♦ Virus
A computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions. Attaches itself to program and propagates copies of itself to other programs. A virus cannot spread without a human action (such as running an infected program) i.e. Code Red, Melissa, Zeus...
• Worms
A worm is a program that spreads copies of itself through a network. The primary difference between a worm and a virus is that a worm operates through networks, and a virus can spread through any medium (but usually uses copied program or data files). Additionally, the worm spreads copies of itself as a stand-alone program, whereas the virus spreads copies of itself as a program that attaches to or embeds in other programs. Worms generally are little programs. i.e. Morris Worm, Storm Worm...
• Trojans
Contains unexpected, additional functionality. Software that you thought was going to be one thing, but turns out to be something bad. Unlike worms and viruses these do not replicate. Named for the fabled “Trojan Horse” that appeared to be a gift but in fact carried a dangerous payload. i.e. CryptoLocker, MyDoom...
♦ Anti-Virus Software
An antivirus is a software program that is used to detect and remove viruses from computer. Requirements of effective antivirus:
• It needs to run in the background at all times.
• It should be kept updated so that it recognizes new versions of malicious programs.
• Capability to scan email attachments and files as they are downloaded from internet.
Some examples of antivirus software areNorton, Kaspersky, Avast, Microsoft Security Essentials...
♦ Spyware
Software that monitors your computer and reveals collected information to an interested party. Spyware steals information. This can be benign when it tracks what webpages you visit; or it can be incredibly invasive when it monitors everything you do with your mouse and keyboard. i.e. Coolwebsearch, Finfisher...
• Malware
The word Malware is short for malicious software, and is a general term used to describe all of the viruses, worms, spyware, and pretty much anything that is specifically designed to cause harm to your PC or steal your information.
• Spam’s
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising and fraud. It is electronic junk mail. i.e. Receiving a jackpot mail.
• Data Backup and Recovery
Data backup means to make copies of data in a removable, long term storage device. It allows the data to be stored at another location and, when required, an individual file or a set of files can be restored to the computer system. The additional copies are called backups.
Data recovery is a process of retrieving inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way.
Recovery tool: If data is not backed up properly and lost due to any reason, it can be recovered sing recovery software. A few examples of data recovery software are R-Studio Data Recovery, R-Undelete, PC inspector file Recovery...
♦ Online Backups
These are also called as remote backup, refers to copying of data (files, folders, or the entire content of hard disk) to some computer on the Internet for online storage. Google drive is widely used software for online backup now a days, this is also helpful in saving you mobile device data online.
Advantages:
• Data can be restored to any computer that is online (connected to the Internet).
• Data is stored safely at a remote location that is far away from the original data.
• Privacy and security of data are assured with encryption and password protection.
• Hacker and Cracker
Showing computer expertise is called as hacking. A hacker constantly looks for flaws in the computer internet security and their sole aim is to rectify these flaws and improve the security.
Breaching security on software or systems is called as Cracking. The purpose of a cracker is to break the security of computers and networks.
♦ Information Security provisions in e-commerce
The information security system in E-commerce should meet the following requirements:
Confidentiality − Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.
Integrity − Information should not be altered during its transmission over the network.
Availability − Information should be available wherever and whenever required within a time limit specified.
Authenticity − There should be a mechanism to authenticate a user before giving him/her an access to the required information.
Non-Reputability − It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt.
Encryption − Information should be encrypted and decrypted only by an authorized user.
♦ Benefits of ICT(Information and Communication Technologies)
Information: It refers to the meaning extracted from the data provided.
Communication: It refers to how the information is verified, distributed and kept secured.
Technology: It refers to the formats and tools used to gather, store and communicate information.
ICT is beneficial in various areas like.
• Education: Teaching and learning using a computer and internet and CD-ROM. Advantages of education through ICT are:
o Complex topics can be easily explained to students.
• 3D Images can be used in teaching which improves the knowledge retention of students.
• Practical demo can be given on any topic.
• Healthcare: Plays an important role in improving the health of individuals. It is used by the government to;
• To promote medical education and training.
• Provide medical assistance during disasters and emergency.
• Share research work.
♦ Governance: Used to achieve efficiency, transparency and citizens participation. It helps citizen in following ways:
• Enables them to pay bills and taxes online.
• Maintains transparency in the system.
• Virtual School: Provides provision of educational facilities on the internet. It has the following features:
• It is available 24x7.
• Quick evaluation by the teachers.
• Parents can access the grades, assignments and other information.
♦ Impact of ICT on Society
The impact of ICT on society is great. As more and more people begin to work from home or jobs become deskilled, computer based, the social implication are going to be very serious.
• Knowledge Based Society: It refers to societies that are well education, and who therefore rely on the knowledge of there citizens to drive the innovation , entrepreneurship and dynamism of that society economy.
• Infomania: It is a condition of reduced concentration caused by a continuously responding to electronic communications such as e-mails and sms.
• Digital Unity: Providing the same opportunities to all sections of peoples to access information technology and the knowledge to use it.
• Digital Divide: The gap between people who have access to modern information technology, such as mobile phones, computer, and the internet, and the knowledge to use them, and people who do not have access and the knowledge to use them.