Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views6 pages

Computer Assignment

The document discusses various types of computer threats, including viruses, worms, ransomware, and phishing, highlighting their potential impacts on users and systems. It also outlines effective mitigation strategies such as installing security software, performing data backups, and keeping systems updated. The conclusion emphasizes the importance of understanding these threats and taking proactive measures to ensure digital safety.

Uploaded by

sultanjay89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views6 pages

Computer Assignment

The document discusses various types of computer threats, including viruses, worms, ransomware, and phishing, highlighting their potential impacts on users and systems. It also outlines effective mitigation strategies such as installing security software, performing data backups, and keeping systems updated. The conclusion emphasizes the importance of understanding these threats and taking proactive measures to ensure digital safety.

Uploaded by

sultanjay89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

ARDHI UNIVERSITY

SCHOOL OF EARTH SCIENCE REAL ESTATE BUSINESS AND


INFOMATICS (SERBI)

MODULE NAME: FUNDAMENTAL OF COMPUTER

MODULE CODE: IS 161

NATURE OF WORK: GROUP WORK

MEMBERS GROUP NO. 10

S/N REG NO. NAME


01 34380/T.2024 COLLINSI EZEKIEL SAILEN
02 33908/T.2024 JUMA LIMU JUMA
03 33743/T.2024 FELIX SAMWEL GENGA
04 32765/T.2024 DENIS TEGEMEA LYMO
05 33379/T.2024 OMARY SALUMU OMARY
06 34655/T.2024 MWALIMU AHMAD MAHANYU
07 34589/T.2024 GLORIA IBRAHIM MTABO
08 33565/T.2024 GRACE ERNEST MBAGULA
09 33752/T.2024 MARIA PRUDENCE PROTAS
10 33384/T.2024 BARAKA DEUS MWAIHOBA
11 341339/T.2024 MELLISA JOSEPH KIRAMBATA
12 33751/T.2024 DEOGRATIUS GODFREY
13 34245/T.2024 NEEMA AYOUB
MNG’ONG’OSE
14 33978/T.2024 ISAACK ALBERT MUWANGA
15 34847/T.2024 MORINE LUSESHELO SIKANA

Table of Contents
INTRODUCTION.......................................................................................................................................3
DIFFERENT TYPES OF COMPUTER THREATS...................................................................................4
1. Viruses.............................................................................................................................................4
2. Worms.............................................................................................................................................4
3. Ransomware....................................................................................................................................4
4. Phishing...........................................................................................................................................4
5. spyware............................................................................................................................................4
6. keyloggers.......................................................................................................................................4
7. Trojan horses...................................................................................................................................4
8. Denial of service attacks..................................................................................................................5
WAYS TO MITIGATE THESE THREATS...............................................................................................5
 Install reliable security software......................................................................................................5
 Data backups...................................................................................................................................5
 Keep systems updated......................................................................................................................5
 Firewalls..........................................................................................................................................5
 Incident response.............................................................................................................................5
 Data encryption...............................................................................................................................6
 DDoS protection..............................................................................................................................6
CONCLUSION...........................................................................................................................................6
INTRODUCTION
Computer threats are activities, events or actions that can harm a computer’s
system or data .In modern digital era computers play a big role in our daily lives,
from personal use to business activities. However, as we depend more on
technology, there are also many risks that come with it and this risks are known as
computer threats. These threats can make a computer stop working properly, steal
information, or let someone use your computer without permission. They can come
from people, programs, or even mistakes we make when using technology.

Computer threats are important to understand because they can affect anyone who
uses a computer, smartphone, or other devices. If a threat is successful, it could
mean losing important files, having personal information stolen, or your device not
working the way it should. Learning about computer threats helps us know how to
stay safe and keep our information protected.

These threats are a problem because computers are part of our everyday lives. We
use them to talk to friends, shop online, work, and keep important information safe.
If a threat happens, it can cause big problems, like losing photos, having your
money stolen, or your computer becoming really slow or not working at all.

Understanding these threats is important because it helps us learn how to protect


ourselves. For example, we can use strong passwords, keep our computers updated,
and avoid clicking on things that seem suspicious. Just like locking your house
keeps it safe, there are steps we can take to keep our computers and information
safe too.
DIFFERENT TYPES OF COMPUTER THREATS.
1. Viruses
Is a type of malicious code that attaches itself to files or programs and spreads
when these files are shared . Viruses can corrupt , delete, or steal data and can
disrupt system functionality. Example a virus embedded in a word document might
execute when the document is opened, infecting the system.
2. Worms
Unlike viruses, worms do not need user interaction to spread .They exploit
vulnerabilities in networks to propagate .worms can cause significant damage by
delivering harmful payloads.
3. Ransomware
Is a type of malware that encrypts a victim’s data and demands payment for
it’s release. Some ransomware may also threaten to leak sensitive information.

Example in 2017 wannacry attack affected thousands of organisations worldwide.


4. Phishing
Are fraudulent attempts to obtain sensitive information like passwords by
impersonating trustworthy entities. Example an email that appears to be from a
bank but directs users to a fake website to verify account details.
5. spyware

Is a software that secretly monitors and collects user activity, such as


keystrokes , browsing history, or personal information, without consent. Example a
spyware application might track user’s login details for banking website.
6. keyloggers

Is a malware that records every keystroke made on a device to steal


sensitive information like passwords , PINs, or credit card numbers. Example
keyloggers are often used in combination with phishing attacks to target users
7. Trojan horses

Is a software that users inadvertently install and once installed, it can create
backdoors, steal data, or damage systems. Example a fake antivirus program that
installs malware when downloaded
8. Denial of service attacks

Overload a server or network with excessive requests, making it


unavailable to legitimate users. When done by multiple systems , it’s called a
distributed denial of service attack. Example on attack of a website might involve
flooding it with traffic, causing it to crash.

WAYS TO MITIGATE THESE THREATS

 Install reliable security software


Use reputable antivirus and anti-malware program to detect and remove threats.
Example Norton, McAfee, or Bitdefender for endpoint protection
 Data backups
Perform regular backups of critical files and store them offline or in a secure
cloud environment. This ensures data recovery in case of ransomware or system
failure.
 Keep systems updated
Regular update operating systems, applications, and firmware to fix known
vulnerabilities. But also enable automatic updates where possible to avoid delays.
 Firewalls
Monitor internet traffics so as to protect your computer from online scammers and
viruses.
 Incident response
Is a documented plan that helps teams quickly identify, deal with and recover from
cyber security threats
 Data encryption
This limits data access to parties that have the encryption key, but also ensure that
even when authorized parties gain access can not easily read the data.
 DDoS protection
This protects the network resources against attacks that aims to overwhelm
services and cause downtime, by mornitor of traffic patterns to detect and block
malicious requests.

CONCLUSION
Computer threats are big problem in today’s world, as they can harm our data,
steal information, and damage systems. However by understanding these threats
and taking steps to prevent them like, using security software, creating strong
passwords, and keeping system updates we can stay safe.

But also the best way to protect ourselves is to stay alert and take action before
problems arise, so as to secure information and enjoy safe digital experience

You might also like