SlideShare une entreprise Scribd logo
1  sur  17
Computer Security Risks
Computer Security Risks 
• A computer security risk is any event or 
• action that could cause a loss of or damage to 
• computer hardware, software, data, information, 
• or processing capability
Cybercrime 
Any illegal act involving a computer 
generally is referred to as a computer crime. 
The term cybercrime refers to online or 
Internet-based illegal acts. Software used by 
cybercriminals sometimes is called crimeware. 
Today, cybercrime is one of the FBI’s top three 
priorities.
Hacker 
• Someone who accesses a 
• computer or network illegally is called hacker. 
• Some hackers 
• claim the intent of their security breaches is 
• to improve security.
Cracker 
• A cracker also is someone who accesses 
• a computer or network illegally but has 
• the intent of destroying data, stealing 
• information, or other malicious action. 
• Both hackers and crackers have advanced 
• computer and network skills.
Script kiddie 
• A script kiddie has the same intent as a 
• cracker but does not have the technical skills
Cyberextortionist 
(CRIMINAL LAW obtaining something by illegal threats) 
A cyberextortionist is someone who uses 
e-mail as a vehicle for extortion. These 
perpetrators send an organization a 
threatening e-mail message indicating they 
will expose confidential information, exploit 
a security flaw, or launch an attack that will 
compromise the organization’s network — if 
they are not paid a sum of money.
Cyberterrorist 
• A cyberterrorist is someone who uses the 
• Internet or network to destroy or damage computers for political 
reasons. The 
• cyberterrorist might target the nation’s air 
• traffic control system, electricity-generating companies, or a 
telecommunications infrastructure. 
• The term, cyberwarfare, describes an attack whose goal ranges from 
disabling a government’s computer network to crippling 
• a country. Cyberterrorism and cyberwarfare usually require a team of 
highly skilled
Internet and Network Attacks 
• Information transmitted over networks has a 
• higher degree of security risk than information 
• kept on an organization’s premises. In an organization, 
• network administrators usually take 
• measures to protect a network from security 
• risks. On the Internet, where no central administrator 
• is present, the security risk is greater.
Security service 
• To determine if your computer is vulnerable 
• to an Internet or network attack, you 
• could use an online security service. An online 
• security service is a Web site that evaluates 
• your computer to check for Internet and e-mail 
• vulnera bilities
How virus can spread through Email Message
Safeguards against Computer Viruses 
and Other Malware 
• Methods that guarantee a computer or 
• network is safe from computer viruses and other 
• malware simply do not exist. Users can take several 
• precautions, however, to protect their home 
• and work computers and mobile devices from 
• these malicious infections
Precautions 
• Do not start a computer with removable media inserted in the drives or plugged in the ports. 
• For example, optical disc drives should be empty, and a USB port should not contain a USB 
flash 
• drive. During the startup process, a computer 
• may attempt to execute the boot sector on media 
• in certain drives and ports. Even if the attempt is 
• unsuccessful, a virus on the boot sector of removable 
• media can infect the computer’s hard disk. 
• If you must start the computer with media in a 
• drive or port, be certain the media are uninfected 
• or from a trusted source
Precautions 
• Never open an e-mail attachment unless you 
• are expecting the attachment and it is from a 
• trusted source. If the e-mail message is from an 
• unknown source or untrusted source, delete the 
• e-mail message immediately — without opening 
• or executing any attachments.
Precautions 
• Some viruses are hidden in macros, which 
• are instructions saved in software such as a word 
• processing or spreadsheet program. In programs 
• that allow users to write macros, you should set 
• the macro security level so that the application 
• software warns users that a document they are 
• attempting to open contains a macro
Precautions 
• Users should install an antivirus program and 
• update it frequently. 
• An antivirus program protects a computer against 
• viruses by identifying and removing any computer 
• viruses found in memory, on storage media, 
• or on incoming files.
Precautions 
• One technique that antivirus programs use to 
• identify a virus is to look for virus signatures. A 
• virus signature, also called a virus definition, is 
• a known specific pattern of virus code. Computer 
• users should update their antivirus program’s 
• signature files regularly

Contenu connexe

Tendances

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Tendances (20)

Types of malware
Types of malwareTypes of malware
Types of malware
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
system Security
system Security system Security
system Security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Computer security
Computer securityComputer security
Computer security
 

