0% found this document useful (0 votes)
18 views21 pages

Categories of Computer Problems

The document outlines how to identify and solve computer problems, categorizing them into hardware and software issues, along with steps for troubleshooting each type. It also discusses the importance of regular computer maintenance, types of diagnostic software, and guidelines for hardware repairs. Additionally, it covers malware and computer viruses, including their definitions, common targets, and prevention methods.

Uploaded by

Eva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views21 pages

Categories of Computer Problems

The document outlines how to identify and solve computer problems, categorizing them into hardware and software issues, along with steps for troubleshooting each type. It also discusses the importance of regular computer maintenance, types of diagnostic software, and guidelines for hardware repairs. Additionally, it covers malware and computer viruses, including their definitions, common targets, and prevention methods.

Uploaded by

Eva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

6H

Identify Computer Problems

• All computer problems fall into two categories:


Hardware problems and Software problems
• Hardware Problems: Basic steps to identify and/or
solve the hardware problem:
– Check that your computer is plugged into a working outlet
– Check that everything is turned on. If something seems to be
not working, make sure the brightness is up or the on switch
is in the appropriate position or the volume unmuted
depending on what you are having issues with
– Check that keyboard, mouse, monitor, speakers, etc. are
plugged into your device. Try a different port, if one is
available, to check if it is the port or the device that is
damaged. Make sure that wireless hardware has a fully
charged battery

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 4

Identify Computer Problems (Cont’)

• Software Problems: Basic steps to identify and/or


solve software issues:

– Try restarting your computer


– Make sure your all programs are updated
– Check that your antivirus software is running
– If your computer is having problems after a new program was
installed, remove that program and try reinstalling it

• How to Solve H/S problems?


– You may find online help on the Internet
– While trying to identify the problem with your computer, it is
good to take notes

Here’s a summary of the information about identifying and solving computer problems:

Categories of Computer Problems

1. Hardware Problems

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 1/21
2. Software Problems

Steps to Identify and Solve Hardware Problems

1. Power and Connections:


Ensure the computer is plugged into a working power outlet.
Confirm that the computer and peripherals are turned on.
2. Settings:
Check brightness, power switches, and volume settings, depending on the issue.
3. Peripheral Devices:
Ensure that external devices (keyboard, mouse, monitor, speakers) are properly connected.
Test peripherals in a different port to rule out port or device issues.
Confirm that wireless devices have fully charged batteries.

Steps to Identify and Solve Software Problems

1. Basic Troubleshooting:
Restart the computer.
2. Updates and Antivirus:
Verify that all software and operating system updates are installed.
Ensure antivirus software is active and up to date.
3. Recently Installed Programs:
If the problem occurred after installing new software, uninstall it and reinstall.

General Tips for Solving Hardware/Software Problems

Look for solutions online (e.g., forums, tutorials, or official support pages).
Keep detailed notes of the steps you take to identify or resolve the issue for future reference.

This structured approach simplifies computer troubleshooting and helps address issues effectively.

Most common computer problems

• Some tips for distinguishing between hardware


problems and software problems are given below:
– Were there any loud noises or smoke when the problem first
appeared? Then it is probably a hardware problem, with the
most likely culprit being the SMPS (Switched Mode
Power Supply) unit.
– Is the computer entirely dead? Or the screen blank? Or the
screen showing a poor/incomplete picture? These faults are
probably also due to hardware problems.
– Does the computer produce a series of beeps? This is a code
that can be used to distinguish some hardware problems.

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 2/21
Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 6

Most common computer problems (Cont’)

– Does the system give any error codes or descriptions while


booting? These can be due to hardware or software
problems. Take careful note of all information given in the
error code.

– Does the computer produce error information after it has


booted or only when you open specific programs? These error
codes are probably due to software problems.
– Have any recent changes been made to hardware or software
(including BIOS settings)? If so, these are likely culprits.
– Has the computer been exposed to viruses or other malware?
This could be a cause of software problems.

