0% found this document useful (0 votes)
47 views27 pages

d2 Printed

Computer security involves protecting computer systems and information from unauthorized access, theft, or damage. It ensures confidentiality, integrity, and availability of data. Common threats include malware, denial of service attacks, password attacks, and SQL injection. Computer security specialists secure infrastructure by installing firewalls and antivirus software, planning security measures, and monitoring networks for threats or abnormal activity. Strong passwords, backing up data, and protecting wireless networks are important practices for individual computer security.

Uploaded by

edris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views27 pages

d2 Printed

Computer security involves protecting computer systems and information from unauthorized access, theft, or damage. It ensures confidentiality, integrity, and availability of data. Common threats include malware, denial of service attacks, password attacks, and SQL injection. Computer security specialists secure infrastructure by installing firewalls and antivirus software, planning security measures, and monitoring networks for threats or abnormal activity. Strong passwords, backing up data, and protecting wireless networks are important practices for individual computer security.

Uploaded by

edris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

What is computer security?

Computer security basically is the protection of computer systems and information from harm,
theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of
your computer system.
There are various types of computer security which is widely used to protect the valuable
information of an organization.
What is Computer Security and its types?
One way to ascertain the similarities and differences among Computer Security is by asking what
is being secured. For example,
 Information security is securing information from unauthorized access, modification &
deletion
 Application Security is securing an application by building security features to prevent
from Cyber Threats such as SQL injection, DoS attacks, data breaches and etc.
 Computer Security means securing a standalone machine by keeping it updated and
patched
 Network Security is by securing both the software and hardware technologies
 Cybersecurity is defined as protecting computer systems, which communicate over the
computer networks
So, Computer security can be defined as controls that are put in place to provide
confidentiality, integrity, and availability for all components of computer systems. Let’s
elaborate the definition.
Components of computer system
The components of a computer system that needs to be protected are:
 Hardware, the physical part of the computer, like the system memory and disk drive
 Firmware, permanent software that is etched into a hardware device’s nonvolatile
memory and is mostly invisible to the user
 Software, the programming that offers services, like operating system, word processor,
internet browser to the user 
The CIA Triad
Computer security is mainly concerned with three main areas:

 Confidentiality is ensuring that information is available only to the intended audience


 Integrity is protecting information from being modified by unauthorized parties
 Availability is protecting information from being modified by unauthorized parties
Computer security threats
Computer security threats are possible dangers that can possibly hamper the normal functioning
of your computer. In the present age, cyber threats are constantly increasing as the world is going
digital. The most harmful types of computer security are:
Why is Computer Security Important?
Protecting the computers and the data in them is an increasingly important consideration.
Hackers are prying over the business network to conduct fraudulent activities, gain access and
steal sensitive information associated with businesses. With the cybersecurity threat landscape
elevating to the next level, individuals and organizations can protect their computers from
staying away from such attacks with efficient computer security systems. Practicing good
computer ethics is a prime key to keeping your laptop safe and having a good user experience.
Computer Security Definition
Computer security involves protecting software, data, hardware, and other components
associated with the computer from cybersecurity threats or damage. Methods, software, and
techniques are applied to enable system security, safeguard computing resources, allow data to
integrity, restrict access to authorized users, and retain data confidentiality. Antivirus, Firewall,
and Internet security software are some of the efficient security systems available to entitle users
with computer security.
3 Best Computer Security Practices
From passwords to file encryption, computer security plays a vital role.
1. Set Strong Passwords
Users are to be wary of cybersecurity threats and should start implementing strong passwords as
weak passwords would allow hackers to guess them easily and gain access to private user
credentials and use them to get monetary benefits. Here is how cybersecurity knowledge plays
the leading role in protecting passwords.
 Never document passwords in text files or spreadsheets
 Avoid saving passwords in the browser
 Avoid using personal information like spouse name, date of birth, child’s name
 Use of complex passwords with a combination of letters (lower-case and upper-case)
 Use unique passwords and do not use the same password for different accounts
 Deploy two-factor authentication
2. Backing up data
The second most important key to cyber-security is backing up data. This is done by saving a
copy of your existing data on an external hard disk so that if your device is stolen or
compromised, your backup data would be a savior.
3. Protecting Wireless Network
All the wireless networks associated with businesses and individuals should be protected with a
strong password. This prevents hackers from accessing or hijacking the wireless business
network. Make sure that the wireless network is encrypted.

