Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436.

Similar presentations


Presentation on theme: "Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436."— Presentation transcript:

1 Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436 Place photo here

2 The Objectives and the outcomes The Objectives: To understand the harms caused by modern crime form. To understand the computer viruses and how to protect their computer. To understand the Computer Ethics. The Outcomes: student should be able to know the computer crimes form. student should be able to understand the computer viruses and how to protect their computer. student should be able Computer Ethics.

3 Introduction Net crime refers to criminal exploitation of the Internet. Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: Crimes that target computers directly Crimes facilitated by computer networks or devices.

4 Crimes that target computers directly Computer viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. Denial-of-service attacks: In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Malware (malicious code) : Malware, short for malicious software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software

5 Crimes facilitated by computer networks or devices Spam: Spam, or the unsolicited sending of bulk email for commercial purposes. Fraud: Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by: Altering computer input in an unauthorized way. Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions. Altering or deleting stored data. Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes.

6 Computer Viruses A computer virus is an application program designed and written to destroy other programs. A virus program is man-made and it infects programs, documents, databases and more. Most people who write and circulate virus programs fall into one of the following two groups: the first uses viruses to show off for their peers, while the other which is far more dangerous group, creates viruses with malicious intent

7 Computer Viruses There are three main computer viruses: Macro is written into the program macro and shuts down functions Worm makes copies of itself and interfere with normal operations. Trojan horse acts as a backdoor, contacting a controller The three primary sources of computer viruses are: The Internet: Via downloads and exchanges Secondary storage: Exchanging disks Computer networks: Can spread from one network to another

8 How do you know if you have a virus? The answer comes when you notice one of the following symptoms. Lack of storage capability Decrease in the speed of executing programs Unexpected error messages Halting the system

9 Virus Protection The best way to cope with viruses is to recognize their existence and use an antiviral or antivirus program. Some tips that will help minimize your vulnerability to viruses: Delete e-mails from unknown Never open a file attached to an e-mail unless you know what it is. Download files from the Internet only from legitimate and reputable sources. Update your antivirus software at least every two weeks Backup your files periodically

10 Computer Ethics You shall not use a computer to harm other people. You shall not snoop around in other people's computer files. You shall not use a computer to steal. You shall not use other people's computer resources without authorization or proper compensation. You shall always use a computer in ways that show consideration and respect for your fellow humans.


Download ppt "Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436."

Similar presentations


Ads by Google