+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Malicious Software ,Good Internet Habits and ICT general Application usage
1. 11ICT General ApplicationsICT General Applications
Malicious Software ,Good Internet
Habits and ICT General Application
Usage
ByBy
Adedayo O.SAdedayo O.S
A Paper Delivered During the New Staff Training for Energy Commission of
Nigeria (ECN) Abuja, 14th to 22nd April 2008.
2. 22ICT General ApplicationsICT General Applications
Virus SourcesVirus Sources
1.1. Simply visiting a compromised Web site canSimply visiting a compromised Web site can
cause infection if certain browsercause infection if certain browser vulnerabilitiesvulnerabilities
are not patched.are not patched.
2.2. Indiscriminate downloading of software fromIndiscriminate downloading of software from
InternetInternet..
3.3. Over liberality with visitors. That is inOver liberality with visitors. That is in thethe use ofuse of
your Internet facility and in use of foreignyour Internet facility and in use of foreign
storage mediastorage media..
4.4. Through e-mail both from friends and strangersThrough e-mail both from friends and strangers
(as attachments).(as attachments).
5.5. Software piracy can sometimes lead to virus infection.Software piracy can sometimes lead to virus infection.
3. 33ICT General ApplicationsICT General Applications
CHARACTERISTICCHARACTERISTIC
SSMALWARE AND SPYWARESMALWARE AND SPYWARES
1.1. Viruses can also replicate themselves (worms).Viruses can also replicate themselves (worms).
2.2. They use up memory and often bring the system to aThey use up memory and often bring the system to a
halt. This can be noticed initiallyhalt. This can be noticed initially by the considerableby the considerable
slowness in operation (booting, running etc)slowness in operation (booting, running etc)..
3.3. Viruses are capable of transmitting themselves acrossViruses are capable of transmitting themselves across
networks and bypassing securitynetworks and bypassing security systems.systems.
44.. They are capable of using up bandwidth very quickly.They are capable of using up bandwidth very quickly.
5.5. They usually fulfil whatever their designer(s) had inThey usually fulfil whatever their designer(s) had in
mind whenmind when produced. E.gproduced. E.g deletion, theft, truncation,deletion, theft, truncation,
falsification, duplication, copy, DoSfalsification, duplication, copy, DoS, corruption, corruption etc.etc.
5. 55ICT General ApplicationsICT General Applications
Storage DevicesStorage Devices
Removable Hard DriveRemovable Hard Drive
Internal Hard DriveInternal Hard Drive
FlashFlash
PC CardsPC Cards
Storage TapesStorage Tapes
Memory SticksMemory Sticks
Floppy DisksFloppy Disks
Zip DisksZip Disks
CD /DVDCD /DVD
6. 66ICT General ApplicationsICT General Applications
Internet Best PracticesInternet Best Practices
Reduce the risk of viruses. Use of anti-virus softwareReduce the risk of viruses. Use of anti-virus software
and keeping it current.and keeping it current.
Never open suspicious e-mail messages or fileNever open suspicious e-mail messages or file
attachmentsattachments
Use Windows Security Centre to manage yourUse Windows Security Centre to manage your
settings. Adjust to the level of protection you aresettings. Adjust to the level of protection you are
comfortable with.comfortable with.
Download internet files from trusted sources only andDownload internet files from trusted sources only and
scan the files with your virus scanner.scan the files with your virus scanner.
Use a firewall, Install a Microsoft Internet ConnectionUse a firewall, Install a Microsoft Internet Connection
firewall as a basic line of defence against outsidefirewall as a basic line of defence against outside
intruders.intruders.
Use strong passwords that are at least eightUse strong passwords that are at least eight
characters long and a combination of lower and uppercharacters long and a combination of lower and upper
case letters, numbers and symbols.case letters, numbers and symbols.