1. INFORMATION AND COMPUTER SECURITY
Q. What is information and computer security?
Information & computer security: is the protection
of computer systems & networks from information
disclosure, theft of or damage to their hardware,
software, or electronic data, as well as from the
disruption or misdirection of the services they provide .
2. INFORMATION AND COMPUTER …
Responsible Behavior in the Computer Lab
A computer laboratory is a special place which contains
delicate and expensive equipment .
Fig1: Students in a
3. INFORMATION AND COMPUTER …
We need to follow some guidelines for responsible
behavior in the Computer Lab. These are:
i. Students are not allowed in computer lab unless
directly supervised by a computer teacher or any
other staff member.
ii. Never share your password, even with your best
iii. Listen to directions given by your computer
iv. Only use the Internet as instructed. Do not click
on links that seem suspicious or are offers of
v. Do not use the mouse or keyboard as a toy.
4. INFORMATION AND COMPUTER …
Do not give own or another’s data to anyone .
E-mail address should not be given to anyone.
Always stick to safe on-line behaviour.
6. INFORMATION AND COMPUTER …
When we use internet, share file & download
files malicious software may get in to our
device . Some of them are :
A computer virus is a program usually hidden within
another simple program.
It produces copies of itself and inserts them into other
programs or files, in turn destroying the data and
performing other malicious actions.
7. INFORMATION AND COMPUTER …
is series of programming steps that are stored in
allows automation of many actions with only a
The virus using macro files are most popular as
Easy to write
Can infect more people faster as they exchange
documents and data frequently
Can easily infect any computer capable of running Office
Macro viruses can do a lot of different damage in a
lot of different ways.
8. INFORMATION AND COMPUTER …
A computer worm is a type of malware that spreads
copies of itself from computer to computer.
A worm can replicate itself without any human
interaction (usually to other computer systems via
network connections) and,
it does not need to attach itself to a software
program in order to cause damage.
9. INFORMATION AND COMPUTER …
2. Trojan horses
It is a program that claims to rid your computer
of viruses but instead introduces viruses into
Since they look like sincere programs they are
referred as Trojan like the “Trojan Horse” of Greek
They are mostly spread through internet
downloads and online gaming programs .
10. INFORMATION AND COMPUTER …
As its name suggests, it is a program used to spy
on the computer system.
It tries to get all confidential & sensitive information
such as your bank account numbers, passwords etc.
Then, this confidential data is misused to access user’s
Malware is short for “malicious software.”
It is any kind of unwanted software that is installed
without your adequate consent.
In fact all the threats mentioned above such as
Virus, Trojans etc are examples of Malware
11. INFORMATION AND COMPUTER …
The term “spam” refers to unsolicited
commercial email (UCE) or unsolicited bulk
The most common spams are:
“Get Rich Quick” and
“Make Money Fast” (MMF) schemes
Spam emails is not only unwanted, it clogs
your email accounts and uses unnecessary
12. INFORMATION AND COMPUTER …
7. Hackers and crackers
Hackers & crackers: software programmers who
use dubious ways to get control over your
computer and systems.
Intent of both is to gain control over your
computer so that they can get the sensitive
confidential information .
So we can see that our computer may be
affected by many malicious software so we
will see how to prevent our computer from
this malicious software .
13. INFORMATION AND COMPUTER …
HOW TO PREVENT MALICIOUS SOFTWARES FROM OUR
Install Anti-virus software
Regularly update software
Only buy Apps from trusted sources
Don’t click on suspicious links or download
attachments from unknown sources
Back up data regularly & Install Firewall