chapter 5: general computer topics department of computer science foundation year program umm alqura...

10
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills- 1 4800150-2 1435/1436 Place photo here

Upload: randolph-cross

Post on 01-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Chapter 5: General Computer Topics

Department of Computer ScienceFoundation Year ProgramUmm Alqura University, Makkah

Computer Skills-1

4800150-21435/1436

Place photo here

Page 2: Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

The Objectives and the outcomes

The Objectives:

• To understand the harms caused by modern crime form.

• To understand the computer viruses and how to protect their computer.

• To understand the Computer Ethics.

The Outcomes:

• student should be able to know the computer crimes form.

• student should be able to understand the computer viruses and how to protect their computer.

• student should be able Computer Ethics.

Page 3: Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Introduction

• Net crime refers to criminal exploitation of the Internet.

• Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories:

• Crimes that target computers directly

• Crimes facilitated by computer networks or devices.

Page 4: Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Crimes that target computers directly

• Computer viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another.

• Denial-of-service attacks: In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users.

• Malware (malicious code) : Malware, short for malicious software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software

Page 5: Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Crimes facilitated by computer networks or devices

• Spam: Spam, or the unsolicited sending of bulk email for commercial purposes.

• Fraud: Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by:

Altering computer input in an unauthorized way.

Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions.

Altering or deleting stored data.

Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes.

Page 6: Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Computer Viruses

• A computer virus is an application program designed and written to destroy other programs.

• A virus program is man-made and it infects programs, documents, databases and more.

• Most people who write and circulate virus programs fall into one of the following two groups:

the first uses viruses to show off for their peers,

while the other which is far more dangerous group, creates viruses with malicious intent

Page 7: Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Computer Viruses

• There are three main computer viruses:

Macro is written into the program macro and shuts down functions

Worm makes copies of itself and interfere with normal operations.

Trojan horse acts as a backdoor, contacting a controller

• The three primary sources of computer viruses are:

The Internet: Via downloads and exchanges

Secondary storage: Exchanging disks

Computer networks: Can spread from one network to another

Page 8: Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

How do you know if you have a virus?

The answer comes when you notice one of the following symptoms.

• Lack of storage capability

• Decrease in the speed of executing programs

• Unexpected error messages

• Halting the system

Page 9: Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Virus Protection

The best way to cope with viruses is to recognize their existence and use an antiviral or antivirus program.

Some tips that will help minimize your vulnerability to viruses:

• Delete e-mails from unknown

• Never open a file attached to an e-mail unless you know what it is.

• Download files from the Internet only from legitimate and reputable sources.

• Update your antivirus software at least every two weeks

• Backup your files periodically

Page 10: Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills-1 4800150-2 1435/1436

Computer Ethics

• You shall not use a computer to harm other people.

• You shall not snoop around in other people's computer files.

• You shall not use a computer to steal.

• You shall not use other people's computer resources without authorization or proper compensation.

• You shall always use a computer in ways that show consideration and respect for your fellow humans.