Sie sind auf Seite 1von 29

Session 2017-18

.Submitted To :- #.Submitted by:-


Mr.Vatan Sahrawat Druv Gera
{Computer Teacher} 10th “C”
INTRODUCTION

Computers and data have


become the lifelines of any organization . If
something goes wrong with them business almost
comes to standstill . This could cause a loss of
thousand or even millions of hours of hard work and
research . Hence, we must take preventive measured
to protect our system and data from virus attack ,
physical damage data loss and hacking.
VIRUS
A computer virus is a programme or a set
of programs that disrupts the normal
functioning of acomputer . A virus infects or
destroys data . It enters into a computer without
the permission or knowledge of the user .
The full form of virus is vital information resources
under seize.
TYPES OF VIRUSES
BOOT VIRUS
• These viruses infect the boot record or master
boot record . They change the location of the
boot record that is responsible for loading the
operating system in memory by copying it
elsewhere . Boot viruses becomes active at the
time of booting the machine .
• Ex – Disk killer, Stone viruses etc.
PROGRAM FILE VIRUSES
• These viruses infect executable files or
program such as those with extension , like
.com , .exe, .ovl , .drv etc . These programs
get loaded in the memory during execution .
The virus becomes active in memory by
replicating itself and infecting files on the disk
. Sunday , Cascade etc are examples .
VIRUS SYMPTOMS
• Deleting or damaging files .
• Reformatting the hard disk.
• showing abnormal write protect error .
• Frequent hanging of the system .
• Displaying unusual messages .
STEPS TO PREVENT VIRUS
• Every PC should have an antivirus .
• Always scan pendrive before copying files.
• Do not install pirated software.
• Take the backup of important files everyday.
VIRUS
COMPUTER WORMS
TROJANS
MALWARE
COMPUTER WORMS AND TROJANS
• A worm is similar to virus in design and is
consiered to be a subclass of a virus . A worm
spreads from computer to computer.
• A trojan horse is full of trickery as its name
reflects . The trojan at first glance will appear to
be useful doftware but is very harmful.
MALWARE AND SPYWARE
• The term malware is made up of two
words , milicous and software . It is a
software that ebters into a computer qnd
damages it without the user’s
knowledge.
• Spyware is a type of malware that installed
on computers and collects information
SPAM

• Spam mails are unwanted bulk e- mail that


• comes from strange sources . These are
• generally sent in large number for commercial
advertisement . In spamming , millions of copies of the
same message are sent to e-mail user worldwide . Spam is
a serious security concern as it can be used to deliver
trojan hoarse , viruses , worms , spyware ...
ANTIVIRUS SOFTWARE
• Antivirus sofyware are computers
• program which are designed to identify , prevent
and remove viruses from a computer . The perorm -:
• Scan files and remove virus
• Scan the incomming mails which might contain virus
.
• Identify suspicious behaviour from any computer
program which might indicate infection.
CYBER CRIME
• Cyber crime involves crimminal
• activities that are traditional in
• nature such as theft fraud forgery defametion and
mischief all of which are subjected tobindian penal
code .
• The only difference between a normal crime and a
cyber crime lies the tools used to commit the crime
THE CYBER CRIME CAN BE BROADLY
CLASSIFIED INTO TWO CATAGERIES.

THE COMPUTER AS A TARGET I.E. USING


COMPUTER TO ATTACK OTHER COMPUTER.

THE COMPUTER AS A WEAPON I.E. USING


COMPUTERS TO COMMIT REAL WORLD
CRIMES.
NOTE-:

THE UNAUTHORISED ACCESS AND HACKING IS


DONE FOR GREED , POWER, PUBLICITY , REVENGE ,
ADVENTURE , DESIRE TO ACCESS FORBIDDEN
INFORMATION , DESTRUCTIVE MINDSET .

HACKING A WEB SERVER OR TAKING CONTROL OF


ANOTHER PERSON WEBSITE IS CALLED WEB HIJACKING ...
HACKER
Hacket are highly technical people
whi secretly breaks into computer
to steal important data or sometimes to destroy it.
Hackers not only steal important data but alsi havk
apps and web sites ti change the program logics .
Hackers usually tamper with data for unethical
purpose , just for obsession to break system
securities.
CRACKERS
• Crackers are technical people who
• are experts in breaking into systems
• to steal important data such as financial details or
padswords etc . Sometimes they use key logger
for this purpose . Crackers also cause harm to
computers by destroying data . They also disturbs
applications by spreading malwares.
BACKUP AND RECOVERY TOOLS

• Data backup •Storage media


In computer terminology For data backup we use
backup is process of some storage
making duplicate copies media that
of data which can be
have suffient
used to restore data and
restore files deleted space of storage.
accidently.
TECHNIQUES OF DATA BACKUP
Online – data can be stored online via
google.
Offline – data can be stored in CD harddisk
and pendrives offline.
Backup sites – data can be stored at different
backup site. These sites provite data copying
during any event of disaster.
DATA RECOVERY TECHNIQUES
•Hardware Repair • Recovery Utilities
We can repair physically To restore data logiacl
damaged harware using multiple damage specialized disk –
techniques . Some damages can imaging utilities are used .
be recovered by replacing These utilities recover every
damaged parts in the hard disk readable bit from surface and
attached to a computer system. also recover logical file
structure of storage media.
ICT
ICT stands for information and
communication technology . This term possibly
comprises of all communication technologies
such as internet cell phones satellite
communication wireless network etc. In this era
of technology , almost every domain such as
education is being benifitted by ICT.
BENIFITS OF ICT
• Benifits of ICT in education .
• Benifits of ICT in Healthcare.
• Benifits of ICT in Governance .
• Benifits of ICT in virtual school.
• Benifits of ICT in Emergence of Knowledge
Economy.

Das könnte Ihnen auch gefallen