Mr.Vatan Sahrawat Druv Gera {Computer Teacher} 10th “C” INTRODUCTION
Computers and data have
become the lifelines of any organization . If something goes wrong with them business almost comes to standstill . This could cause a loss of thousand or even millions of hours of hard work and research . Hence, we must take preventive measured to protect our system and data from virus attack , physical damage data loss and hacking. VIRUS A computer virus is a programme or a set of programs that disrupts the normal functioning of acomputer . A virus infects or destroys data . It enters into a computer without the permission or knowledge of the user . The full form of virus is vital information resources under seize. TYPES OF VIRUSES BOOT VIRUS • These viruses infect the boot record or master boot record . They change the location of the boot record that is responsible for loading the operating system in memory by copying it elsewhere . Boot viruses becomes active at the time of booting the machine . • Ex – Disk killer, Stone viruses etc. PROGRAM FILE VIRUSES • These viruses infect executable files or program such as those with extension , like .com , .exe, .ovl , .drv etc . These programs get loaded in the memory during execution . The virus becomes active in memory by replicating itself and infecting files on the disk . Sunday , Cascade etc are examples . VIRUS SYMPTOMS • Deleting or damaging files . • Reformatting the hard disk. • showing abnormal write protect error . • Frequent hanging of the system . • Displaying unusual messages . STEPS TO PREVENT VIRUS • Every PC should have an antivirus . • Always scan pendrive before copying files. • Do not install pirated software. • Take the backup of important files everyday. VIRUS COMPUTER WORMS TROJANS MALWARE COMPUTER WORMS AND TROJANS • A worm is similar to virus in design and is consiered to be a subclass of a virus . A worm spreads from computer to computer. • A trojan horse is full of trickery as its name reflects . The trojan at first glance will appear to be useful doftware but is very harmful. MALWARE AND SPYWARE • The term malware is made up of two words , milicous and software . It is a software that ebters into a computer qnd damages it without the user’s knowledge. • Spyware is a type of malware that installed on computers and collects information SPAM
• Spam mails are unwanted bulk e- mail that
• comes from strange sources . These are • generally sent in large number for commercial advertisement . In spamming , millions of copies of the same message are sent to e-mail user worldwide . Spam is a serious security concern as it can be used to deliver trojan hoarse , viruses , worms , spyware ... ANTIVIRUS SOFTWARE • Antivirus sofyware are computers • program which are designed to identify , prevent and remove viruses from a computer . The perorm -: • Scan files and remove virus • Scan the incomming mails which might contain virus . • Identify suspicious behaviour from any computer program which might indicate infection. CYBER CRIME • Cyber crime involves crimminal • activities that are traditional in • nature such as theft fraud forgery defametion and mischief all of which are subjected tobindian penal code . • The only difference between a normal crime and a cyber crime lies the tools used to commit the crime THE CYBER CRIME CAN BE BROADLY CLASSIFIED INTO TWO CATAGERIES.
THE COMPUTER AS A TARGET I.E. USING
COMPUTER TO ATTACK OTHER COMPUTER.
THE COMPUTER AS A WEAPON I.E. USING
COMPUTERS TO COMMIT REAL WORLD CRIMES. NOTE-:
THE UNAUTHORISED ACCESS AND HACKING IS
DONE FOR GREED , POWER, PUBLICITY , REVENGE , ADVENTURE , DESIRE TO ACCESS FORBIDDEN INFORMATION , DESTRUCTIVE MINDSET .
HACKING A WEB SERVER OR TAKING CONTROL OF
ANOTHER PERSON WEBSITE IS CALLED WEB HIJACKING ... HACKER Hacket are highly technical people whi secretly breaks into computer to steal important data or sometimes to destroy it. Hackers not only steal important data but alsi havk apps and web sites ti change the program logics . Hackers usually tamper with data for unethical purpose , just for obsession to break system securities. CRACKERS • Crackers are technical people who • are experts in breaking into systems • to steal important data such as financial details or padswords etc . Sometimes they use key logger for this purpose . Crackers also cause harm to computers by destroying data . They also disturbs applications by spreading malwares. BACKUP AND RECOVERY TOOLS
• Data backup •Storage media
In computer terminology For data backup we use backup is process of some storage making duplicate copies media that of data which can be have suffient used to restore data and restore files deleted space of storage. accidently. TECHNIQUES OF DATA BACKUP Online – data can be stored online via google. Offline – data can be stored in CD harddisk and pendrives offline. Backup sites – data can be stored at different backup site. These sites provite data copying during any event of disaster. DATA RECOVERY TECHNIQUES •Hardware Repair • Recovery Utilities We can repair physically To restore data logiacl damaged harware using multiple damage specialized disk – techniques . Some damages can imaging utilities are used . be recovered by replacing These utilities recover every damaged parts in the hard disk readable bit from surface and attached to a computer system. also recover logical file structure of storage media. ICT ICT stands for information and communication technology . This term possibly comprises of all communication technologies such as internet cell phones satellite communication wireless network etc. In this era of technology , almost every domain such as education is being benifitted by ICT. BENIFITS OF ICT • Benifits of ICT in education . • Benifits of ICT in Healthcare. • Benifits of ICT in Governance . • Benifits of ICT in virtual school. • Benifits of ICT in Emergence of Knowledge Economy.