Interactive Powerpoint_How to Master effective communication
Computer Virus & Malware Guide
1. 1
Computer Virus
Computer viruses are small software programs that are designed to spread from
one computer to another and to interfere with computer operation. A virus might
corrupt or delete data on your computer, use your e-mail program to spread itself
to other computers, or even erase everything on your hard disk. Viruses often
perform some type of harmful activity on infected hosts, such as stealing hard disk
space or CPU time, accessing private information, corrupting data, increasing
maintenance cost etc. Viruses are most easily spread by attachments in e-mail
messages or instant messaging messages. Viruses also spread through downloads
on the Internet. They can be hidden in illicit software or other files or programs you
might download.
Malware
Malware (for “malicious software”) is any program or file that is harmful to a
computer user. Malware is a term for any software that gets installed on your
machine and performs unwanted tasks, often for some third party’s benefit.
Malware programs can range from being simple pop-up advertising to causing
serious computer invasion and the damage (eg. Stealing passwords and data or
infecting other machines on the network). Some malware provides no uninstall
option, and installs code in unexpected and hidden places (eg. Windows registry) or
modifies the operating system, thus making it more difficult to remove.
Spyware
A program written to monitor your action on a computer. A common type of
spyware is a key-logger program. This program can record every key stroke and
mouse click you make. Spyware can be delivered via a Trojan horse program.
Trojan horse
A program written to deliver a malicious program that may then cause
destruction to your computer. A Trojan horse is delivered by someone or hidden
within another program that may seem harmless.
2. 2
Adware
Adware is any software application in which advertising banners are displayed
while a program is running. The ads are delivered through pop-up windows or bars
that appear on the program's user interface. Adware is commonly created for
computers, but may also be found on mobile devices.
Preventive measures- (Firewall, antivirus software)
How to prevent computer viruses
Install a reliable antivirus program
Avoid suspicious websites
Never Open Email attachments without scanning them first.
Setup automatic scans
Stay away from cracked software
Install a firewall
Firewall
A firewall is a system designed to prevent unauthorized access to or from a
private network. Firewall can be implemented in both software and hardware.
Firewalls are frequently used to prevent unauthorized internet users from accessing
private networks connected to the Internet. All messages entering or leaving the
intranet pass through the firewall, which examines each message and blocks those
that do not meet the specified security criteria. Firewall is a network security system
that monitors and controls the incoming and outgoing network traffic based on
predetermined security rules.
Eg. Zone Alarm firewall, Shardaccess, Mpssvc, Lptables etc.
Antivirus Software
Antivirus software is a program or set of programs that are designed to
prevent, search for, detect and remove software viruses and other malicious
3. 3
software like worms, Trojans, adware and more. These tools are critical for users to
have installed and up-to-date because a computer without antivirus software
installed will be infected within minutes of connecting to the internet. There are
several different companies that build and offer antivirus software and what each
offers can vary but all perform some basic functions:
1. Scan specific files or directories for any malware or known malicious patterns
2. Allow you to schedule scans to automatically run for you
3. Allow you to initiate a scan of a specific file or of your computer, or of a CD or
flash drive at any time.
4. Remove any malicious code detected
Cyber privacy and password protection
Cyber Privacy
Privacy is our right to control what happens with personal information about
us.
Internet privacy violation risks may be minimized as follows:
• Always use preventative s/w applications such as Anti-virus anti-malware.
• Avoid shopping on unreliable websites
• Avoid exposing personal data on websites with lower security levels
• Clear the browser’s cache and browsing history on a consistent basis
• Always use very strong passwords consisting of letters numerals and special
characters.
Passwordprotection
• Never give out your password to any one
• Don’t just use one password
• Create password that easy to remember but hard to others guess.
• Make the password at least 8 characters long
4. 4
• Include numbers capital letters and symbols
• Don’t fall the phishing attack
Legal and ethical issues
Copyright
The exclusive right given by law for a certain term of years to an author,
composer etc. to print, publish and sell copies of his original work. Copyright allows
authors, musicians, artists etc. to make money of their labor. It also prevents people
from altering the work without permission. Copyright law can be protected, literary
work, musical work, Dramatic work, Choreographic work, pictorial, graphic,
sculptural works, motion pictures, AV, Sound recording, architectural works. It give
the copyright holders to reproduce the work, right to prepare derivative works,
right to distribute copies for sale, right to prepare AV work publicly, right to display
musical and artistic works publicly.
Creative Common License
A Creative Commons (CC) license is one of several public copy right
licenses that enable the free distribution of an otherwise copyrighted "work". A CC
license is used when an author wants to give other people the right to share, use,
and build upon a work that they (the author) have created.