Here’s a concise summary of common computer problems and how to distinguish between hardware
and software issues:

Identifying Hardware Problems

1. Physical Signs:
Loud noises or smoke: Likely a hardware issue, especially with the SMPS (Switched Mode
Power Supply).
Blank or distorted screen: Indicates possible hardware faults.
Series of beeps: Indicates hardware issues, often signaling specific faults (check the beep
code documentation).
2. No Response:
If the computer is entirely dead, it’s likely a hardware issue, such as power failure.
3. Error Codes on Boot:
Boot errors can be caused by both hardware and software issues. Record the error code for
diagnosis.

Identifying Software Problems

1. Error Messages:
Errors during booting or while using specific programs often indicate software problems.
2. Recent Changes:
Recent software installations, updates, or changes to BIOS settings can cause software
problems.
3. Virus/Malware Exposure:

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 3/21
If the system behaves erratically, check for malware or viruses.

General Guidelines for Troubleshooting

Note error messages, codes, and system behavior to assist in pinpointing the cause.
Investigate recent changes to hardware or software.
For hardware issues, check physical components; for software issues, check updates, settings, and
antivirus status.

This approach helps differentiate between hardware and software issues effectively.

Diagnostics Software

• Several types of diagnostic software are available for


PCs
• The types of diagnostic software are as follows:
– POST (Power-On Self-Test)
– Manufacturer-supplied diagnostics software
– Peripheral diagnostics software
– Operating system diagnostics software
– Commercial diagnostics software
– Free/open-source diagnostics software

Here’s an overview of the different types of diagnostic software for PCs:

Types of Diagnostic Software

1. POST (Power-On Self-Test):


Built-in diagnostic tool that runs when a computer is powered on.
Checks critical hardware components like RAM, CPU, and storage devices.
Displays or beeps error codes if issues are detected.
2. Manufacturer-Supplied Diagnostics Software:
Provided by hardware manufacturers (e.g., Dell Diagnostics, Lenovo Diagnostics).
Designed to test and troubleshoot components specific to the manufacturer's hardware.
3. Peripheral Diagnostics Software:
Used to test and diagnose issues with external or peripheral devices (e.g., printers, monitors,
or external drives).
May be provided by the peripheral’s manufacturer.
4. Operating System Diagnostics Software:
Built into the operating system (e.g., Windows Memory Diagnostic, macOS Disk Utility).
Helps identify and resolve hardware or software issues within the OS environment.
5. Commercial Diagnostics Software:

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 4/21
Paid tools with advanced features for PC diagnostics (e.g., Norton Utilities, AIDA64, or PC-
Doctor).
Often used by professionals for in-depth analysis.
6. Free/Open-Source Diagnostics Software:
Free alternatives that offer diagnostic tools for hardware and software issues (e.g.,
MemTest86, HWiNFO, CrystalDiskInfo).
Ideal for personal or basic use without incurring additional costs.

Each type of diagnostic software serves a specific purpose and can be used based on the issue and user
expertise. Combining these tools can provide comprehensive diagnostics and troubleshooting.

Computer Maintenance

• Computer maintenance is the practice of keeping


computers in a good state of repair
• Here are five great reasons why regular computer
maintenance is a good idea:
– Early Detection of Issues
– Prevention against Viruses and Malware
– Speed up Your Computer
– Maximize your Software Efficiency
– Prevent Data Loss

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 9

Computer Maintenance (Cont’)

• Some of the techniques for improving the slow


performance of a computer
– Dust control
– Disk Defragmenter
– Scan Disk/ Check Now
– Excess and Unused Files
– Disk Cleanup
– Deleting Browsing History
– Startup folder
– Software Inventory
– Protect your PC from cyber-threats or Malware
– Updating Software
– Overheating
– Insufficient RAM
– Endurance

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 5/21
Computer Maintenance Overview

Definition:
Computer maintenance involves regularly checking, repairing, and optimizing computers to ensure they
function efficiently and reliably.

Why Regular Maintenance is Important

1. Early Detection of Issues:


Identify and fix problems before they escalate, saving time and costs.
2. Prevention Against Viruses and Malware:
Regular updates and scans protect your system from malicious threats.
3. Speed Up Your Computer:
Optimizing software and cleaning hardware ensures better performance.
4. Maximize Software Efficiency:
Keeps programs running smoothly by resolving compatibility issues and applying updates.
5. Prevent Data Loss:
Regular backups and proper maintenance reduce the risk of losing important files.

