Page 370 - Trackpad 402_Class-X_Final
P. 370
There are several methods of eradication:
• Removing the code in the infected file which corresponds to a virus.
• Removing the infected file.
• Quarantining the infected file, which involves moving it to a location where it cannot be run.
• Inform the user about the presence of the malware and the action that has been taken.
• Separate all the infected files and applications so that the infection cannot spread further.
Some well-known antivirus programs are Norton, AVG, McAfee, Symantec, SmartDog, Kaspersky, etc.
Norton McAfee Quick Heal AVG
1. What is Antivirus?
uiz Bee 2. Mention the name of some online spoofing threats.
3. Write any two advantages of online shopping.
Best Practices for Internet Security
The following are some of the best practices that can be followed to be safe while using internet:
• Install the latest and up-to-date web browser, do not install non-reliable extensions on the browser.
• While surfing through websites ensure to access information from reliable and secured websites (https:)
• Keep deleting Cache/Cookies from the browser.
• Do not keep passwords and login details saved on the browser, logout from all accounts as soon as you complete
your work.
• Keep the privacy settings of browser to medium/high.
• Avoid clicking on pop ups that have the unrealistic offers.
• Do not reveal your OTP/Personal information on any random site for which you are not sure.
• Be very careful when using email IDs of any banking or financial websites as there are many cloned websites with
similar spellings to make you victim of financial fraud.
• Do not download anything from website without verifying the authenticity of the website.
• Always login in your email accounts using Incognito Window/Private Window/InPrivate Window of the browser
while working on public computers.
• Always keep copies of personal data in additional media such as compact discs, pen drives, etc. This could be helpful
in situations when there is a loss of data. Keep the data away from unauthorized users.
Guidelines to be Followed to Prevent Cyber Crime
Some of the basic guidelines that we can follow to prevent Cyber Crime are as follows:
• Always update your operating system, software and apps.
370 Trackpad Information Technology-X

