Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

Similar documents
Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Different network topologies

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Fundamentals of Networking Types of Topologies

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Technology in Action

The Features and Uses of Computer Networking. Unit 11 Task 1

Dr./ Ahmed Mohamed Rabie Sayed

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

Computer Networks Question Bank

Network Definition A network can be defined as two or more computers connected together in such a way that they can share resources.

What is a Network? A connection of two or more computers so that they can share resources.

E-companion. Quiz for IT-knowledge

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

Chapter 9. Introduction. Communications

2. Give advantages and disadvantages of computer network. (Any 2 advantages- 2 Marks, Any 2 disadvantages- 2 Marks) Answer: Advantages:

INTRODUCTION TO ICT.

Computer Technology Flash Card 2

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

It is the process of sharing data, programs, and information between two or more computers.

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node

Computer Networks. Cables Radio signals (wireless/wifi) Telephone lines Satellite links (Long distance)

Discovering Computers Chapter 9 Communications and Networks

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Data Communication. Chapter # 1: Introduction. By: William Stalling

INVIGILATED BY MARKED BY MARKS TALLIED BY

Southam College Computing & ICT Department. Summer Project

Networking interview questions

TYPES OF COMPUTER NETWORKS

IT 2004 Data Communication & Networking

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

A Review Paper on Network Security Attacks and Defences

Introduction to Computer Science (I1100) Networks. Chapter 6

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

CompTIA A+ Accelerated course for & exams

COMPUTER SKILLS COMP101

Securing NetWare Enterprise Local Area Networks H. Van Tran Cynthia D. Heagy Payoff

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

1 Q1. Attempt any THREE 09 1 Give the difference between Human Network and

Name of the Assistant/ Associate Professor:Annu Saini Class and Section:BCA 1 st sem Subject:Computer and Programming Fundamentals July 2018

Review: Networking Fall Final

Local Area Network(LAN)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

COMPUTER NETWORKING. Terminology of Network:

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Unit 11: Computer Networks

Advantages of Networks

Copyright 2006 Prentice-Hall. All rights reserved. 1

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

Computer Skills Revision. By: Rana Hammady

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA

Lesson-1 Computer Security

E-Commerce. Infrastructure I: Computer Networks

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

SAMPLE COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12

Networks: Communicating and Sharing Resources

Zillya Internet Security User Guide

TOPIC 5: COMMUNICATION AND INTERNET

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Study on Various Network Topologies for set up best Network

Data Communication and Network. Introducing Networks

Networks: Communicating and Sharing Resources

Chapter 4 The Internet

Computer Communication Networks Lecture No. 1

Which one of the following terms describes the physical components of a computer system?

Full file at

COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4

Computer Network??? Why Computer Networks? Network Classification. Introduction to Computer Networks. Classification of a Computer network by Scale

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

Chapter 5 Local Area Networks. Computer Concepts 2013

Introduction to Computer Networks. Budditha Hettige

Communications and Networks

Fundamentals of Networking Introduction to Networking Devices

ก ก Information Technology II

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

Introduction to Networking

ITEC 3800 Data Communication and Network. Introducing Networks

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

TECHNOLOGY STREAM: HARDWARE AND NETWORK ENGINEERING KCTS 121 : SYSTEM ADMINISTRATION AND NETWORK FUNDAMENTALS

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction

Malware, , Database Security

Chapter 1 B: Exploring the Network

Topic 4 Transfer of Data in ICT Systems

Unit 2 Assignment 2. Software Utilities?

Chapter 10: Security and Ethical Challenges of E-Business

Computer Networks. Chapter 1 An Introduction to Networking

Chapter 9 Introduction to Networks

Network+ Guide to Networks 5 th Edition. Chapter 1 An Introduction to Networking

The City School PAF Chapter Comprehensive Worksheet December 2015 ICTech Class 7 Candidate Name: Index Number: Section: Branch/Campus: Date:

Chapter by Prentice Hall

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Transcription:

DATA PROCESSING NOTES FOR SS THREE FIRST TERM 2016/2017 SESSION SCHEME OF WORK Week 3 Week 4 Continuation of Spreadsheet(Practical) Computer Virus Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal Week 5 Computer Networking Meaning of Network and Networking Network Topologies Types Of Computer Networks Intranet, Extranet And Internet Network Devices Benefits Of Computer Networks Week 6 Week 7-8 Database Security Parallel and Distributed Databases Architectures For Parallel Databases Parallel Query Evaluation Advantages Of Parallel Databases Disadvantages Of Parallel Databases Distributed Databases Types Distributed Databases Week 9 Crash recovery and Database Indexes Computer Ethics and Safety Measures (SS 1 data processing) Maintenance of computer I and II (SS2 and SS3 data processing) Career opportunities in data processing (SS3 data processing) 1