Techniques for Improving Computer Performance

1. Hardware Maintenance:
Dust Control: Prevent overheating by cleaning internal components.
Overheating Prevention: Ensure proper ventilation and cooling systems.
RAM Upgrade: Add more memory if applications demand higher performance.
2. Storage Optimization:
Disk Defragmenter: Reorganize fragmented data for faster access.
Disk Cleanup: Remove temporary files and unused system data.
Excess and Unused Files: Regularly delete unnecessary files.
3. System Scans and Updates:
Scan Disk/Check Now: Detect and fix disk errors.
Antivirus and Malware Protection: Use reliable security tools to safeguard your PC.
Updating Software: Keep your OS and applications current for better stability and security.
4. System Settings:
Startup Folder: Disable unnecessary programs at startup to improve boot time.
Software Inventory: Remove unused or outdated software to free resources.
5. User Habits:
Deleting Browsing History: Clears cached data, improving browser performance.
Endurance: Regularly monitor and maintain your system to prolong its lifespan.

By following these practices, you can maintain a reliable and efficient computer system while reducing
the risk of failures.

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 6/21
Hardware Repairs

• Repair means to rectify, to fix the problem either in the


hardware or software
• For repairing or trouble-shooting a computer use the
following guidelines:
– Gather together your toolkit
– Check for power FIRST, before doing anything else
– Check your external connections to the computer
– Perform the Power-On-Self-Test (POST)
– If the computer is still malfunctioning, go ahead then and open
the case

– Clean any dust or foreign material out of the case while it is open

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 11

Hardware Repairs (Cont’)

– Try to boot the computer with hard drive, or with a bootable


CD/DVD disk if necessary
– Check the CMOS setup program, and correct any configuration
problems
– Look for unwanted changes
– Isolate the problem to one piece of hardware, or one software
package
– When all these fails, then consult a professional
– The computer is unable to start up
– The computer screen is blank
– The Blue screen

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 12

Hardware Repairs (Cont’)

– Trouble with video card

– OS or some Software is functioning abnormally


– Windows do not boot properly
– The computer is on but not responding
– An external device is not working
– Replacing a Power Supply
– Replacing a Hard Drive or formatting and installing Fresh OS
– Replacing RAM
– Peripheral Hardware Use and Maintenance

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 7/21
Hardware Repairs Overview

Definition:
Hardware repair involves fixing physical components of a computer or troubleshooting related issues.

Guidelines for Troubleshooting and Repairing Hardware

1. Preparation:
Gather your toolkit (screwdrivers, thermal paste, anti-static wrist strap, etc.).
2. Initial Checks:
Check for power before proceeding with any repairs.
Verify external connections (e.g., cables, power cords).
3. Testing:
Perform the Power-On Self-Test (POST) to detect hardware issues.
If POST doesn’t help, open the case for further inspection.
4. Cleaning:
Remove dust or foreign materials from inside the case to prevent overheating.
5. Boot Testing:
Attempt to boot using the hard drive or a bootable CD/DVD.
6. Configuration:
Access the CMOS setup program to check and correct configuration settings.
Identify and undo any unwanted changes in the system.
7. Problem Isolation:
Narrow the issue down to a specific hardware component or software program.
8. Consult Professionals:
If all else fails, seek professional assistance.

Common Hardware Problems and Repairs

1. Computer Fails to Start:


Check power supply, connections, and motherboard functionality.
2. Blank Screen:
Verify video card connections and monitor functionality.
3. Blue Screen (BSOD):
Look for hardware conflicts or driver errors.
4. Video Card Issues:
Inspect for physical damage or replace the card if needed.
5. Abnormal OS or Software Functioning:
Check for hardware compatibility issues and update drivers.
6. Windows Fails to Boot Properly:
Repair or reinstall the operating system, if necessary.

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 8/21
7. Unresponsive Computer:
Inspect power supply, RAM, or motherboard.
8. External Device Malfunction:
Test the device on another computer to rule out device failure.

