Page 370 - Trackpad 402_Class-X_Final
P. 370

There are several methods of eradication:
        •  Removing the code in the infected file which corresponds to a virus.
        •  Removing the infected file.
        •  Quarantining the infected file, which involves moving it to a location where it cannot be run.

        •  Inform the user about the presence of the malware and the action that has been taken.
        •  Separate all the infected files and applications so that the infection cannot spread further.
        Some well-known antivirus programs are Norton, AVG, McAfee, Symantec, SmartDog, Kaspersky, etc.


















                      Norton                  McAfee                Quick Heal                AVG


                                1. What is Antivirus?
                 uiz Bee        2. Mention the name of some online spoofing threats.

                                3. Write any two advantages of online shopping.



        Best Practices for Internet Security

        The following are some of the best practices that can be followed to be safe while using internet:
        •  Install the latest and up-to-date web browser, do not install non-reliable extensions on the browser.
        •  While surfing through websites ensure to access information from reliable and secured websites (https:)
        •  Keep deleting Cache/Cookies from the browser.
        •  Do not keep passwords and login details saved on the browser, logout from all accounts as soon as you complete
          your work.
        •  Keep the privacy settings of browser to medium/high.
        •  Avoid clicking on pop ups that have the unrealistic offers.
        •  Do not reveal your OTP/Personal information on any random site for which you are not sure.
        •  Be very careful when using email IDs of any banking or financial websites as there are many cloned websites with
          similar spellings to make you victim of financial fraud.
        •  Do not download anything from website without verifying the authenticity of the website.
        •  Always login in your email accounts using Incognito Window/Private Window/InPrivate Window of the browser
          while working on public computers.
        •  Always keep copies of personal data in additional media such as compact discs, pen drives, etc. This could be helpful
          in situations when there is a loss of data. Keep the data away from unauthorized users.

        Guidelines to be Followed to Prevent Cyber Crime
        Some of the basic guidelines that we can follow to prevent Cyber Crime are as follows:

        •  Always update your operating system, software and apps.


          370   Trackpad Information Technology-X
   365   366   367   368   369   370   371   372   373   374   375