What do Computer Security Specialists do?


Computer security managers are accountable for securing the computing resources and data of
the company consistently. A security analyst should restrict access to specific users to gain
confidential information.
Planning Security
Security experts analyze and plan the computer protection measures to protect the vital
components of the IT infrastructure from countering the possible vulnerabilities and threats.
Securing the Infrastructure
The critical role of any computer security specialist is to secure the infrastructure of the
corporate network. Even the most sought-after software can have the possibility of retaining
overlooked vulnerabilities that are detected only when there is an audit.
The security specialist is responsible for installing a free firewall to filter out the possible threats
and an antivirus to scan, detect and remove any malware infection from the system.
Monitoring the Infrastructure
The prime role of any computer security specialist is to monitor the corporate IT infrastructure.
They are accountable for checking what goes in and comes out of the network. They deploy
automated security systems to monitor the system’s activities connected to the network.
A key component of infrastructure security is monitoring infrastructure. Security analysts place
to network and computer monitors on the web and critical servers at strategic points. These
monitors typically communicate with a central server, reporting all activity for later analysis.
Security analysts use automated tools to scan the logs produced by the monitors and look for
aberrations in the activity.
Facts about Computer Security
Companies are not aware of the modes of attacks.
With technology, attackers have evolved over the years to deploy sophisticated methods and
impose attacks on their target networks. Companies are confident about their IT security
progress; however, in reality, they are not aware of how they are being attacked.
Every company is hacked.
When we hear about a company’s breach, our instant reflux will make us think that the company
does not practice proper computer security systems. However, every company is at high risk and
is likely to be attacked anytime.
Penetration testers experience ethical hacking to be very simple, and they easily outplay the
existing security system of a computer network. Hence it is a verdict that all the computers are
not secured.

Types of Attacks
There are many kinds of attacks available to the dedicated hacker. These are among the most
famous and frequent types of attacks.

1. Denial of service (DDoS):


This is an attack used to restrict the user’s access to the system resources by flooding the server
with useless traffic. The botmaster commands all the bots to access a resource at the same time
so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that
same resource, they will not be able to do so.
2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of
malware:
 Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it
to get passwords and account details.
 Virus: A computer virus is a malicious code that replicates by copying itself to another
program or document and changes how a computer works. The virus, such as the Melissa
virus, requires someone to knowingly or unknowingly spread the infection without the
knowledge or permission of a user or system administrator. 
 Worms: This is a standalone program that runs independently and infects the system.
One of the more popular examples is W32.Alcra.F. The worm propagates itself through
network share devices.
 Trojan horse: This is a malicious code that takes over your computer. This code can
damage or steal information from your computer.
3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct
the payment. Simple, right?
4. Phishing:The attacker sends bait, often in the form of an email. It encourages people to share
their details. For example, you get an email like this:
5. Eavesdropping:
Attacker observes traffic on your system and the work you are doing. The attacker can monitor
you in three ways: 
 Email monitoring
 Which websites you visit
 What items you download
6. SQL injection:
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input
into a SQL statement. This type of attack happens only on websites. The best example would be
www.facebook.com. There is a database stored on the Facebook website. The hackers get into
that database and sign in using someone else's username and password.
7. Password attack:
To crack a password or find a password, hackers employ the following techniques:
 Dictionary attack: In this method, they handle every password that is possible through
the dictionary
 Brute force: It is a trial and error method used to decode the password or data. This
attack takes the most amount of time.
 Keylogger: As the name suggests, keylogger records all the hits on the keyboard. Most
people use it to get passwords and account details
 Shoulder surfing: The attackers observe the user’s keyboard by looking over the user’s
shoulder.
 Rainbow table: There are rainbow tables that contain precomputed hash values.
Attackers use this table to find the user’s password.
8. Social engineering:
Attackers create social situations that encourage you to share your password. For example, let’s
say that you are out of your office, and you get a call. The person says that he is from the IT
department and they have found out that your system has been compromised. He asks you to
share your password. You might believe him and share your password. However, the caller was,
in fact, a hacker, and how he has your password. Now that he has access, he can compromise
your organization's data. The best way to avoid the effects of social engineering is to learn your
organization’s protocol regarding password sharing.

