0% found this document useful (0 votes)
27 views8 pages

CL Unit-3 Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views8 pages

CL Unit-3 Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Step-by-Step Guide for Installing and Configuring Antivirus Software**

**1. Choose the Right Antivirus Software**

Before installation, choose reliable antivirus software that fits your needs. Some
popular antivirus options include:

- **Free:** Avast, AVG, Microsoft Defender

- **Paid:** Norton, McAfee, Bitdefender, Kaspersky

*2. Download the Antivirus**

- Visit the official website of the antivirus software.

- Look for the download option (usually labeled “Free Trial” or “Buy Now” for paid
versions).

- Download the correct version for your operating system (Windows, macOS, Linux).

*3. Install the Antivirus Software**

- Open the downloaded setup file.

- Follow the on-screen instructions. You’ll likely have to agree to the terms and
conditions.

- Choose where to install the software if prompted (default settings work for most
users).

- Installation may take a few minutes.

4. Activate the Software**

- After installation, if the antivirus is paid or offers a trial, you may need to **activate it**
using a license key.

- This key is typically provided via email after purchase or on the purchase confirmation
page.

*5. Perform the Initial Setup**


- Once installed, the antivirus will often prompt you to run an initial scan of your system
to detect any existing threats.

- Customize the settings to match your security preferences:

- **Real-Time Protection:** Ensures continuous monitoring for viruses.

- **Scheduled Scans:** Set up regular, automatic scans (e.g., daily, weekly).

- **Web Protection:** Enable this feature to block suspicious websites and phishing
attempts.

- **Firewall (if included):** Activate the firewall to protect against external threats.

*6. Update the Antivirus Definitions**

- Antivirus software relies on virus definitions, which need to be regularly updated to


detect the latest threats.

- Go to the settings or update section and ensure that automatic updates are enabled.

*7. Configure Additional Features (Optional)**

Some antivirus software comes with extra features that you can configure:

- **Email Protection:** Scans incoming emails for malicious attachments.

- **Ransomware Protection:** Shields your files from unauthorized encryption.

- **Parental Controls:** Blocks harmful websites for younger users.

- **VPN (Virtual Private Network):** Protects your online privacy by encrypting your
internet connection.

*8. Perform a Full System Scan**

- Run a **full system scan** to check for any threats already present on your system.

- This can take a few minutes to several hours depending on the size of your system and
the antivirus software used.

9. Regular Maintenance**

- Keep your antivirus software updated by ensuring that automatic updates are enabled.
- Perform periodic manual scans, especially after installing new software or
downloading files from the internet.

Following these steps ensures that your system is protected from viruses, malware, and
other security threats.
Cyber law ,Cyber Crime and Intellectual Property

WiFi security management in Computer and Mobile:


Definition:
Wi-Fi is a wireless technology used to connect computers, tablets,
smartphones and other devices to the internet.
Wireless security is the prevention of unauthorized access or damage to
computers or data using wireless networks, which include Wi-Fi
networks.

Threats to WiFi networks:


