You are on page 1of 67

This book is compiled for all

BS/ADP disciplines. First 10


chapters (from page 1 to 205)
included in this book are
related to computer concepts
and other chapters are related
to the Windows 7, MS office
2010 (Word, Excel, PowerPoint,
Access), and InPage 2000 with
practical.
INTRODUCTION TO COMPUTER

Chapter 8
The Internet & Computer
Security
Contents
• The Internet
• Services Provided by the Internet
• Terminologies & Tools used for Internet
• Advantages & Disadvantages of the Internet
• Search Engines
• E-mail
• Computer Security
• Cybercrime
• Computer Virus
• Antivirus Programs
• Computer Ethics
The Internet
Chapter 8 – The Internet & Computer Security
The Internet
• The word "Internet" stands for International Network
• Internet is the largest computer network in the world
• Information can be sent and received through the Internet all over the world
• Internet is the network of many computer networks around the world
• It consists of millions of private, public, academic, business, and government
networks
• Communication protocol used for the Internet is TCP/IP
• Internet connects millions of computers
• These computers are linked through different communication media
• Commonly used communication media are telephone lines, fiber optic cables,
microwave, and satellite
• A large number of books, newspapers, magazines, encyclopedia, and other
types of materials are available in electronic form on the Internet
• We can find information about almost anything in the world
The Internet

