SlideShare a Scribd company logo
1 of 11
1
Computer Virus
Computer viruses are small software programs that are designed to spread from
one computer to another and to interfere with computer operation. A virus might
corrupt or delete data on your computer, use your e-mail program to spread itself
to other computers, or even erase everything on your hard disk. Viruses often
perform some type of harmful activity on infected hosts, such as stealing hard disk
space or CPU time, accessing private information, corrupting data, increasing
maintenance cost etc. Viruses are most easily spread by attachments in e-mail
messages or instant messaging messages. Viruses also spread through downloads
on the Internet. They can be hidden in illicit software or other files or programs you
might download.
Malware
Malware (for “malicious software”) is any program or file that is harmful to a
computer user. Malware is a term for any software that gets installed on your
machine and performs unwanted tasks, often for some third party’s benefit.
Malware programs can range from being simple pop-up advertising to causing
serious computer invasion and the damage (eg. Stealing passwords and data or
infecting other machines on the network). Some malware provides no uninstall
option, and installs code in unexpected and hidden places (eg. Windows registry) or
modifies the operating system, thus making it more difficult to remove.
Spyware
A program written to monitor your action on a computer. A common type of
spyware is a key-logger program. This program can record every key stroke and
mouse click you make. Spyware can be delivered via a Trojan horse program.
Trojan horse
A program written to deliver a malicious program that may then cause
destruction to your computer. A Trojan horse is delivered by someone or hidden
within another program that may seem harmless.
2
Adware
Adware is any software application in which advertising banners are displayed
while a program is running. The ads are delivered through pop-up windows or bars
that appear on the program's user interface. Adware is commonly created for
computers, but may also be found on mobile devices.
Preventive measures- (Firewall, antivirus software)
How to prevent computer viruses
 Install a reliable antivirus program
 Avoid suspicious websites
 Never Open Email attachments without scanning them first.
 Setup automatic scans
 Stay away from cracked software
 Install a firewall
Firewall
A firewall is a system designed to prevent unauthorized access to or from a
private network. Firewall can be implemented in both software and hardware.
Firewalls are frequently used to prevent unauthorized internet users from accessing
private networks connected to the Internet. All messages entering or leaving the
intranet pass through the firewall, which examines each message and blocks those
that do not meet the specified security criteria. Firewall is a network security system
that monitors and controls the incoming and outgoing network traffic based on
predetermined security rules.
Eg. Zone Alarm firewall, Shardaccess, Mpssvc, Lptables etc.
Antivirus Software
Antivirus software is a program or set of programs that are designed to
prevent, search for, detect and remove software viruses and other malicious
3
software like worms, Trojans, adware and more. These tools are critical for users to
have installed and up-to-date because a computer without antivirus software
installed will be infected within minutes of connecting to the internet. There are
several different companies that build and offer antivirus software and what each
offers can vary but all perform some basic functions:
1. Scan specific files or directories for any malware or known malicious patterns
2. Allow you to schedule scans to automatically run for you
3. Allow you to initiate a scan of a specific file or of your computer, or of a CD or
flash drive at any time.
4. Remove any malicious code detected
Cyber privacy and password protection
Cyber Privacy
Privacy is our right to control what happens with personal information about
us.
Internet privacy violation risks may be minimized as follows:
• Always use preventative s/w applications such as Anti-virus anti-malware.
• Avoid shopping on unreliable websites
• Avoid exposing personal data on websites with lower security levels
• Clear the browser’s cache and browsing history on a consistent basis
• Always use very strong passwords consisting of letters numerals and special
characters.
Passwordprotection
• Never give out your password to any one
• Don’t just use one password
• Create password that easy to remember but hard to others guess.
• Make the password at least 8 characters long
4
• Include numbers capital letters and symbols
• Don’t fall the phishing attack
Legal and ethical issues
Copyright
The exclusive right given by law for a certain term of years to an author,
composer etc. to print, publish and sell copies of his original work. Copyright allows
authors, musicians, artists etc. to make money of their labor. It also prevents people
from altering the work without permission. Copyright law can be protected, literary
work, musical work, Dramatic work, Choreographic work, pictorial, graphic,
sculptural works, motion pictures, AV, Sound recording, architectural works. It give
the copyright holders to reproduce the work, right to prepare derivative works,
right to distribute copies for sale, right to prepare AV work publicly, right to display
musical and artistic works publicly.
Creative Common License
