• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Preventing Computer Risk

Extracts from this document...


Preventing computer risk * Set the macro security in programs so you can enable or disable macros * Install an antivirus program on all of your computers. * Never open an e-mail attachment unless you are expecting it and it is from a trusted source. * If the antivirus program flags an e-mail attachment as infected, delete the attachment immediacy. * Check all downloaded programs for viruses, worms, or Trojan horses. * Install a personal firewall program. * Use an efficient and trusted anti-virus software. What is an antivirus Program? * Identifies and removes computer viruses, and also, protects the computer against worms and Trojan horses' What is a virus signature * A virus signature is an algorithm or hash that uniquely identifies a specific virus. ...read more.


Recovery disk * Removable disk that contains uninfected copy of key operation system commands that enables computer to restart. Also called rescue disk. What is unauthorized access and how is it achieved? * Use of a computer or network without permission. * Hackers/Crackers usually break into computer by connecting to it and then logging in as a legitimate. What is a firewall? * Security * Program that protects personal computer and its data from unauthorized instructions. * Monitors transmissions o and from computer. * Informs you of attempted access. What are ways to protect your computer? ...read more.


What is callback system? * Users connects to computer only after the computer calls that user back at previously established telephone number. * Some networks utilize callback systems as an access control method to authenticate remote or mobile users. * Callback system work best for users who regularly work the same remote location. What is a license agreement? * The right to use software * Single user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer. * What are some other safeguards against software theft? * Prediction activation allows user to input product identification number online or by phone and receive unique installation identification number. ?? ?? ?? ?? ITGS - Preventing Computer Risk SeungWan, Kang G11 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    it is much easier to get information through HIT because it is easier for thieves to hack into an account than to steal a folder in an office or hospital. Privacy concerns have erupted over several years where thieves would get access to personal and health information of a client through HIT, which results in medical identity theft.

  2. Internet and computer safety

    This shows how he was able to target girls, easily by producing a "modeling" agency, which shows how he was able to target a large number of girls due to the increase in interests of modeling careers; he also targeted girls on under 18 chat rooms which he was allowed

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    After all, why would people buy a textbook online when they could go to a bookstore? But eventually, a revolutionary change in culture and groupthink took place. Buying things online was all about price and selection, says Ellen Davis, a vice president with the National Retail Federation.

  2. Proyecto Personal - Anorexia y Bulimia

    Desafortunadamente, no tuve la oportunidad de asistir a ninguna de las terapias, pero conversamos y me explic� en que consist�an, cu�l era su objetivo, entre otras cosas. Algo que pude observar fue que, luego de hablar con la psic�loga, con los nutricionistas, entrenadores y doctores, obtuve perspectivas un tanto diferentes de cada uno, especialmente de los entrenadores.

  1. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    2.1.2: Shutdown The shutdown process in a computer system is commonly defined for all, regardless of the operating system. This process initiates commands to close down background applications and then disconnect from power source after saving the settings. After the user initiates the shutdown, the processes in Windows XP make

  2. Informe TISG (ITGS)

    Actualmente no cuentan con medios de difusi�n de la informaci�n de la empresa, por lo que la obtenci�n de clientes se dificulta debido a que �nicamente mediante recomendaciones de los mismos es dada a conocer la empresa. A trav�s de la creaci�n de una p�gina web, es puesta en disponibilidad

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work