• We can also access the latest information or news on any topic


• It means that Internet is an ocean of knowledge
• In addition to finding information, we can communicate with other people
around world.
• Due to Internet, our world has become a global village
Working of the Internet
• There is no particular organization that controls the Internet
• Different networks of private companies, government agencies, research
organizations, and universities are interconnected together
• Therefore, Internet is a collection of millions of computers, all linked together
• A personal computer can be linked to the Internet using a phone-line modem,
DSL, or cable modem
• Modem is used to communicate with the server of an Internet Service
Provider (ISP)
• A computer in a business or university is usually connected with LAN using
Network Interface Card (or LAN card)
• LAN of the university or business is connected to the server of the ISP
• User’s computer connects to the ISP’s server
• ISP’s server makes its connection to a larger ISP
Working of the Internet
• Largest ISPs maintain fiber-optic "backbones"
for an entire region
• Backbone is the central structure or element of the
network, which connects other elements of the
network and handles the major traffic
• The backbone is a high-speed element
• It is the major communication link that ties Internet
servers across wide geographical areas
• Backbones around the world are connected through
fiber-optic lines, undersea cables, or satellite links
• In this way, every computer on the Internet is
connected to every other computer on the
Internet
The Intranet
• An internal private network of an organization that can be accessed only by
the authorized users of the organization is called Intranet
• It uses Internet and Web technologies for sharing information between the
users of the same organization or company
• It looks like a private version of the Internet
• Information cannot be exchanged outside the organization
The Extranet
• A network of an organization that can be accessed by authorized outside
users is called Extranet
• It is an extension of the Intranet
• It may consist of two or more intranets
• It is used for business and educational purposes
• It uses Internet technology and the public telecommunication system for
sharing business information with authorized outside users
• These users may be customers, suppliers, business partners, etc.
• An outside user accesses the Extranet by using the username and password
Internet Protocols
• Internet Protocol is a set of defined rules and procedures used for
communication through which Internet users exchange information on the
network
• The first protocol was developed in the early 1970s for data communication
on the network and was named as Network Control Protocol (NCP)
TCP/IP
• TCP/IP stands for Transmission Control Protocol / Internet Protocol
• TCP/IP is the basic communication protocol of the Internet
• It can also be used as a communication protocol in a private network such as
Intranet and Extranet
• It was developed by the Department of Defense (DoD) of the USA
Internet Protocols
TCP/IP
• TCP/IP controls and manages data transmission over the Internet
• It also defines a mechanism through which every computer on the Internet is identified
separately
• It manages the transmission of data on the Internet by breaking the data into small pieces
called packets
• Each packet contains actual data and addresses of destination (receiver) and source
(sender)
• TCP/IP consists of two layers; higher layer and lower layer
• TCP is called a higher layer, while IP is called a lower layer
• Higher layer (TCP)
• It is responsible for verifying the correct delivery of data from source to destination
• It breaks message or file into smaller packets that are transmitted over the Internet
• It also reassembles (combines or rebuild) the packets into the original message that is received
from the Internet
• Lower layer (IP)
• It is responsible for moving a packet of data from node to node
• It forwards each packet based on a destination address
• IP operates on gateways. Each gateway on the network checks this address to see where to
forward the message
Internet Protocols
FTP
• FTP stands for File Transfer Protocol
• This protocol exchanges files between users
• It is specially designed for uploading and downloading audio, video, graphics, and
all other different types of files
• FTP software uses this protocol for transferring files on the Internet
• Examples of FTP software are WS_FTP and Cute FTP
HTTP
• HTTP stands for HyperText Transfer Protocol
• It is a protocol used for communication between browsers and web servers (e.g.
for transferring information from web pages, stored on the web server, to the
browser)
• It was developed in 1990 when the World Wide Web (WWW) was introduced
SMTP
• SMTP stands for Simple Mail Transfer Protocol
• This protocol is used to send and receive e-mails on the Internet
Services Provided by the Internet
Chapter 8 – The Internet & Computer Security
Services Provided by the Internet
• Internet plays a very important role in our society
• It provides a lot of latest information about the business, education, etc.
• It has become the main medium for advertisement and communication
between users etc.
World Wide Web
• World Wide Web is commonly known as the web
• This service is used to get different information on the Internet
• World Wide Web is a vast network of HTTP servers or Web servers
• These servers store webpages (websites) that are accessible on the Internet
• World Wide Web is abbreviated as www or 3w
Services Provided by the Internet
Newsgroups
• Newsgroups are discussion groups or forums
• They provide services to exchange messages on Internet about a particular
subject
• This facility is provided on the Internet on special servers known as News
servers
• Different newsgroups are available for different purposes
• For example, a newsgroup provides the services to exchange information
about business and another provides the services about current affairs, etc.
Services Provided by the Internet
Chatting
• Internet provides facility to chat (talk) with people online all over the world
• Different programs like MSN Messenger, Yahoo Messenger, AOL online, etc.
are available for chatting on the Internet
• Chat rooms allow users to participate in a chat on the Internet
• Chat rooms are locations on the web that provide facilities to the users to
chat with each other online over the Internet
• They send messages by typing with keyboard and receive messages from
other ends instantly
• Some chat rooms support voice chats and video chats where people talk
with each other and see them also.
Services Provided by the Internet
E-Commerce
• E-Commerce stands for Electronic Commerce
• It is a very important service provided by the Internet through which
financial transactions are carried out over the Internet
• It is the modern way to run a business on an international basis
• When business is conducted with the help of computer networks, this
activity is usually termed as e-commerce or e-trade
• Examples of E-commerce are: online shopping, online advertising, online
