SlideShare une entreprise Scribd logo
1  sur  10
11ICT General ApplicationsICT General Applications
Malicious Software ,Good Internet
Habits and ICT General Application
Usage
ByBy
Adedayo O.SAdedayo O.S
A Paper Delivered During the New Staff Training for Energy Commission of
Nigeria (ECN) Abuja, 14th to 22nd April 2008.
22ICT General ApplicationsICT General Applications
Virus SourcesVirus Sources
1.1. Simply visiting a compromised Web site canSimply visiting a compromised Web site can
cause infection if certain browsercause infection if certain browser vulnerabilitiesvulnerabilities
are not patched.are not patched.
2.2. Indiscriminate downloading of software fromIndiscriminate downloading of software from
InternetInternet..
3.3. Over liberality with visitors. That is inOver liberality with visitors. That is in thethe use ofuse of
your Internet facility and in use of foreignyour Internet facility and in use of foreign
storage mediastorage media..
4.4. Through e-mail both from friends and strangersThrough e-mail both from friends and strangers
(as attachments).(as attachments).
5.5. Software piracy can sometimes lead to virus infection.Software piracy can sometimes lead to virus infection.
33ICT General ApplicationsICT General Applications
CHARACTERISTICCHARACTERISTIC
SSMALWARE AND SPYWARESMALWARE AND SPYWARES
1.1. Viruses can also replicate themselves (worms).Viruses can also replicate themselves (worms).
2.2. They use up memory and often bring the system to aThey use up memory and often bring the system to a
halt. This can be noticed initiallyhalt. This can be noticed initially by the considerableby the considerable
slowness in operation (booting, running etc)slowness in operation (booting, running etc)..
3.3. Viruses are capable of transmitting themselves acrossViruses are capable of transmitting themselves across
networks and bypassing securitynetworks and bypassing security systems.systems.
44.. They are capable of using up bandwidth very quickly.They are capable of using up bandwidth very quickly.
5.5. They usually fulfil whatever their designer(s) had inThey usually fulfil whatever their designer(s) had in
mind whenmind when produced. E.gproduced. E.g deletion, theft, truncation,deletion, theft, truncation,
falsification, duplication, copy, DoSfalsification, duplication, copy, DoS, corruption, corruption etc.etc.
44ICT General ApplicationsICT General Applications
Updating AntivirusUpdating Antivirus
55ICT General ApplicationsICT General Applications
Storage DevicesStorage Devices
Removable Hard DriveRemovable Hard Drive
Internal Hard DriveInternal Hard Drive
FlashFlash
PC CardsPC Cards
Storage TapesStorage Tapes
Memory SticksMemory Sticks
Floppy DisksFloppy Disks
Zip DisksZip Disks
CD /DVDCD /DVD
66ICT General ApplicationsICT General Applications
Internet Best PracticesInternet Best Practices
Reduce the risk of viruses. Use of anti-virus softwareReduce the risk of viruses. Use of anti-virus software
and keeping it current.and keeping it current.
Never open suspicious e-mail messages or fileNever open suspicious e-mail messages or file
attachmentsattachments
Use Windows Security Centre to manage yourUse Windows Security Centre to manage your
settings. Adjust to the level of protection you aresettings. Adjust to the level of protection you are
comfortable with.comfortable with.
Download internet files from trusted sources only andDownload internet files from trusted sources only and
scan the files with your virus scanner.scan the files with your virus scanner.
Use a firewall, Install a Microsoft Internet ConnectionUse a firewall, Install a Microsoft Internet Connection
firewall as a basic line of defence against outsidefirewall as a basic line of defence against outside
intruders.intruders.
Use strong passwords that are at least eightUse strong passwords that are at least eight
characters long and a combination of lower and uppercharacters long and a combination of lower and upper
case letters, numbers and symbols.case letters, numbers and symbols.
77ICT General ApplicationsICT General Applications
Block Pop-upsBlock Pop-ups
88ICT General ApplicationsICT General Applications
How to download CorrectlyHow to download Correctly
99ICT General ApplicationsICT General Applications
THANK YOU.THANK YOU.
99ICT General ApplicationsICT General Applications
THANK YOU.THANK YOU.

