Computer security
Contents:
1.1: Why is computer security so important?. 2
1.2: ADVICE for computer uses: 2
1.3: Be Careful About Programs You Download and Run. 2
2.0: Avoid Pirated and Cracked Software. 3
2.1: Beware Phishing and Social Engineering: 3
2.3: What are the hacker's goals?. 4
3.1: What is the antivirus software?. 5
Top 10 antiviruses software : 6
5.0: Advantages and disadvantages of password?. 7
6.0: How to create a strong password?. 7
6.1: The four characters classes. 7
7.0: Examples for bad password and good password. 8
Information and Computer Security (ICS) contributes to the advance of knowledge directly related to the theory and practice of the management and security of information and information systems. It publishes research and case study papers relating to new technologies, methodological developments, empirical studies and practical applications.
Frist, the computer play a big role in our live. Every think around you work by computer like, laptop, tablet, and smart phone… so the most important thing in computer world is security wish mean we should to know how to protect our computer.
Be Careful about programs you download and run.
Avoid pirated and cracked software.
Beware of Phishing and Social Engineering.
Don’t Reuse Passwords.
His one may seem obvious, but so much of the malware Windows users encounter seems to be as a result of accidentally downloading and installing bad software. Be careful about the programs you download and run. Only download and run trustworthy software.
Get the software from its official website if you want to download VLC, download it from VLC’s official website. Don’t click a “Download VLC” banner on another website and download it from someone else that may bundle malware or adware along with it.
When you acquire pirated or cracked software from peer-to-peer networks or shady websites, you are taking a big risk. By running an .exe file from such locations, you trust the distributor to not do anything harmful. Software-cracking groups make worse yet, the cracks you may need to run to make such software work properly. You can’t know if they’ve included malware or not.
Downloading pirated software and cracks is just a bad idea from a security standpoint. We have probably all seen people download files from peer-to-peer networks and become infected as a result.
Downloading unauthorized software is much riskier than pirating music or videos — software is machine code that can be tampered with. A video is just a media file that can play or not play — although untrustworthy individuals often try to disguise malicious programs as videos so less-experienced users will run them.
Browsers and email clients try to protect you from phishing attacks, but they’re not perfect. A phishing attack is the web equivalent of someone calling your phone, claiming to be your bank, and asking for your credit card number. Your bank would never call you and ask for this information, just as they would never email you and ask you to send the information in an email.
Be very careful when disclosing personal information online. Ensure you disclose it only to legitimate individuals and websites. To access your bank’s website, go directly there — don’t click a link in an email that claims to be from your bank, but may actually direct you to an imposter site.
People who want to damage a company or organization create some malware. If a virus can tie up an organization’s network, it can cost them serious amounts of money. A disgruntled employee or someone else with a specific agenda might create this. (The Hackers)
A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. The subculture that has evolved around hackers is often referred to as the computer underground. In addition, the best group of hacking is anonymous hackers.
Entertainment.
Bragging rights.
Stolen Goods.
Power from stolen information.
Stealing your information.
Damage your computer and files.
Install quality antivirus
Keep anti-malware applications current
Perform daily scans
Disable auto run
Disable image previews in your mail
Don't click on email links or attachments
Surf smart
Don’t download random files
Don’t use pen drive full with virus
Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware, and more.
A secret word or phrase that must be used to gain admission to a place.
"If you don't know the password you can't come in"
A string of characters that allows access to a computer, interface, or system.
"Each user has a password in order to log on to the network"
Easy to memorize.
You can change it easily.
Freedom to select.
Protect your information.
Respect of privacy.
loss your password.
Easy for users to remember.
They contain number or letter sequences
or letter-to-number substitutions, such as
E for 3 or O for zero.
Contain characters from three of the four classes of characters.
Capital letters (A, B, C).
Small letters (a, b, c).
Numbers (1, 2, 3).
Symbols (!, @, &).
123456.
ahmed.
Mobile number(05……..).
ID number (1…….).
A6med@501.
1015@Ahme0.
Snap@Ahmed&1015.
TTCahmed*012.
Computer security very important to protect our information in the internet. Because the internet like big world flue whit good things and the bad things or risks that, damage your computers and files. If you want, protect your computer from hackers and malware. You must install antivirus program and be careful when you use the internet to be safety.
1: In your opinion, why is computer security so important?
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
2: In your opinion, who is the hacker?
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
3: What are the hacker's goals?
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
4: In your opinion, what is the best antiviruses programs? And way?
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
5:According to the subject, What is the password?
…………………………………………………………………………………………………………………………………………………………………………………………………………………………
6: Write 2 example of good and bad password?
Good password | Bad password |
(Share your answer with your partner)
1: https://www.americanexpress.com/uk/content/security/phishing/
2: https://www.usa.gov/common-scams-frauds
3: Parker, D. B. (1981). Computer security management (p. 308). Reston, VA: Reston Publishing Company.
4: Landwehr, C. E. (1981). Formal models for computer security. ACM Computing Surveys (CSUR), 13(3), 247-278