How Do You Secure Your Computer?


1. Two-way authentication
Two-factor authentication adds a layer of security to the authentication process by making it
harder for attackers to gain access to a person's devices or online accounts. For example, when
you make online payments, you first have to confirm your card’s cvv number, then you undergo
a second confirmation by providing your mobile number.
2. Secure passwords
Create strong passwords so that no one will be able to hack or guess your password. The best
passwords include:
 At least 15 characters.
 Capital letters.
 Special characters. Example: @#$%.
 Numbers.
3. Regular updates
Always keep your system and all its software updated. Many updates contain additional defenses
against cyber attacks.
4. Antivirus
Antivirus is a computer program used to prevent, detect, and remove malware. Examples of
antivirus include Norton, Quickheal, and McAfee.
5. Firewalls
Firewalls prevent unauthorized Internet users from accessing private networks connected to the
Internet, especially intranets.
6. Anti-Phishing Tactics
When you get an email that looks suspicious or has no relation to you, then do the following:
 Do not click on the link in the email.
 Do not provide any personal details if asked.
 Do not open the attached files.
7. Encryption
This is the process of converting ordinary plain text into unintelligible text and vice-versa.
Encryption is used in many applications like: 
 Banking transactions.
 Computer passwords.
 E-commerce transactions.
A computer worm is a type of malware that spreads copies of itself from computer to computer.
A worm can replicate itself without any human interaction, and it does not need to attach itself to
a software program in order to cause damage.
How do computer worms work? 
Worms can be transmitted via software vulnerabilities. Or computer worms could arrive as
attachments in spam emails or instant messages (IMs). Once opened, these files could provide a
link to a malicious website or automatically download the computer worm. Once it’s installed,
the worm silently goes to work and infects the machine without the user’s knowledge.
How to tell if your computer has a worm
If you suspect your devices are infected with a computer worm, run a virus scan immediately.
Even if the scan comes up negative, continue to be proactive by following these steps.
1. Keep an eye on your hard drive space. When worms repeatedly replicate themselves,
they start to use up the free space on your computer.
2. Monitor speed and performance. Has your computer seemed a little sluggish lately?
Are some of your programs crashing or not running properly? That could be a red flag
that a worm is eating up your processing power.
3. Be on the lookout for missing or new files. One function of a computer worm is to
delete and replace files on a computer.

How to help protect against computer worms 


Computer worms are just one example of malicious software. To help protect your computer
from worms and other online threats, take these steps.
1. Since software vulnerabilities are major infection vectors for computer worms, be sure
your computer’s operating system and applications are up to date with the latest versions.
Install these updates as soon as they’re available because updates often include patches
for security flaws.
2. Phishing is another popular way for hackers to spread worms (and other types of
malware). Always be extra cautious when opening unsolicited emails, especially those
from unknown senders that contain attachments or dubious links. 
3. Be sure to invest in a strong internet security software solution that can help block these
threats. A good product should have anti-phishing technology as well as defenses against
viruses, spyware, ransomware, and other online threats.

What is a computer worm? 


A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate
from one computer to another without human activation after breaching a system. Typically, a
worm spreads across a network through your Internet or LAN (Local Area Network) connection.
Naturally, you must be wondering what is a Trojan and how does it relate to computer worms?   