Repair Solutions for Common Hardware Issues

Replacing Components:
Power Supply: Replace if there are power irregularities.
Hard Drive: Replace or reformat and reinstall a fresh OS if the drive fails.
RAM: Replace faulty memory sticks to restore performance.
Peripheral Maintenance:
Check cables, clean connectors, and update device drivers regularly.

By systematically diagnosing and addressing these issues, you can effectively repair and maintain
computer hardware.

Malware

• Malicious software, is any software used to disrupt


computer or mobile operations, gather sensitive
information, gain access to private computer systems, or
display unwanted advertising.

• These malicious software find its way into:

– a) Boot sector,
– b) File Allocation Table,
– c) Partition table, and

– d) .Com and .Exe. Files.

Malware Overview

Definition:
Malware (short for malicious software) refers to any software designed with harmful intent. It can:

Disrupt computer or mobile operations.


Steal sensitive information.
Gain unauthorized access to private systems.
Display unwanted advertising (adware).

Common Malware Targets

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 9/21
1. Boot Sector:
The part of a hard drive or storage device containing essential startup instructions. Malware
in the boot sector can prevent the computer from starting properly.
2. File Allocation Table (FAT):
A system that keeps track of where files are stored on a disk. Malware targeting the FAT can
corrupt or hide files.
3. Partition Table:
Contains information about disk partitions. Malware affecting this area can render the disk
unreadable or inaccessible.
4. .Com and .Exe Files:
Executable files are often infected because they run programs, making them an easy target
for malware to spread.

Key Takeaways

Malware can attack critical areas of a computer system, including:

Startup processes (boot sector).


File management systems (FAT and partition table).
Executable programs (.com and .exe files).

Understanding these vulnerabilities is essential for preventing, detecting, and removing malware
effectively.

Computer Virus

• A computer virus is defined as a piece of code which is executed in


a target computer to hamper the smooth functioning of the PC.
– It replicates itself and can quickly affect hosts of other computers, thus
paralyzing the entire network.

• Types of PC Virus: Boot Sector Virus, Macro Virus, and email virus
• How do Computer Viruses Spread?
• Deadly effect of virus
• Symptoms of Computer Virus Infection
• How to Prevent Viruses?
• How to Remove a Virus?

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 15

Computer Virus (Cont’)


• A Good Virus Protection Program should:
– Scan for viruses: Should be able to check your drives for
viruses, as well as the RAM of your computer, and detect

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 10/21
the presence of a virus.
– Clean up the virus: must be able to get rid of the virus it
finds on your computer; otherwise, it is useless.
– Protect your System from viruses: Must have the ability
to load a piece of the program into memory at boot-up time,
to protect you from getting a virus in the first place.
– Provide Automatic updates: Must regularly and
automatically check back with the manufacturer for
information on new viruses.

Computer Virus Overview

Definition:
A computer virus is a piece of malicious code designed to disrupt the normal functioning of a computer.

Key Features:
Self-replicates to infect multiple systems.
Can spread across networks, potentially paralyzing them.

Types of Computer Viruses

1. Boot Sector Virus:


Infects the boot sector of a hard drive, making the system unbootable.
2. Macro Virus:
Targets applications like MS Office by embedding malicious code in documents or
spreadsheets.
3. Email Virus:
Spreads through infected email attachments or links.

How Do Computer Viruses Spread?

Infected email attachments or malicious links.


Downloading files or software from untrusted sources.
USB drives or other infected external devices.
Exploiting vulnerabilities in outdated software or operating systems.

Deadly Effects of a Virus

System slowdowns or crashes.


Corruption or deletion of files.
Unauthorized access to sensitive data.
Disruption of entire networks or systems.

Symptoms of a Virus Infection

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 11/21
Frequent pop-up ads or error messages.
Unusual system behavior (slow performance or crashes).
Unauthorized changes to system settings or files.
New or unknown programs running automatically.
Disabled antivirus or security programs.

How to Prevent Viruses?

1. Install Antivirus Software:


Use a reliable program to detect and block threats.
2. Keep Software Updated:
Apply updates to fix vulnerabilities in your OS or applications.
3. Avoid Suspicious Downloads:
Only download files or software from trusted sources.
4. Be Cautious with Emails:
Do not open attachments or links from unknown senders.
5. Enable Firewalls:
Protect your system from unauthorized access.

