0% found this document useful (0 votes)
23 views10 pages

Ict CH-4

Uploaded by

galma jaldesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views10 pages

Ict CH-4

Uploaded by

galma jaldesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Chapter four

ICT Security
Chapter Objectives
• After completing this section the learner should be able to:
• Describe computer security objectives
• Define the key words used to discuss computer security
• Explain the primary mechanisms used to protect computers and their
contents
• Define computer viruses & identify some of the most common types
• Identify some ways to prevent or recover from a virus infection
Introduction
• Computer security is a system designed to protect your computer
from any damage.
• It may be for single computer or networked computers.
• Computer damage
• Hardware damage
• Software damage
• Data loss
• invasion of databases by unauthorized individuals.
Why to Secure Computer
• Computer-based information systems are much more exposed to different
problems such as abuse, human errors, and crime etc than the manual
system.
• Information in a computer must be protected from being accessed by
unauthorized individuals.
• There are three main objectives for computer security
• Confidentiality: preventing sensitive information from improper exposure.
• Availability: against accidental actions that cause information resources to be
unavailable to users when needed.
• Integrity: refers to protecting against deliberate or accidental corruption of
information.
• It refers to internal consistency.
Computer Security Key Words
• Assets:-is any information, software, personnel, hardware, or computer
facility
• Vulnerability:- is a point where a system is exposed to attack
• Threat:- the source of problem for the computer
• Person:- user of the computer
• Thing:- faulty equipment, virus, and software failure.
• Event:- interruption of electricity, fire, and flood, and network failure.
• Safeguard:- a technique for protecting computer from a threat
• So computer security is the process of applying safeguard to reduce
vulnerability of computer to threats
Protecting Computers
• Common Security Mechanisms
• Physical Security: It provides controls over the access and use of computer
facilities and equipment and controls for the prevention of theft
• Passwords: are a confidential sequence of characters that give approved
users access to computers
• Firewalls: guard against unauthorized access to an internal network
• Codes: encrypting mechanism to protect transmitted information
• Audits: is used to monitor and record computer transactions
• Backup: protection of data by keeping copies of sensitive data in several
different locations
Computer Viruses
• Computer viruses are specific type of programs written deliberately to
cause harm to someone’s computer or to use that computer in
unauthorized way.
• Virus Program
• Malicious (destructive) program/software that damages computer
• Needs a host to infect; the host is an innocent program
• Reproduces its own code by copying itself onto the host program
• Executes when infected program is executed
• Spreads from program to program or from disk to disk
• May damage the files on a computer or attack the system in general
Types of Viruses
• Worm
• Program that copies itself over and over again causing a computer to crash when it runs out of RAM/hard disk space
• Does NOT infect other programs
• Trojan Horse
• Program that appears to have a useful function but really does not
• Delivery vehicle for some code (logic bomb or virus) on to a computer
• Bomb (Logic Bomb):
• Program that waits a certain period of time before executing its code
• Piece of code embedded in a program or the operating system itself that waits for a particular event to occur
• Boot Sector Viruses
• Infect the boot sector and related areas on a hard or floppy disk
• Is activated every time the machine is powered on
• Program Viruses
• Contaminates files that contain computer code specially “.exe” and “.com” files
• Can be spread through any medium used to transport software
Prevention of Viruses
• Buying original software from the company that created the software
• Using an antivirus program (some are free, others you have to buy)
and making sure that it is updated regularly
• Back up – Continuous duplicating of important files/documents
• Re-formatting disk to erase boot sector and partition viruses
The End
Thank You !!!

You might also like