1 / 8

The Risks of Computing

By: Jack, Anna, Cassidy and Patrick October 7, 2008. The Risks of Computing . Protecting your Computer. Theft There are systems that you can lock your computers in special cabinets by using strong cables and tying them to desk. Many areas have video cameras to protect there computers. .

yen
Download Presentation

The Risks of Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. By: Jack, Anna, Cassidy and Patrick October 7, 2008 The Risks of Computing

  2. Protecting your Computer • Theft • There are systems that you can lock your computers in special cabinets by using strong cables and tying them to desk. • Many areas have video cameras to protect there computers.

  3. Damage and Data Loss Damage • Make sure your computers are safe by putting them on durable tables • Hide cables and wires so that people don’t trip over them Data Loss • Occur through hardware failures, power spikes, hackers, accidental deletions, angry employees. • You should have an emergency plan and have a backup. • Add extra security so that hackers don’t steal your hardware.

  4. Backups and Power Backups • You should backup your work regularly. You should have several backup CD stored securely Power • 2 kinds of power problems: Outages and surges. • If there is a sudden loss of power your computer will shutdown and will probably lose the work you were working on.

  5. Hackers and data security • Usually the data on the computer is worth more than the computer. • It usually had a rippled effect throughout the organization of business. • A hacker is someone who illegally gets into another computer and steals information or corrupts data. • Some hackers are known as crackers they consider them selves very good with programming languages. • They steal information to make money off of. • They destroy information. • They change information. • A good way to protect your computer is to have different combinations of letters and numbers and to change your passwords frequently.

  6. Understanding Viruses • The only way a virus can enter your computer is if you open • Viruses come in through disk or files that come onto your computer through emails or the internet. • Basically it is a computer program that is able to move from computer by attaching itself in computer programs.

  7. Types of Viruses • Boot sector • Program or File • Macro • Multipartite • Worms • Trojan horses • To protect these viruses use an antivirus program like Norton

  8. The End!

More Related