Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 -...

47
Introduction to Information Technology and Applications

Transcript of Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 -...

Page 1: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Introduction to Information

Technology and Applications

Page 2: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Computer Maintenance,

Security and Problem Solving

Week 4

Page 3: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Objectives

At the end of this lesson, you will learn:

How to maintain computers

Basic security terminology

How to protect your computer

How to resolve computer related problems

Page 4: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Computer Maintenance

Computer maintenance is set of services or

procedures performed to keep a computer in

good working, robust condition.

A well-maintained computer

Performs faster

Runs more efficiently

Crashes less

Maintaining your computer will save you money,

time, and protect your data.

Page 5: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Why maintenance is important?

Page 6: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Why maintenance is important?

Page 7: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

File Security

File Security is a feature of your file system that:

Controls which users can access to which files.

Brings limitations on what users can do with files.

For instance,

A file may be viewed by everyone but only certain

specific people may change it.

A file may be secured so that only the owner may

view it.

You can use password to prevent other people

from opening or modifying your file

Page 8: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 9: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 10: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 11: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 12: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 13: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 14: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Computer Security

Page 15: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Computer Security Computer criminals (hackers or crackers) can

attack Directly, by breaking into your computer through the

Internet and stealing your personal information

Indirectly, by creating malware (MALicioussoftWARE)

Malware is any software designed to cause damage to a single computer, server, or computer network, whether it’s a virus, spyware, Trojan, etc.

Fortunately, you can protect yourself by taking some simple precautions.

Page 16: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 17: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Click System and Security, and then click

Action Center, click Security

Page 18: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Security Center checks your computer for these

security essentials:

Firewall

Automatic updating

Malware protection

Other security settings

Page 19: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 20: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 21: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 22: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 23: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 24: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 25: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 26: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 27: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 28: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 29: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 30: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 31: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 32: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 33: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 34: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 35: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 36: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 37: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 38: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 39: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 40: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 41: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 42: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 43: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 44: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 45: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 46: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.
Page 47: Introduction to Information Technology and Applicationsindex-of.co.uk/Hacking-Coleccion/96 - Introduction To Information... · Introduction to Information Technology and Applications.

Question?