banking, etc.
• Through e-commerce, goods can be purchased and sold from anywhere in
the world
• Credit cards are used for payments
Services Provided by the Internet
Telnet
• Telnet is an abbreviation for Terminal Network
• It is a software that is used to login and to run commands (or programs) on a
remote computer on the Internet
• Through this service, a user can also access information on the Internet
• He runs the telnet client application on his computer
• Telnet provides a prompt on the user’s computer screen
• User can access the remote computer by giving commands through this
prompt
• When a command is sent to the host computer, information is accessed from
the host and displayed on the user’s computer screen
• User’s computer linked to the remote computer will act as a terminal
• User feels that he/she is sitting in front of the host computer and operating it
Services Provided by the Internet
Gopher
• Gopher is an Internet service (or menu-based information retrieval system)
• It organizes resources into multilevel menus to make finding information
easier on the Internet
• Before Gopher, it was difficult to find information on the Internet
E-mail
• E-mail stands for electronic mail
• It is the most popular service provided by the Internet
• It provides a fast and efficient way to send and receive messages through the
Internet
• Different types of files can also be sent through e-mail
Terminologies & Tools used for
Internet
Chapter 8 – The Internet & Computer Security
Terminologies & Tools used for Internet
Web Server
• A computer on the network (i.e. Internet) in which websites or web pages
are stored is known as a web server
• We access a web page or website from a web server through a web browser
• We send a request to the web server through a web browser
• Web server receives the request and sends back information of the web
page or website through the web browser
• Nowadays millions of web servers are providing these services on the
Internet
Client
• Hardware and software through which user gets information from server as
well as sends information to other users through server is called client
• Usually, personal computers and browser programs are used to get
information from server
Terminologies & Tools used for Internet
Web Browser
• A software that is used to access websites or web pages is known as a web
browser
• A user enters the URL of the website in the address bar of the browser window
• Browser accesses the website or web page and its information are displayed in the
main window of the browser
• Many web browsers are available
• Examples → Internet Explorer, Google Chrome, Opera, Mozilla Firefox, and Safari
Web Page
• A document on the Web (World Wide Web) is called a web page
• This document can contain text, graphics, audios, videos, and links to other web
pages
Website
• A collection of related web pages is called a website
• A website may contain many web pages and some other files
• A user can access any website through a web browser
Terminologies & Tools used for Internet
Home Page
• Main page or title page of the website is known as the home page
• It provides an introduction to the website
• This page is downloaded first when the website is accessed
• Usually, all links of other pages of the website are given on the home page
• Therefore, other pages of the website are visited or accessed through the
home page
Web Hosting
• Web hosting is the service which provides the online storage space for
storing website or web pages on the web servers
• Companies which provide storage space on their web servers are known as
web hosts
Terminologies & Tools used for Internet
HTML
• HTML stands for Hyper Text Markup Language
• HTML is a computer language
• It is used to create web pages/websites
• This language provides commands (or keywords) for creating HTML documents
• These commands or keywords are called tags
• These tags are used for defining the layout (or structure) of a web page, formatting
text of a web page, and linking other web pages
URL Address
• URL stands for Uniform Resource Locator
• It is an address of a web page or website on the Internet
• Every web page has a unique address
• A web page can only be accessed if we know the URL of that page
• For example, Google is the most popular website and its URL is
http://www.google.com
Terminologies & Tools used for Internet
Addressing Schemes
• In a computer network, computers or other computing devices exchange data (communicate)
with each other with the references to their addresses
• When a computer or other computing device is connected to the Internet, a unique address is
assigned to it
• A computer is accessed with the reference to its address
• Addresses are assigned to the computers according to a set of rules → addressing schemes
• On Internet, two types of addressing schemes are used: IP Addressing and DNS Addressing
• IP Addressing
• IP stands for Internet Protocol
• An IP address is a unique identifier that is assigned to a computer or device when it is connected to
Internet
• It is a numerical address
• A typical IP address looks like this: 216. 27. 61.137
• Every machine on the Internet has a unique IP address
• A server has a static IP address that does not change
• When a home computer connects to the ISP, it is also assigned an IP address by ISP
• This IP address is unique for that session
• It is not static
• When the same computer will be connected next time, a different IP address will be assigned to it
Terminologies & Tools used for Internet
Addressing Schemes
• DNS Addressing
• DNS stands for Domain Name System
• IP addresses are difficult to remember by the users
• Every server (or host) on the Internet also has a unique name
• Human-readable name assigned to the computer (server) on the Internet is called the domain
name
• It is a common and unique text name and is an alternative to an IP address
• For example, "hotmail.com" is a permanent, human-readable name
• This address is easier to remember than an IP Address
Hyperlinks
• A hyperlink is a simple text or an image that links to another webpage or specific
section within the same webpage
• A website consists of many webpages that are linked with one another through
hyperlinks
• Generally, hyperlinks are called just links
Terminologies & Tools used for Internet
ISP
• ISP stands for Internet Service Provider
• It is a company that provides Internet connections to users
• There are many ISP companies in each big city in the countries of the world
• We have to get an Internet connection from any ISP company to connect to
the Internet
• ISP Company will provide a username for identification, a password for
account security, and a telephone number to connect to its server computer
• Popular ISPs in Pakistan → PTCL, Comsats, World Call, and Wateen.
Advantages & Disadvantages of
the Internet
Chapter 8 – The Internet & Computer Security
Advantages of the Internet
+ Sharing Information
+ Collection of Information
+ News
+ Searching Jobs
+ Advertisement
+ Communication
+ Entertainment
+ Online Education
+ Online Results
+ Online Airlines and Railway Schedules
+ Online Medical Advice

