Você está na página 1de 17

ANTI-VIRUS

SMJK CHIO MIN

OBJECTIVES

CONTENTS

CLASS 4A & 4TM3

SUMMARY

EVALUATION

OBJECTIVES
At the end of the lesson, students should be able to
Select the appropriate security measures to overcome

the identified computer threats: antivirus, antispyware, firewall, data backup, and human aspects.
Describe the impact of ICT on society.

3.3 security measures


Anti-virus

Antispyware

Firewall

Security Measures

Data Backup

Crypto graphy

Human Aspect

Anti-virus
Anti-virus is an utility program that we use to protect

a computer against viruses by identifying and removing computer viruses found in the computer memory, computer storage or incoming e-mails files.
Examples of antivirus are

Norton AVG Kaspersky Avira Bitdefender

Anti-spyware
Anti-spyware is an utility program that we use to

protect the computers from spyware


Spyware is designed secretly record and report an

individuals activities on the internet.


It enters your systems through internet when you open

e-mail or download software.


Examples of antispyware program are Spybot Search

and Destroy, Ad-ware and Spyware Blaster.

Firewall
Firewall is a piece of hardware or software which

functions in a networked environment to prevent some communications forbidden by security policy.


We use firewall to prevent hacking (unauthorized

access is the use of a computer or network without permission).

Data Backup
Backup is utility program that makes a copy of all files

or selected files that have been saved onto a disk.


Backup Data is to ensure our data can still be used if

the original is corrupted and prevent our files from malicious program.

Cryptography
Cryptography is a process of transforming plaintext

into ciphertext then back again.


Encryption is a process of converting plaintext into

ciphertext.
Decryption is the process of converting ciphertext

into plaintext.
We use cryptography to secure the information and

prevent hacking or unauthorized access.

Cryptography
DECRYPTION

I love ICT so much

Ciphertext
MRNME REOGO SANOW

I love ICT so much

Plaintext

Plaintext

ENCRYPTION

Human Aspects
Human Aspects refer to the user and also the intruder

of a computer system.
Human aspect security is the hardest aspects to give

protection to. Lack of achieving a good information security procedure.


Three ways of security through human aspects are

Organization self awareness Organization user self awareness Individual user self awareness

3.4. current and future development


Impact of ICT in society Computer helps people to do their work faster and more efficient by using the software application that consist of special program for specific tasks.

3.4. current and future development


Impact of ICT on society
Software application are used for many reason such as To enhance the learning process To help in business activities To assist the graphic and multimedia projects To facilitate communication

activity

Move in a group of three Get A4 paper from teacher Discuss in your group about your invention Draw the draft

The Racing Game of Knowledge


Continue

summary
There are several appropriate security measures to

overcome the identified computer threats: antivirus, anti-spyware, firewall, data backup, cryptography and human aspects.
Impact of ICT on society including: Home and education Business Graphics & multimedia Communication

Você também pode gostar