How to Remove a Virus?

1. Run a Full Virus Scan:


Use antivirus software to detect and remove malware.
2. Enter Safe Mode:
Boot into safe mode to prevent the virus from running while removing it.
3. Delete Infected Files:
Quarantine or manually delete files flagged by the antivirus.
4. Reinstall the OS (if necessary):
As a last resort, format the drive and reinstall the operating system.

Qualities of a Good Virus Protection Program

1. Virus Scanning:
Should detect viruses in storage devices and RAM.
2. Virus Cleanup:
Must remove detected viruses effectively.
3. Real-Time Protection:
Load at boot time to block incoming threats immediately.
4. Automatic Updates:
Regular updates to stay current with the latest virus definitions.

By following these practices and using a robust antivirus program, you can protect your system from
most virus threats.

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 12/21
Computer Security

• Computer security involves: safeguarding computing


resources, ensuring data integrity, limiting access to
authorized users, and maintaining data confidentiality.
• Effective computer security involves:
– taking physical security measures (to ensure hardware and media
are not stolen or damaged),
– minimizing the risk and implications of error,
– failure or loss (for example by developing a resilient back-up
strategy),
– appropriate user authentication (for example by employing
strong password), and
– possibly the encryption of sensitive files.

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 17

Physical Security

• Physical security involves protecting your assets and


information from physical access by unauthorized personnel.
• In other words, you’re trying to protect those items that can
be seen, touched, and stolen.
• Lock Door – one of the easiest way to prevent those intent to
creating problems physically entering your environment is to
lock your doors and keep them out.
• Securing physical documents/password/shredding – in high
security and government environment, sensitive papers
should be either shredded or burned.
• Biometrics – It is a physical characteristic ( such as fingerprint,
palm, hand scanner, retina scanner, and soon, possibly, DNA
scanner) to identify the user.

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 18

Physical Security (Cont’)

• Badges – It can be any of form of identification intended to


differentiate the holder from everyone else. e.g. name badge or
photo ID
• RFID Badges – It is a type of badge or card that give you
access to resources, including buildings, parking lots and
computer.
• RSA Token – are anything that user must have on them to

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 13/21
access network resources and are often associated with devices
that enables the user to generate one-time password
authenticating their identity.
• Privacy Filters – either film or glass add-ons that are placed
over a monitor or laptop screen to prevent the data on the
screen from being readable when viewed from the sides.

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 19

Physical Security (Cont’)

• Retinal
– It is one form of biometric device that can be used to
identify user
– Matches are made based upon identification of the
blood vessel in an individual retina.
– Slightly expensive.
• Tailgating – it refers being so close to someone
when they enter a building that you are able to
come in right behind them without needing use a
key, a card, or any other security device.

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 20

Digital Security

• Digital security focused on keeping harmful data and


malware out as well as on authorization and permissions.
• It offers a wide choice of defense methods. These include:
• Anti-virus Software operations include:
– Run in the background at all time
– Update the virus definition to recognize new malicious
software
– Signature-based detection involves searching for known
patterns of data within executable code
– Generic-based signature are being used to detect new virus
by looking for malicious code/slight variants of code in file
and will be test in sandbox to see if it performs any
malicious actions.

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 21

Digital Security (Cont’)

• FIREWALL
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 14/21
– Device that provides secure connectivity between
networks (internal/external; varying levels of trust)
– Used to implement and enforce a security policy for
communication between networks
– Separate local network from the Internet
– FUNCTIONS OF FIREWALL: Restrict incoming and
outgoing traffic by IP address, ports, or users
– Block invalid packets

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 22

Digital Security (Cont’)

• Antispyware
– Just as antivirus seeks out and stops viruses from
entering and spreading
– Purpose of antispyware software
– The OS from Microsoft are the one most affected by
spyware, and Microsoft has released Windows
Defender and Security Essentials

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 23

Digital Security (Cont’)

• User authentication/Strong password is a password that


meets the following guidelines:
– Be seven or fourteen characters long, due to the way in which
encryption works. For obvious reasons, fourteen characters are
preferable.
– Contain both uppercase and lowercase letters.
– Contain numbers.
– Contain a symbol in the second, third, fourth, fifth or sixth
position (due to the way in which encryption works).
– Not resemble any of your previous passwords.
– Not be your name, your friend's or family member's name, or
your login. –
– Not be a dictionary word or common name.

