SlideShare ist ein Scribd-Unternehmen logo
1 von 9
PROTECT COMPUTER
FROM MALWARE
Chapter 6
Computer Security and Ethics
• HOW TO PROTECT COMPUTER SYSTEM FROM
VIRUS ATTACK
There are many ways to protect
computer system from virus attacks.
Here are some simple steps to protect
your computer.
• INSTALL FIREWALL
A firewall enacts the role of a security
guard.
INSTALL ANTIVIRUS SOFTWARE
It helps to protect the computer from
any unauthorized code or software
that creates a threat to the system.
INSTALL ANTI-SPYWARE SOFTWARE
Anti-spyware is a computer program
that detects infection on computer
and removes them.
• The following are common methodologies
used for authentication purpose.
USERNAME AND PASSWORD
• A user name is a name that identifies a
person on a computer system.
• Username and password are used to
authorize users to have access to computer
system, e-mail account, bank account and
other services available on computer.
COMMON METHODOLOGIES USED FOR
AUTHENTICATION
PERSONAL IDENTIFICATION NUMBER [PIN]
• Personal identification number [PIN] is a
confidential numeric password used to
authenticate a user to get access to computer
system.
• ACCESS CARD
Access cards are very similar in appearance to
credit cards. They areused to open security gates,
parking barriers and doors of hotel rooms.
• BIOMETRICS
Biometrics is a method based on measurement
of features of face, fingerprints, hand geometry,
signature and voice for authentication of
individuals.
COMPUTER ETHICS
• Computer ethics means an acceptable
behavior for using computer technology. It is a
code of behavior for moral and social issues
while using computer technology, particularly
internet. Computer use should be honest
respect the rights of others on the internet
and obey laws that apply online behavior.
ETHICAL USE OF COMPUTER
• Computer should not be used to harm other
people.
• Computer user should not break into other’s
computer system to steal, change or destroy
information.
• Computer should not read documents and e-
mails of other users without their consent.
• People should not commit any type of crime with
the help of computer technology.
• Computer users should respect the privacy of
others.
Assignment
Solve the following questions :
1. What are common methodologies used for authentication?
2. Define computer ethics and write some important moral guidelines for
ethical use of computer technology .
3. Name any three places where authentication of people is required .
4. What types of problems may be faced if computer users do not comply
with the moral guidelines of computer ethics?
5. You have learned four common methodologies used for authentication
purpose Explain any two of them .
6. Define authorized and unauthorized access with example .
Refer Textbook
•Review Key points of
the chapter Review
•Review MCQs

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
Atlantic Training, LLC.
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

Was ist angesagt? (19)

System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
Security
SecuritySecurity
Security
 
Security in Banks and ATM's
Security in Banks and ATM'sSecurity in Banks and ATM's
Security in Banks and ATM's
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Evote and associated risks
Evote and associated risksEvote and associated risks
Evote and associated risks
 
Software Security
Software SecuritySoftware Security
Software Security
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Resume Modified
Resume ModifiedResume Modified
Resume Modified
 
Automation
AutomationAutomation
Automation
 
Internet
InternetInternet
Internet
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
A dummies guide to security
A dummies guide to securityA dummies guide to security
A dummies guide to security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 

Ähnlich wie Protect computer from malware

Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
MamthaMam1
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 

Ähnlich wie Protect computer from malware (20)

ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Information security management
Information security managementInformation security management
Information security management
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
gagan internship.pptx
gagan internship.pptxgagan internship.pptx
gagan internship.pptx
 
INTERNT.ppt
INTERNT.pptINTERNT.ppt
INTERNT.ppt
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 

Mehr von ShouaQureshi

Word processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updatedWord processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updated
ShouaQureshi
 

Mehr von ShouaQureshi (18)

touchscreens
touchscreenstouchscreens
touchscreens
 
3D Priinters
3D Priinters 3D Priinters
3D Priinters
 
2D and 3D Cutter
2D and 3D Cutter 2D and 3D Cutter
2D and 3D Cutter
 
scanners touchscreen bar code readers
scanners touchscreen bar code readersscanners touchscreen bar code readers
scanners touchscreen bar code readers
 
impact and non impact printers
impact and non impact printers impact and non impact printers
impact and non impact printers
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
2d and 3d cutters
2d and 3d cutters2d and 3d cutters
2d and 3d cutters
 
Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship Key,ID Field and Tables Relationship
Key,ID Field and Tables Relationship
 
Input and output devices
Input and output devicesInput and output devices
Input and output devices
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Multiple choice questions chapter 1
Multiple choice questions  chapter 1Multiple choice questions  chapter 1
Multiple choice questions chapter 1
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
 
Class ix ms word part 1
Class ix ms word part 1Class ix ms word part 1
Class ix ms word part 1
 
Word processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updatedWord processing part 2 lecture and assignment updated
Word processing part 2 lecture and assignment updated
 
Spreadsheet new
Spreadsheet newSpreadsheet new
Spreadsheet new
 
Manupulating and formatting data
Manupulating and formatting dataManupulating and formatting data
Manupulating and formatting data
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Protect computer from malware

  • 1. PROTECT COMPUTER FROM MALWARE Chapter 6 Computer Security and Ethics
  • 2. • HOW TO PROTECT COMPUTER SYSTEM FROM VIRUS ATTACK There are many ways to protect computer system from virus attacks. Here are some simple steps to protect your computer. • INSTALL FIREWALL A firewall enacts the role of a security guard.
  • 3. INSTALL ANTIVIRUS SOFTWARE It helps to protect the computer from any unauthorized code or software that creates a threat to the system. INSTALL ANTI-SPYWARE SOFTWARE Anti-spyware is a computer program that detects infection on computer and removes them.
  • 4. • The following are common methodologies used for authentication purpose. USERNAME AND PASSWORD • A user name is a name that identifies a person on a computer system. • Username and password are used to authorize users to have access to computer system, e-mail account, bank account and other services available on computer. COMMON METHODOLOGIES USED FOR AUTHENTICATION
  • 5. PERSONAL IDENTIFICATION NUMBER [PIN] • Personal identification number [PIN] is a confidential numeric password used to authenticate a user to get access to computer system. • ACCESS CARD Access cards are very similar in appearance to credit cards. They areused to open security gates, parking barriers and doors of hotel rooms. • BIOMETRICS Biometrics is a method based on measurement of features of face, fingerprints, hand geometry, signature and voice for authentication of individuals.
  • 6. COMPUTER ETHICS • Computer ethics means an acceptable behavior for using computer technology. It is a code of behavior for moral and social issues while using computer technology, particularly internet. Computer use should be honest respect the rights of others on the internet and obey laws that apply online behavior.
  • 7. ETHICAL USE OF COMPUTER • Computer should not be used to harm other people. • Computer user should not break into other’s computer system to steal, change or destroy information. • Computer should not read documents and e- mails of other users without their consent. • People should not commit any type of crime with the help of computer technology. • Computer users should respect the privacy of others.
  • 8. Assignment Solve the following questions : 1. What are common methodologies used for authentication? 2. Define computer ethics and write some important moral guidelines for ethical use of computer technology . 3. Name any three places where authentication of people is required . 4. What types of problems may be faced if computer users do not comply with the moral guidelines of computer ethics? 5. You have learned four common methodologies used for authentication purpose Explain any two of them . 6. Define authorized and unauthorized access with example .
  • 9. Refer Textbook •Review Key points of the chapter Review •Review MCQs