A Creative Commons (CC) license is one of several public copy right
licenses that enable the free distribution of an otherwise copyrighted "work". A CC
license is used when an author wants to give other people the right to share, use,
and build upon a work that they (the author) have created.
Plagiarism
Plagiarism is the "wrongful appropriation" and "stealing and publication" of
another author's "language, thoughts, ideas, or expressions" and the representation
of them as one's own original work. Plagiarism is the act of taking another person’s
writing, conversation, song or even idea and passing it off as your own. This includes
information from web pages, books, songs, television shows, email messages,
interviews, articles, artworks or any other medium. Whenever you paraphrase,
summarize, words, phrases or sentence from another person’s work, it is necessary
to indicate the source of the information within your paper using an internal
citation.
5
Hacking
The process of attempting to gain or successfully gaining unauthorized access
to computer resources for the purpose of help or secure system is called hacking.
Hacking is the technique in which any one can access and one’s computer without
his permission. A hacker knows all about the operating system and different holes in
the system. Computer hacking is when files on your computer are view created or
edited without your authorization. Hacker can gain complete access to your
computer from any were in the world if your computer is turned on, unprotected
and has an internet connection.
1. White-Hat Hackers
The good guys who identify the security weakness of the system or network
and inform the owner about them. A white hat hacker’s breaks security for no-
malicious reasons, perhaps to test their own security system or while working in
a security company which makes security software. White-hat hacker is also
referred to as the ethical hacker.
2. Black Hat Hackers
A black hat hacker is the villain or bad guy, who crash into victim’s security to
steal information and destroy the victim’s security network. Black hat hacker is
also known as cracker. Black hat hacker break into secure networks to destroy
data.
3. Grey Hat Hackers
Grey hat hacker is the combination of black hat hacker and white hat hacker. A
grey hat hacker may surf the internet and hack into a computer system for the
sole purpose of notifying the administrator that their system has a security
defect. Then they may offer correct the defect for a fee.
6
Netiquette
Netiquette is short for "Internet etiquette." Just like etiquette is a code of
polite behavior in society, netiquette is a code of good behavior on the Internet.
This includes several aspects of the Internet, such as email, social media, online
chat, web forums, website comments, multiplayer gaming, and other types of
online communication. There are ten rules of netiquette that everyone who goes
online should follow
• Remember the Human
• Adhere to the same standards online that you follow in real life
• Know where you are in cyberspace
• Respect other people’s time
• Make yourself look good online
• Share expert knowledge
• Help keep flame wars under control
• Respect other people’s privacy
• Don’t abuse your power
• Be forgiving of other people’s mistakes
Phishing
Phishing is a fraudulent attempt, usually made through email, to steal your
personal information. Phishing emails usually appear to come from a well- known
organization and ask for your personal information- such as credit card number,
social security number, account number or password.
Prevent phishing attacks
 Do not reply to emails that request financial information, even if ti appears to
be from a trusted source
 Do not reply to emails from unrecognized senders.
7
 Do not open any links in suspicious emails, instant messages, or chat-room
messages.
 Only communicate personal information over the phone or through a secure
website.
 Never use email to share personal information.
 Avoid using email on public computers.
 Don’t click anything in pop-up windows.
 Use security programs to protect your computer.
 Check your credit report and financial statements regularly
Software piracy
Unauthorized copying or distribution of copyrighted software. It is done by
copying, downloading, sharing, selling or installing multiple copies onto personal or
work computers. A term used to describe the act of illegally using, copying or
distributing software without ownership or legal rights. The majority of software
today is purchased as an one-site license, meaning that only one computer may
have that software installed on it at one time. Copying that software to multiple
computers or sharing it with your friend without multiple Licenses is considered
software piracy, which is illegal. Under the Indian Copyright Act, a software pirate
can be tried under both civil and criminal law. The minimum jail term for software
copyright infringement is seven days and the maximum jail term is three years.
Statutory fines range from a minimum of 50,000 to a maximum of 200000 rupees.
Software privacy
Privacy software is software built to protect the privacy of its users. The
software typically works in conjunction with Internet usage to control or limit the
amount of information made available to third parties. The software can
apply encryption or filtering of various kinds. Privacy software can refer to two
different types of protection. One type is protecting a user's Internet privacy from
the World Wide Web. There are software products that will mask or hide a user's IP
