Protect Application or System Software
Protect Application or System Software
Protect Application or System Software
pre. by jaleto
1
LO1 : Ensure user accounts are controlled
3
- UAC ask you for permission or an administrator password
before performing actions that could potentially affect
your computer's operation or that change settings that
affect other users.
NB:
⇒ User account can helps to prevent malicious software (malware)
and spyware from installing or making changes to your computer
without permission.
⇒ When your permission or password is needed to complete a task,
user account will alert you with one of the following messages
• Any user name in any form, such as capitalized, doubled, reversed, etc.
We can create local user accounts, which give people access to your
computer but don't give them access to the domain. Only system
administrators can create domain user accounts.
1. Open Microsoft Management Console by clicking the Start button
, typing mmc into the search box, and then pressing Enter.If you're
prompted for an administrator password or confirmation, type the
password or provide confirmation.
2. In the left pane of Microsoft Management Console, click Local
Users and Groups. If you don't see Local Users and Groups
If you don't see Local Users and Groups, it's probably because that
snap-in hasn't been added to Microsoft Management Console. Follow
these steps to install it:
▪ Spyware ▪ Worm
c. Macro-Virus
- Worms
- Trojan Horses
- Logic Bombs
- As well as being potentially destructive by themselves, each can also be used
as a vehicle to propagate any virus.
- Worm- a worm is a self-replicating virus that does not alter files but
duplicates itself.
Protect Application System or Software for
34
Extension class by Shambel D
Types of Destructive Software (Non-Virus)
Trojan (Trojan horse):-
- A Trojan Horse is a destructive program that has been disguised (or
concealed in) an innocuous piece of software.
- worm and virus programs may be concealed within a Trojan Horse.
- When Greek warriors concealed themselves in an attractive wooden
horse and left it outside the gates of the besieged city of Troy, the
Trojans assumed it was a friendly peace offering and took it in.
Malware:-
- Malware (for "malicious software") is any program or file that is
harmful to a computer user.
- malware includes computer viruses, worms, Trojan horses,
and also Spyware and programming that gathers information
about a computer user without permission.
Protect Application System or Software for
39
Extension class by Shambel D
Types of Destructive Software
Phishing:-
- A phish is a disguised email sent with the intent of
obtaining privileged information.
- Phishing is widely used for identity and data theft.
- phishing work in a business setting like, workers asked
to click on a link or go to a specific website to update
his user name and password or risk suspension.
Protect Application System or Software for
40
Extension class by Shambel D
Types of Destructive Software
Rootkits:-
- Rootkits are a set of software tools used by an intruder
to gain and maintain access to a computer system
without the user's knowledge.
- These tools conceal covert running processes, files and
system data making them difficult to detect.
Required
1. Safely Install Your Computer’s Operating System
Strongly Recommended
5. Enable Firewall Protection
knowledge.