SOCIETAL IMPACTS OF IT SUJAL KUMPAWT 8D ROLL NUMBER 12
Computer and data have become lifeline of any organisation. If somethings goes wrong with them, business almost comes to a standstill. This could cause a lot of thousand or even millions of hours hard work and research. Hence you must take preventative measures to protect your system and data from virus attacks, physical damage , data loss and hacking. Many a times while working on a computer, it gets hanged, restart frequently and sometimes data gets lost. Generally, we call it a virus attack. However in reality, it is not only virus but worms, Trojans, spyware etc. are equally responsible for improper functioning of a computer.
virus A computer virus spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage . It enters a computer without any permission or knowledge of the user. A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs . If this replication succeeds, the affected areas are then said to be "infected" with a computer virus. Almost virus are attached to an executable file, which means that if a virus exists in a computer files, unless you open the malicious program. Virus stands for Vital Information Resources under Siege.
Types of virus Viruses can be classified into to major categories Boot virus : A boot sector virus, also known as an MBR virus, DBR virus, or a boot infector, is a type of virus that explicitly targets and contaminates a specific physical segment containing essential information of the computer required to properly run the operating system for start-ups and to operate initial functions . Program file virus : T hese infect program files, such as applications, games or utilities. They are often memory-resident, meaning that once they have been executed they remain active in the computer's memory and can infect more programs.
Virus symptoms Virus can cause many problem such as: Suddenly slow computer performance, meaning it takes a noticeably longer time to start up or open programs. Problems unexpectedly shutting down or restarting. Missing files. Frequent system crashes. Frequent error messages. Unexpected pop-up windows.
Steps to prevent virus Install antivirus or anti-malware software. Keep your antivirus software up to date. Run antivirus scans regularly. Keep your operating system up to date. Protect your network. Think before you click. Keep your personal information secure. Don't use unsecured Wi-Fi.
Computer worms A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers . It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue . Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time.
Trojans A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software .
Malware It is a software that enters a computer and damages it without users knowledge. Malware are trouble causing program. It may be vires, worm, T rojan horse spyware. Malware not only interrupt the normal working of computer, but also steal information. S ome EG. Of data stealing malware are : Bancos : it wait for the user to access banking website, and while surfing, it steals the information Gator: it monitor web surfing habits, and pop ups the relevant ads.
Spyware Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
Antivirus software An antivirus product is a program designed to detect and remove viruses and other kinds of malicious software from your computer or laptop
Cyber crime Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them.
Hackers Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them.
Crackers The Glossary defined a computer cracker as "an individual who attempts to access computer systems without authorization. These individuals are often malicious, as opposed to hackers, and have many means at their disposal for breaking into a system.
Backup Backup is the process of creating a copy of the data on your system that you use for recovery in case your original data is lost or corrupted. You can also use backup to recover copies of older files if you have deleted them from your system.
Security provision in E - commerce Ecommerce security is a set of guidelines that ensures safe online transactions. Just like physical stores invest in security guards or cameras to prevent theft, online stores need to defend against cyberattacks.
Privacy (using encryption) Encryption conceals data by scrambling it, so that anyone who tries to view it sees only random information. Encrypted data can only be unscrambled through the process of decryption. Encryption is essential for protecting users' online activities.
Password and pin numbers In general, a PIN takes a few taps on a screen to input. What Is a Password. A password is another gatekeeper for your personal information. Unlike a PIN, a password can contain upper and lowercase letters, numbers, and symbols.
Firewalls A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.