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 24

Digital Security (Cont’)

• Directory permissions
– Can do to improve or change the security of the
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 15/21
directory services deployed.
– Can ensure that they don’t become a tool for an
attacker bent on compromising organization’s security

Computer Security Overview

Computer security is a comprehensive approach to safeguarding computing resources, ensuring data


integrity, limiting access to authorized users, and maintaining data confidentiality.

Effective Computer Security Measures

1. Physical Security
Protects hardware, media, and information from unauthorized physical access.
Examples include locked doors, shredding sensitive documents, and using biometric
scanners.
2. Digital Security
Focuses on protecting against harmful data, malware, and unauthorized access.
Includes antivirus programs, firewalls, and user authentication mechanisms.
3. Minimizing Risks and Backup Strategies
Ensures error recovery through backups and proper error handling.
4. Encryption
Safeguards sensitive files by making them unreadable to unauthorized users.

Physical Security Measures

1. Locking Doors:
Prevents unauthorized access to computer systems and sensitive information.
2. Biometric Devices:
Examples: Fingerprint, retina, and palm scanners.
Provide reliable and personal authentication.
3. Badges and RFID:
Used for identification and granting access to secure areas.
4. RSA Tokens:
Devices that generate one-time passwords for secure network access.
5. Privacy Filters:
Shields monitor or laptop screens to prevent unauthorized viewing.
6. Tailgating Prevention:
Ensures unauthorized individuals cannot follow authorized personnel into secure areas.

Digital Security Measures

1. Antivirus Software:

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 16/21
Scans for and removes malicious software.
Uses signature-based and generic-based detections.
Runs continuously and updates regularly to counter new threats.
2. Firewalls:
Separates local networks from the internet.
Restricts traffic by IP, port, or user.
Blocks invalid packets and enforces security policies.
3. Antispyware:
Detects and removes spyware that can steal sensitive information.
Examples: Microsoft Defender and Security Essentials.
4. User Authentication:
Employs strong passwords with the following characteristics:
At least 7-14 characters.
Includes uppercase, lowercase, numbers, and symbols.
Avoids dictionary words, names, or previous passwords.
5. Directory Permissions:
Controls access to sensitive directories to prevent unauthorized changes or attacks.

Best Practices for Computer Security

1. Strong Passwords:
Use unique, complex passwords and change them regularly.
2. Update Software:
Keep operating systems and applications up to date to patch vulnerabilities.
3. Backup Strategies:
Regularly back up important data to recover from potential loss.
4. Encryption:
Encrypt sensitive files to protect them from unauthorized access.

By implementing these physical and digital security measures, organizations and individuals can greatly
reduce the risk of data breaches and system compromises.

Computer Security Threats

• Computer Security Threats are possible dangers


that can affect the smooth functioning of your PC.

• These may be a small piece of adware or a harmful


Trojan malware.

• In the present age, computer security threats are


constantly increasing as the world is going digital.
• There are several types of computer security
threats such as Trojans, Virus, Adware, Malware,

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 17/21
Rootkit, hackers and much more

Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 26

Types of Computer Security Threats

• COMPUTER VIRUS: a malicious program, which replicates


itself and infects the files and programs that can make
them non-functional.
• COMPUTER WORMS: A self-replicating computer
program that spreads malicious codes, computer worms
make use of the network to send copies of the original
codes to other PCS. It can also go to the extent of sending
transferring documents utilizing the email of the user.
• SCAREWARE: Scareware is a malware that tricks victims
to buy software by displaying fake virus alerts.
A scareware infected PC may get pop-ups of fake malware
threats and to get rid of those, users are prompted to
purchase a fake anti-malware software.
Lecture 6: PC Diagnostics, Repairs, and Maintenance

CSC 347 27

Types of Computer Security Threats

• KEYLOGGER: Also known as a keystroke logger, Keyloggers


can track the real-time activity of a user on his computer.
Keylogger runs in the background and records all
keystrokes made by a user and passes the information to
the hacker with the motive to steal password and banking
details.
• ROOTKIT: A rootkit is considered extremely dangerous as
they appear to be legitimate files and deceives the
computer user. Rootkit masks viruses and worms and
makes them appear as necessary files. These are very

difficult to remove and only an antivirus with the anti-


rootkit feature can remove a rootkit.

