ANTI-VIRUS
SMJK CHIO MIN
OBJECTIVES
CONTENTS
CLASS 4A & 4TM3
SUMMARY
EVALUATION
OBJECTIVES
At the end of the lesson, students should be able to
Select the appropriate security measures to overcome
the identified computer threats: antivirus, antispyware, firewall, data backup, and human aspects.
Describe the impact of ICT on society.
3.3 security measures
Anti-virus
Antispyware
Firewall
Security Measures
Data Backup
Crypto graphy
Human Aspect
Anti-virus
Anti-virus is an utility program that we use to protect
a computer against viruses by identifying and removing computer viruses found in the computer memory, computer storage or incoming e-mails files.
Examples of antivirus are
Norton AVG Kaspersky Avira Bitdefender
Anti-spyware
Anti-spyware is an utility program that we use to
protect the computers from spyware
Spyware is designed secretly record and report an
individuals activities on the internet.
It enters your systems through internet when you open
e-mail or download software.
Examples of antispyware program are Spybot Search
and Destroy, Ad-ware and Spyware Blaster.
Firewall
Firewall is a piece of hardware or software which
functions in a networked environment to prevent some communications forbidden by security policy.
We use firewall to prevent hacking (unauthorized
access is the use of a computer or network without permission).
Data Backup
Backup is utility program that makes a copy of all files
or selected files that have been saved onto a disk.
Backup Data is to ensure our data can still be used if
the original is corrupted and prevent our files from malicious program.
Cryptography
Cryptography is a process of transforming plaintext
into ciphertext then back again.
Encryption is a process of converting plaintext into
ciphertext.
Decryption is the process of converting ciphertext
into plaintext.
We use cryptography to secure the information and
prevent hacking or unauthorized access.
Cryptography
DECRYPTION
I love ICT so much
Ciphertext
MRNME REOGO SANOW
I love ICT so much
Plaintext
Plaintext
ENCRYPTION
Human Aspects
Human Aspects refer to the user and also the intruder
of a computer system.
Human aspect security is the hardest aspects to give
protection to. Lack of achieving a good information security procedure.
Three ways of security through human aspects are
Organization self awareness Organization user self awareness Individual user self awareness
3.4. current and future development
Impact of ICT in society Computer helps people to do their work faster and more efficient by using the software application that consist of special program for specific tasks.
3.4. current and future development
Impact of ICT on society
Software application are used for many reason such as To enhance the learning process To help in business activities To assist the graphic and multimedia projects To facilitate communication
activity
Move in a group of three Get A4 paper from teacher Discuss in your group about your invention Draw the draft
The Racing Game of Knowledge
Continue
summary
There are several appropriate security measures to
overcome the identified computer threats: antivirus, anti-spyware, firewall, data backup, cryptography and human aspects.
Impact of ICT on society including: Home and education Business Graphics & multimedia Communication