Professional Documents
Culture Documents
Computer Security is the protection of computing systems and the data that they store
or access.
Computer Security allows the user to carry out their mission by:
computing practices.
This means that everyone who uses a computer or mobile device needs to understand
how to keep their computer, devices and data secure by:
• Use good, cryptic passwords that can’t be easily guessed - and keep your
passwords secret
• Make sure your computer, devices and applications (apps) are current and up
to date Make sure your computer is protected with up-to-date anti-virus and
anti-spyware software
• Don’t click on unknown or unsolicited links or attachments, and don’t
download unknown files or programs onto your computer or other devices
• Remember that information and passwords sent via standard, unencrypted
wireless are especially easy for hackers to intercept An unprotected computer
can become infected or compromised within a few seconds after it is connected
to the network.
Computer Viruses
o Viruses are small programs that hide themselves on your disks (both diskettes
and your hard disk). For example, a virus might attach itself to a program
such as a spreadsheet program such that each time the spreadsheet program
runs, the virus runs, too, and it has the chance to reproduce (by attaching to
other programs)
o Unless you use virus detection software the first time that you know that you
have a virus is when it activates.
o Viruses hide on a disk and when you access the disk (either a diskette or
another hard disk over a network) the virus program will start and infect
your computer.
o The worst thing about a computer virus is that they can spread from one
computer to another, either via use of infected floppy disk, or over a
computer network, including the Internet
Viruses
•E-mail viruses: An e-mail virus travels as an attachment to e-mail messages, and
usually replicates itself by automatically mailing itself to dozens of people
in the victim's e-mail address book. Some e-mail viruses don't even require
a double-click -- they launch when you view the infected message in the
preview pane of your e-mail software
•Trojan horses: A Trojan horse is simply a computer program. The program claims
to
do one thing (it may claim to be a game) but instead does damage when you
run it (it may erase your hard disk). Trojan horses have no way to replicate
automatically.
•Worms: A worm is a small piece of software that uses computer networks and
security holes to replicate itself. A copy of the worm scans the network for another
machine that has a specific security hole. It copies itself to the new machine
using the security hole, and then starts replicating from there, as well.
Virus- some emails may be incorporated with files containing malicious script
which when run on your computer may destroy your important data.
Physical breaches: