• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Preventing Computer Risk

Extracts from this document...

Introduction

Preventing computer risk * Set the macro security in programs so you can enable or disable macros * Install an antivirus program on all of your computers. * Never open an e-mail attachment unless you are expecting it and it is from a trusted source. * If the antivirus program flags an e-mail attachment as infected, delete the attachment immediacy. * Check all downloaded programs for viruses, worms, or Trojan horses. * Install a personal firewall program. * Use an efficient and trusted anti-virus software. What is an antivirus Program? * Identifies and removes computer viruses, and also, protects the computer against worms and Trojan horses' What is a virus signature * A virus signature is an algorithm or hash that uniquely identifies a specific virus. ...read more.

Middle

Recovery disk * Removable disk that contains uninfected copy of key operation system commands that enables computer to restart. Also called rescue disk. What is unauthorized access and how is it achieved? * Use of a computer or network without permission. * Hackers/Crackers usually break into computer by connecting to it and then logging in as a legitimate. What is a firewall? * Security * Program that protects personal computer and its data from unauthorized instructions. * Monitors transmissions o and from computer. * Informs you of attempted access. What are ways to protect your computer? ...read more.

Conclusion

What is callback system? * Users connects to computer only after the computer calls that user back at previously established telephone number. * Some networks utilize callback systems as an access control method to authenticate remote or mobile users. * Callback system work best for users who regularly work the same remote location. What is a license agreement? * The right to use software * Single user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer. * What are some other safeguards against software theft? * Prediction activation allows user to input product identification number online or by phone and receive unique installation identification number. ?? ?? ?? ?? ITGS - Preventing Computer Risk SeungWan, Kang G11 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    The medical information and research future of tomorrow depends upon this method of data storageand clinical sharing. http://www.brighthub.com/health/technology/articles/7402.aspx Electronic Medical Records - The Pros and Cons By Katt Mollar April 11 2009 In this digital age, more and more bulks of information which used to be paper-based, from library catalogues

  2. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    have to prepare to load the registries of the application to be run on the icon tray after login. The Tiger smoothly loads and sets up the user preferences and settings instead of multiple user-edited registries. 10 2.2.2: Shutdown test For the shutdown test, both the operating systems were put to test with no running/open applications.

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    A simple Google search for the names of local stores will bring up their web sites and online options, if applicable. Bear in mind that not all areas have access to online shopping - some stores are still testing out their online programs or have not branched out onto the World Wide Web.

  2. Proyecto Personal - Anorexia y Bulimia

    La segunda es Comunidad y Servicio, pues al comunicar lo que he aprendido, aparte de informar a las personas que me rodean, puedo ayudar los enfermos que padecen de anorexia y bulimia, contribuyendo con mi comunidad. Finalmente tenemos Salud y Educaci�n Social, ya que estas enfermedades tienen que ver con

  1. Internet and computer safety

    This article describes how an online predator advertised a fake modeling agency on the internet to lure young girls, then he "would push and push as far as he could with the girls to see if he could draw them further into his web of sexual activity,".

  2. Informe TISG (ITGS)

    La empresa va comenzando, por lo cual el usuario final requiere que se d� a conocer. La empresa se especializa en consultor�a de negocios y automatizaci�n de procesos mediante la venta y capacitaci�n para el uso de puntos de venta (son distribuidores autorizados y capacitados para manejar puntos de venta IBM).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work