• Details are given in book “Introduction to Computer” – PM Series


Disadvantages of the Internet
- Viruses
- Security Problems
- Immorality
- Filtration of Information
- Accuracy of Information
- Wastage of Time
• Details are given in book “Introduction to Computer” – PM Series
Search Engines
Chapter 8 – The Internet & Computer Security
Search Engines
• A search engine is a special website on the Internet
• It is used to search different information on the Internet (or web)
• A lot of information is available on the Internet on different websites or webpages
• There are billions of websites on the Internet
• We cannot remember the URLs of all the websites
• We can search different websites or webpages and information stored in them
through search engines
• Search engines maintain a list of billions of webpages containing information on
various topics
• Many search engines are available on the Internet
• YAHOO http://www.yahoo.com
• ALTA VISTA http://www.altavista.com
• ASK http://www.ask.com
• GOOGLE http://www.google.com
• EXCITE http://www.excite.com
Search Engines
Searching Information using Search Engine
• Some keywords (i.e. words) related to the topic or information being
searched are given to search engine
• Search engine searches the required information and sends the addresses of
webpages containing the required information to the user’s computer
• For example, to search information about the "History of the Internet", give
these words to any search engine
• Search engine will search the given information and will provide a list of links
of webpages or websites along with a brief description of each webpage
E-mail
Chapter 8 – The Internet & Computer Security
E-mail
• E-mail stands for electronic mail
• It is the most popular service provided by the Internet
• We can send and receive messages anywhere in the world
• One message can be sent to many persons with a single e-mail
• Different types of files can also be sent with the e-mail
• An E-mail message takes a very short time to reach its destination
• Usually, every Internet user has an e-mail facility
• E-mail facility is provided by ISP (Internet Service Provider)
• This facility is also provided free of cost by most popular websites of the
world such as "hotmail.com", "yahoo.com", and "gmail.com".
Working of E-mail
• An e-mail program is used to create, send, and to receive e-mails
• This program is also called e-mail client
• Outlook Express is an example of an e-mail client
• When a user sends the e-mail message, the computer connects to an e-mail
server and transmits a copy of the message to that e-mail server
• An e-mail server is a host computer on the Internet
• It receives the message and finds out the distinction e-mail server where the
e-mail is to be sent
• It connects to that server and transmits a copy of the message
E-mail Attachment
• Attachment is a powerful feature of e-mail
• It enables us to send files with an e-mail message
• Any types of files can be attached to the e-mail
• The files may include documents, pictures or images, and audio & video files,
etc.
• Attachment size varies from one e-mail service provider to the other
• Usually, the attachment size is 25MB or more
E-mail Address
• E-mail messages are sent and received with the reference to e-mail
addresses
• Therefore, every Internet user must have an e-mail account, to send and
receive e-mails
• An e-mail address consists of a username and his address on the Internet
• General format of an e-mail address username @ domain_name
• username → indicates the username i.e. name of user or organization
• domain_name → indicates the DNS address
• For example, "pakman_series@ hotmail.com" is an e-mail address
• "pakman_series" is the username
• "hotmail.com" is the DNS address

• When someone sends an e-mail to your e-mail address, it is stored in your


mailbox
Advantages of E-mail
+It is very fast and reaches the destination in a few seconds.
+Its cost is very low. It is almost free, even in Pakistan.
+One message can be sent to many persons with a single e-mail.
+It is available around the clock and around the globe.
+We can send and receive e-mail messages anywhere in the world.
+We can send any type of files via e-mail.
+It is possible to send and receive e-mail messages through a mobile phone.
+The receiver is not interrupted by the arrival of the e-mail. It is put in his/her
mailbox on the server and he/she can read at any time.
Disadvantages of E-mail
- Privacy Issue
- No Emotions
- Junk Mails
- Spreading of Viruses
- Urgent messages can be delayed
- Fraud via e-mail

• Details are given in book “Introduction to Computer” – PM Series


Computer Security
Chapter 8 – The Internet & Computer Security
Computer Security
• Today, critical or important information of many organizations is stored and
managed on computers and mobile devices
• Information may be credit card numbers, customer’s bank account
information, and purchase information
• Computers and mobile devices, along with the information they store, are
accessible and available when needed
• Many organizations provide online services to their customers/users
• Data is stored online for providing fast services
• For example
• A credit card company may put data of its customers online
• A bank providing online services
• A university may provide the facility of viewing results online. Similarly, people take
online exams like GRE, GUAT, etc.
Computer Security
• Data/information can be lost or destroyed or misuse due to different reasons
• It can be deleted or destroyed accidentally or intentionally
• Data is more valuable than computer hardware and software
• In case of failure of hardware, it can be replaced
• Similarly, in case of loss of software, it can be re-installed
• But in case of data loss, it is difficult to recover in time
• Organizations must take measures (or necessary arrangements) to protect or
safeguard their computers, mobile devices, and information/data they store,
from loss, damage, and misuse.
• Protecting a computer system and its resources (such as hardware, software,
and information or data) from being damaged or accessed by unauthorized
persons is called computer security
• Different methods are used to ensure the security of a computer system
Computer Security
Importance of Computer Security
• Because of the Internet, today computer systems are facing different kinds of security threats
• Some examples of these threats are viruses, worms, adware, spyware, hackers and crackers, etc.
• These threats can cause various types of damages to computer hardware, software, and
important data stored inside computers or mobile devices
• For example, if a person gains unauthorized access to an online bank, he can transfer a large
amount of money from other accounts to his personal account
• Similarly, an unauthorized user may also delete important data of a business or an organization
• So it is very important to protect the computer system and data stored in it from being theft,
deleted, or corrupted
• A computer security system ensures that we can work in a risk-free environment
• Basically, there are three main objectives of computer security:
• To protect hardware from being theft or damaged
• To protect information and software stored in computers or mobile devices from being theft
or damaged
• To prevent interruption (disruption) in computer services or operations
Authorized Access & Unauthorized Access
• Accessing a computer or its resources legally is called authorized access
• Sometimes a legal user is restricted to a specific level of access
• This level of access of a user is known as his/her authorized access
• A process to check the rights of a user to access a particular computer
system is called authorization
• Accessing a computer or its resources illegally is called unauthorized access
• When someone tries to exceed his/her level of access, it is considered
unauthorized access
• Unauthorized access to a computer or its resources is a crime
Hardware Theft
• Hardware theft is the act of stealing digital equipments such as a computer,
mobile device, storage medium, and communication device
• Hardware vandalism is an act of destroying hardware equipments
• For example, an angry employee of an organization may damage the server
computer of the network or cut the wires of the network
• Hardware failure is a fault or break down within the electronic circuits or
electromechanical components of a computer system
• Hardware can fail for a variety of reasons such as aging hardware, natural or
man-made disasters, electrical power problems or fluctuations, and even
errors in software or apps
Software Theft
• Software theft is the act of stealing software media, illegally copying the
software, and intentionally deleting the software
• For example
• A person can steal the CD/DVD or hard disk that contains the software
• A person can copy software illegally and distribute it
• A person can delete the installed software from the computer or an organization
Information Theft
• Information theft is the act of stealing personal or confidential information
• Stolen information can be used for destructive or illegal activities
• For example, an unauthorized user may use the credit card number of
another user for shopping
• Information theft often is linked to other types of cybercrimes
Cybercrime
Chapter 8 – The Internet & Computer Security
Cybercrime
• Any criminal activity (i.e. illegal act) which is performed by using a computer
or mobile device and the Internet is known as cybercrime
• It is also called computer crime
• Persons who commit computer crimes are called cybercriminal or computer
criminals
• Examples of cybercrimes
• Stealing credit card numbers
