37
Arush Wad IT Vatsal Unadkat

Societal Impacts Of IT (Class X)

Embed Size (px)

DESCRIPTION

This PPT is a summary of the chapter 'Societal Impacts Of IT'.

Citation preview

Page 1: Societal Impacts Of IT (Class X)

Arush Wad

Societal Impacts Of IT

Vatsal Unadkat

Page 2: Societal Impacts Of IT (Class X)

Malicious Software are the programs that generate threats to

the computer system and stored data.

Page 3: Societal Impacts Of IT (Class X)

Virus

Worms

Trojan

Horses

Spyware

Malicious Software

Page 4: Societal Impacts Of IT (Class X)

Viruses• Virus (Vital Information Recourses

Under Seize) is a small program or a small code segment that is capable of attaching itself to existing programs of files and infect them as well as replicate itself without users knowledge or permission. It spreads by external devices like CDs, pen drives, or email and executes when an infected program is executed. If an infected computer gets in contact gets in contact with an un infected computer virus may pass onto the uninfected system and destroy the files.

Page 5: Societal Impacts Of IT (Class X)

Viruses

Boot Sector

File Infecting

PolymorphicStealth

Multipartite

Page 6: Societal Impacts Of IT (Class X)

Boot Sector

VirusThis type of virus infects the master boot record of the system by either moving to another sector or replacing it with infected one.

Page 7: Societal Impacts Of IT (Class X)

F

Ile

This type of virus infects the executable files or files containing executable code such as .exe, .com, .dll, .sys, etc.

INFECTING

VIRUS These viruses add their code to

executables, which when infected may send viral code other executables.

When the infected file is opened or used the virus may overwrite the file and cause permanent damage to the content of the overwritten file.

Page 8: Societal Impacts Of IT (Class X)

Polymorphic Viruses

This type of virus changes its code as it propagates from one file to another. Therefore, each copy that is generated appears different from others. This makes the polymorphic virus difficult to be detected by the antivirus.

Page 9: Societal Impacts Of IT (Class X)

Stealth VirusThis type of virus attempts to conceal its presence from the user and/or antivirus software by using various techniques.

Page 10: Societal Impacts Of IT (Class X)

M

ultIpartIte

A multipartite virus is a computer virus that

infects multiple different target platforms, and

remains recursively infective in each target.

VIRUS It attempts to attack

both the boot sector and the executable, or programs, files at the same time.  

This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated. 

Page 11: Societal Impacts Of IT (Class X)

Worms

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.

Both worms and viruses tend to fill computer memory with useless data thereby preventing you from using memory space for legal applications or programs.

Page 12: Societal Impacts Of IT (Class X)

TROJAN

Trojan horse is a program that appears to be legal and useful but concurrently does something unexpected like destroying existing programs and files . As it does not replicate itself in the computer it is not a virus.However it usually opens a way for the other malicious software like viruses to enter into the computer system. It may also allow unauthorized users access the information stored in the computer.

horses

Page 13: Societal Impacts Of IT (Class X)

Spyware is any technology that aids in gathering information about a person or organization without their knowledge.

Spyware can get in a

computer as a

software virus or as

the result of

installing a new

program.

On the Internet spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.

Page 14: Societal Impacts Of IT (Class X)

Spam refers to the unsolicited or unwanted mail or message sent

to a large number of individuals. It is forced on to the people who would otherwise choose not to

receive such mails. Spam mails are mostly

commercial mails sent by

various companies to promote

their services at e-mail is the

cheapest way to advertise.

In addition it may also be used to

spreading viruses or worms.

Page 15: Societal Impacts Of IT (Class X)

It may flood the e-mails box due to which no other mail can be received.

The recipient time is wasted in reading all the unwanted e-mails.

Network bandwidth is wasted in sending such mails.

Page 16: Societal Impacts Of IT (Class X)

A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.

Hackers may also

introduce new viruses

in the network, which

can enter database

and other applications

and crash the whole

server.

In the hacking community, hackers have been classified into two categories, namely, white hat hackers and black hat hackers.

The hackers that break into the computer security with non-malicious reasons are known as white hat hackers.

The hackers who break into the computer security without administration for ulterior

purposes such as theft, terrorism, etc. are known as black hat

hackers.

Page 17: Societal Impacts Of IT (Class X)
Page 18: Societal Impacts Of IT (Class X)

Antivirus software

is an application

that is used for

protection against

malicious

software.

An antivirus program scans the hard the hard disc

for viruses. After scanning the

software removes the viruses, so that

the computer is able to perform

efficiently again.

Most anti-virus software havean auto update feature that enables the computer to download the definition of new viruses.The updating of a antivirus software is important because the virus 'creators’ are always in the process of developing new viruses.

The updated virus definitions is should always be

maintained so that users can operate their computers

without any problem.

Page 19: Societal Impacts Of IT (Class X)

Data loss is very

common to all

You need to protect your data

You need to

take backup

of your data

Some failure such as hardware failure, software failure, or natural disaster may occur resulting in data loss.

Data backup refers to making duplicate copies of your data and storing them onto some permanent storage device such as pen drive, portable hard disc, DVD, CD, etc.