To keep it brief, a Trojan uses trickery and social engineering to deceive people into running it.
For example, a Trojan may pretend to be legitimate software. A worm is a type of Trojan
because it normally relies on social engineering to attack systems.  
How does a computer worm spread?
 Phishing: Fraudulent emails that look authentic can carry worms in corrupt attachments.
Such emails may also invite users to click malicious links or visit websites designed to
infect users with worms.
 Spear-Phishing: Targeted phishing attempts can carry dangerous malware like
ransomware cryptoworms.  
 Networks: Worms can self-replicate across networks via shared access.
 Security holes: Some worm variants can infiltrate a system by exploiting software
vulnerabilities.
 File sharing: P2P file networks can carry malware like worms.
 Social networks: Social platforms like MySpace have been affected by certain types of
worms.
 Instant messengers (IMs): All types of malware, including worms, can spread through
text messages and IM platforms such as Internet Relay Chat (IRC).  
 External devices: Worms can infect USB sticks and external hard drives.
What does a computer worm do?
Once a computer worm has breached your computer’s defenses it can perform several malicious
actions:
 Drop other malware like spyware or  Overload networks
ransomware  Steal data
 Consume bandwidth  Open a backdoor
 Delete files  Deplete hard drive space
Computer worm vs. virus
Some people think that a computer worm and computer virus are the same things because the
two behave similarly. They may even use the terms like "worm computer virus" or "worm virus
malware." The truth is that the two are comparable but different threats.
The defining difference between a virus and a worm is that viruses rely on human action for
activation and need a host system to replicate. In other words, a virus won’t harm your system
unless you run it. For example, a virus on a flash drive connected to your computer won’t
damage your system unless you activate it. And as mentioned above, a worm doesn’t need a host
system or user action to spread.
Computer worm examples
Over the years, there have been some particularly devastating worms. Some worms have caused
billions in damage. Here is a brief list of some infamous ones:
 Morris Worm: Also known as the Internet worm, this was one of the first computer
worms to spread via the Internet and earn notoriety in the media.
 Bagle: Also known as Beagle, Mitglieder, and Lodeight, this mass-mailing worm had
many variants.
 Blaster: Also known as MSBlast, Lovesan, and Lovsan, this worm attacked computers
running Windows XP and Windows 2000.
 Conficker: Also known as Downup, Downadup, and Kido, this worm exploited flaws in
Windows to infect millions of computers in over a hundred countries.
 ILOVEYOU: The ILOVEYOU worm infected tens of millions of computers globally,
resulting in billions of dollars in damage.
 Mydoom: This became the fastest-spreading email worm in 2004, sending junk email
across computers.
 Ryuk: Although Ryuk wasn't always a worm, it's now worm-like ransomware.
 SQL Slammer: The SQL Slammer worm gained infamy for slowing down Internet
traffic with denial-of-service attacks on some Internet hosts.
 Storm Worm: This worm utilized social engineering with fake news of a disastrous
storm to drop botnets on compromised machines.
 Stuxnet: Some experts believe this sophisticated worm was developed for years to
launch a cyberattack.
Symptoms of a computer worm 
Many of the symptoms of a computer worm are like that of a computer virus. For example, you
may have a computer worm if your computer slows down, freezes, crashes or throws up error
messages. You may also notice that files are missing or corrupted or that your hard drive's space
is rapidly depleting inexplicably. Additionally, you may see alerts from your firewall about a
breach. 

What types of Computer Worms are there?


