Question:
What is the Computer Security?
Answer:
Computer Security is the process of preventing and
detecting unauthorized use of your computer. It involves the process of
safeguarding against intruders from using your computer resources for
malicious intents or for their own gains (or even gaining access to them
accidentally).
Question:
What are threats of a Computer System?
Answer:
A
threat can be either "intentional" (i.e., intelligent; e.g., an
individual cracker or a criminal organization) or "accidental" (e.g.,
the possibility of a computer malfunctioning, or the possibility of a natural
disaster such as an earthquake, a fire, or a tornado) or otherwise a
circumstance, capability, action, or event.
Question:
What are viruses and its types?
Answer:
Computer Viruses are malicious
software programs that damage computer program entering into the computer
without the permission of the users, and also run against the wishes of the
users. They are replicated by themselves. Viruses are so dangerous and
malicious that they can be automatically copied and pasted from memory to
memory over and over; the transmitting power is too much quick from network to
network that can simply hang smoothly running computer, sometimes damage the
important programs of the computer. Viruses are very dangerous program can go
on their activities automatically and can do a great loss of the users.
It is quite impossible to give the proper information about
the types of viruses. The types of viruses are changing day by day. Therefore
on the basis of their origin, hiding, damaging types, operating system etc
their types as follows:
Boot Sector Virus:
Boot sector virus infects the boot sector on floppy disks, hard disks and other
bootable media like DVD or CD. The examples of boot sector viruses are – Form,
Michelangelo, and Stoned.
Macro Virus:
A macro virus is an original individual amongst the types of computer virus,
and contaminates the macros inside a pattern. As soon as you release a
spreadsheet or word processing text, the macro virus gets into typical pattern.
The examples of Macro viruses are – Relax, Babbles, and Melissa.
Companion Viruses:
Companion viruses are as same as direct action types or resident types. They
are companion viruses as because sometimes they get into the method and
accompany the other existing files. The example of accompany viruses are –
Asimov.1539, Terax.1069.
File Infector Virus: This sort of virus contaminates programs or executable
records (records with .EXE or .COM extension). Whilst one of these programs is
run, straight or circuitously, the virus is turned on; creating the harmful
belongings it is automatic to bear out. The greater part of accessible viruses
fit in to this class, along with can be classified depending on the proceedings
that they take out.
Question:
What is Antivirus Software, Explain With Example?
Answer:
Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Antivirus software was originally developed to detect and remove computer viruses, hence the name.
Probably the three best known, full-scale antivirus software packages for purchase are from Kaspersky, McAfee, and Norton. AVG and Panda are two examples of free antivirus software.
Question: What is computer Firewall and Explain its use?
Answer: A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.
Question: How
are Firewalls Used?
Answer: Firewalls are frequently used to
prevent unauthorized Internet users from accessing private networks connected
to the Internet, especially intranets.
All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security
criteria.
Question: What is cyber crime and computer ethics?
Answer: Computer ethics is a set of moral principles that regulate the use of computers.
Cyber crime is criminal activity done using computers and the internet. It is considered to be one of the fastest growing areas in crime.
Question: Who are Hackers and Crackers?
Answer:
Hackers: A person who uses computers to gain unauthorized access to data.
A cracker (also known as a black hat hacker) is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties. The general view is that, while hackers build things, crackers break things.
Question: What are Cyber law and its importance?
Answer: Cyber means the use of Internet technologies and computers it includes computers, networks, software, data storage devices, Internet, websites, emails, ATM machines etc. To protect the cyber crime over Internet, this law is passed to protect the Internet cyber crime. This law is approved by the government. Cyber law Includes:
1.
Cyber crimes
2.
Electronic and Digital Signatures
3.
Intellectual Property
4.
Data protection and privacy
Importance of Cyber Law:
Importance of Cyber Law:
1)
Companies now be able to carry out electronic commerce
using the legal infrastructure provided by the Act
2)
Act allows Government to issue notification on the web
thus heralding e-governance
3)
Protect Computer fraud and Unauthorized access.
4)
Consumers are now increasingly using credit cards for
shopping.
5)
Most people are using email, cell phones and SMS
messages for communication as well as Deal with Internet Banking Transactions.
Question:
What is backup and restore?
Answer:
Backup and Restore (formerly Windows Backup and
Restore Center) is a component of Microsoft Windows introduced in Windows
Vista and included in later versions that allows users to create backups and
restore from backups. It is a replacement of NTBackup, which was
included in previous Windows versions.