address from the outside world in order to protect the user from identity theft. The
second type of protection is hiding or deleting the users Internet traces that are left
8
on their PC after they have been surfing the Internet. There is software that will
erase all the users Internet traces and there is software that will hide and encrypt a
user's traces so that others using their PC will not know where they have been
surfing.
Cyber law- IT Act 2000,IT Act 2008
Cyber law is the law for regulating controlling and governing cyber space.
Cyber space includes computers network, software, data storage devices, Internet,
websites email and other electronic devices such as mobile phone ATM machines
etc. The Information technology Act 2000 passed by Indian parliament on 17
October 2000.The original act contained in 94 sections, divided in 13 chapters and 4
schedules.
Section Offence Penalty
65 Tampering with computer
source documents
Imprisonment up to three years or/and with
fine up to Rs.200000
66 Hacking with computer
system
Imprisonment up to three years or/and with
fine up to Rs.500000
66A Sending offensive messages **24th
march 2015 SC cancelled this section
66B Receiving stolen computer or
communication device
Imprisonment up to three years or/and with
fine up to Rs.100000
66C Using password of another
person
Imprisonment up to three years or/and with
fine up to Rs.100000
66D Cheating using computer
resource
Imprisonment up to three years or/and with
fine up to Rs.100000
66E Publishing private images of
others
Imprisonment up to three years or/and with
fine up to Rs.200000
66F Acts of cyber terrorism Imprisonment up to life.
67 Publishing information which
is obscene in electronic form
Imprisonment up to five years or/and with
fine up to Rs.1000000
9
67A Publishing images containing
sexual acts
Imprisonment up to seven years or/and
with fine up to Rs.1000000
67B Publishing Child porn or
predating children online
Imprisonment up to five years or/and with
fine up to Rs.1000000 on first conviction.
Imprisonment up to seven years or/and
with fine up to Rs.1000000 on second
conviction.
67C Failure to maintain records Imprisonment up to three years or/and with
fine
68 Failure/refusal to comply
with orders
Imprisonment up to three years or/and with
fine up to Rs.200000
69 Failure/refusal to decrypt
data
Imprisonment up to seven years and
possible fine
70 Securing access or
attempting to secure access
to a protected system
Imprisonment up to tenyears or/and with
fine
71 Misrepresentation Imprisonment up to three years or/and with
fine up to Rs.100000
IT Act 2008
The information technology Amendment Act, 2008(IT Act 2008) is a
substantial addition to India’s Information Technology Act 2000. In the 2008 version
of the act there are 124 sections and 14 chapters. The IT Amendment Act was
passed by the Indian parliament in October 2008 and came into force a year later.
The Act is administered by the Indian Computer Emergency Response Team (CERT-
In). The original Act was developed to promote the IT industry, regulate e-
commerce, facilitate e-governance and prevent cybercrimes. The Amendment has
been criticized for decreasing the penalties for some cybercrimes and for lacking
sufficient safeguards to protect the civil rights of individuals.
10
Morphing
Short for metamorphosing, morphing refers to an animation technique in
which one image is gradually turned into another. Many advanced animation
programs support some type of morphing feature. Morphing is editing the original
picture by unauthorized user or fake identity. It was identified that female’s pictures
are downloaded by fake users and again re-posted/uploaded on different websites
by creating fake profiles after editing it.
Pornography
Porn is the abbreviation for pornography, which is sexual material that is
explicitly portrayed for the primary purpose of sexual arousal. Sexually explicit
material can be presented in a variety of ways, including magazines, photographs,
Films, writings, sculptures, animation, sound recordings and video games. The
effects of pornography have a tremendous amount of negative outcomes. Some
research has shown that viewing/using pornography has an influence on domestic
violence, sexual dysfunction, rape, difficulties with a sexual relationship and child
sexual abuse.
Health hazards of using computer
 Repetitive Strain Injury(RSI) in Wrists and Hands
Typing and using a mouse for long periods are common causes of RSI in
the wrist (it is often called carpal-tunnel syndrome)
1. Use a wrist-rest to support the wrists while typing and when using the
mouse
2. Take regular break from typing or using the mouse
 Back and Neck Ache
People suffer from back and neck pain after working at a computer for a
long time. This is usually due to them having a bad sitting posture.
1. Use an adjustable, ergonomic chair and take the time to set it up
properly.
11
2. The computer keyboard and monitor should be at the correct height for
the seated person (keyboard lower than the elbow, top of monitor at eye
level)
3. Take regular breaks: get up, walk around, stretch your muscles
 Eye-Strain
This is caused by looking at a monitor which is a constant distance away.
The muscles that focus your eyes do not move, so get tired and painful. Eye-
strain can also causes headaches.
1. Look away from the monitor at regular Intervals refocus on distant or
close objects to exercise the muscles in the eye.
2. Use an anti-glare filter in front of the monitor to cut down on screen
reflections that can also tire the eyes.

