Page 61 - IT_V1.0_Class10
P. 61
Backup Your Data ii. Identity: There are cases where a hacker steals your personal information and assumes your identity.
Make sure to regularly save all the important information from your computer onto another device, like a CD, With this false identity, the hacker can gain access to your account information or perform illegal activity.
DVD, or external hard drive. This way, if something happens to your computer, you will still have all your files iii. Software Piracy: It is stealing of software and using or distributing unlicensed and unauthorised copies
safe and sound. of a computer program or software.
Scanning and Cleaning Viruses b. Online Predator: These are people who trap you into inappropriate relationships. They may be older
people who pretend to be of your age, bullying you into doing illegal activities online.
Protect your computer from harmful viruses by installing antivirus software. This software not only prevent
viruses from infecting your system, but also scan and remove any viruses that may have already snuck in, c. Internet Scams: We may receive very attractive offers saying you have won a huge amount of money in
keeping your data safe from harm. For example, if you receive an email with a suspicious attachment, the a lottery and you can claim the prize by depositing a certain amount of money. They gain access to your
antivirus software will detect and quarantine the virus before it can harm your computer. account details and misuse later.
Increasing Computer Performance d. Virus: These are computer programs that replicate themselves and spread to all files, once they attack a
computer. This makes it very difficult to remove them.
Over time, your computer can slow down due to the accumulation of unnecessary files and data. Keep
your computer running smoothly by regularly cleaning out these unnecessary files using Disc cleaner
MALWARE
software. By freeing up space on your hard drive, you’ll notice a significant improvement in your computer’s
performance. Use Disc cleaning software such as CCleaner. This software will help you identify and remove Malware refers to infectious programs that hamper the functioning of a computer system. It is an unwanted
unnecessary files from your computer, freeing up space and improving its performance. software which is designed to damage a computer system. Some common types of malware are virus, worms,
trojan horse, spyware, etc.
Removing Spam from Your Computer
Don’t let unwanted spam emails clutter your inbox. Take the time to regularly delete these emails and set Virus
up filters in your email settings to automatically redirect spam to a separate folder. This way, you can keep A computer virus is a type of unwanted computer program/
your inbox organised and free from annoying spam messages. Also, set up filters in your email client to malicious software (malware) which is developed by miscreants
automatically move spam emails to a separate folder. with an intention to infect the files of a computer, corrupt a
database, or hamper the functioning of a computer system.
SESSION 4 Computer Security and Privacy
Symptoms of Computer Virus
Computer security is important for keeping our digital data safe from threats like hackers, viruses, and data When virus infects human beings, it damages the body, which
breaches. As we use technology more every day, it’s crucial to protect both personal and work-related is evident through certain symptoms. In the similar manner,
information from being accessed or damaged without permission. By using strong security measures, we can there are certain symptoms that hint that a computer has been
make sure that our data stays safe, private, and accessible only to those who are authorised.
infected by virus like:
COMPUTER SECURITY DEALS WITH PROTECTING COMPUTERS Slowdown: Fall in speed of processing of computer.
Pop-Ups: Appearance of unexpected pop-ups on the system.
Computer security is about keeping your computer and all the information on it safe from any unauthorised
access or loss. Computer security breaches can happen for various reasons, such as malware attack, lack of Crash: Frequent crashing of system or BSOD (Blue Screen of Death).
security awareness, etc. Running Out of Storage Space: Occupying huge space of storage.
Reasons for Security Break Loss of File: Abrupt deletion of files on a computer system.
Personal information can be lost or leaked in various ways, such as: Unusual Activity of Messages or Programs: Automatic opening or closing of a program, abrupt restarting
When we share our information on sites that are not secured. of a computer and opening of strange or unknown windows during the process of booting.
When a person gets unauthorised access to our computer. Unusual Network Activity: Unusual network activity, such as excessive transfer of data, even when all the
applications are closed.
THREATS
Worms
Threats are the ways in which personal information can be leaked from a computer without our knowledge.
Worms are computer programs or algorithms that are alien to the host computer and are designed to
There are various threats to our computer:
purposely slow down the functioning of a computer. Worms replicate inside the system and thus occupy a
a. Theft: It means stealing of information or hardware. It is of three types: huge memory space in the storage device. Worms spread more commonly in computers that are connected
i. Physical: If a person steals your laptop or desktop. to a network. Examples of worms are Linux Ballpit, Morris worm, W32/Nimda worm, Mydoom, Sasser, etc.
ICT Skills-II 59