COMPUTER VIRUS Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. It is a program written by people called virus perpetrators or data invaders which often cause damage by attaching itself to another program and files on the computer system. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses are often spread by attachments in e-mail messages or instant messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. DEFINITION A computer virus is a piece of software that attaches itself to another program to corrupt the program and files on the computer system. Types of Computer Virus Computer Viruses are classified according to their nature of infection and behavior. Different types of computer virus classification are given below. 1. Resident virus: They usually fix themselves inside the computer memory. They get activated every time the OS runs and end up infecting other opened files.they hide in RAM.Examples CMJ,Randex,Mrklunky etc. 2. Overwrite Virus: These types of viruses delete any information in a file they infect, leaving them partially or completely useless once they are infected. Once in the computer, they replace all the file content but the file size doesn t change.examples trivial.88.d,trj.reboot etc 3. Boot sector: A Boot Sector Virus infects the first sector of the hard drive, where the Master Boot Record (MBR) is stored.. If a computer is infected with Boot Sector Virus, when the computer is turned on, the virus launches immediately and is loaded into memory, enabling it to control the computer. examples poly boot,antiexe,stone virus,disk killer,form etc 4. Macro virus: Macro viruses infect files that are created using certaing applications e.g ms office suite, these macros are usually stored as part of the document or spreadsheet and can travel to other systems when these files are transferred to another computer.examples Relax,Bablas etc 5. Directory Virus: Also known as cluster virus or file system virus. They infect the computer s directory by changing the path indicating file location. They are usually located in the disk but affect the entire directory. Example is any file with the extension.exe or.com 2

6. Polymorphic virus: Polymorphic Viruses have the capability to change their appearance and change their code every time they infect a different system.this helps the Polymorphic Viruses to hide from anti-virus software.examples are Elkern,Marburg,etc. Effects of virus It causes computer to crash (i.e. to stop functioning normally or to stop responding to other software) Loss of files and corruption of data stored in file. Virus warning signs When a computer is infected with virus, the following symptoms may occur Slow system performance Presence of tiny dots Incomplete saving of files Appearance of strange characters Corruption of the system set up instructions Wandering across the screen New windows keep opening up at an alarming rate when files and folders getting deleted when disks and drives are not working properly Sources of Virus Infected storage devices such as flash drive,cd-rom etc By downloading or opening attachments in email from unknown source Through internet download Installation of infected programs opening an infected document by downloading cracked and illegal versions of software MALWARE PROGRAMS Malware is an abbreviated term meaning malicious software.it is a program that is specifically designed to gain access to or damage the computer files without the knowledge of the owner. It is developed for the purpose of doing harm to files, software and hardware.computer Virus is one of the examples of malware. Other malware programs include; Computer Worm: This is a program that uses computer network to spread itself. 3

Trojan Horses: This is illegal instructions placed in the middle of a legitimate program.it is hidden program that runs on your computer without your knowledge. Logic Bombs: This type of malware do not replicate, they are designed to destroy data on the computer system once certain conditions have been met. Spyware: It is written to spy through a legal software.it changes computer s configuration and personal information. VIRUS DETECTION SOFTWARE (ANTI-VIRUS) This is a program written by the programmer to get rid of computer viruses. Some anti-virus are programmed to kill the virus and the effect done to the computer while others prevent the virus from entering the computer system. Anti-virus software is computer software used to prevent, detect and remove malicious software. Examples are; karpersky,e-scan,avast,mcafee, etc Assignment one 1. List six examples of Anti-virus 2. What are the methods through which you can prevent your computer from virus infection.(list atleast 7) 3. What are the corrective measures to be taken in order to remove a virus from an infected computer. NETWORKING INTRODUCTION A network is nothing more than a group of computers and other communicating devices connected together so that they can exchange information and share resources. Computer networks can be found in large Businesses, Government offices, Institutions, Hospitals and so on. All over the world, millions of computers are being linked together in network, from local area networks to wide area networks to form internet. Networks are built with a mixture of computer hardware and software. 4

DEFINITION A computer network often referred to as a network is a collection of computers and other communicating devices connected together to enable them share resources and information. NETWORKING: This is the process or practice of linking two or more computing devices for the purpose of sharing resources and information. Network Elements Servers Clients/workstations Shared data Resources like printer, files, and other hardware and software resources Protocols Network Cables e.g UTP, STP, Coaxial, Fibre Optics. User INTRANET, EXTRANET AND INTERNET INTRANET An intranet is a private network belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. It may consist of many interlinked local area networks. Intranet is also referred to as a website within your company's network that (mostly) only employees can access. EXTRANET An extranet is an intranet that is accessible to some people from outside the company, or possibly shared by more than one organization.it is A network based on Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners The difference between internet and intranet is that Intranet uses the internet protocols such as TCP/IP and FTP. Intranet sites are accessible via web browser in similar way as websites in internet. But only members of Intranet network can access intranet hosted sites. TYPES OF NETWORK Personal Area Network (PAN): This is a computer network used for data transmission among devices such mobile computers, cell phone within the range of an individual person. 5