More Related Content

What's hot

Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavierMo Han
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605RAKESH SHARMA
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 

What's hot (20)

A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Hacking
HackingHacking
Hacking
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Internet security
Internet securityInternet security
Internet security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
System failure
System  failureSystem  failure
System failure
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Hacking
HackingHacking
Hacking
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
Hacking Hacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Malwares
MalwaresMalwares
Malwares
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 

Similar to Computer Virus & Malware Guide

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptlowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptlowlesh1
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 

Similar to Computer Virus & Malware Guide (20)

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Computer security
Computer securityComputer security
Computer security
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 

More from vazhichal12

Online assignment
Online assignmentOnline assignment
Online assignmentvazhichal12
 
Online assignment exploratory
Online assignment exploratoryOnline assignment exploratory
Online assignment exploratoryvazhichal12
 
Curriculum vitae
Curriculum vitae Curriculum vitae
Curriculum vitae vazhichal12
 
Pedagogy assignment
Pedagogy assignmentPedagogy assignment
Pedagogy assignmentvazhichal12
 
Online assignment Exploratory Learning
Online assignment Exploratory LearningOnline assignment Exploratory Learning
Online assignment Exploratory Learningvazhichal12
 
Keerthana methodology assignment 2
Keerthana methodology assignment 2Keerthana methodology assignment 2
Keerthana methodology assignment 2vazhichal12
 
Keerthana pedagogy assignment 2
Keerthana pedagogy assignment 2Keerthana pedagogy assignment 2
Keerthana pedagogy assignment 2vazhichal12
 
Blessy methodology assignment 2
Blessy methodology assignment 2Blessy methodology assignment 2
Blessy methodology assignment 2vazhichal12
 
PowerPoint presentation
PowerPoint presentation PowerPoint presentation
PowerPoint presentation vazhichal12
 
Second sem optional assignment 1
Second sem optional assignment 1Second sem optional assignment 1
Second sem optional assignment 1vazhichal12
 
Learning management system
Learning management systemLearning management system
Learning management systemvazhichal12
 
Hsslive gnukhata-handbook-itschool-converted
Hsslive gnukhata-handbook-itschool-convertedHsslive gnukhata-handbook-itschool-converted
Hsslive gnukhata-handbook-itschool-convertedvazhichal12
 
PowerPoint presentation
PowerPoint presentation PowerPoint presentation
PowerPoint presentation vazhichal12
 
ONLINE ASSIGNMENT
ONLINE ASSIGNMENTONLINE ASSIGNMENT
ONLINE ASSIGNMENTvazhichal12
 
POWER POINT PRESENTATION
POWER POINT PRESENTATION POWER POINT PRESENTATION
POWER POINT PRESENTATION vazhichal12
 
Itinerant Retailers
Itinerant RetailersItinerant Retailers
Itinerant Retailersvazhichal12
 

More from vazhichal12 (20)

Online assignment
Online assignmentOnline assignment
Online assignment
 
Assignment
AssignmentAssignment
Assignment
 
Copyright
CopyrightCopyright
Copyright
 
Copyright
CopyrightCopyright
Copyright
 
Online assignment exploratory
Online assignment exploratoryOnline assignment exploratory
Online assignment exploratory
 
Curriculum vitae
Curriculum vitae Curriculum vitae
Curriculum vitae
 
Pedagogy assignment
Pedagogy assignmentPedagogy assignment
Pedagogy assignment
 
Online assignment Exploratory Learning
Online assignment Exploratory LearningOnline assignment Exploratory Learning
Online assignment Exploratory Learning
 
Keerthana methodology assignment 2
Keerthana methodology assignment 2Keerthana methodology assignment 2
Keerthana methodology assignment 2
 
Keerthana pedagogy assignment 2
Keerthana pedagogy assignment 2Keerthana pedagogy assignment 2
Keerthana pedagogy assignment 2
 
