• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Preventing Computer Risk

Extracts from this document...

Introduction

Preventing computer risk * Set the macro security in programs so you can enable or disable macros * Install an antivirus program on all of your computers. * Never open an e-mail attachment unless you are expecting it and it is from a trusted source. * If the antivirus program flags an e-mail attachment as infected, delete the attachment immediacy. * Check all downloaded programs for viruses, worms, or Trojan horses. * Install a personal firewall program. * Use an efficient and trusted anti-virus software. What is an antivirus Program? * Identifies and removes computer viruses, and also, protects the computer against worms and Trojan horses' What is a virus signature * A virus signature is an algorithm or hash that uniquely identifies a specific virus. ...read more.

Middle

Recovery disk * Removable disk that contains uninfected copy of key operation system commands that enables computer to restart. Also called rescue disk. What is unauthorized access and how is it achieved? * Use of a computer or network without permission. * Hackers/Crackers usually break into computer by connecting to it and then logging in as a legitimate. What is a firewall? * Security * Program that protects personal computer and its data from unauthorized instructions. * Monitors transmissions o and from computer. * Informs you of attempted access. What are ways to protect your computer? ...read more.

Conclusion

What is callback system? * Users connects to computer only after the computer calls that user back at previously established telephone number. * Some networks utilize callback systems as an access control method to authenticate remote or mobile users. * Callback system work best for users who regularly work the same remote location. What is a license agreement? * The right to use software * Single user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer. * What are some other safeguards against software theft? * Prediction activation allows user to input product identification number online or by phone and receive unique installation identification number. ?? ?? ?? ?? ITGS - Preventing Computer Risk SeungWan, Kang G11 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. Internet and computer safety

    This shows how he was able to target girls, easily by producing a "modeling" agency, which shows how he was able to target a large number of girls due to the increase in interests of modeling careers; he also targeted girls on under 18 chat rooms which he was allowed

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    More than 150 million people - about two-thirds of all Internet users in the U.S. - bought something online last year. It's a staggering leap for an industry used by 27% of the nation's online population a decade ago. (See 10 things to buy during the recession.)

  1. Proyecto Personal - Anorexia y Bulimia

    Al entrar se pod�a apreciar una salita de espera, y al lado una peque�a oficina, donde se encontraba la secretaria con la cual habl� por tel�fono para sacar la cita. Me dirigi� hacia la salita y me dijo que esperara ah�, pero primero quer�a tomar una foto al lugar, lo

  2. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    As soon as the power button on the Mac is pushed, a process called the BootROM firmware is activated. BootROM has two key responsibilities, firstly it initializes system hardware and then it selects an operating system to run, in this case the Tiger.

  1. Informe TISG (ITGS)

    La empresa va comenzando, por lo cual el usuario final requiere que se d� a conocer. La empresa se especializa en consultor�a de negocios y automatizaci�n de procesos mediante la venta y capacitaci�n para el uso de puntos de venta (son distribuidores autorizados y capacitados para manejar puntos de venta IBM).

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    it is much easier to get information through HIT because it is easier for thieves to hack into an account than to steal a folder in an office or hospital. Privacy concerns have erupted over several years where thieves would get access to personal and health information of a client through HIT, which results in medical identity theft.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work