Computer worms can be divided mainly according to the type of spread:
Internet Worms
These are completely independent programs. You use an infected machine to search the internet
for other vulnerable machines. If a vulnerable computer is found, the worm infects it.
Email Worms
This computer worm is most commonly spread via email attachments. It usually has double file
extensions (e.g. .mp4.exe or .avi.exe) so that the recipient could think that they are media files
and not malicious computer programs.
File Sharing Worms
Despite the illegality, file sharing and peer-to-peer file transfers are still used by millions of
people worldwide. In doing so, they unknowingly expose their computers to the threat of file-
sharing worms. Like email and instant messaging worms, these programs are often disguised as
double-ended media files.
Instant Messaging Worms
They are similar to email worms, the only difference being in the way they spread. They are
disguised as attachments or clickable links to websites. Often times, short messages like “LOL”
or “This is your must-see!” accompanied to trick the victim into thinking that a friend sent a
funny video to watch.
Known Computer Worms
Morris Worm
This computer worm was launched in 1988 by Robert Morris. He released some code without
knowing that it was riddled with bugs that would cause a variety of problems for the affected
hosts. The Morris worm resulted in thousands of overloaded computers running on UNIX,
costing between $ 10 million and $ 100 million in financial damage.
Storm Worm
The Storm Worm is an email worm from 2007. The victims received emails with a false news
story. This reported an unprecedented storm wave that should have killed hundreds of people
across Europe. More than 1.2 billion emails infected with the Storm worm have been sent over
the course of 10 years. Experts believe that there are still at least one million infected computers
whose owners do not know they are infected.
SQL Worm
This computer worm was unique in its method of spreading. It generated a series of random IP
addresses and mailed itself to them in the hope that they weren’t protected by antivirus
software. Shortly after the SQL worm spread in 2003, more than 75,000 infected computers were
unwittingly involved in DDoS attacks on several large websites.
How do you recognize a Computer Worm?
Users should be familiar with the signs of a computer worm so that they can quickly identify an
infestation and remove the computer worm. Here are the most typical symptoms of a computer
worm:
 =Unusual computer behavior  =Firewall warnings
(messages, sounds, pictures)  =Unusual behavior of the web
 =Programs that open and run browser
automatically  =Strange and unintended desktop
 =Slow computing performance files and icons appear
 =System freezes and crashes
 =Operating system errors and system
error messages
 =Emails sent to contacts without the
user's knowledge
 =Missing or changed files
How can I remove a Computer Worm?
The following steps should be used to completely remove a computer worm:
1.  First of all, high-quality anti-virus software should be installed. When choosing
software, reputable manufacturers should be used, as malware often comes with fake
antivirus programs.
2. Disable System Restore to prevent Windows from creating backups that are infected with
the computer worm.
3. Carry out a full scan of the system with the antivirus program.
4. If computer worms are found, the software usually offers to remove them.
5. If the anti-virus program does not automatically remove the worm, it is important to note
the name of the worm.
6. If this is the case, a suitable tool for removing the worm in question should be
downloaded and executed using a search engine. The antivirus software should also be
deactivated. If it is run while the worm is being removed, it could conflict with the
removal methods and cause a system failure.
7. After the worm has been removed, the anti-virus program should be switched on
again. The same goes for system recovery.
How can you protect yourself from a Computer Worm?
There are several best practices that individuals as well as businesses can follow to protect their
computers from a computer worm. The following steps reduce the risk of infection and make it
easier to identify and eliminate computer worms:
Safe Behavior
Attachments and links should only be opened if they come from a trustworthy source known to
the user. E-mails from unknown senders should not be opened, as many computer worms spread
via e-mail. Companies should conduct awareness training courses with their employees so that
they are made aware of the dangers and risks on the Internet.
Regular Updates
Operating systems and software should be kept up to date with regular updates. The
manufacturer’s updates often contain security patches that protect computers from new worms
and fix errors. This is important because a computer worm will benefit from the vulnerabilities.
Antivirus Software
Antivirus software is the first preventive measure to avoid computer worms. It is a program that
protects the computer from viruses, worms, Trojans and malware of all kinds. It scans every file
on the computer and helps prevent damage. Antivirus programs that are able to scan downloads
and already contain tools to remove worms are particularly effective.
Firewall
A firewall is a security tool that is used to monitor incoming and outgoing network traffic based
on security rules. The main purpose is to create a barrier between internal and external network
in order to protect against cyber attacks.
Protect your email inbox
Computer worms often attack computers via email. For example, they can get onto the computer
via a phishing email. Heretofore you can already protect before the malware au f the
computer. This works for companies, for example, with Spam and Malware
Protection or Advanced Threat Protection from Hornetsecurity.
Summarizing the differences between viruses and worms
Virus Worm
 Requires a host  Spreads independently
 Triggered by human interaction  Doesn’t require human interaction
 Often arrives through an infected file or  Often arrives through a software
program (file-infector) vulnerability

There are similarities, too


Despite the distinctions outlined above, worms and viruses do behave similarly in other respects.
The main similarity is that both viruses and worms self-replicate and spread rapidly. In fact,
both can spread exponentially, giving them extreme potential for damage. When it comes to
viruses vs. worms, it’s safe to say you want to stay far away from both.
Both viruses and worms can spread exponentially.

Which is more dangerous, a computer virus or worm?