Blessy methodology assignment 2
Blessy methodology assignment 2Blessy methodology assignment 2
Blessy methodology assignment 2
 
PowerPoint presentation
PowerPoint presentation PowerPoint presentation
PowerPoint presentation
 
Second sem optional assignment 1
Second sem optional assignment 1Second sem optional assignment 1
Second sem optional assignment 1
 
Online 2
Online 2Online 2
Online 2
 
Learning management system
Learning management systemLearning management system
Learning management system
 
Hsslive gnukhata-handbook-itschool-converted
Hsslive gnukhata-handbook-itschool-convertedHsslive gnukhata-handbook-itschool-converted
Hsslive gnukhata-handbook-itschool-converted
 
PowerPoint presentation
PowerPoint presentation PowerPoint presentation
PowerPoint presentation
 
ONLINE ASSIGNMENT
ONLINE ASSIGNMENTONLINE ASSIGNMENT
ONLINE ASSIGNMENT
 
POWER POINT PRESENTATION
POWER POINT PRESENTATION POWER POINT PRESENTATION
POWER POINT PRESENTATION
 
Itinerant Retailers
Itinerant RetailersItinerant Retailers
Itinerant Retailers
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Computer Virus & Malware Guide

  • 1. 1 Computer Virus Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, increasing maintenance cost etc. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. Malware Malware (for “malicious software”) is any program or file that is harmful to a computer user. Malware is a term for any software that gets installed on your machine and performs unwanted tasks, often for some third party’s benefit. Malware programs can range from being simple pop-up advertising to causing serious computer invasion and the damage (eg. Stealing passwords and data or infecting other machines on the network). Some malware provides no uninstall option, and installs code in unexpected and hidden places (eg. Windows registry) or modifies the operating system, thus making it more difficult to remove. Spyware A program written to monitor your action on a computer. A common type of spyware is a key-logger program. This program can record every key stroke and mouse click you make. Spyware can be delivered via a Trojan horse program. Trojan horse A program written to deliver a malicious program that may then cause destruction to your computer. A Trojan horse is delivered by someone or hidden within another program that may seem harmless.
  • 2. 2 Adware Adware is any software application in which advertising banners are displayed while a program is running. The ads are delivered through pop-up windows or bars that appear on the program's user interface. Adware is commonly created for computers, but may also be found on mobile devices. Preventive measures- (Firewall, antivirus software) How to prevent computer viruses  Install a reliable antivirus program  Avoid suspicious websites  Never Open Email attachments without scanning them first.  Setup automatic scans  Stay away from cracked software  Install a firewall Firewall A firewall is a system designed to prevent unauthorized access to or from a private network. Firewall can be implemented in both software and hardware. Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the Internet. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. Eg. Zone Alarm firewall, Shardaccess, Mpssvc, Lptables etc. Antivirus Software Antivirus software is a program or set of programs that are designed to prevent, search for, detect and remove software viruses and other malicious
  • 3. 3 software like worms, Trojans, adware and more. These tools are critical for users to have installed and up-to-date because a computer without antivirus software installed will be infected within minutes of connecting to the internet. There are several different companies that build and offer antivirus software and what each offers can vary but all perform some basic functions: 1. Scan specific files or directories for any malware or known malicious patterns 2. Allow you to schedule scans to automatically run for you 3. Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time. 4. Remove any malicious code detected Cyber privacy and password protection Cyber Privacy Privacy is our right to control what happens with personal information about us. Internet privacy violation risks may be minimized as follows: • Always use preventative s/w applications such as Anti-virus anti-malware. • Avoid shopping on unreliable websites • Avoid exposing personal data on websites with lower security levels • Clear the browser’s cache and browsing history on a consistent basis • Always use very strong passwords consisting of letters numerals and special characters. Passwordprotection • Never give out your password to any one • Don’t just use one password • Create password that easy to remember but hard to others guess. • Make the password at least 8 characters long
  • 4. 4 • Include numbers capital letters and symbols • Don’t fall the phishing attack Legal and ethical issues Copyright The exclusive right given by law for a certain term of years to an author, composer etc. to print, publish and sell copies of his original work. Copyright allows authors, musicians, artists etc. to make money of their labor. It also prevents people from altering the work without permission. Copyright law can be protected, literary work, musical work, Dramatic work, Choreographic work, pictorial, graphic, sculptural works, motion pictures, AV, Sound recording, architectural works. It give the copyright holders to reproduce the work, right to prepare derivative works, right to distribute copies for sale, right to prepare AV work publicly, right to display musical and artistic works publicly. Creative Common License A Creative Commons (CC) license is one of several public copy right licenses that enable the free distribution of an otherwise copyrighted "work". A CC license is used when an author wants to give other people the right to share, use, and build upon a work that they (the author) have created. Plagiarism Plagiarism is the "wrongful appropriation" and "stealing and publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own original work. Plagiarism is the act of taking another person’s writing, conversation, song or even idea and passing it off as your own. This includes information from web pages, books, songs, television shows, email messages, interviews, articles, artworks or any other medium. Whenever you paraphrase, summarize, words, phrases or sentence from another person’s work, it is necessary to indicate the source of the information within your paper using an internal citation.
  • 5. 5 Hacking The process of attempting to gain or successfully gaining unauthorized access to computer resources for the purpose of help or secure system is called hacking. Hacking is the technique in which any one can access and one’s computer without his permission. A hacker knows all about the operating system and different holes in the system. Computer hacking is when files on your computer are view created or edited without your authorization. Hacker can gain complete access to your computer from any were in the world if your computer is turned on, unprotected and has an internet connection. 1. White-Hat Hackers The good guys who identify the security weakness of the system or network and inform the owner about them. A white hat hacker’s breaks security for no- malicious reasons, perhaps to test their own security system or while working in a security company which makes security software. White-hat hacker is also referred to as the ethical hacker. 2. Black Hat Hackers A black hat hacker is the villain or bad guy, who crash into victim’s security to steal information and destroy the victim’s security network. Black hat hacker is also known as cracker. Black hat hacker break into secure networks to destroy data. 3. Grey Hat Hackers Grey hat hacker is the combination of black hat hacker and white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect. Then they may offer correct the defect for a fee.
  • 6. 6 Netiquette Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite behavior in society, netiquette is a code of good behavior on the Internet. This includes several aspects of the Internet, such as email, social media, online chat, web forums, website comments, multiplayer gaming, and other types of online communication. There are ten rules of netiquette that everyone who goes online should follow • Remember the Human • Adhere to the same standards online that you follow in real life • Know where you are in cyberspace • Respect other people’s time • Make yourself look good online • Share expert knowledge • Help keep flame wars under control • Respect other people’s privacy • Don’t abuse your power • Be forgiving of other people’s mistakes Phishing Phishing is a fraudulent attempt, usually made through email, to steal your personal information. Phishing emails usually appear to come from a well- known organization and ask for your personal information- such as credit card number, social security number, account number or password. Prevent phishing attacks  Do not reply to emails that request financial information, even if ti appears to be from a trusted source  Do not reply to emails from unrecognized senders.
  • 7. 7  Do not open any links in suspicious emails, instant messages, or chat-room messages.  Only communicate personal information over the phone or through a secure website.  Never use email to share personal information.  Avoid using email on public computers.  Don’t click anything in pop-up windows.  Use security programs to protect your computer.  Check your credit report and financial statements regularly Software piracy Unauthorized copying or distribution of copyrighted software. It is done by copying, downloading, sharing, selling or installing multiple copies onto personal or work computers. A term used to describe the act of illegally using, copying or distributing software without ownership or legal rights. The majority of software today is purchased as an one-site license, meaning that only one computer may have that software installed on it at one time. Copying that software to multiple computers or sharing it with your friend without multiple Licenses is considered software piracy, which is illegal. Under the Indian Copyright Act, a software pirate can be tried under both civil and criminal law. The minimum jail term for software copyright infringement is seven days and the maximum jail term is three years. Statutory fines range from a minimum of 50,000 to a maximum of 200000 rupees. Software privacy Privacy software is software built to protect the privacy of its users. The software typically works in conjunction with Internet usage to control or limit the amount of information made available to third parties. The software can apply encryption or filtering of various kinds. Privacy software can refer to two different types of protection. One type is protecting a user's Internet privacy from the World Wide Web. There are software products that will mask or hide a user's IP address from the outside world in order to protect the user from identity theft. The second type of protection is hiding or deleting the users Internet traces that are left