Plagiarism
Plagiarism is the "wrongful appropriation" and "stealing and publication" of
another author's "language, thoughts, ideas, or expressions" and the representation
of them as one's own original work. Plagiarism is the act of taking another person’s
writing, conversation, song or even idea and passing it off as your own. This includes
information from web pages, books, songs, television shows, email messages,
interviews, articles, artworks or any other medium. Whenever you paraphrase,
summarize, words, phrases or sentence from another person’s work, it is necessary
to indicate the source of the information within your paper using an internal
citation.
5. 5
Hacking
The process of attempting to gain or successfully gaining unauthorized access
to computer resources for the purpose of help or secure system is called hacking.
Hacking is the technique in which any one can access and one’s computer without
his permission. A hacker knows all about the operating system and different holes in
the system. Computer hacking is when files on your computer are view created or
edited without your authorization. Hacker can gain complete access to your
computer from any were in the world if your computer is turned on, unprotected
and has an internet connection.
1. White-Hat Hackers
The good guys who identify the security weakness of the system or network
and inform the owner about them. A white hat hacker’s breaks security for no-
malicious reasons, perhaps to test their own security system or while working in
a security company which makes security software. White-hat hacker is also
referred to as the ethical hacker.
2. Black Hat Hackers
A black hat hacker is the villain or bad guy, who crash into victim’s security to
steal information and destroy the victim’s security network. Black hat hacker is
also known as cracker. Black hat hacker break into secure networks to destroy
data.
3. Grey Hat Hackers
Grey hat hacker is the combination of black hat hacker and white hat hacker. A
grey hat hacker may surf the internet and hack into a computer system for the
sole purpose of notifying the administrator that their system has a security
defect. Then they may offer correct the defect for a fee.
6. 6
Netiquette
Netiquette is short for "Internet etiquette." Just like etiquette is a code of
polite behavior in society, netiquette is a code of good behavior on the Internet.
This includes several aspects of the Internet, such as email, social media, online
chat, web forums, website comments, multiplayer gaming, and other types of
online communication. There are ten rules of netiquette that everyone who goes
online should follow
• Remember the Human
• Adhere to the same standards online that you follow in real life
• Know where you are in cyberspace
• Respect other people’s time
• Make yourself look good online
• Share expert knowledge
• Help keep flame wars under control
• Respect other people’s privacy
• Don’t abuse your power
• Be forgiving of other people’s mistakes
Phishing
Phishing is a fraudulent attempt, usually made through email, to steal your
personal information. Phishing emails usually appear to come from a well- known
organization and ask for your personal information- such as credit card number,
social security number, account number or password.
Prevent phishing attacks
Do not reply to emails that request financial information, even if ti appears to
be from a trusted source
Do not reply to emails from unrecognized senders.
7. 7
Do not open any links in suspicious emails, instant messages, or chat-room
messages.
Only communicate personal information over the phone or through a secure
website.
Never use email to share personal information.
Avoid using email on public computers.
Don’t click anything in pop-up windows.
Use security programs to protect your computer.
Check your credit report and financial statements regularly
Software piracy
Unauthorized copying or distribution of copyrighted software. It is done by
copying, downloading, sharing, selling or installing multiple copies onto personal or
work computers. A term used to describe the act of illegally using, copying or
distributing software without ownership or legal rights. The majority of software
today is purchased as an one-site license, meaning that only one computer may
have that software installed on it at one time. Copying that software to multiple
computers or sharing it with your friend without multiple Licenses is considered
software piracy, which is illegal. Under the Indian Copyright Act, a software pirate
can be tried under both civil and criminal law. The minimum jail term for software
copyright infringement is seven days and the maximum jail term is three years.
Statutory fines range from a minimum of 50,000 to a maximum of 200000 rupees.
Software privacy
Privacy software is software built to protect the privacy of its users. The
software typically works in conjunction with Internet usage to control or limit the
amount of information made available to third parties. The software can
apply encryption or filtering of various kinds. Privacy software can refer to two
different types of protection. One type is protecting a user's Internet privacy from
the World Wide Web. There are software products that will mask or hide a user's IP
address from the outside world in order to protect the user from identity theft. The
second type of protection is hiding or deleting the users Internet traces that are left
8. 8
on their PC after they have been surfing the Internet. There is software that will
erase all the users Internet traces and there is software that will hide and encrypt a
user's traces so that others using their PC will not know where they have been
surfing.
Cyber law- IT Act 2000,IT Act 2008
Cyber law is the law for regulating controlling and governing cyber space.
