SlideShare a Scribd company logo
PROTECT COMPUTER
FROM MALWARE
Chapter 6
Computer Security and Ethics
• HOW TO PROTECT COMPUTER SYSTEM FROM
VIRUS ATTACK
There are many ways to protect
computer system from virus attacks.
Here are some simple steps to protect
your computer.
• INSTALL FIREWALL
A firewall enacts the role of a security
guard.
INSTALL ANTIVIRUS SOFTWARE
It helps to protect the computer from
any unauthorized code or software
that creates a threat to the system.
INSTALL ANTI-SPYWARE SOFTWARE
Anti-spyware is a computer program
that detects infection on computer
and removes them.
• The following are common methodologies
used for authentication purpose.
USERNAME AND PASSWORD
• A user name is a name that identifies a
person on a computer system.
• Username and password are used to
authorize users to have access to computer
system, e-mail account, bank account and
other services available on computer.
COMMON METHODOLOGIES USED FOR
AUTHENTICATION
PERSONAL IDENTIFICATION NUMBER [PIN]
• Personal identification number [PIN] is a
confidential numeric password used to
authenticate a user to get access to computer
system.
• ACCESS CARD
Access cards are very similar in appearance to
credit cards. They areused to open security gates,
parking barriers and doors of hotel rooms.
• BIOMETRICS
Biometrics is a method based on measurement
of features of face, fingerprints, hand geometry,
signature and voice for authentication of
individuals.
COMPUTER ETHICS
• Computer ethics means an acceptable
behavior for using computer technology. It is a
code of behavior for moral and social issues
while using computer technology, particularly
internet. Computer use should be honest
respect the rights of others on the internet
and obey laws that apply online behavior.
ETHICAL USE OF COMPUTER
• Computer should not be used to harm other
people.
• Computer user should not break into other’s
computer system to steal, change or destroy
information.
• Computer should not read documents and e-
mails of other users without their consent.
• People should not commit any type of crime with
the help of computer technology.
• Computer users should respect the privacy of
others.
Assignment
Solve the following questions :
1. What are common methodologies used for authentication?
2. Define computer ethics and write some important moral guidelines for
ethical use of computer technology .
3. Name any three places where authentication of people is required .
4. What types of problems may be faced if computer users do not comply
with the moral guidelines of computer ethics?
5. You have learned four common methodologies used for authentication
purpose Explain any two of them .
6. Define authorized and unauthorized access with example .
Refer Textbook
•Review Key points of
the chapter Review
•Review MCQs

More Related Content

PPT
Chap13 Security and Ethical Challenges
PPT
Security and ethical challenges in mis
PPT
Information security Presentation
PPSX
Information security presentation
PPTX
Security system in banks
PPT
MIS-CH08: Securing Information Systems
PPT
COB4 Computer Crime
Chap13 Security and Ethical Challenges
Security and ethical challenges in mis
Information security Presentation
Information security presentation
Security system in banks
MIS-CH08: Securing Information Systems
COB4 Computer Crime

What's hot (18)

PPTX
System Security enviroment in operating system
PPT
Security
PPTX
Security in Banks and ATM's
PPTX
Computer security & ethics
PPTX
Cyber crimes
PPTX
Evote and associated risks
PPTX
Software Security
PPT
Computer Ethics and Legal Issues
DOC
Resume Modified
PPTX
Automation
PPTX
Internet
PPTX
Computer Security Primer - Eric Vanderburg - JURINNOV
PPTX
Computer Security
PPTX
Ns lecture5: Introduction to Computer, Information, and Network Security.
PPTX
A dummies guide to security
PPT
Employee Security Training[1]@
DOCX
Cyber crime
PPT
Cyber security awareness training by cyber security infotech(csi)
System Security enviroment in operating system
Security
Security in Banks and ATM's
Computer security & ethics
Cyber crimes
Evote and associated risks
Software Security
Computer Ethics and Legal Issues
Resume Modified
Automation
Internet
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security
Ns lecture5: Introduction to Computer, Information, and Network Security.
A dummies guide to security
Employee Security Training[1]@
Cyber crime
Cyber security awareness training by cyber security infotech(csi)
Ad

Similar to Protect computer from malware (20)

PPTX
ComputingEthics.pptx
PPTX
COMPUTER APPLICATIONS Module 5.pptx
PDF
Unit14-Computer Security and ethics -downloaded.pdf
PPTX
Aqua Blue Illustrative What is Cyber Security Presentation.pptx
PPTX
Computer Security and their social effect and their usage.
PPTX
Cybersecurity; Definition, Use, and Practice
PPTX
Computer Ethics_Satyajit Patil.pptx
PPTX
Staying safe on the internet
PPTX
Ch15 power point
PPTX
Computer Ethics, Cyber ethics and securi
PPTX
Ethics and safety measures in computing.pptx
PPT
Information security management
PPTX
Lecture 5.1.pptx
PPT
Security (IM).ppt
PPTX
gagan internship.pptx
PPT
INTERNT.ppt
PPT
ethical legal issues
PPTX
Module 8 security and ethical challenges
 