1. Local Area Network (LAN): This is a number of computers and other devices connected together by cable or wireless media that communicate with one another within a small geographical area e.g. a building. 2. Metropolitan Area Network (MAN): This is a network that interconnects users with computer resources in a geographic area or region larger than that covered by a large local area network (LAN) but smaller than the area covered by a wide area network (WAN). MANs are formed by connecting multiple LANs. Thus, MANs are extremely efficient and provide fast communication via high-speed carriers, such as fiber optic cables. Eg state government connect to staff communicate with each other anywhere within Lagos 3. Wide Area Network (WAN): A wide area network (WAN) is a network that exists over a large-scale geographical area. A WAN connects different smaller networks, including local area networks (LAN) and metro area networks (MAN). This ensures that computers and users in one location can communicate with computers and users in other locations. WAN implementation can be done either with the help of the public transmission system or a private network. NETWORK DEVICES Network devices are components used to connect computers or other electronic devices together so that they can share files or resources like printers. They include; Hub, Switch, Router, Brouter, Modem, Network Interface Card NETWORK TOPOLOGY This is referred to as the physical arrangement or layout of computer and other component on a network. TYPES OF NETWORK PROTOCOL Bus topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called Linear Bus topology Features of Bus Topology 1. It transmits data only in one direction. 2. Every device is connected to a single cable Advantages of Bus Topology 6

1. It is cost effective. 2. Cable required is least compared to other network topology. 3. Used in small networks. 4. It is easy to understand. 5. Easy to expand joining two cables together. Disadvantages of Bus Topology 1. Cables fails then whole network fails. 2. If network traffic is heavy or nodes are more the performance of the network decreases. 3. Cable has a limited length. 4. It is slower than the ring topology. Star topology In this type of topology all the computers are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node. Advantages of Star Topology 1. Fast performance with few nodes and low network traffic. 2. Hub can be upgraded easily. 3. Easy to troubleshoot. 4. Easy to setup and modify. 5. Only that node is affected which has failed, rest of the nodes can work smoothly. Disadvantages of Star Topology 1. Cost of installation is high. 2. Expensive to use. 3. If the hub fails then the whole network is stopped because all the nodes depend on the hub. Ring topology It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbours for each device. Advantages of Ring Topology 1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data. 2. Cheap to install and expand 7

Disadvantages of Ring Topology 1. Troubleshooting is difficult in ring topology. 2. Adding or deleting the computers disturbs the network activity. 3. Failure of one computer disturbs the whole network. Tree Topology It has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchical topology. It should at least have three levels to the hierarchy. It is extension of bus and star topologies. CATEGORIES OF COMPUTER NETWORK There are two categories of networks 1. Peer-to-peer networks 2. Server-based networks(client-server network) 1. Peer-to-peer network: This is a network of computers configured to allow certain files and folders to be shared with everyone or with selected users. Peer-to-peer networks are quite common in small offices that do not use a dedicated file server. 2. A client-server network is a central computer, also known as a server, which hosts data and other forms of resources. Clients such as laptops and desktop computers contact the server and request to use data or share its other resources with it. ASSIGNMENT TWO 1. Mention two advantages of peer-to-peer and server based network 2. Mention two disadvantages of peer-to-peer and server based network Benefits of computer networks File sharing Resource sharing 8

Speed Security Internet access sharing ASSIGNMENT THREE 1. What is computer ethics 2. What are the responsible ways of using computer and the Internet 3. List four ways of misusing computer and the internet 4. State safety measures that need to be taken when using computer ASSIGNMENT FOUR 1. State four qualities of good computer professionals 2. List four computer professional bodies in Nigeria 3. State two primary functions of the following computer professionals Web Developer DATABASE SECURITY Database Administrator Network Engineer Hardware Engineer Network Administrator Database security refers to the collective measures used to protect and secure a database or database management software from illegitimate use and malicious threats and attacks. It is a broad term that includes a multitude of processes, tools and methodologies that ensure security within a database environment. Database security covers and enforces security on all aspects and components of databases. This includes: Data stored in database Database server Database management system (DBMS) Other database workflow applications Database security is generally planned, implemented and maintained by a database administrator and other information security professional. The three main objectives to consider when designing a secure database are; SECRECY, INTERGRITY AND AVAILABILITY. 9

The primary method used to protect data is limiting access to the data. This can be done through authentication, authorization, and access control. TYPES OF DATABASE SECURITY CONTROL The security requirement of a system are specified by means of a security policy which is then enforced by various security mechanisms. The different types of database security include; Access Control Access control in database security is the establishment of measures that minimize or totally avoid unauthorized access to database. The purpose of access control is to ensure that a user is only permitted to perform those operations on the database for which that user is authorized. Auditing Database auditing is used to track database access and user activity. Auditing can be used to identify who accessed database objects, what actions were performed, and what data was changed. Database auditing does not prevent security breaches, but it does provide a way to identify if breaches have occurred. Authentication Database authentication is the process or act of confirming that a user who is attempting to log in to a database is authorized to do so, and is only accorded the rights to perform activities that he or she has been authorized to do. DATABASE ADMINISTRATOR A Database Administrator is responsible for the performance, intergrity and security of a database. Also, a DBA is involved in the planning and development of database, as well as troubleshooting any issues on behalf of the user ROLE OF A DATABASE ADMINISTRATOR Installing and updating the database server and application tools Controlling and monitoring user access to the database Backing up and restoring databases Generating various reports by querying from database when needed Maintaining system security Monitoring and optimizing the performance of the database 10