Issues and precautions related to ict

16
Issues and precautions related to ICT

description

 

Transcript of Issues and precautions related to ict

Page 1: Issues and precautions related to ict

Issues and precautions related to ICT

Page 2: Issues and precautions related to ict

Physical IssuesEnvironmental factors

Your computer should be kept in a Dust freeDry (moisture free)Smoke free environment

Page 3: Issues and precautions related to ict

Physical IssuesHardware protectionYour computer should be equipped with

A UPS (Uninterrupted Power Supplier) to avoid risk of sudden power failure and fluctuations.

Surge protection to protect against lightning and thunder.

Stabilizer to control voltage.

Page 4: Issues and precautions related to ict

Logical securityThe software and the data in your computer can be protected through the use of PasswordBackups

Page 5: Issues and precautions related to ict

Malicious codesA common misconception is that other kinds of electronic nastiest such as worms and Trojan horse applications are viruses.

Viruses, worms and Trojan horse belong to a broader category called “malicious codes”.

Page 6: Issues and precautions related to ict

VirusA program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Like any other program, it contains instructions that tell your computer what to do.

Page 7: Issues and precautions related to ict

VirusViruses can also replicate themselves.All computer viruses are man made.A simple virus that can make a copy of itself over again is

relatively easy to produce.A virus can be destructive; it could format your hard

drive, overwrite your hard drive boot sector or delete files and render your machine inoperative.

Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.

An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

Page 8: Issues and precautions related to ict

VirusHow do viruses invade a machine?E-mail or an e-mail attachmentDownloadsShared infected floppy disksHacking (Occasionally)

Page 9: Issues and precautions related to ict

VirusTrojan HorseA destructive program that masquerades

as a benign application. Unlike viruses, Trojan horses do not replicate themselves.

Page 10: Issues and precautions related to ict

VirusWormA program or algorithm that replicates

itself over a computer network and usually performs malicious actions.

Page 11: Issues and precautions related to ict

VirusVirusA program or piece of code that is loaded

onto your computer without your knowledge and runs against your wishes.

Page 12: Issues and precautions related to ict

VirusBlended programBlended threats combine the

characteristics of viruses, worms, Trojan Gorses and malicious code with server and Internet vulner abilities.

Page 13: Issues and precautions related to ict

VirusCombating Viruses, Worms and Trojan

HorsesThe first step to protecting your computer is to

ensure your operating system (OS) is up-to-date

you should have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms and Trojan horses.

You should also install a firewall as well.

Page 14: Issues and precautions related to ict

Antivirus SoftwareAntivirus software can detect nearly all

types of known viruses, but it must be updated regularly to maintain effectiveness.

Page 15: Issues and precautions related to ict

FirewallA firewall is a system that prevents unauthorized use and access to your computer.

A firewall can be either hardware or software.

Page 16: Issues and precautions related to ict

FirewallHardware firewalls provide a strong degree of protection from most forms of attack from the outside world can be purchased as a stand alone product or in broadband routers.

For individual home users, the most popular firewall choice is a software firewall