• Stealing currency from online bank accounts
• Stealing passwords or pin codes
• Illegally downloading important documents or files such as confidential financial
reports and research work
• Identity theft
• Threatening someone using the Internet
• Illegal access to others’ computers and data
• Change of data without the permission of its owner
Types of Computer Criminals
Hacker
• A person who accesses a computer system and its resources or network
illegally is called a hacker
• He/she has an advanced computer and network skills
• Unauthorized access to a computer system or network is called hacking
• Nowadays many organizations appoint hackers to check the security of their
computer systems, networks, or websites
• These hackers are also known as white hats or ethical hackers
Cracker
• A person who breaks the security system of a computer system or network
and accesses it illegally for criminal and destructive purposes is called a
cracker
• He/she also breaks the licensed software without the permission of its
owner and redistributes this software illegally
• Crackers are computer experts and have advanced networking skills
Types of Computer Criminals
Unethical Employees
• Unethical employees may break into their employers’ computers for
different reasons
• Some want to exploit a security weakness, while others want to achieve
financial benefit by selling confidential information
• Some disappointed or unhappy employees may want revenge
Computer Virus
Chapter 8 – The Internet & Computer Security
Computer Virus
• A program or piece of code that infects or affects the computer system or mobile device
and files/programs stored in it is called a virus
• It can load into the user’s computer primary or secondary memory without his/her
knowledge
• The code for a computer virus is written in a programming language
• This code is attached to a file such as a program file
• A file containing a virus is called an infected file
• When the infected file is copied to a disk, the virus is also copied and it hides itself or
attaches to other files on the disk
• A disk that contains virus/viruses is called an infected disk
• Different computer viruses create different problems in different ways
• A virus may destroy all data stored in the hard disk by formatting it
• A virus may change the boot sector of the hard disk. If the boot sector of a disk is affected, it cannot boot the
computer
• A computer virus is automatically loaded from disk into the memory of the computer. It slows down the data
accessing speed of the computer
• A virus may detect some special information like passwords or any sensitive data and send it to some other user on
a network. For example, a virus may read the ‘Pin Code’ of a credit card, entered by a user, and then sends this
information to another user.
Activation of a Virus
• When a virus performs its actions, it is called the activation of a virus
• Different computer viruses are activated in different ways
• For example, some viruses are activated on a fixed date
• Usually, these viruses are part of the application programs (or operating
systems)
• When the application program is run on the computer, it checks the system
date
• If the system date matches with the activation date of the virus, the virus is
activated
Signs of Virus Infection
• There are a number of signs which indicate that a computer is infected by a
virus
• An unusual message or image appears on the computer screen
• An unusual sound or music plays randomly on the computer
• Speed of the computer slows down
• Computer stops functioning
• Some programs do not run properly on the computer
• New programs do not install on the computer
• Some files or folders may get corrupted
• Files or folders may be deleted suddenly
• Computer may face trouble to boot
• Internet access may be blocked completely or partially
• System settings or properties may be changed
• Hard disk may have no free space suddenly for storing data
• CD-ROM tray may open and close unwillingly
• Programs may start running without user commands
Protection from Viruses
• A computer system can be protected from viruses by following these
precautions:
• Always use an antivirus program with the latest version, to detect and remove viruses
from the computer.
• Never open unknown email messages, and also scan (for viruses) all email messages
even if you know the sender of the message.
• Removable storage devices such as USB flash drive should be scanned for viruses
before use.
• Freeware and shareware software downloaded from the Internet normally contain
viruses. These software must be scanned with the latest antivirus program before
using them.
• Pirated software should not be installed on the computer. Always use licensed
software.
Causing of Spreading Viruses
Removable Storage Media
• Today, removable storage media (such as USB flash drives and CDs) are commonly
used for transferring files from one computer to the other
• USB flash drive is the most popular portable storage device
• In a flash drive, some files may be infected by viruses
• When a user copies infected files from a flash drive into his/her computer, viruses
are also transferred/copied
Networks