En vedette

4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
badak sumbu
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
malik1972
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
chrispaul8676
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
mmagario
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
Miguel Rebollo
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

En vedette (16)

Cyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the CorporateCyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the Corporate
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Hardware theft
Hardware theftHardware theft
Hardware theft
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Role of media in social awareness
Role of media in social awarenessRole of media in social awareness
Role of media in social awareness
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Software theft
Software theftSoftware theft
Software theft
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similaire à Computer security risks

BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
limsh
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
Kitkat Emoo
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 

Similaire à Computer security risks (20)

Computer security risks
Computer security risksComputer security risks
Computer security risks
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Information security
Information securityInformation security
Information security
 
презентация1
презентация1презентация1
презентация1
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Computer Security update and virus .pptx
Computer Security  update and virus .pptxComputer Security  update and virus .pptx
Computer Security update and virus .pptx
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Computer security
Computer securityComputer security
Computer security
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 

Plus de Aasim Mushtaq

Quality Assurance and Inspection of Nestle QEC
Quality Assurance and Inspection of Nestle QECQuality Assurance and Inspection of Nestle QEC
Quality Assurance and Inspection of Nestle QEC
Aasim Mushtaq
 
110 mcqs of HR Management Solved
110 mcqs of HR Management Solved 110 mcqs of HR Management Solved
110 mcqs of HR Management Solved
Aasim Mushtaq
 
Cash conversion cycle
Cash conversion cycleCash conversion cycle
Cash conversion cycle
Aasim Mushtaq
 
Bond Valuation Financial Management
Bond Valuation Financial ManagementBond Valuation Financial Management
Bond Valuation Financial Management
Aasim Mushtaq
 
Tips for a Good Presentation
Tips for a Good PresentationTips for a Good Presentation
Tips for a Good Presentation
Aasim Mushtaq
 

Plus de Aasim Mushtaq (20)

Carmichael Coal Mine Case Study
Carmichael Coal Mine Case StudyCarmichael Coal Mine Case Study
Carmichael Coal Mine Case Study
 
Tally erp 9 notes and practice book
Tally erp 9 notes and practice bookTally erp 9 notes and practice book
Tally erp 9 notes and practice book
 
Quality Assurance and Inspection of Nestle QEC
Quality Assurance and Inspection of Nestle QECQuality Assurance and Inspection of Nestle QEC
Quality Assurance and Inspection of Nestle QEC
 
Impact of Dividend policy on Shareholders Wealth
Impact of Dividend policy on Shareholders WealthImpact of Dividend policy on Shareholders Wealth
Impact of Dividend policy on Shareholders Wealth
 
110 mcqs of HR Management Solved
110 mcqs of HR Management Solved 110 mcqs of HR Management Solved
110 mcqs of HR Management Solved
 
Growth model
Growth modelGrowth model
Growth model
 
Cash conversion cycle
Cash conversion cycleCash conversion cycle
Cash conversion cycle
 
Bond Valuation Financial Management
Bond Valuation Financial ManagementBond Valuation Financial Management
Bond Valuation Financial Management
 
Islamic Banking/ Financing Trends & Opportunities
Islamic Banking/ Financing Trends & OpportunitiesIslamic Banking/ Financing Trends & Opportunities
Islamic Banking/ Financing Trends & Opportunities
 
Monopoly, Monopolistic Competition and Oligopoly
Monopoly, Monopolistic Competition and OligopolyMonopoly, Monopolistic Competition and Oligopoly
Monopoly, Monopolistic Competition and Oligopoly
 
Financial Statement Analysis of Suzuki Motors
Financial Statement Analysis of Suzuki Motors Financial Statement Analysis of Suzuki Motors
Financial Statement Analysis of Suzuki Motors
 
Strategic Management
Strategic ManagementStrategic Management
Strategic Management
 
Utility Programs
Utility ProgramsUtility Programs
Utility Programs
 
Salient features of Pakistan's Budget 2014-15
Salient features of Pakistan's Budget 2014-15 Salient features of Pakistan's Budget 2014-15
Salient features of Pakistan's Budget 2014-15
 
Salient features of budget 2014
Salient features of budget 2014Salient features of budget 2014
Salient features of budget 2014
 
