Willem Wiechers 3 rd March PDF

Please download to get full document.

View again

of 24
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Information Report

School Work


Views: 88 | Pages: 24

Extension: PDF | Download: 1

Related documents
Willem Wiechers 3 rd March Why do we want Malware & Virus Protection? To make our computers save Wish to keep our data private Wish to have a safe environment to do our online banking, shopping,
Willem Wiechers 3 rd March Why do we want Malware & Virus Protection? To make our computers save Wish to keep our data private Wish to have a safe environment to do our online banking, shopping, buying of travel tickets etc. Wish to keep our content & our address books private Etc. 2 All communication with a computer takes place over the internet using a network. So it is the traffic in and out of a computer that we have to safeguard. This takes place automatically in the background without most users being aware of it. So how does it all work? 3 A physical firewall is a wall made of brick, steel, or other inflammable material that prevents the spread of a fire in a building. In computing, a firewall serves a similar purpose. It acts as a barrier between a trusted system or network and outside connections, such as the Internet. However, a computer firewall is more of a filter than a wall, allowing trusted data to flow through it. 4 5 Is the Firewall On? Important at home Especially open to virus attacks when off Crucial when on a public Network Far more likely to be targetted 6 Malware (Malicious Software) Is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware. 7 A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be infected . 8 A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. Trojans often present themselves as routine, useful, or interesting in order to persuade victims to install them on their computers. 10 Computers software that is installed surreptitiously and gathers information about an Internet user's browsing habits, intercepts the user's personal data, etc., transmitting this information to a third party: 11 Viruses, Worms & Trojan Horses can be linked together. They cause disruption on a computer by affecting the files in some way. They may alter, delete, or replace certain files on the computer and cause havoc that way. They don t steal your data nor do they use your data. Spyware does look at your data, e.g. your browser history, may steal your address book, try getting hold of your passwords etc. 12 You must have one On new computers with Windows 8.1 it is preinstalled (Windows Defender) Need to install one on earlier systems Microsoft has Microsoft Essentials for free Other free ones: Avira, Avast, AVG, Windows Defender Others : Norton, Kaspersky, McAfee 13 No simple answer All free systems also sell a chargeable version Better virus detection for non-free packages? Not proven according to reviewers So why pay? More bells & whistles. Free automatic backups of computers on the cloud. Also include virus removal tools once computer infected, also may deal with spyware. 14 It checks all incoming data for viruses. Every web page accessed & every received is checked including attachments USB sticks as soon as they are inserted are checked as are cd s & dvd s On program execution some checks are made 15 No antivirus software is 100% efficient Paid for systems claim they deal more quickly with new viruses So it is essential to keep updating the antivirus software definition files. (Automatic for most of them) Leave computer on permanently, it will do it overnight, otherwise on booting up. It is the uploading of new definition files, and the checking of the system that slows down the computer on booting up 16 Hardware Troubles No Response Slow Performance Slow Start-up Crashing System Missing Files Disks or Disk Drives are not Accessible Extra Files Printer Issues Unusual Error Messages 17 Malwarebytes 18 19 20 21 22 23 24 25
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks