SlideShare une entreprise Scribd logo
1  sur  16
Physical Issues
 Environmental factors
   Your computer should be kept in a
      Dust free
      Dry (moisture free)
      Smoke free environment
Physical Issues
 Hardware protection
 Your computer should be equipped with
   A UPS (Uninterrupted Power Supplier) to avoid
    risk of sudden power failure and fluctuations.
   Surge protection to protect against lightning
    and thunder.
   Stabilizer to control voltage.
Logical security
  The software and the data in your
  computer can be protected through the
  use of
      Password
      Backups
Malicious codes
 A common misconception is that other
 kinds of electronic nastiest such as worms
 and Trojan horse applications are viruses.


 Viruses, worms and Trojan horse belong to a
 broader category called “malicious codes”.
Virus
 A program or piece of code that is loaded
 onto your computer without your knowledge
 and runs against your wishes. Like any other
 program, it contains instructions that tell
 your computer what to do.
Virus
 Viruses can also replicate themselves.
 All computer viruses are man made.
 A simple virus that can make a copy of itself over again is
  relatively easy to produce.
 A virus can be destructive; it could format your hard drive,
  overwrite your hard drive boot sector or delete files and render
  your machine inoperative.
 Even such a simple virus is dangerous because it will quickly use
  all available memory and bring the system to a halt.
 An even more dangerous type of virus is one capable of
  transmitting itself across networks and bypassing security
  systems.
Virus
  How do viruses invade a machine?
  E-mail or an e-mail attachment
  Downloads
  Shared infected floppy disks
  Hacking (Occasionally)
Virus
   Trojan Horse
   A destructive program that masquerades as a
    benign application. Unlike viruses, Trojan horses
    do not replicate themselves.
Virus
   Worm
   A program or algorithm that replicates itself over a
    computer network and usually performs malicious
    actions.
Virus
   Virus
   A program or piece of code that is loaded onto
    your computer without your knowledge and runs
    against your wishes.
Virus
   Blended program
   Blended threats combine the characteristics of
    viruses, worms, Trojan Gorses and malicious code
    with server and Internet vulner abilities.
Virus
   Combating Viruses, Worms and Trojan Horses
     The first step to protecting your computer is to ensure
      your operating system (OS) is up-to-date
     you should have anti-virus software installed on your
      system and ensure you download updates frequently to
      ensure your software has the latest fixes for new viruses,
      worms and Trojan horses.
     You should also install a firewall as well.
Antivirus Software
   Antivirus software can detect nearly all types of
    known viruses, but it must be updated regularly to
    maintain effectiveness.
Firewall
   A firewall is a system that prevents unauthorized
    use and access to your computer.
   A firewall can be either hardware or software.
Firewall
   Hardware firewalls provide a strong degree of
    protection from most forms of attack from the
    outside world can be purchased as a stand alone
    product or in broadband routers.
   For individual home users, the most popular
    firewall choice is a software firewall

Contenu connexe

Tendances

Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protectionreasonsecurity
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaILAKIA
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trendsAthena Catindig
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - MalwaresArnav Kumar
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus softwarekhalid umer
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 

Tendances (20)

Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Anti virus
Anti virusAnti virus
Anti virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
 
information about virus
information about virusinformation about virus
information about virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus
virusvirus
virus
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Similaire à Issues and precautions related to ict

Similaire à Issues and precautions related to ict (20)

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus
VirusVirus
Virus
 
Virus project
Virus projectVirus project
Virus project
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Virus
VirusVirus
Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

Dernier

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Dernier (20)

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

Issues and precautions related to ict

  • 1.
  • 2. Physical Issues  Environmental factors  Your computer should be kept in a  Dust free  Dry (moisture free)  Smoke free environment
  • 3. Physical Issues  Hardware protection  Your computer should be equipped with  A UPS (Uninterrupted Power Supplier) to avoid risk of sudden power failure and fluctuations.  Surge protection to protect against lightning and thunder.  Stabilizer to control voltage.
  • 4. Logical security  The software and the data in your computer can be protected through the use of  Password  Backups
  • 5. Malicious codes  A common misconception is that other kinds of electronic nastiest such as worms and Trojan horse applications are viruses.  Viruses, worms and Trojan horse belong to a broader category called “malicious codes”.
  • 6. Virus  A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Like any other program, it contains instructions that tell your computer what to do.
  • 7. Virus  Viruses can also replicate themselves.  All computer viruses are man made.  A simple virus that can make a copy of itself over again is relatively easy to produce.  A virus can be destructive; it could format your hard drive, overwrite your hard drive boot sector or delete files and render your machine inoperative.  Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.  An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
  • 8. Virus  How do viruses invade a machine?  E-mail or an e-mail attachment  Downloads  Shared infected floppy disks  Hacking (Occasionally)
  • 9. Virus  Trojan Horse  A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves.
  • 10. Virus  Worm  A program or algorithm that replicates itself over a computer network and usually performs malicious actions.
  • 11. Virus  Virus  A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
  • 12. Virus  Blended program  Blended threats combine the characteristics of viruses, worms, Trojan Gorses and malicious code with server and Internet vulner abilities.
  • 13. Virus  Combating Viruses, Worms and Trojan Horses  The first step to protecting your computer is to ensure your operating system (OS) is up-to-date  you should have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms and Trojan horses.  You should also install a firewall as well.
  • 14. Antivirus Software  Antivirus software can detect nearly all types of known viruses, but it must be updated regularly to maintain effectiveness.
  • 15. Firewall  A firewall is a system that prevents unauthorized use and access to your computer.  A firewall can be either hardware or software.
  • 16. Firewall  Hardware firewalls provide a strong degree of protection from most forms of attack from the outside world can be purchased as a stand alone product or in broadband routers.  For individual home users, the most popular firewall choice is a software firewall