Financial Statement Analysis Engro Foods, Ratios
Financial Statement Analysis Engro Foods, RatiosFinancial Statement Analysis Engro Foods, Ratios
Financial Statement Analysis Engro Foods, Ratios
 
Impact of Branding on consumer buying behaviour
Impact of Branding on consumer buying behaviour Impact of Branding on consumer buying behaviour
Impact of Branding on consumer buying behaviour
 
Tips for a Good Presentation
Tips for a Good PresentationTips for a Good Presentation
Tips for a Good Presentation
 
Team Work
Team WorkTeam Work
Team Work
 
Input devices
Input devicesInput devices
Input devices
 

Dernier

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Computer security risks

  • 2. Computer Security Risks • A computer security risk is any event or • action that could cause a loss of or damage to • computer hardware, software, data, information, • or processing capability
  • 3. Cybercrime Any illegal act involving a computer generally is referred to as a computer crime. The term cybercrime refers to online or Internet-based illegal acts. Software used by cybercriminals sometimes is called crimeware. Today, cybercrime is one of the FBI’s top three priorities.
  • 4. Hacker • Someone who accesses a • computer or network illegally is called hacker. • Some hackers • claim the intent of their security breaches is • to improve security.
  • 5. Cracker • A cracker also is someone who accesses • a computer or network illegally but has • the intent of destroying data, stealing • information, or other malicious action. • Both hackers and crackers have advanced • computer and network skills.
  • 6. Script kiddie • A script kiddie has the same intent as a • cracker but does not have the technical skills
  • 7. Cyberextortionist (CRIMINAL LAW obtaining something by illegal threats) A cyberextortionist is someone who uses e-mail as a vehicle for extortion. These perpetrators send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network — if they are not paid a sum of money.
  • 8. Cyberterrorist • A cyberterrorist is someone who uses the • Internet or network to destroy or damage computers for political reasons. The • cyberterrorist might target the nation’s air • traffic control system, electricity-generating companies, or a telecommunications infrastructure. • The term, cyberwarfare, describes an attack whose goal ranges from disabling a government’s computer network to crippling • a country. Cyberterrorism and cyberwarfare usually require a team of highly skilled
  • 9. Internet and Network Attacks • Information transmitted over networks has a • higher degree of security risk than information • kept on an organization’s premises. In an organization, • network administrators usually take • measures to protect a network from security • risks. On the Internet, where no central administrator • is present, the security risk is greater.
  • 10. Security service • To determine if your computer is vulnerable • to an Internet or network attack, you • could use an online security service. An online • security service is a Web site that evaluates • your computer to check for Internet and e-mail • vulnera bilities
  • 11. How virus can spread through Email Message
  • 12. Safeguards against Computer Viruses and Other Malware • Methods that guarantee a computer or • network is safe from computer viruses and other • malware simply do not exist. Users can take several • precautions, however, to protect their home • and work computers and mobile devices from • these malicious infections
  • 13. Precautions • Do not start a computer with removable media inserted in the drives or plugged in the ports. • For example, optical disc drives should be empty, and a USB port should not contain a USB flash • drive. During the startup process, a computer • may attempt to execute the boot sector on media • in certain drives and ports. Even if the attempt is • unsuccessful, a virus on the boot sector of removable • media can infect the computer’s hard disk. • If you must start the computer with media in a • drive or port, be certain the media are uninfected • or from a trusted source
  • 14. Precautions • Never open an e-mail attachment unless you • are expecting the attachment and it is from a • trusted source. If the e-mail message is from an • unknown source or untrusted source, delete the • e-mail message immediately — without opening • or executing any attachments.
  • 15. Precautions • Some viruses are hidden in macros, which • are instructions saved in software such as a word • processing or spreadsheet program. In programs • that allow users to write macros, you should set • the macro security level so that the application • software warns users that a document they are • attempting to open contains a macro
  • 16. Precautions • Users should install an antivirus program and • update it frequently. • An antivirus program protects a computer against • viruses by identifying and removing any computer • viruses found in memory, on storage media, • or on incoming files.
  • 17. Precautions • One technique that antivirus programs use to • identify a virus is to look for virus signatures. A • virus signature, also called a virus definition, is • a known specific pattern of virus code. Computer • users should update their antivirus program’s • signature files regularly