Setting Up a Desktop Computer
-
Upload
patrick-jorge-sibayan -
Category
Documents
-
view
17 -
download
2
description
Transcript of Setting Up a Desktop Computer
![Page 1: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/1.jpg)
SETTING UPA
DESKTOP COMPUTER
![Page 2: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/2.jpg)
![Page 3: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/3.jpg)
![Page 4: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/4.jpg)
![Page 5: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/5.jpg)
![Page 6: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/6.jpg)
![Page 7: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/7.jpg)
![Page 8: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/8.jpg)
![Page 9: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/9.jpg)
![Page 10: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/10.jpg)
![Page 11: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/11.jpg)
![Page 12: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/12.jpg)
![Page 13: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/13.jpg)
![Page 14: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/14.jpg)
![Page 15: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/15.jpg)
![Page 16: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/16.jpg)
![Page 17: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/17.jpg)
COMPUTER SECURITY RISKS
AND SAFETY
![Page 18: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/18.jpg)
COMPUTER SECURITY RISKS
- is any event or action that could cause a loss of or damage to computer hardware, software,
data, information or processing capability
![Page 19: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/19.jpg)
COMPUTER CRIME
- any illegal act involving a computer
![Page 20: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/20.jpg)
CYBERCRIME
- refers to online or Internet-based illegal acts
![Page 21: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/21.jpg)
CRIMEWARE
- software used by cybercriminals
![Page 22: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/22.jpg)
HACKER
- someone who accesses a computer or network illegally
![Page 23: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/23.jpg)
CRACKER
- someone who accessesa computer or network illegally
but has the intent of destroying data, stealing information
or other malicious action
![Page 24: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/24.jpg)
CYBEREXTORTIONIST
- someone who usese-mail as a vehicle for extortion
![Page 25: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/25.jpg)
CYBERTERRORIST
- someone who uses the Internet or network
to destroy or damage computers for political reasons
![Page 26: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/26.jpg)
CYBERWARFARE
- describes an attack whose goal ranges from disabling
a government’s computer network to crippling a country
![Page 27: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/27.jpg)
1. MALWARE
![Page 28: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/28.jpg)
1. MALWARE
- short for malicious software
- programs that act without a user’s knowledge and deliberately
alter the computer’s operations
![Page 29: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/29.jpg)
VIRUS
- is a potentially damagingcomputer program that affects
or infects a computer negatively by altering the way the computer works
without the user’s knowledge or permission
![Page 30: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/30.jpg)
WORM
- is a program that copies itself repeatedly
![Page 31: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/31.jpg)
TROJAN HORSE
- is a program that hides within or looks like a legitimate program
![Page 32: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/32.jpg)
SYMPTOMS OF INFECTED COMPUTER
Operating system runs much slower than usual
Available memory is less than expected
Files become corrupted Screen displays unusual message
or image Music or unusual sound plays
randomly
![Page 33: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/33.jpg)
SYMPTOMS OF INFECTED COMPUTER
Existing programs and files disappear
Programs or files do not work properly
Unknown programs or files mysteriously appear
System properties change Operating system does not start up
Operating system shuts down unexpectedly
![Page 34: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/34.jpg)
MALWARE INFECTS COMPUTER WHEN…
(1) Opens an infected file. (2) Runs an infected program.
(3) Boots the computer with infected removable media inserted in a
drive or plugged in a port.(4) Connects an unprotected
computer to a network.(5) When a certain condition or
event occurs, such as the computer’s clock changing to
a specific date.