Though there can be a scale of danger among viruses and worms, worms are generally
considered more dangerous. Worms are sneakier, because they can infect you without you even
realizing it. And new strains of viruses (or file-infectors) are hard to find these days, while
worms are much more common.
Both worms and viruses have huge potential to cause security and privacy problems. A minor
malware infection can damage files, programs, or devices. But more damaging infections can
steal your sensitive personal data, which could lead to identity fraud and monetary theft. 
Small companies, large corporations, health care systems, and even countries can be hit hard by
malware. Viruses and worms can cause large scale data leaks, data loss or theft, expensive repair
costs, reputational damage, and even cyberwarfare.
Virus vs. worm: which one do I have?
All types of malware have some similar traits and characteristics. That can make it extremely
difficult to determine which form of malicious software you have, because they can cause very
similar symptoms. In general, look out for these tell-tale signs of a malware infection:
 Unexplained slow performance
 Changed settings or new apps that
you didn’t configure yourself
 Lots of crashes or freezes
 Missing or corrupted files
 A hyperactive processor
 Sudden loss of storage space
 Tons of pop-ups
If you notice any of these symptoms, it’s time to find out what’s plaguing your machine.
What to do if you have a virus or worm?
If your device is suffering from any of the malware symptoms above, you should immediately
perform a malware scan. Unless you’re a malware expert, it can be extremely difficult to find
and diagnose the infection yourself.
An ounce of prevention is worth a pound of cure, as the old adage goes, and that applies tenfold
when it comes to viruses and worms. Learn how to protect yourself now and you’ll never have to
worry about damaged files, stolen personal data, or spreading the infection to your friends and
family in the future.
Avoid opening suspicious emails and links
When it comes to the internet, a healthy dose of skepticism is often warranted. Don’t open
emails from unknown sources. Even if it’s from a trusted contact, but it doesn’t sound like
them, proceed cautiously. Their device may be infected with malware that’s now spamming their
contacts. Be especially careful with links and attachments. That includes links you receive on
messaging apps and social media. 
Download apps and media only from trusted sources
Apple’s App Store and the Google Play store vet developers and their apps and test them for
security. While it’s not 100% foolproof, it’s much safer than downloading programs on a third-
party website. 
Use an ad blocker
Malvertising refers to infected ads that can spread malware on your device if you click on them.
Malvertising can also insert malware into ad networks that distribute ads across the internet. That
means malicious ads can show up even on legitimate, trustworthy sites. An ad blocker will
prevent ads from loading, so you never even see them. And an ad blocker will also help prevent
drive-by downloads, whereby infected ads get into your system without even being clicked on.
Use a trusted antivirus
Viruses, worms, Trojans, ransomware — you can prevent them all with a robust cybersecurity
tool like AVG AntiVirus FREE. AVG provides 24/7 protection to detect and block all types of
malware before it can get anywhere near your system. And extra, built-in defenses against
infected email attachments, malicious downloads, and unsafe links means you always stay safe
against the most common virus and worm vectors.

How to Protect Yourself from Computer Viruses and Computer Worms


Here are some simple ways to protect yourself:
 Install anti-virus software and firewall
 Track potential data exfiltration at the edge and attacks at the point of entry
 Remember to regularly install security patches
 Monitor and analyze file and user behavior
 Leverage security analytics to spot suspicious behavior
 Set up alerts to notify you automatically and immediately when an anomaly occurs
Difference between Worms and Virus
1. Worms : 
Worms are similar to a virus but it does not modify the program. It replicates itself more and
more to cause slow down the computer system. Worms can be controlled by remote. The main
objective of worms is to eat the system resources. 
2. Virus : 
A virus is a malicious executable code attached to another executable file that can be harmless or
can modify or delete data. When the computer program runs attached with a virus it performs
some action such as deleting a file from the computer system. Viruses can’t be controlled by
remote. 
Difference between Worms and Virus : 
 
S.No. WORMS VIRUS
A Virus is a malicious executable code
A Worm is a form of malware that attached to another executable file which
1. replicates itself and can spread to can be harmless or can modify or delete
different computers via Network. data. 