Cyber space includes computers network, software, data storage devices, Internet,
websites email and other electronic devices such as mobile phone ATM machines
etc. The Information technology Act 2000 passed by Indian parliament on 17
October 2000.The original act contained in 94 sections, divided in 13 chapters and 4
schedules.
Section Offence Penalty
65 Tampering with computer
source documents
Imprisonment up to three years or/and with
fine up to Rs.200000
66 Hacking with computer
system
Imprisonment up to three years or/and with
fine up to Rs.500000
66A Sending offensive messages **24th
march 2015 SC cancelled this section
66B Receiving stolen computer or
communication device
Imprisonment up to three years or/and with
fine up to Rs.100000
66C Using password of another
person
Imprisonment up to three years or/and with
fine up to Rs.100000
66D Cheating using computer
resource
Imprisonment up to three years or/and with
fine up to Rs.100000
66E Publishing private images of
others
Imprisonment up to three years or/and with
fine up to Rs.200000
66F Acts of cyber terrorism Imprisonment up to life.
67 Publishing information which
is obscene in electronic form
Imprisonment up to five years or/and with
fine up to Rs.1000000
9. 9
67A Publishing images containing
sexual acts
Imprisonment up to seven years or/and
with fine up to Rs.1000000
67B Publishing Child porn or
predating children online
Imprisonment up to five years or/and with
fine up to Rs.1000000 on first conviction.
Imprisonment up to seven years or/and
with fine up to Rs.1000000 on second
conviction.
67C Failure to maintain records Imprisonment up to three years or/and with
fine
68 Failure/refusal to comply
with orders
Imprisonment up to three years or/and with
fine up to Rs.200000
69 Failure/refusal to decrypt
data
Imprisonment up to seven years and
possible fine
70 Securing access or
attempting to secure access
to a protected system
Imprisonment up to tenyears or/and with
fine
71 Misrepresentation Imprisonment up to three years or/and with
fine up to Rs.100000
IT Act 2008
The information technology Amendment Act, 2008(IT Act 2008) is a
substantial addition to India’s Information Technology Act 2000. In the 2008 version
of the act there are 124 sections and 14 chapters. The IT Amendment Act was
passed by the Indian parliament in October 2008 and came into force a year later.
The Act is administered by the Indian Computer Emergency Response Team (CERT-
In). The original Act was developed to promote the IT industry, regulate e-
commerce, facilitate e-governance and prevent cybercrimes. The Amendment has
been criticized for decreasing the penalties for some cybercrimes and for lacking
sufficient safeguards to protect the civil rights of individuals.
10. 10
Morphing
Short for metamorphosing, morphing refers to an animation technique in
which one image is gradually turned into another. Many advanced animation
programs support some type of morphing feature. Morphing is editing the original
picture by unauthorized user or fake identity. It was identified that female’s pictures
are downloaded by fake users and again re-posted/uploaded on different websites
by creating fake profiles after editing it.
Pornography
Porn is the abbreviation for pornography, which is sexual material that is
explicitly portrayed for the primary purpose of sexual arousal. Sexually explicit
material can be presented in a variety of ways, including magazines, photographs,
Films, writings, sculptures, animation, sound recordings and video games. The
effects of pornography have a tremendous amount of negative outcomes. Some
research has shown that viewing/using pornography has an influence on domestic
violence, sexual dysfunction, rape, difficulties with a sexual relationship and child
sexual abuse.
Health hazards of using computer
Repetitive Strain Injury(RSI) in Wrists and Hands
Typing and using a mouse for long periods are common causes of RSI in
the wrist (it is often called carpal-tunnel syndrome)
1. Use a wrist-rest to support the wrists while typing and when using the
mouse
2. Take regular break from typing or using the mouse
Back and Neck Ache
People suffer from back and neck pain after working at a computer for a
long time. This is usually due to them having a bad sitting posture.
1. Use an adjustable, ergonomic chair and take the time to set it up
properly.
11. 11
2. The computer keyboard and monitor should be at the correct height for
the seated person (keyboard lower than the elbow, top of monitor at eye
level)
3. Take regular breaks: get up, walk around, stretch your muscles
Eye-Strain
This is caused by looking at a monitor which is a constant distance away.
The muscles that focus your eyes do not move, so get tired and painful. Eye-
strain can also causes headaches.
1. Look away from the monitor at regular Intervals refocus on distant or
close objects to exercise the muscles in the eye.
2. Use an anti-glare filter in front of the monitor to cut down on screen
reflections that can also tire the eyes.