• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Preventing Computer Risk

Extracts from this document...

Introduction

Preventing computer risk * Set the macro security in programs so you can enable or disable macros * Install an antivirus program on all of your computers. * Never open an e-mail attachment unless you are expecting it and it is from a trusted source. * If the antivirus program flags an e-mail attachment as infected, delete the attachment immediacy. * Check all downloaded programs for viruses, worms, or Trojan horses. * Install a personal firewall program. * Use an efficient and trusted anti-virus software. What is an antivirus Program? * Identifies and removes computer viruses, and also, protects the computer against worms and Trojan horses' What is a virus signature * A virus signature is an algorithm or hash that uniquely identifies a specific virus. ...read more.

Middle

Recovery disk * Removable disk that contains uninfected copy of key operation system commands that enables computer to restart. Also called rescue disk. What is unauthorized access and how is it achieved? * Use of a computer or network without permission. * Hackers/Crackers usually break into computer by connecting to it and then logging in as a legitimate. What is a firewall? * Security * Program that protects personal computer and its data from unauthorized instructions. * Monitors transmissions o and from computer. * Informs you of attempted access. What are ways to protect your computer? ...read more.

Conclusion

What is callback system? * Users connects to computer only after the computer calls that user back at previously established telephone number. * Some networks utilize callback systems as an access control method to authenticate remote or mobile users. * Callback system work best for users who regularly work the same remote location. What is a license agreement? * The right to use software * Single user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer. * What are some other safeguards against software theft? * Prediction activation allows user to input product identification number online or by phone and receive unique installation identification number. ?? ?? ?? ?? ITGS - Preventing Computer Risk SeungWan, Kang G11 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    While retailers were initially terrified of what bad reviews could do to their bottom line, they've since witnessed the power of a rave review and embraced the practice. Despite initial fears, says Craig Berman, Amazon's vice president of global communications, product reviews have only served to increase their customer loyalty.

  2. Proyecto Personal - Anorexia y Bulimia

    Al entrar se pod�a apreciar una salita de espera, y al lado una peque�a oficina, donde se encontraba la secretaria con la cual habl� por tel�fono para sacar la cita. Me dirigi� hacia la salita y me dijo que esperara ah�, pero primero quer�a tomar una foto al lugar, lo

  1. Internet and computer safety

    This article describes how an online predator advertised a fake modeling agency on the internet to lure young girls, then he "would push and push as far as he could with the girls to see if he could draw them further into his web of sexual activity,".

  2. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    To record the time, a stopwatch was started as soon as the power button was switched on and stopped when the login window was spotted. To eliminate errors and/or flaws, the test was taken three times each and then an average was calculated.

  1. Informe TISG (ITGS)

    Actualmente no cuentan con medios de difusi�n de la informaci�n de la empresa, por lo que la obtenci�n de clientes se dificulta debido a que �nicamente mediante recomendaciones de los mismos es dada a conocer la empresa. A trav�s de la creaci�n de una p�gina web, es puesta en disponibilidad

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    and access to the personal health information", because at the moment, health information is available electronically to many different organizations and individuals. It seems like the use to paperwork to keep all health information is not reliable because in the event of a fire, all information may be loss, however,

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work