Computer Security Threats

Computer security threats pose significant risks to the smooth functioning of PCs and digital systems.
These threats are becoming increasingly sophisticated as the world transitions to a more digital
landscape. Here are the most common types of threats:

1. Types of Computer Security Threats


Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 18/21
a. Computer Virus

Definition: Malicious programs that replicate themselves and infect files, rendering them non-
functional.
Impact: Spreads rapidly, damaging files and programs on the infected system.

b. Computer Worms

Definition: Self-replicating programs that spread malicious code using networks.


Impact:
Sends copies of itself across networks.
Utilizes user emails to transfer documents or infect other systems.

c. Scareware

Definition: Malware designed to trick users into purchasing fake security software by showing
false virus alerts.
Impact:
Constant pop-ups about fake malware threats.
Lures users into paying for fraudulent software.

d. Keylogger

Definition: Tracks and records all keystrokes made by a user.


Impact:
Steals sensitive data like passwords, banking details, and private information.
Operates in the background without the user’s knowledge.

e. Rootkit

Definition: Dangerous software that masquerades as legitimate files to avoid detection.


Impact:
Masks viruses and worms, making them harder to identify and remove.
Requires specialized antivirus tools with anti-rootkit capabilities.

2. Other Common Threats

Adware: Displays unwanted advertisements that can slow down the system and compromise
privacy.
Trojan Malware: Malicious programs disguised as useful applications to gain unauthorized access.
Hackers: Individuals or groups who exploit system vulnerabilities for personal gain or disruption.

Mitigation Measures

1. Install Trusted Antivirus Software:


Ensure the antivirus includes features like anti-rootkit, anti-spyware, and real-time scanning.
2. Update Software Regularly:
Keeps systems protected against newly discovered vulnerabilities.
3. Use Strong Passwords:
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 19/21
Protects accounts and sensitive data from unauthorized access.
4. Avoid Suspicious Links/Emails:
Prevents phishing attacks and malware infections.
5. Regular Scans and Backups:
Detects threats early and safeguards data against potential loss.

By understanding and addressing these threats, users can better protect their systems and maintain
secure computing environments.

Tips for Best Computer Security

• Use the best antivirus software, which not only provides


protection to your PC but also internet protection and
guards against cyber threats.
• Do not download untrusted email attachments and these
may carry harmful malware.
• Never download software from unreliable sites as they
may come with a virus that may infect your system as
soon as you install the software.

Tips for Best Computer Security

To ensure robust computer security and protect your system from cyber threats, follow these best
practices:

1. Use Reliable Antivirus Software

Features to Look for:


Comprehensive system protection.
Internet security to guard against phishing and malicious websites.
Real-time scanning and automatic updates to handle emerging threats.

2. Avoid Untrusted Email Attachments

Why?
Attachments from unknown senders can carry harmful malware, ransomware, or viruses.
Best Practices:
Only open email attachments from trusted sources.
Scan attachments with antivirus software before downloading or opening them.

3. Download Software Only from Trusted Sources

Risks of Unreliable Sites:


Software from unverified sources may include malicious code or spyware.
Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 20/21
Installing such software can compromise your system immediately.
Recommendations:
Use official websites or trusted platforms for downloading software.
Verify the legitimacy of the source before downloading.

4. Additional Tips for Enhanced Security

Regularly update your operating system and applications.


Enable firewalls to filter and block unauthorized access.
Use strong passwords and enable multi-factor authentication where possible.
Backup your data regularly to safeguard against data loss.
Be cautious when clicking on unknown links or pop-up ads online.

By adhering to these tips, you can significantly enhance the security of your computer and protect your
sensitive data from potential threats.

Printed using ChatGPT to PDF, powered by PDFCrowd HTML to PDF API. 21/21

You might also like