  • 8. 8 on their PC after they have been surfing the Internet. There is software that will erase all the users Internet traces and there is software that will hide and encrypt a user's traces so that others using their PC will not know where they have been surfing. Cyber law- IT Act 2000,IT Act 2008 Cyber law is the law for regulating controlling and governing cyber space. Cyber space includes computers network, software, data storage devices, Internet, websites email and other electronic devices such as mobile phone ATM machines etc. The Information technology Act 2000 passed by Indian parliament on 17 October 2000.The original act contained in 94 sections, divided in 13 chapters and 4 schedules. Section Offence Penalty 65 Tampering with computer source documents Imprisonment up to three years or/and with fine up to Rs.200000 66 Hacking with computer system Imprisonment up to three years or/and with fine up to Rs.500000 66A Sending offensive messages **24th march 2015 SC cancelled this section 66B Receiving stolen computer or communication device Imprisonment up to three years or/and with fine up to Rs.100000 66C Using password of another person Imprisonment up to three years or/and with fine up to Rs.100000 66D Cheating using computer resource Imprisonment up to three years or/and with fine up to Rs.100000 66E Publishing private images of others Imprisonment up to three years or/and with fine up to Rs.200000 66F Acts of cyber terrorism Imprisonment up to life. 67 Publishing information which is obscene in electronic form Imprisonment up to five years or/and with fine up to Rs.1000000
  • 9. 9 67A Publishing images containing sexual acts Imprisonment up to seven years or/and with fine up to Rs.1000000 67B Publishing Child porn or predating children online Imprisonment up to five years or/and with fine up to Rs.1000000 on first conviction. Imprisonment up to seven years or/and with fine up to Rs.1000000 on second conviction. 67C Failure to maintain records Imprisonment up to three years or/and with fine 68 Failure/refusal to comply with orders Imprisonment up to three years or/and with fine up to Rs.200000 69 Failure/refusal to decrypt data Imprisonment up to seven years and possible fine 70 Securing access or attempting to secure access to a protected system Imprisonment up to tenyears or/and with fine 71 Misrepresentation Imprisonment up to three years or/and with fine up to Rs.100000 IT Act 2008 The information technology Amendment Act, 2008(IT Act 2008) is a substantial addition to India’s Information Technology Act 2000. In the 2008 version of the act there are 124 sections and 14 chapters. The IT Amendment Act was passed by the Indian parliament in October 2008 and came into force a year later. The Act is administered by the Indian Computer Emergency Response Team (CERT- In). The original Act was developed to promote the IT industry, regulate e- commerce, facilitate e-governance and prevent cybercrimes. The Amendment has been criticized for decreasing the penalties for some cybercrimes and for lacking sufficient safeguards to protect the civil rights of individuals.
  • 10. 10 Morphing Short for metamorphosing, morphing refers to an animation technique in which one image is gradually turned into another. Many advanced animation programs support some type of morphing feature. Morphing is editing the original picture by unauthorized user or fake identity. It was identified that female’s pictures are downloaded by fake users and again re-posted/uploaded on different websites by creating fake profiles after editing it. Pornography Porn is the abbreviation for pornography, which is sexual material that is explicitly portrayed for the primary purpose of sexual arousal. Sexually explicit material can be presented in a variety of ways, including magazines, photographs, Films, writings, sculptures, animation, sound recordings and video games. The effects of pornography have a tremendous amount of negative outcomes. Some research has shown that viewing/using pornography has an influence on domestic violence, sexual dysfunction, rape, difficulties with a sexual relationship and child sexual abuse. Health hazards of using computer  Repetitive Strain Injury(RSI) in Wrists and Hands Typing and using a mouse for long periods are common causes of RSI in the wrist (it is often called carpal-tunnel syndrome) 1. Use a wrist-rest to support the wrists while typing and when using the mouse 2. Take regular break from typing or using the mouse  Back and Neck Ache People suffer from back and neck pain after working at a computer for a long time. This is usually due to them having a bad sitting posture. 1. Use an adjustable, ergonomic chair and take the time to set it up properly.
  • 11. 11 2. The computer keyboard and monitor should be at the correct height for the seated person (keyboard lower than the elbow, top of monitor at eye level) 3. Take regular breaks: get up, walk around, stretch your muscles  Eye-Strain This is caused by looking at a monitor which is a constant distance away. The muscles that focus your eyes do not move, so get tired and painful. Eye- strain can also causes headaches. 1. Look away from the monitor at regular Intervals refocus on distant or close objects to exercise the muscles in the eye. 2. Use an anti-glare filter in front of the monitor to cut down on screen reflections that can also tire the eyes.