Page 64 - Ai_C10_Flipbook
P. 64

Threats to Computer

              Threats refers to the potential risk or dangers in which personal information can be leaked from a computer
              without our knowledge.

              Some of the common threats to the computer are:
              (a)   Theft: Theft means stealing of information or sensitive or confidential data stored on a computer. These maybe
                  of three types:
                    • Physical: Where a person may steal your desktop computer or laptop.
                    • Identity:  Where a hacker steals your  personal information and assumes  your  identity. Using this false
                    identity, the hacker can gain access to your account information or perform illegal activity.
                    • Software Piracy: This is stealing of software and includes using or distributing unlicensed and unauthorised
                    copies of a computer program or software.
              (b)   Virus: Computer virus is a malicious code that attaches itself to a file and enters your computer system and
                  makes copies of itself and carries out the harmful tasks in such a way that it damages the important files of
                  an operating system or application programs or important data files due to which the computer may stop
                  working.
                  Major types of viruses are Worms and Trojan Horse.

                    • Worms: Computer worms are a type of malicious software or malware that can replicate and spread on their
                    own mainly across computer networks.

                    • Trojan Horse: This malicious software disguises itself as a useful software but is designed to carry out
                    harmful  activities on  a  computer.  The  name "Trojan  Horse"  comes from the  ancient  Greek  story  of the
                    wooden horse used to infiltrate the city of Troy.

              (c)   Online Predator: Online predators are individuals who use the internet to exploit, manipulate, or abuse
                  others, particularly targeting vulnerable populations like children and teenagers. They often build trust
                  with their victims through flattery, gifts, or attention. They may pose as peers or friends to create a sense
                  of familiarity and trust.

              (d)   Internet Scams: Internet scams often involve attractive offers that claim you have won a large sum of money
                  in a lottery or a prize and that you can claim the prize by depositing a certain amount of money. When you
                  deposit the money using credit card or online banking, you not only lose the deposit money but your card /
                  account information may be misused later.
              Protecting Your Data


              Data protection is safeguarding your data from data damage or data access by unauthorised people. It is always a
              good practice to maintain and protect your computers data by following some precautions and managing a few
              computer settings.
              Some of the important points to protect your data are:

                 • Use Proper Passwords Combinations for Your Computer Login:  At the time to allocate passwords take care
                to use the combinations of small letters, upper case, numbers, and special characters like $, %, &, etc. These
                combinations are difficult to hack and will be able to save your computer from unauthorised access.

                 • Install  Anti-virus and Firewall:  Anti-viruses and Firewall will not allow the unwanted  data  to enter  your
                computer. If by mistake you download any malicious code then antivirus or antimalware software will warn
                you and then will remove it from your computer. This way you will be able to project your data from getting
                damaged or stolen. Firewall can be a hardware— network security device or a software that acts as a barrier to
                    62      Artificial Intelligence Play (Ver 1.0)-X
   59   60   61   62   63   64   65   66   67   68   69