Societal Impacts Of IT (Class X)
-
Upload
vatsal-unadkat -
Category
Education
-
view
293 -
download
0
description
Transcript of Societal Impacts Of IT (Class X)
Arush Wad
Societal Impacts Of IT
Vatsal Unadkat
Malicious Software are the programs that generate threats to
the computer system and stored data.
Virus
Worms
Trojan
Horses
Spyware
Malicious Software
Viruses• Virus (Vital Information Recourses
Under Seize) is a small program or a small code segment that is capable of attaching itself to existing programs of files and infect them as well as replicate itself without users knowledge or permission. It spreads by external devices like CDs, pen drives, or email and executes when an infected program is executed. If an infected computer gets in contact gets in contact with an un infected computer virus may pass onto the uninfected system and destroy the files.
Viruses
Boot Sector
File Infecting
PolymorphicStealth
Multipartite
Boot Sector
VirusThis type of virus infects the master boot record of the system by either moving to another sector or replacing it with infected one.
F
Ile
This type of virus infects the executable files or files containing executable code such as .exe, .com, .dll, .sys, etc.
INFECTING
VIRUS These viruses add their code to
executables, which when infected may send viral code other executables.
When the infected file is opened or used the virus may overwrite the file and cause permanent damage to the content of the overwritten file.
Polymorphic Viruses
This type of virus changes its code as it propagates from one file to another. Therefore, each copy that is generated appears different from others. This makes the polymorphic virus difficult to be detected by the antivirus.
Stealth VirusThis type of virus attempts to conceal its presence from the user and/or antivirus software by using various techniques.
M
ultIpartIte
A multipartite virus is a computer virus that
infects multiple different target platforms, and
remains recursively infective in each target.
VIRUS It attempts to attack
both the boot sector and the executable, or programs, files at the same time.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Worms
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.
Both worms and viruses tend to fill computer memory with useless data thereby preventing you from using memory space for legal applications or programs.
TROJAN
Trojan horse is a program that appears to be legal and useful but concurrently does something unexpected like destroying existing programs and files . As it does not replicate itself in the computer it is not a virus.However it usually opens a way for the other malicious software like viruses to enter into the computer system. It may also allow unauthorized users access the information stored in the computer.
horses
Spyware is any technology that aids in gathering information about a person or organization without their knowledge.
Spyware can get in a
computer as a
software virus or as
the result of
installing a new
program.
On the Internet spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.
Spam refers to the unsolicited or unwanted mail or message sent
to a large number of individuals. It is forced on to the people who would otherwise choose not to
receive such mails. Spam mails are mostly
commercial mails sent by
various companies to promote
their services at e-mail is the
cheapest way to advertise.
In addition it may also be used to
spreading viruses or worms.
It may flood the e-mails box due to which no other mail can be received.
The recipient time is wasted in reading all the unwanted e-mails.
Network bandwidth is wasted in sending such mails.
A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.
Hackers may also
introduce new viruses
in the network, which
can enter database
and other applications
and crash the whole
server.
In the hacking community, hackers have been classified into two categories, namely, white hat hackers and black hat hackers.
The hackers that break into the computer security with non-malicious reasons are known as white hat hackers.
The hackers who break into the computer security without administration for ulterior
purposes such as theft, terrorism, etc. are known as black hat
hackers.
Antivirus software
is an application
that is used for
protection against
malicious
software.
An antivirus program scans the hard the hard disc
for viruses. After scanning the
software removes the viruses, so that
the computer is able to perform
efficiently again.
Most anti-virus software havean auto update feature that enables the computer to download the definition of new viruses.The updating of a antivirus software is important because the virus 'creators’ are always in the process of developing new viruses.
The updated virus definitions is should always be
maintained so that users can operate their computers
without any problem.
Data loss is very
common to all
You need to protect your data
You need to
take backup
of your data
Some failure such as hardware failure, software failure, or natural disaster may occur resulting in data loss.
Data backup refers to making duplicate copies of your data and storing them onto some permanent storage device such as pen drive, portable hard disc, DVD, CD, etc.
The data backup is essential for recovering the data as quickly, and with as little
damaging impact on users, as possible.