• A computer network (Internet or another network) is the major source of
spreading viruses
• In a computer network, if a computer is infected by a virus then this computer may
infect other computers in the network also
• For example, when users access the infected computer in the network, then
viruses are also transferred or copied into their computers
• Similarly, when a user downloads a file infected with viruses from the Internet, the
viruses are transferred to the computer also
Causing of Spreading Viruses
Insecure Websites
• There are many websites on the Internet that are not completely secure
• These insecure websites may contain viruses
• These websites are set up to spread viruses, or for some other bad purposes
• When we access these insecure websites then viruses are also automatically
downloaded and infect our computers
Email Attachment
• Sending a computer file along with an email is called an email attachment
• Email attachment or message is also a source of spreading viruses
• An email may contain an infected file attachment
• When a user opens an infected email attachment, virus may infect computer
• This virus is also transferred to other computers when email messages are
sent from the infected computer to them
Causing of Spreading Viruses
Email Attachment (Cont.)
• Most of the viruses are attached to anonymous emails
• These types of emails are received in the Spam or Junk folder of the user’s email account
• A person can send an infected email to hundreds of other people simultaneously
• In this way, viruses spread in many computers via emails
• Therefore, do not open emails received from unknown persons
Pirated Software
• Word ‘pirated’ means ‘copied illegally’
• Software which is installed and used illegally (or without a license) is called pirated
software
• Pirated software is also a major source of spreading viruses
• Some software companies intentionally attach viruses with their software
• When these software are installed in computers illegally, viruses are activated and
damage computers
• Suppose a student downloads a computer game from the Internet and installs in his/her
computer
• Viruses may also transfer to the computer with that game
Antivirus Programs
Chapter 8 – The Internet & Computer Security
Antivirus Programs
• A software that detects and removes viruses from the computer or mobile device
is known as an antivirus program
• Most antivirus programs can also detect and remove viruses from the computer or
mobile device
• Many antivirus programs automatically scan all types of removable storage devices
inserted in the computer or mobile device, files downloaded from the web, and
email attachments
• These programs also prevent viruses from entering into the computer
• Most of the email servers and web servers also have antivirus programs installed
to check incoming and outgoing email messages and files for viruses
• A large number of antivirus programs are available
• These programs contain a list of known viruses
• They also contain methods for removing these viruses from infected files or disks
• However, there is no single antivirus software, which can remove all types of
viruses
• If an antivirus identifies/detects an infected file, it attempts to remove the viruses
Antivirus Programs
• Latest antivirus software must be installed on the computer to save the
computer from new viruses
• We should update antivirus and scan the computer system regularly
• Examples of Antivirus
• Symantec
• McAfee
• AVG
• Avast
• Kaspersky
• NOD 32
• Windows defender
Computer Ethics
Chapter 8 – The Internet & Computer Security
Computer Ethics
• Moral guidelines and principles that are followed for the positive use of computers,
mobile devices, information systems, and related technologies are known as computer
ethics
• For example, it is unethical to copy software without the permission of its owner
• Ethics are different from laws
• General moral guidelines and principles to the use of computers
• A computer system should not be used to harm or disturb other people.
• It is totally unethical to access and destroy the data/information of other people.
• Developing and intentionally spreading viruses in computers is unethical.
• Reading other people’s email messages is unethical. This is an attack on their privacy.
• It is a criminal activity to access the bank account of a company or a person illegally through a
computer network and transfer money to another account.
• Spreading rumors or false news through the use of a computer or mobile networks is also a serious
crime.
• Software is an intellectual product. Getting illegal copies of copyrighted software is ethically wrong.
• Hacking a computer system or any electronic system is unethical.
• Installing software without the permission of its author is unethical.
• Always develop such programs or software that are not harmful to society.
• Always use of computer hardware, software, and data with responsibility and carefully.
For more details, refers to

PM Series

Introduction to Computer

by
CM Aslam, Aqsa Aslam, Mussadiq Fida, & Mudassir
Ahmad

Publisher:Majeed Sons
22- Urdu Bazar, Lahore

You might also like