Contenu connexe

Tendances

Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paperJennifer Cataluña
 
Computer Virus
Computer Virus Computer Virus
Computer Virus Study Hub
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and AntivirusBordaArka
 
Dungogan chap 2 lab 2
Dungogan chap 2 lab 2Dungogan chap 2 lab 2
Dungogan chap 2 lab 2ricky098
 
Zamayla chap 2 lab 2
Zamayla chap 2 lab 2Zamayla chap 2 lab 2
Zamayla chap 2 lab 2zamayla143
 
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008eLiberatica
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 

Tendances (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Lab 2
Lab 2Lab 2
Lab 2
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and Antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Dungogan chap 2 lab 2
Dungogan chap 2 lab 2Dungogan chap 2 lab 2
Dungogan chap 2 lab 2
 
Zamayla chap 2 lab 2
Zamayla chap 2 lab 2Zamayla chap 2 lab 2
Zamayla chap 2 lab 2
 
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008
 
Chap 2 lab 2
Chap 2 lab 2Chap 2 lab 2
Chap 2 lab 2
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 

En vedette

Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or LaptopSOBXTECH
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwaresKriti kohli
 
Microsoft Security Intelligence Report Volume 11
Microsoft Security Intelligence Report Volume 11Microsoft Security Intelligence Report Volume 11
Microsoft Security Intelligence Report Volume 11MSFTSIR
 
Network Security
Network SecurityNetwork Security
Network SecuritySOBXTECH
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet securityhimeag
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
Integrating SEO & PPC Search Marketing
Integrating SEO & PPC Search MarketingIntegrating SEO & PPC Search Marketing
Integrating SEO & PPC Search MarketingDaniel Riveong
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into MarketingEd Fry
 

En vedette (19)

Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or Laptop
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Microsoft Security Intelligence Report Volume 11
Microsoft Security Intelligence Report Volume 11Microsoft Security Intelligence Report Volume 11
Microsoft Security Intelligence Report Volume 11
 
Malwares
MalwaresMalwares
Malwares
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Compiling Malware Features
Compiling Malware FeaturesCompiling Malware Features
Compiling Malware Features
 
Network Security
Network SecurityNetwork Security
Network Security
 
Malware
MalwareMalware
Malware
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Integrating SEO & PPC Search Marketing
Integrating SEO & PPC Search MarketingIntegrating SEO & PPC Search Marketing
Integrating SEO & PPC Search Marketing
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
52 Types of Marketing Strategies
52 Types of Marketing Strategies52 Types of Marketing Strategies
52 Types of Marketing Strategies
 
How To (Really) Get Into Marketing
How To (Really) Get Into MarketingHow To (Really) Get Into Marketing
How To (Really) Get Into Marketing
 

Similaire à Malicious Software ,Good Internet Habits and ICT general Application usage

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
How to Audit
How to AuditHow to Audit
How to Auditayousif
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)richbryansalvo
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}richbryansalvo
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxsachingwalani24
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 

Similaire à Malicious Software ,Good Internet Habits and ICT general Application usage (20)

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Computer security
Computer securityComputer security
Computer security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How to Audit
How to AuditHow to Audit
How to Audit
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Spn year8 notes
Spn year8 notesSpn year8 notes
Spn year8 notes
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Privacy, Security
Privacy, SecurityPrivacy, Security
Privacy, Security
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
Virus Training
Virus TrainingVirus Training
Virus Training
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 

Plus de Love Steven

Job and Task Analysis
Job and Task AnalysisJob and Task Analysis
Job and Task AnalysisLove Steven
 
Personnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesPersonnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesLove Steven
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectorsLove Steven
 
Internet Explorer and Outlook Express
Internet  Explorer and Outlook ExpressInternet  Explorer and Outlook Express
Internet Explorer and Outlook ExpressLove Steven
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application SoftwareLove Steven
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals TrainingLove Steven
 
Energy Databank in Nigeria: Management ,Technology and Security
Energy Databank in Nigeria:   Management ,Technology and SecurityEnergy Databank in Nigeria:   Management ,Technology and Security
Energy Databank in Nigeria: Management ,Technology and SecurityLove Steven
 

Plus de Love Steven (7)

Job and Task Analysis
Job and Task AnalysisJob and Task Analysis
Job and Task Analysis
 
Personnel Management Software Developing and Processes
Personnel Management Software Developing and ProcessesPersonnel Management Software Developing and Processes
Personnel Management Software Developing and Processes
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Internet Explorer and Outlook Express
Internet  Explorer and Outlook ExpressInternet  Explorer and Outlook Express
Internet Explorer and Outlook Express
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application Software
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
 