Full Backup Method
Incremental Backup Method
Differential Backup Method
Mirror Backup Method
Backup Methods
Full Backu
p Method
This is the basic backup method that
backups up all the files on the computer the
computer system.
Generally performed on a weekly or
monthly basis.Consumes a lot of time as
of time as well as secondary
memory.
Incremental
Backup Method
This method backs up only those files
that have been modified since the
most recent backup, thereby
making each backup an
increment to the last backup.
A single backup is not sufficient
to restore all the files, which
makes the restoring
process slower.
It consumes less time
and memory space to take a
backup.
Differential
Backup Method
This method backs up all the files that have any difference from the last
backup.
Restoring files require the full
backup and only the last
differential backup. This
makes restoring little faster than
incremental backup.
Backing up is slower and
storage requirement is
higher than incremental
backup.
Mirror Backu
p Method
The mirror backup method
copies the files or folders being
backed up without any
compressions.
It keeps each file separate in the
destination thereby making the destination a
mirror of the source.
The feature makes this
methods fastest of all methods.
However, it requires more
storage space as compared to
other methods.
Online Backups means
taking backup of data
on a remote computer
over the Internet.
There are several
disadvantages of this
method over other
backup methods.
Firstly, this method not only enables you to recover data after file corruption or computer failure, but you can also recover data even if a natural disasterhas destroyed everything at your place.
Secondly, you can access your data anywhere in the world and at anytime. In addition, the files to
be backed up are encryptedby your computer before being sent to the remote
computer and are secured with password protection.
This ensures the protection of your data from unauthorized access.
However, it is not affordable for individual users or small business to subscribe for online backup services.
Sometimes, you lose important data because of disk failure, accidental deletion of files, etc
In such situations, recovery
tools come to our rescue.
A recover tool enables you to recover lost data.
The situation even becomes worse if you are not having backup of data.
Suppose you friend forgot his passport at your house and went away. You want to send it to him
but you don’t want anyone else to steal the passport.
How will you do it?
This picture
is a hint to
the puzzle.
This picture
is a hint to
the puzzle.
You will put the passport in a box and lock it with a lock and key. This key will Remain with you. Then you send the box to your friend. Your friend will put another lock on it with another key that will remain with him. He will send it back. You will unlock your lock with your key and send it back to him. He will unlock his lock with his key and take his passport.
Encryption and decryption
works in the same way.
A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
All Traffic in either direction must pass through the firewall.
The firewallitself is immuneto penetration.
Only traffic authorized by the local security policy must be allowed to pass.
Social Networking refers to the grouping of individuals to share their common interests or activities
Nowadays, online social networking is gaining popularity and a number of websites (known as social sites) are available for creating online communities.
Introduction
ToICT
ICT has become the integral part of our working and living environments and will continue to be a powerful resource for business.
ICT stands for Information and Communication Technologies. These technologies include computers, internet, broadcasting technologies (radio and television) and telephony.
Due to globalization and other factors, these technologies are changing and improving dad by day.
Benefits of ICT
ICT provides several significant benefits and today , it has been used everywhere and in every field including education, healthcare, governance, etc.
Some important benefits of ICT are as follows:-
• Education• Healthcare• Governance
The use of sounds effects, comic characters and
scripted act attracts the students and helps them to understand the lessons by
getting involved with the lessons being delivered.
This keeps the process of learning new concepts very
lively.
Education
The introduction of ICT in education has made the learning fun and interesting for student now a days.
Many illustrations are given in the form of video clips which help students to understand quickly.
Healthcare
This technology has made the scope for error very minor and helps the doctor to perform surgeries remotely
ICT has facilitated
us with a number
of medical equipment such as
scanners , microprocessors
and computer-guided
lasers.
The scanners process the data present in them in a readable format, microprocessors help to control many medical devices like pacemaker and the computer-guided lasers are used for various kinds of surgeries.
GovernanceAll or most of the information generated by the government is easily accessible through the electronic media, such as Internet, mobile phones, etc.
The use of ICT in governance practices offers better interaction between government, its institutions and people. This leads enhanced governance practices and effective management.
This increases the transparency of government and administration to the business as well as its citizens.