11ICT General ApplicationsICT General Applications
Malicious Software ,Good Internet Habits and ICT General Application
Usage
ByBy
Adedayo O.SAdedayo O.S
A Paper Delivered During the New Staff Training for Energy Commission of Nigeria (ECN) Abuja, 14th to 22nd April 2008.
22ICT General ApplicationsICT General Applications
Virus SourcesVirus Sources
1.1.Simply visiting a compromised Web site Simply visiting a compromised Web site can cause infection if certain browsercan cause infection if certain browser vulnerabilities are not patched.vulnerabilities are not patched.
2.2.Indiscriminate downloading of software Indiscriminate downloading of software from Internetfrom Internet..
3.3.Over liberality with visitors. That is in Over liberality with visitors. That is in the the use of your Internet facility and in use of use of your Internet facility and in use of foreignforeign storage mediastorage media..
4.4.Through e-mail both from friends and Through e-mail both from friends and strangers (as attachments).strangers (as attachments).
5.5. Software piracy can sometimes lead to virus Software piracy can sometimes lead to virus infection.infection.
33ICT General ApplicationsICT General Applications
CHARACTERISTICSCHARACTERISTICSMALWARE AND SPYWARESMALWARE AND SPYWARES
1. 1. Viruses can also replicate themselves (worms).Viruses can also replicate themselves (worms).2.2. They use up memory and often bring the system to a They use up memory and often bring the system to a
halt. This can be noticed initiallyhalt. This can be noticed initially by the considerable by the considerable slowness in operation (booting, running etc)slowness in operation (booting, running etc)..
3.3. Viruses are capable of transmitting themselves across Viruses are capable of transmitting themselves across networks and bypassing securitynetworks and bypassing security systems.systems.
44.. They are capable of using up bandwidth very quickly.They are capable of using up bandwidth very quickly.5.5. They usually fulfil whatever their designer(s) had in They usually fulfil whatever their designer(s) had in
mind when mind when produced. E.gproduced. E.g deletion, theft, truncation, deletion, theft, truncation, falsification, duplication, copy, DoSfalsification, duplication, copy, DoS, corruption, corruption etc. etc.
55ICT General ApplicationsICT General Applications
Storage DevicesStorage DevicesRemovable Hard Drive Removable Hard Drive
Internal Hard Drive Internal Hard Drive
Flash Flash
PC Cards PC Cards
Storage Tapes Storage Tapes
Memory Sticks Memory Sticks
Floppy Disks Floppy Disks
Zip Disks Zip Disks
CD /DVDCD /DVD
66ICT General ApplicationsICT General Applications
Internet Best PracticesInternet Best PracticesReduce the risk of viruses. Use of anti-virus software Reduce the risk of viruses. Use of anti-virus software and keeping it current.and keeping it current.Never open suspicious e-mail messages or file Never open suspicious e-mail messages or file attachmentsattachmentsUse Windows Security Centre to manage your settings. Use Windows Security Centre to manage your settings. Adjust to the level of protection you are comfortable Adjust to the level of protection you are comfortable with. with. Download internet files from trusted sources only and Download internet files from trusted sources only and scan the files with your virus scanner.scan the files with your virus scanner.Use a firewall, Install a Microsoft Internet Connection Use a firewall, Install a Microsoft Internet Connection firewall as a basic line of defence against outside firewall as a basic line of defence against outside intruders. intruders. Use strong passwords that are at least eight characters Use strong passwords that are at least eight characters long and a combination of lower and upper case letters, long and a combination of lower and upper case letters, numbers and symbols. numbers and symbols.
88ICT General ApplicationsICT General Applications
How to download CorrectlyHow to download Correctly