Download presentation
Presentation is loading. Please wait.
1
War between Good and Evil.
The battlefield is your PC! Internet Safety
2
Internet Safety •Anything you say, no matter how secure you think it is, or who you say it to, may be accessed by others
3
Internet Safety If you are on your parent’s account, what you say or do might come back to them Always ask the teacher if it’s OK to download something on the computer.
4
Internet Safety Good citizenship means doing the right things for the right reasons, that benefits others Good citizenship when using the computer means: Not sharing software with others Proper conduct online No chatting in a chat program Not transmitting offensive materials to others Do not share your passwords. Change when your password if your has been hacked.
5
A computer virus •Computer virus refers to a program which damages computer systems and/or destroys or erases data files
6
Types of Computer Virus
Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Script Virus Trojan Horse
7
Time Bomb A time bomb is a virus program that performs an activity on a particular date
8
Logical Bomb A logical bomb is a destructive program that performs an activity when a certain action has occurred.
9
Worm Virus A worm is also a destructive program that fills a computer system with self-replicating information, clogging the system so that its operations are slowed down or stopped
10
Boot Sector Virus A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
11
Macro Virus A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk
12
Script Virus Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages
13
Trojan Horse Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.
14
Trojan Horse Trojan Horse usually comes with monitoring tools and key loggers
15
Practice Internet Safety
Remember to Always Practice Internet Safety The End
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.