Energy Databank in Nigeria: Management ,Technology and Security
Energy Databank in Nigeria:   Management ,Technology and SecurityEnergy Databank in Nigeria:   Management ,Technology and Security
Energy Databank in Nigeria: Management ,Technology and Security
 

Dernier

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 

Dernier (20)

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 

Malicious Software ,Good Internet Habits and ICT general Application usage

  • 1. 11ICT General ApplicationsICT General Applications Malicious Software ,Good Internet Habits and ICT General Application Usage ByBy Adedayo O.SAdedayo O.S A Paper Delivered During the New Staff Training for Energy Commission of Nigeria (ECN) Abuja, 14th to 22nd April 2008.
  • 2. 22ICT General ApplicationsICT General Applications Virus SourcesVirus Sources 1.1. Simply visiting a compromised Web site canSimply visiting a compromised Web site can cause infection if certain browsercause infection if certain browser vulnerabilitiesvulnerabilities are not patched.are not patched. 2.2. Indiscriminate downloading of software fromIndiscriminate downloading of software from InternetInternet.. 3.3. Over liberality with visitors. That is inOver liberality with visitors. That is in thethe use ofuse of your Internet facility and in use of foreignyour Internet facility and in use of foreign storage mediastorage media.. 4.4. Through e-mail both from friends and strangersThrough e-mail both from friends and strangers (as attachments).(as attachments). 5.5. Software piracy can sometimes lead to virus infection.Software piracy can sometimes lead to virus infection.
  • 3. 33ICT General ApplicationsICT General Applications CHARACTERISTICCHARACTERISTIC SSMALWARE AND SPYWARESMALWARE AND SPYWARES 1.1. Viruses can also replicate themselves (worms).Viruses can also replicate themselves (worms). 2.2. They use up memory and often bring the system to aThey use up memory and often bring the system to a halt. This can be noticed initiallyhalt. This can be noticed initially by the considerableby the considerable slowness in operation (booting, running etc)slowness in operation (booting, running etc).. 3.3. Viruses are capable of transmitting themselves acrossViruses are capable of transmitting themselves across networks and bypassing securitynetworks and bypassing security systems.systems. 44.. They are capable of using up bandwidth very quickly.They are capable of using up bandwidth very quickly. 5.5. They usually fulfil whatever their designer(s) had inThey usually fulfil whatever their designer(s) had in mind whenmind when produced. E.gproduced. E.g deletion, theft, truncation,deletion, theft, truncation, falsification, duplication, copy, DoSfalsification, duplication, copy, DoS, corruption, corruption etc.etc.
  • 4. 44ICT General ApplicationsICT General Applications Updating AntivirusUpdating Antivirus
  • 5. 55ICT General ApplicationsICT General Applications Storage DevicesStorage Devices Removable Hard DriveRemovable Hard Drive Internal Hard DriveInternal Hard Drive FlashFlash PC CardsPC Cards Storage TapesStorage Tapes Memory SticksMemory Sticks Floppy DisksFloppy Disks Zip DisksZip Disks CD /DVDCD /DVD
  • 6. 66ICT General ApplicationsICT General Applications Internet Best PracticesInternet Best Practices Reduce the risk of viruses. Use of anti-virus softwareReduce the risk of viruses. Use of anti-virus software and keeping it current.and keeping it current. Never open suspicious e-mail messages or fileNever open suspicious e-mail messages or file attachmentsattachments Use Windows Security Centre to manage yourUse Windows Security Centre to manage your settings. Adjust to the level of protection you aresettings. Adjust to the level of protection you are comfortable with.comfortable with. Download internet files from trusted sources only andDownload internet files from trusted sources only and scan the files with your virus scanner.scan the files with your virus scanner. Use a firewall, Install a Microsoft Internet ConnectionUse a firewall, Install a Microsoft Internet Connection firewall as a basic line of defence against outsidefirewall as a basic line of defence against outside intruders.intruders. Use strong passwords that are at least eightUse strong passwords that are at least eight characters long and a combination of lower and uppercharacters long and a combination of lower and upper case letters, numbers and symbols.case letters, numbers and symbols.
  • 7. 77ICT General ApplicationsICT General Applications Block Pop-upsBlock Pop-ups
  • 8. 88ICT General ApplicationsICT General Applications How to download CorrectlyHow to download Correctly
  • 9. 99ICT General ApplicationsICT General Applications THANK YOU.THANK YOU.
  • 10. 99ICT General ApplicationsICT General Applications THANK YOU.THANK YOU.