL THE COMPUTER REMOTELY. COMPUTER WORM
  • 6. A TROJAN HORSE IN FULL OF TRICKERY AS ITS NAME REFLECTS. THE TROJAN HORSE, AT FIRST GLANCE WILL APPEAR BE A USEFUL SOFTWARE BUT WILL ACTUALLY DAMAGE THE COMPUTER ONCE IT IS INSTALLED. USERS ON THE RECEIVING END OF A TROJAN HORSE ARE USUALLY TRICKED INTO OPENING THEM BECAUSE THEY APPEARS TO BE A RECEIVING USEFUL SOFTWARE OR FILES FROM A GENUINE SOURCE. WHEN A TROJAN HORSE IS ACTIVATED ON A COMPUTER, THE RESULTS CAN VARY. SOME TROJANS ARE DESIGNED TO BE A MORE IRRITATING THAN MALICIOUS OR THEY CAN CAUSE SERIOUS DAMAGE BY DELETING FILES AND DESTROYING INFORMATION ON A SYSTEM. TROJAN ARE ALSO KNOWN TO CREATE A BACKDOOR ON A COMPUTER THAT GIVES AN EASY ACCESS TO MALICIOUS USERS, THUS ALLOWING YOU CONFIDENTIAL OR PERSONAL INFORMATION BE COMPROMISED. UNLIKE VIRUS AND WORMS, TROJANS DO NOT REPRODUCE BY INFECTING OTHER FILES NOR DO THEY SELF REPLICATE. TROJANS
  • 7. THE TERM MALWARE IS MADE UP OF TWO WORDS, MALICIOUS AND SOFTWARE. IT IS A SOFTWARE THAT ENTERS INTO A COMPUTER AND DAMAGE IT WITHOUT THE USERS KNOWLEDGE. MALWARE ARE TROUBLE CAUSING PROGRAMS. IT MAY BE A VIRUS, WORM, TROJAN HORSE OR SPYWARE. MALWARE NOT ONLY INTERRUPT THE NORMAL WORKING OF A COMPUTER BUT ALSO STEAL IMPORTANT INFORMATION. MALWARE
  • 8. SPYWARE IS A TYPE OF MALWARE THAT IS INSTALLED ON COMPUTERS AND COLLECTS INFORMATION ABOUT USERS WITHOUT THEIR KNOWLEDGE. SPYWARE PROGRAMS SECRETLY MONITOR THE USERS COMPUTING. THEY CAN COLLECT VARIOUS TYPES OF PERSONAL INFORMATION SUCH AS INTERNET SURFING HABITS, VISITED WEB PAGES, AND TRANSMIT THIS INFORMATION IN THE BACKGROUND TO SOMEONE ELSE. THEY CAN ALSO INTERFERE WITH USERS CONTROL OF THE COMPUTER IN OTHER WAYS, SUCH AS INSTALLING ADDITIONAL SOFTWARE AND REDIRECTING THE WEB BROWSER ACTIVITY TO OTHER PAGES. SOMETIMES THEY ALSO CHANGE THE COMPUTER SETTING THAT RESULTS IN SLOW CONNECTION SPEED, AND WRONG FUNCTIONALITY OF OTHER PROGRAMS. SPYWARE CAN ALSO GATHER INFORMATION ABOUT E-MAIL ADDRESSES, PASSWORDS AND EVEN CREDIT CARD NUMBERS. Spyware
  • 9. ANTI-VIRUS SOFTWARE ARE COMPUTER PROGRAMS WHICH ARE DESIGNED TO IDENTIFY, PREVENT AND REMOVE VIRUSES FROM A COMPUTER. THEY PERFORM THE FOLLOWING TASKS IN A COMPUTER : 1) SCAN THE COMPUTER FILES TO LOOK THE KNOWN VIRUS FROM VIRUS DICTIONARY. 2) IDENTIFY SUSPICIOUS BEHAVIOR FROM ANY COMPUTER PROGRAM WHICH MIGHT INDICATE INFECTION. 3) SCAN THE INCOMING E-MAIL WHICH MIGHT CAN VIRUS IN ATTACHMENT. SIMPLY INSTALLING A ANTI-VIRUS SOFTWARE IN OUR COMPUTER DOES NOT GUARANTEE THE 100% PROTECTION, AS THE INSTALLED ANTI-VIRUS PROGRAM WOULD NOT BE ABLE TO DETECT ANY NEW VIRUS PROGRAMS. WE SHOULD UPDATE OUR COMPUTER WITH THE LATEST VERSIONS OF ANTI- VIRUS DEFINITION. MOST OF THE ANTI-VIRUS SOFTWARE COMPANIES PROVIDE THE FACILITY TO DOWNLOAD THE LATEST UPDATES FROM THEIR WEBSITES. ANTI-VIRUS
  • 10. HACKER HACKERS ARE HIGHLY TECHNICAL PEOPLE WHO SECRETLY BREAK INTO COMPUTERS TO STEAL IMPORTANT DATA OR SOMETIMES TO DESTROY IT. HACKER NOT ONLY STEAL THE IMPORTANT DATA BUT ALSO HACK APPLICATIONS AND WEBSITES TO CHANGE THE PROGRAMS LOGOS. HACKERS USUALLY TEMPER WITH DATA FOR UNETHICAL PURPOSES, JUST FOR OBSESSION TO BREAK SYSTEM SECURITIES. ALTHOUGH HACKING IS DONE WITHOUT ANY CONSENT FOR THE USERS, BUT IT IS NOT ALWAYS DESTRUCTITIVE. HACKING WHICH IS DONE FOR GOOD CAUSE SUCH AS NATIONAL SECURITY ETC. IS KNOWN AS ETHICAL HACKING. ANKIT FADIA IS WELL KNOWN ETHICAL HACKER FROM INDIA. HACKER & CRACKER