![Page 35: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/35.jpg)
SAFEGUARDS AGAINST
MALWARE
![Page 36: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/36.jpg)
TRUSTED SOURCE
- is an organization or person you believe will not send
a virus infected file knowingly
![Page 37: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/37.jpg)
ANTIVIRUS PROGRAM
- protects a computer againstviruses by identifying and removing
any computer viruses found in memory on storage media or on incoming files
![Page 38: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/38.jpg)
VIRUS SIGNATURE /DEFINITION
- is a known specific pattern of virus code
- one technique that antivirus programs use to identify a virus
![Page 39: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/39.jpg)
QUARANTINE
- is a separate area of a hard disk that holds the infected file until
the infection can be removed
![Page 40: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/40.jpg)
VIRUS HOAX
- is an e-mail message that warns users of a nonexistent virus or other malware
![Page 41: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/41.jpg)
FIREWALL
- is hardware or software thatprotects a network’s resources
from intrusion by users on another network such as the Internet
![Page 42: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/42.jpg)
2. UNAUTHORIZED ACCESS AND USE
![Page 43: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/43.jpg)
UNAUTHORIZED ACCESS
- is the use of a computer or network without permission
![Page 44: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/44.jpg)
UNAUTHORIZED USE
- is the use of a computer or its data for unapproved or possibly
illegal activities
![Page 45: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/45.jpg)
SAFEGUARDS AGAINST
UNAUTHORIZED USE AND ACCESS
![Page 46: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/46.jpg)
ACCESS CONTROL
- is a security measure that defines who can access a computer,when they can access it and
what actions they can take while accessing the computer
![Page 47: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/47.jpg)
AUDIT TRAIL
- records in a file both successfuland unsuccessful access attempts
![Page 48: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/48.jpg)
IDENTIFICATION
- verifies that an individual is a valid user
- uses username (specifies a specific user)
![Page 49: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/49.jpg)
AUTHENTICATION
- verifies that the individual is the person he or she claims to be
- uses password (private combination of characters
associated with the user name that allows access to certain
computer resources)
![Page 50: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/50.jpg)
AUTHENTICATION
- uses possessed objects (any item that you must carry to gain access to a computer
or computer facility)
- uses PIN (personal identification number)
![Page 51: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/51.jpg)
AUTHENTICATION
- uses biometric devices (authenticates a person’s identity
by translating a personal characteristic, such as a fingerprint, into a digital code
that is compared with a digital code stored in the computer verifying a
physical or behavioral characteristic)
![Page 52: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/52.jpg)
3. HARDWARE THEFT AND VANDALISM
![Page 53: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/53.jpg)
HARDWARE THEFT
- is the act of stealing computer equipment
![Page 54: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/54.jpg)
HARDWARE VANDALISM
- is the act of defacing ordestroying computer equipment
![Page 55: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/55.jpg)
4. SOFTWARE THEFT
![Page 56: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/56.jpg)
4. SOFTWARE THEFT
- occurs when someone:(1) Steals software media
(2) intentionally erases programs(3) illegally copies a program
(4) illegally registers or activates a program
![Page 57: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/57.jpg)
SOFTWARE PIRACY
- is the unauthorized and illegal duplication of copyrighted software
![Page 58: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/58.jpg)
KEYGEN
- short for key generator
- creates software registration numbers and sometimes activation codes
![Page 59: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/59.jpg)
SAFEGUARDS AGAINST
SOFTWARE THEFT
![Page 60: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/60.jpg)
LICENSE AGREEMENT
- is the right to use the software
- provides specific conditions for use of the software which the user must accept before
using the software
![Page 61: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/61.jpg)
PRODUCT ACTIVATION
- conducted either online or by telephone
- users provide the software product’s 25-character identification number to receive an installation identification number unique to the computer on
which the software is installed
![Page 62: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/62.jpg)
5. INFORMATION THEFT
- occurs when someone steals personal or confidential information
![Page 63: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/63.jpg)
SAFEGUARDS AGAINST
INFORMATION THEFT
![Page 64: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/64.jpg)
ENCRYPTION
- is a process of convertingreadable data into unreadable
characters to preventunauthorized access
- to read the data, the recipient must decrypt or decipher
it into a readable form
![Page 65: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/65.jpg)
ENCRYPTION
- the encrypted (scrambled) data is called ciphertext
- an encryption algorithm or cypher is a set of steps that can convert
readable plaintext into unreadable ciphertext
![Page 66: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/66.jpg)
ENCRYPTION KEY
- is a set of characters that the originator of the data uses
to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext
![Page 67: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/67.jpg)
6. SYSTEM FAILURE
![Page 68: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/68.jpg)
6. SYSTEM FAILURE
- is the prolonged malfunction of a computer
- can cause loss of hardware, software, data or information
![Page 69: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/69.jpg)
SAFEGUARDS AGAINST
SYSTEM FAILURE
![Page 70: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/70.jpg)
UNINTERRUPTIBLE POWER SUPPLY
- is a device that contains surgeprotection circuits and one or more
batteries that can provide power during a temporary or permanent
loss of power
![Page 71: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/71.jpg)
BACKUP
- is a duplicate of a file, program or disk that can be used if the original
is lost, damaged or destroyed
![Page 72: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/72.jpg)
FULL BACKUP
- copies all of the files in the computer
![Page 73: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/73.jpg)
SELECTIVE BACKUP
- users choose which folders and files to include in a backup
![Page 74: Setting Up a Desktop Computer](https://reader030.fdocuments.in/reader030/viewer/2022020202/577cc74f1a28aba711a099fb/html5/thumbnails/74.jpg)
THANK YOU!