• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Preventing Computer Risk

Extracts from this document...

Introduction

Preventing computer risk * Set the macro security in programs so you can enable or disable macros * Install an antivirus program on all of your computers. * Never open an e-mail attachment unless you are expecting it and it is from a trusted source. * If the antivirus program flags an e-mail attachment as infected, delete the attachment immediacy. * Check all downloaded programs for viruses, worms, or Trojan horses. * Install a personal firewall program. * Use an efficient and trusted anti-virus software. What is an antivirus Program? * Identifies and removes computer viruses, and also, protects the computer against worms and Trojan horses' What is a virus signature * A virus signature is an algorithm or hash that uniquely identifies a specific virus. ...read more.

Middle

Recovery disk * Removable disk that contains uninfected copy of key operation system commands that enables computer to restart. Also called rescue disk. What is unauthorized access and how is it achieved? * Use of a computer or network without permission. * Hackers/Crackers usually break into computer by connecting to it and then logging in as a legitimate. What is a firewall? * Security * Program that protects personal computer and its data from unauthorized instructions. * Monitors transmissions o and from computer. * Informs you of attempted access. What are ways to protect your computer? ...read more.

Conclusion

What is callback system? * Users connects to computer only after the computer calls that user back at previously established telephone number. * Some networks utilize callback systems as an access control method to authenticate remote or mobile users. * Callback system work best for users who regularly work the same remote location. What is a license agreement? * The right to use software * Single user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer. * What are some other safeguards against software theft? * Prediction activation allows user to input product identification number online or by phone and receive unique installation identification number. ?? ?? ?? ?? ITGS - Preventing Computer Risk SeungWan, Kang G11 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    EMRs translates into better treatment for patients. Take the example of one asthma center's experience with EMR: "A major benefit associated with EMR implementation was the increase in the number of children who were hospitalized with an asthma exacerbation and received an asthma action plan upon discharge.

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    After all, why would people buy a textbook online when they could go to a bookstore? But eventually, a revolutionary change in culture and groupthink took place. Buying things online was all about price and selection, says Ellen Davis, a vice president with the National Retail Federation.

  1. Proyecto Personal - Anorexia y Bulimia

    Tambi�n, obtuve informaci�n de una entrevista que realic� durante mi visita al centro Abint. Aqu� tuve la oportunidad de hablar con la psic�loga, cuyo nombre no puedo mencionar pues la instituci�n prefiere quedar an�nima. En la elaboraci�n de la entrevista, trat� de realizar preguntas relacionadas con ciertos aspectos de los cuales hab�a encontrado escasa informaci�n, o ninguna.

  2. Informe TISG (ITGS)

    La empresa va comenzando, por lo cual el usuario final requiere que se d� a conocer. La empresa se especializa en consultor�a de negocios y automatizaci�n de procesos mediante la venta y capacitaci�n para el uso de puntos de venta (son distribuidores autorizados y capacitados para manejar puntos de venta IBM).

  1. Internet and computer safety

    This article describes how an online predator advertised a fake modeling agency on the internet to lure young girls, then he "would push and push as far as he could with the girls to see if he could draw them further into his web of sexual activity,".

  2. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    their time arguing whether Mac OS X or Windows XP is superior. But like all humans are better at something or the other, operating systems can't be left behind. The main aim of this essay is on the differences between the two operating systems and how the common features are favorable for different kinds of users.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work