Download CHAPTER 8 System Resources Optimization

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer file wikipedia , lookup

Disk formatting wikipedia , lookup

Computer security wikipedia , lookup

Transcript
Security Technology Department
CHAPTER 8
System Resources Optimization
Chapter 8
Learning Objectives
After completing this lesson, you should be able to:
i.
ii.
iii.
iv.
Explain computer resources
Explain the effects caused by file fragmentation in the PC.
Explain the methods of optimizing the computer performance.
Describe the different types of computer security threats.
Disk Fragmentation
After a period of time of use, hard disks will have disk fragmentation. It refers to the condition
of a disk in which files are divided into pieces, scattered around the disk. Fragmentation is
caused by frequent use of a disk for creating, deleting, and modifying files. At some point, the
OS needs to store parts of a file in scattered clusters. The result is slow performance of the disk.
The OS needs to search through different parts of the disk to put together a single file.
In visual form, we can imagine the condition to be like this:
The red portions represent fragmented files.
SY2006FP: Computer Essentials
Page 8- 1
Security Technology Department
Chapter 8
To speed up a PC, an OS can defragment the hard disk. A defragmented hard disk will look like
this:
To defragment a hard drive, for Windows OS, go to [Control Panel],[ System and Security], and
choose [Defragment your Hard drive].
SY2006FP: Computer Essentials
Page 8- 2
Security Technology Department
Chapter 8
PC Optimization
PC Optimization refers to getting the PC to operate at maximum efficiency and speed in
retrieval, storage or program execution. Once optimized, a PC will run smoother and faster with
less chances of stalling.
There are four ways of optimizing a PC:
 Software Optimization
Software can be optimized by good programming techniques so that
- it operates faster, or
- uses less RAM
 Operating System Optimization
OS can be optimized by
- reducing running processes
- defragmenting the hard disk
- reducing unneeded system boot processes, etc
 Hard disk Optimization
A hard disk will operate faster when it has less files. The number of unnecessary files on
your hard disk can be removed using a utility known as Disk Cleanup Wizard. It removes
temporary files, empties the Recycle Bin, and removes system files and other items that
you no longer need.
 Optimization using Virtual Memory
When too many programs are running, RAM may be used up. That slows down the PC
and may even stall it. Windows OS has a feature known as Virtual Memory. When RAM
is used up, it uses hard disk space to act like RAM. The size of this virtual memory can be
set.
SY2006FP: Computer Essentials
Page 8- 3
Security Technology Department
Chapter 8
Virtual Memory Setting – Windows 7
If you receive warnings that your virtual memory is low, you'll need to increase the minimum
size of your paging file. Windows sets the initial minimum size of the paging file equal to the
RAM installed on your computer, and the maximum size equal to three times the RAM. If you
see warnings at these recommended levels, then increase the minimum and maximum sizes.
Open System by clicking the Start button Picture of the Start button, right-clicking Computer,
and then clicking Properties. In the left pane, click Advanced system settings. Administrator
permission required If you're prompted for an administrator password or confirmation, type
the password or provide confirmation.
On the Advanced tab, under Performance, click Settings.
Click the Advanced tab, and then, under Virtual memory, click Change.
Clear the “Automatically manage paging file size for all drives” check box.
Under Drive [Volume Label], click the drive that contains the paging file you want to change.
Click Custom size, type a new size in megabytes in the Initial size (MB) or Maximum size (MB)
box, click Set, and then click OK.
SY2006FP: Computer Essentials
Page 8- 4
Security Technology Department
Chapter 8
Security Threats
Computer security means to protect information. It deals with the prevention and detection of
unauthorized actions by users of a computer. Personal PCs and commercial servers contain
sensitive and confidential information. Criminals will want to get hold of these information for
their crimes. For instance, there are criminals who steal userids and passwords of credit card
accounts, then make purchases online using these accounts. If they can steal bank account
information, they can take all the money from an account. Any form of intended crime targeted
at computer systems are known as security threats.
Computers and computer networks need security features to ensure that,
 no unauthorized users get into the system
 only authorized users can enter and use the system
 data are kept safe
 applications running normally
The main areas of threats to guard against are:
 internal threats – employees who have access to the system
 external threats – unauthorized users who may try to hack the system
Damages that may result from these threats include:
 loss of data
 corruption of data
SY2006FP: Computer Essentials
Page 8- 5



Security Technology Department
loss of equipment
shutdown of operation
drop in system performance
Chapter 8
The five most common security threats to PCs are:
 Computer virus
 SPAM
 PHISHING
 Spyware
 Keystroke Logging
Security Threat #1 : Computer Virus
A computer virus is a piece of software that can replicate itself and infect a computer without
the user knowing. It can be transmitted over,
a computer network or the Internet, or
removable media such as CDs or memory sticks.
Viruses can cause following damages:
- delete files
- reformat the hard disk
- replicate themselves
- display texts or videos
- cause erratic behavior of the PC
- crash the OS
- cause loss data.
To safeguard PCs, viruses must be prevented, detected and removed using antivirus software.
The two most common methods used to detect viruses are:
 compare virus signatures
A list of virus signatures is stored in a database. The antivirus examines computer files
SY2006FP: Computer Essentials
Page 8- 6
Security Technology Department

Chapter 8
and compares them with these signatures. If they match, it is a virus. This method is
only effective against known viruses. The database must also be updated regularly.
detect behavior of virus
The virus is detected by its behavior using a heuristic algorithm. This method can detect
viruses that are not known.
Security Threat #2: SPAM
SPAM refers to a same message sent to a large number of internet users. The message is
unsolicited. It can be sent over any media including email, online forums, blogs, etc. The main
aim of SPAM is for free advertising. A person who creates a SPAM is called a spammer. When
spamming floods the email inbox of a user, he will have to waste time and effort deleting all the
unwanted messages. Anti-spam software or filers are used to detect and prevent spam. One
example is Symantec.
Some email software are able to detect commonly used spam patterns, push these spam emails
to a Spam inbox. Users can also mark some emails as spams. One example is Gmail by Google.
SY2006FP: Computer Essentials
Page 8- 7
Security Technology Department
Chapter 8
Security Threat #3: PHISHING
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and
credit card details. The aim is to mislead you into giving these information online.
Phishing emails can contain links to websites that are infected with malware. For example, an
email claims to be sent from a bank. In the email, you are asked to click on a link. The link will
bring you to a fake website where you are asked to login to your bank account. One you do
that, your password will be given to the person behind the phishing.
Banks provide an additional step for login, viz,
 security code from security token
 security code sent via SMS
SY2006FP: Computer Essentials
Page 8- 8
Security Technology Department
The following actions can be taken against phishing:
 never login to a website via a email link
 always login via a website by going entering its url
 never enter your id and password if you are suspicious
 insist on additional security code
Chapter 8
One example of a phishing emails. Usually there is promise of rewards, money, etc.
Spyware
A spyware is a type of software that goes into a computer, without the owner knowing it. It will
then transmit data from the computer to the hacker. It can also take over control of a
computer. It is usually installed when you have requested for some free programs online.
Spywares can collect the following,
 user information
 user surfing patterns
 sensitive data (passwords, bank account information, etc)
 change computer settings
 change web browser settings
Software used to detect and remove spyware are known as anti-spyware. Anti-spyware
programs monitor data coming from,
 emails and websites
 downloads of files
SY2006FP: Computer Essentials
Page 8- 9
Security Technology Department
Examples of anti-spyware software are,
 Norton AntiSpyware
 PC Tools Spyware Doctor
Chapter 8
Do you know of any others? If yes, state them here:
__________________________
__________________________
Keystroke Logging
Keystroke Logging is the action of recording the keys struck on a keyboard. It can be done using
hardware devices or software. It can be done with or without the user’s knowledge.
Hackers can install a keystroke logging software on a computer manually or via a virus. By
recording your keystrokes, hackers can obtain your sensitive data, such as,
 Passwords
 bank security codes
 credit card numbers
Precautions to take against keystroke logging include,
 install anti-spyware program
 beware of installation of freeware
 beware of allowing strangers to use your computers
 check the security level of the internet browser used
SY2006FP: Computer Essentials
Page 8- 10
Security Technology Department
SY2006FP: Computer Essentials
Chapter 8
Page 8- 11