The data backup is essential for recovering the data as quickly, and with as little

damaging impact on users, as possible.

Page 20: Societal Impacts Of IT (Class X)

Full Backup Method

Incremental Backup Method

Differential Backup Method

Mirror Backup Method

Backup Methods

Page 21: Societal Impacts Of IT (Class X)

Full Backu

p Method

This is the basic backup method that

backups up all the files on the computer the

computer system.

Generally performed on a weekly or

monthly basis.Consumes a lot of time as

of time as well as secondary

memory.

Page 22: Societal Impacts Of IT (Class X)

Incremental

Backup Method

This method backs up only those files

that have been modified since the

most recent backup, thereby

making each backup an

increment to the last backup.

A single backup is not sufficient

to restore all the files, which

makes the restoring

process slower.

It consumes less time

and memory space to take a

backup.

Page 23: Societal Impacts Of IT (Class X)

Differential

Backup Method

This method backs up all the files that have any difference from the last

backup.

Restoring files require the full

backup and only the last

differential backup. This

makes restoring little faster than

incremental backup.

Backing up is slower and

storage requirement is

higher than incremental

backup.

Page 24: Societal Impacts Of IT (Class X)

Mirror Backu

p Method

The mirror backup method

copies the files or folders being

backed up without any

compressions.

It keeps each file separate in the

destination thereby making the destination a

mirror of the source.

The feature makes this

methods fastest of all methods.

However, it requires more

storage space as compared to

other methods.

Page 25: Societal Impacts Of IT (Class X)

Online Backups means

taking backup of data

on a remote computer

over the Internet.

There are several

disadvantages of this

method over other

backup methods.

Firstly, this method not only enables you to recover data after file corruption or computer failure, but you can also recover data even if a natural disasterhas destroyed everything at your place.

Secondly, you can access your data anywhere in the world and at anytime. In addition, the files to

be backed up are encryptedby your computer before being sent to the remote

computer and are secured with password protection.

This ensures the protection of your data from unauthorized access.

However, it is not affordable for individual users or small business to subscribe for online backup services.

Page 26: Societal Impacts Of IT (Class X)

Sometimes, you lose important data because of disk failure, accidental deletion of files, etc

In such situations, recovery

tools come to our rescue.

A recover tool enables you to recover lost data.

The situation even becomes worse if you are not having backup of data.

Page 27: Societal Impacts Of IT (Class X)

Suppose you friend forgot his passport at your house and went away. You want to send it to him

but you don’t want anyone else to steal the passport.

How will you do it?

This picture

is a hint to

the puzzle.

This picture

is a hint to

the puzzle.

Page 28: Societal Impacts Of IT (Class X)

You will put the passport in a box and lock it with a lock and key. This key will Remain with you. Then you send the box to your friend. Your friend will put another lock on it with another key that will remain with him. He will send it back. You will unlock your lock with your key and send it back to him. He will unlock his lock with his key and take his passport.

Encryption and decryption

works in the same way.

Page 29: Societal Impacts Of IT (Class X)

A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set.

Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.

Page 30: Societal Impacts Of IT (Class X)

All Traffic in either direction must pass through the firewall.

The firewallitself is immuneto penetration.

Only traffic authorized by the local security policy must be allowed to pass.

Page 31: Societal Impacts Of IT (Class X)

Social Networking refers to the grouping of individuals to share their common interests or activities

Nowadays, online social networking is gaining popularity and a number of websites (known as social sites) are available for creating online communities.

Page 32: Societal Impacts Of IT (Class X)

Introduction

ToICT

ICT has become the integral part of our working and living environments and will continue to be a powerful resource for business.

ICT stands for Information and Communication Technologies. These technologies include computers, internet, broadcasting technologies (radio and television) and telephony.

Due to globalization and other factors, these technologies are changing and improving dad by day.

Page 33: Societal Impacts Of IT (Class X)

Benefits of ICT

ICT provides several significant benefits and today , it has been used everywhere and in every field including education, healthcare, governance, etc.

Some important benefits of ICT are as follows:-

• Education• Healthcare• Governance

Page 34: Societal Impacts Of IT (Class X)

The use of sounds effects, comic characters and

scripted act attracts the students and helps them to understand the lessons by

getting involved with the lessons being delivered.

This keeps the process of learning new concepts very

lively.

Education

The introduction of ICT in education has made the learning fun and interesting for student now a days.

Many illustrations are given in the form of video clips which help students to understand quickly.

Page 35: Societal Impacts Of IT (Class X)

Healthcare

This technology has made the scope for error very minor and helps the doctor to perform surgeries remotely

ICT has facilitated

us with a number

of medical equipment such as

scanners , microprocessors

and computer-guided

lasers.

The scanners process the data present in them in a readable format, microprocessors help to control many medical devices like pacemaker and the computer-guided lasers are used for various kinds of surgeries.

Page 36: Societal Impacts Of IT (Class X)

GovernanceAll or most of the information generated by the government is easily accessible through the electronic media, such as Internet, mobile phones, etc.

The use of ICT in governance practices offers better interaction between government, its institutions and people. This leads enhanced governance practices and effective management.

This increases the transparency of government and administration to the business as well as its citizens.

Page 37: Societal Impacts Of IT (Class X)