Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

Computer security

Jamal A Nasir
Computer Security Risks
What is a computer security risk?
 Event or action that causes loss of or damage to
computer system
Internet and Network Attacks

What are viruses, worms, and Trojan horses?

Virus is a Worm copies Trojan horse hides


potentially itself repeatedly, within
damaging using up or looks like
resources
computer legitimate
and possibly
program shutting down program until
computer or triggered
network
Does not
Can spread
replicate
and
itself on
damage
other
files
computers
Internet and Network Attacks

How can a virus spread through an e-mail message?


Step 1. Unscrupulous Step 2. They use
programmers create a virus the Internet to send
program that deletes all files. the e-mail message
They hide the virus in a to thousands of
picture and attach the picture users around the
to an e-mail message. world.

Step 3b. Other users do not


recognize the name of the
Step 3a. Some sender of the e-mail message.
users open the These users do not open the
attachment and e-mail message - instead they
their computers delete the e-mail message.
become infected These users’ computers are not
with the virus. infected with the virus.
Internet and Network Attacks

What is an antivirus program?


 Identifies and removes
computer viruses
 Most also protect
against worms , Trojan
horses, and spyware
Internet and Network Attacks

What are some tips for preventing virus, worm, and Trojan
horse infections?
Never open an
Never start a e-mail attachment
Install an antivirus
computer with unless you are
program on all of
removable media expecting it and
your computers
inserted it is from a
trusted source
If the antivirus
Check all
program flags an
downloaded
e-mail attachment Install a personal
programs for
as infected, delete firewall program
viruses, worms,
the attachment
or Trojan horses
immediately
Internet and Network Attacks

What is a firewall?
 Security system consisting of hardware and/or
software that prevents unauthorized intrusion
Internet and Network Attacks

What is a personal firewall?


 Program that protects personal computer and its data
from unauthorized intrusions
 Monitors transmissions to and from computer
 Informs you of attempted intrusion
Unauthorized Access and Use
What is a user name?
 Unique combination of characters that identifies user
 Password is private
combination of
characters associated
with the user name
that allows access
to computer
resources
Unauthorized Access and Use
How can you make your password more secure?
 Longer passwords provide greater security
Unauthorized Access and Use
What is a biometric device?
 Authenticates person’s
identity using personal
characteristic
 Fingerprint, hand geometry,
voice, signature, etc.

p. 567 - 568 Fig. 11-13 Next


Backing Up — The Ultimate Safeguard
What is a backup?

Duplicate of file, program, or disk

Three-generation
Three-generation
Full
Fullbackup
backup Selective
Selectivebackup
backup backup
backup
all
allfiles
filesinin select
selectwhich
whichfiles
files preserves
preserves
computer
computer totoback
backup
up three
threecopies
copiesofof
important
importantfiles
files

In case of system failure or corrupted files,


restore files by copying to original location
Health Concerns of Computer Use
What are some health concerns of computer use?
Computer
Computer vision syndrome
(CVS)—eye and vision
problems
Carpal
Carpal tunnel
tunnel syndrome
syndrome (CTS)
(CTS)
—inflammation
—inflammation ofof nerve
nerve that
that
connects
connects forearm
forearm toto palm
palm

Repetitive strain injury (RSI)

Tendonitis—inflammation
Tendonitis—inflammation ofof
tendon
tendon due
due to
to repeated
repeated motion
motion
Computer addiction—when
addiction—when
computer consumes entire
social life
life

You might also like