PDF
4.2 Network Issues and Communication.pdf
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
ComputingEthics.pptx
COMPUTER APPLICATIONS Module 5.pptx
Unit14-Computer Security and ethics -downloaded.pdf
Aqua Blue Illustrative What is Cyber Security Presentation.pptx
Computer Security and their social effect and their usage.
Cybersecurity; Definition, Use, and Practice
Computer Ethics_Satyajit Patil.pptx
Staying safe on the internet
Ch15 power point
Computer Ethics, Cyber ethics and securi
Ethics and safety measures in computing.pptx
Information security management
Lecture 5.1.pptx
Security (IM).ppt
gagan internship.pptx
INTERNT.ppt
ethical legal issues
Module 8 security and ethical challenges
 
4.2 Network Issues and Communication.pdf
Lecture 6 Cybersecurity-Basics and .pptx
Ad

More from ShouaQureshi (18)

PPTX
touchscreens
PPTX
3D Priinters
PPTX
2D and 3D Cutter
PPTX
scanners touchscreen bar code readers
PPTX
impact and non impact printers
PPTX
Chapter 1
PPTX
2d and 3d cutters
PPTX
Key,ID Field and Tables Relationship
PPTX
Input and output devices
PPTX
Malware part 2
PPTX
Malware part 1
DOCX
Multiple choice questions chapter 1
PDF
Hacker cracker cybercrime-computer security
PPTX
Malware and its types
PPTX
Class ix ms word part 1
PPTX
Word processing part 2 lecture and assignment updated
PPTX
Spreadsheet new
PPTX
Manupulating and formatting data
touchscreens
3D Priinters
2D and 3D Cutter
scanners touchscreen bar code readers
impact and non impact printers
Chapter 1
2d and 3d cutters
Key,ID Field and Tables Relationship
Input and output devices
Malware part 2
Malware part 1
Multiple choice questions chapter 1
Hacker cracker cybercrime-computer security
Malware and its types
Class ix ms word part 1
Word processing part 2 lecture and assignment updated
Spreadsheet new
Manupulating and formatting data

Recently uploaded (20)

PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Empowerment Technology for Senior High School Guide
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Trump Administration's workforce development strategy
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Hazard Identification & Risk Assessment .pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
What if we spent less time fighting change, and more time building what’s rig...
Empowerment Technology for Senior High School Guide
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Supply Chain Operations Speaking Notes -ICLT Program
IGGE1 Understanding the Self1234567891011
Final Presentation General Medicine 03-08-2024.pptx
History, Philosophy and sociology of education (1).pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Trump Administration's workforce development strategy
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Hazard Identification & Risk Assessment .pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Final Presentation General Medicine 03-08-2024.pptx
Unit 4 Skeletal System.ppt.pptxopresentatiom

Protect computer from malware

  • 1. PROTECT COMPUTER FROM MALWARE Chapter 6 Computer Security and Ethics
  • 2. • HOW TO PROTECT COMPUTER SYSTEM FROM VIRUS ATTACK There are many ways to protect computer system from virus attacks. Here are some simple steps to protect your computer. • INSTALL FIREWALL A firewall enacts the role of a security guard.
  • 3. INSTALL ANTIVIRUS SOFTWARE It helps to protect the computer from any unauthorized code or software that creates a threat to the system. INSTALL ANTI-SPYWARE SOFTWARE Anti-spyware is a computer program that detects infection on computer and removes them.
  • 4. • The following are common methodologies used for authentication purpose. USERNAME AND PASSWORD • A user name is a name that identifies a person on a computer system. • Username and password are used to authorize users to have access to computer system, e-mail account, bank account and other services available on computer. COMMON METHODOLOGIES USED FOR AUTHENTICATION
  • 5. PERSONAL IDENTIFICATION NUMBER [PIN] • Personal identification number [PIN] is a confidential numeric password used to authenticate a user to get access to computer system. • ACCESS CARD Access cards are very similar in appearance to credit cards. They areused to open security gates, parking barriers and doors of hotel rooms. • BIOMETRICS Biometrics is a method based on measurement of features of face, fingerprints, hand geometry, signature and voice for authentication of individuals.
  • 6. COMPUTER ETHICS • Computer ethics means an acceptable behavior for using computer technology. It is a code of behavior for moral and social issues while using computer technology, particularly internet. Computer use should be honest respect the rights of others on the internet and obey laws that apply online behavior.
  • 7. ETHICAL USE OF COMPUTER • Computer should not be used to harm other people. • Computer user should not break into other’s computer system to steal, change or destroy information. • Computer should not read documents and e- mails of other users without their consent. • People should not commit any type of crime with the help of computer technology. • Computer users should respect the privacy of others.
  • 8. Assignment Solve the following questions : 1. What are common methodologies used for authentication? 2. Define computer ethics and write some important moral guidelines for ethical use of computer technology . 3. Name any three places where authentication of people is required . 4. What types of problems may be faced if computer users do not comply with the moral guidelines of computer ethics? 5. You have learned four common methodologies used for authentication purpose Explain any two of them . 6. Define authorized and unauthorized access with example .
  • 9. Refer Textbook •Review Key points of the chapter Review •Review MCQs