This document discusses how to protect computers from malware through various methods. It recommends installing a firewall, antivirus software, and anti-spyware software to block unauthorized code and protect the system. Common authentication methods for computer access include usernames and passwords, personal identification numbers, access cards, and biometrics like fingerprints. The document also covers the importance of computer ethics and guidelines for ethical computer use, such as respecting privacy, not harming others, and not committing crimes.
2. • HOW TO PROTECT COMPUTER SYSTEM FROM
VIRUS ATTACK
There are many ways to protect
computer system from virus attacks.
Here are some simple steps to protect
your computer.
• INSTALL FIREWALL
A firewall enacts the role of a security
guard.
3. INSTALL ANTIVIRUS SOFTWARE
It helps to protect the computer from
any unauthorized code or software
that creates a threat to the system.
INSTALL ANTI-SPYWARE SOFTWARE
Anti-spyware is a computer program
that detects infection on computer
and removes them.
4. • The following are common methodologies
used for authentication purpose.
USERNAME AND PASSWORD
• A user name is a name that identifies a
person on a computer system.
• Username and password are used to
authorize users to have access to computer
system, e-mail account, bank account and
other services available on computer.
COMMON METHODOLOGIES USED FOR
AUTHENTICATION
5. PERSONAL IDENTIFICATION NUMBER [PIN]
• Personal identification number [PIN] is a
confidential numeric password used to
authenticate a user to get access to computer
system.
• ACCESS CARD
Access cards are very similar in appearance to
credit cards. They areused to open security gates,
parking barriers and doors of hotel rooms.
• BIOMETRICS
Biometrics is a method based on measurement
of features of face, fingerprints, hand geometry,
signature and voice for authentication of
individuals.
6. COMPUTER ETHICS
• Computer ethics means an acceptable
behavior for using computer technology. It is a
code of behavior for moral and social issues
while using computer technology, particularly
internet. Computer use should be honest
respect the rights of others on the internet
and obey laws that apply online behavior.
7. ETHICAL USE OF COMPUTER
• Computer should not be used to harm other
people.
• Computer user should not break into other’s
computer system to steal, change or destroy
information.
• Computer should not read documents and e-
mails of other users without their consent.
• People should not commit any type of crime with
the help of computer technology.
• Computer users should respect the privacy of
others.
8. Assignment
Solve the following questions :
1. What are common methodologies used for authentication?
2. Define computer ethics and write some important moral guidelines for
ethical use of computer technology .
3. Name any three places where authentication of people is required .
4. What types of problems may be faced if computer users do not comply
with the moral guidelines of computer ethics?
5. You have learned four common methodologies used for authentication
purpose Explain any two of them .
6. Define authorized and unauthorized access with example .