1.Unauthorized Access: Attackers may gain access to a network if it's
not properly secured with strong encryption and passwords.
2.Man-in-the-Middle Attacks: Attackers intercept and potentially alter
communication between devices and the network.
3.Rogue Hotspots: Fake WiFi networks set up by attackers to trick users
into connecting, which can then be used to steal personal information.
4.WiFi Jamming: Deliberate interference with the signal to disrupt
connectivity.
5.Packet Sniffing: Capturing and analyzing data packets transmitted
over the network to steal sensitive information.
6.Weak Encryption: Using outdated or weak encryption standards like
WEP can leave a network vulnerable.
7.Password Cracking: Attackers use various methods to guess or crack
weak passwords protecting the WiFi network.
Some tips for managing WiFi security in Computers:
1.Use Strong Encryption: Always use WPA3 encryption if available. If
not, WPA2 is a good alternative. Avoid using WPA(WiFi Protected
Access)or WEP(Wired Equivalent Privacy) as they are outdated and
insecure.
2.Set a Strong Password: Choose a complex, unique password for your
Wi-Fi network to make it harder for unauthorized users to gain access.
3.Change Default Settings: Change the default username and password
for your router's admin interface to prevent unauthorized changes.
4.Update Firmware Regularly: Keep your router's firmware up to date
to protect against vulnerabilities and exploits.
5. Disable WPS: Wi-Fi Protected Setup (WPS) can be a security risk as it
may be vulnerable to brute-force attacks. Disable it if it's not needed.
6. Limit Network Access: Use MAC address filtering to restrict which
devices can connect to your network. While not foolproof, it adds an
extra layer of security.
7. Enable Guest Network: Set up a separate guest network for visitors
to keep your primary network secure.
8.Monitor Network Activity: Regularly check connected devices and
network activity for any suspicious behavior.
9.Secure Your Router Physically: Place your router in a secure location
to prevent tampering and unauthorized physical access.
10.Use a VPN: Consider using a Virtual Private Network (VPN) to add an
extra layer of encryption for your internet traffic, especially if using
public Wi-Fi.

Some tips for managing WiFi security in Mobiles:


1.Connect to Trusted Networks: Only connect to Wi-Fi networks you
trust. Avoid connecting to public or unknown networks whenever
possible.
2.Use a VPN: Utilize a Virtual Private Network (VPN) to encrypt your
internet traffic, especially on public Wi-Fi networks. This helps protect
your data from being intercepted.
3.Enable Network Notifications: Turn on notifications for available
networks. This feature can alert you if your device connects to an
unfamiliar or potentially insecure network.
4.Forget Networks After Use: When you’re finished using a Wi-Fi
network, especially public ones, make sure to "forget" the network on
your device to prevent automatic reconnection.
5.Use Strong Authentication: Ensure your Wi-Fi network is protected
with WPA3 or WPA2 encryption and a strong password. Avoid using
WEP or open networks.
6.Keep Your Device Updated: Regularly update your mobile operating
system and apps to protect against known vulnerabilities and security
threats.
7.Disable Wi-Fi When Not in Use: Turn off Wi-Fi on your mobile device
when you’re not using it to prevent unwanted connections and reduce
exposure to potential attacks.
8.Monitor Connections: Review and manage connected networks in
your device’s Wi-Fi settings to ensure only authorized networks are
saved.
9.Secure Your Device: Use a strong password, PIN, or biometric lock to
secure your mobile device itself, which adds an additional layer of
protection in case your device is lost or stolen.
10.Be Cautious with Hotspots: Avoid accessing sensitive information or
conducting financial transactions on public Wi-Fi hotspots. If necessary,
use additional security measures, such as two-factor authentication.

Uses/ Applications of WiFi:


1.Enhanced Connectivity: Facilitates seamless wireless internet access
for employees, improving productivity and communication.
2. Office Networking: Connects office equipment such as computers,
printers, and VoIP phones, streamlining business operations and
collaboration.
3.Remote Work: Supports telecommuting by providing reliable wireless
access to corporate networks and resources from remote locations.
4.Conference Rooms: Enables wireless presentation and collaboration
tools, enhancing meeting effectiveness and interaction.

5.Data Collection: Supports the deployment of IoT devices for real-time


data monitoring and analytics in sectors such as manufacturing,
logistics, and retail.
6.Customer Engagement: Provides WiFi access in customer-facing
environments, enabling services such as guest internet access and
location-based marketing.
7.Healthcare: Facilitates the use of wireless medical devices,
telemedicine services, and secure electronic health record
management.
8.Education and Training: Enhances learning environments by
connecting educational tools and resources, enabling interactive and
remote training sessions.
9.Public Spaces: Offers internet connectivity in public areas,
contributing to improved user experience and operational efficiency in
facilities such as airports, libraries, and hotels.

You might also like