The main objective of worms is to eat the The main objective of viruses is to modify
2.
system resources. the information.
It doesn’t need a host to replicate from
3. It requires a host is needed for spreading.
one computer to another.
4. It is less harmful as compared. It is more harmful.
Worms can be detected and removed by Antivirus software is used for protection
5.
the Antivirus and firewall. against viruses.
6. Worms can be controlled by remote. Viruses can’t be controlled by remote.
Worms are executed via weaknesses in the
7. Viruses are executed via executable files.
system.
Internet worms, Instant messaging Boot sector virus, Direct Action virus,
worms, Email worms, File sharing worms, Polymorphic virus, Macro virus,
8.
Internet relay chat (IRC) worms are Overwrite virus, File Infector virus are
different types of worms. different types of viruses
Examples of worms include Morris worm, Examples of viruses include Creeper,
9.
storm worm, etc. Blaster, Slammer, etc.
It does not need human action to
10. It needs human action to replicate.
replicate.a that
11. Its spreading speed is faster. Its spreading speed is slower as compared.

What to Do if You Have a Virus or Worm


Whether you’re noticing your device is acting strangely or your security software notified you
about the threat of a virus or a worm, you might find yourself wondering about the best course of
action.
If you find that your device is infected with a worm or virus, the steps for minimizing damage
and removal are quite simple.
First, you need to minimize the damage. While it might seem easier said than done, it is really
quite simple. The easiest way to do this is to shut off your internet and cut all internet access to
your devices. It will prevent the worm or virus from transmitting your data and “blind” the
cybercriminal.
Next, you need to run a virus scan and delete any suspicious files. We recommend saving all
important documents to an external hard drive, USB stick, or secured cloud.
Lastly, you need to remove the malicious code. Run your antivirus program (and make sure it
is updated). Most times, the antivirus program will be able to locate and isolate the threat. If for,
whatever reason, the worm or virus will not leave quietly, you can restore your computer to its
factory settings. But remember, this will cause you to lose all your data.
How to Protect Yourself from Computer Viruses and Computer Worms
A good defense is the best offense.
Here are 8 things you can do to protect your devices from viruses and worms.
1. Use a good antivirus. It will help recognize and protect your devices against most
known viruses. However, as attackers are continually writing new viruses, it is important
to always update your antivirus.
2. Use strong and unique passwords. Use a password manager to help you manage them.
Do not use the same password for every website.
3. Enable two-factor authentication (2FA) to prevent unauthorized access to your
accounts.
4. Use a VPN. This will add another layer of encryption to protect your connections.
5. Don’t ignore device updates. Whether they’re for your operating system or an app, they
can provide essential security patches.
6. Enable your firewall. Firewalls prevent certain types of infection by blocking malicious
traffic before it can enter your computer.
7. Avoid clicking on suspicious links or attachments. Even if you know the sender, it’s
always a good idea to run a scan and check all shortened links.
8. Use only HTTPS web connections to enter your personal details.
What are the different types of computer viruses?
1. Boot sector virus
This type of virus can take control when you start — or boot — your computer. One way
it can spread is by plugging an infected USB drive into your computer.
2. Web scripting virus
This type of virus exploits the code of web browsers and web pages. If you access such a
web page, the virus can infect your computer.
3. Browser hijacker
This type of virus “hijacks” certain web browser functions, and you may be automatically
directed to an unintended website.
4. Resident virus
This is a general term for any virus that inserts itself in a computer system’s memory. A
resident virus can execute anytime when an operating system loads.
5. Direct action virus
This type of virus comes into action when you execute a file containing a virus.
Otherwise, it remains dormant.
6. Polymorphic virus
A polymorphic virus changes its code each time an infected file is executed. It does this
to evade antivirus programs.
7. File infector virus
This common virus inserts malicious code into executable files — files used to perform
certain functions or operations on a system.
8. Multipartite virus
This kind of virus infects and spreads in multiple ways. It can infect both program files
and system sectors.
9. Macro virus
Macro viruses are written in the same macro language used for software applications.
Such viruses spread when you open an infected document, often through email
attachments.

single sign-on (SSO)


 Single sign-on (SSO) is a session and user authentication service that permits a user to
use one set of login credentials...
 Single Sign-on (SSO) occurs when a user logs in to one application and is then signed in to other
applications automatically, regardless of the platform, technology, or domain the user is using.
The user signs in only one time, hence the name of the feature (Single Sign-on).
For example, if you log in to a Google service such as Gmail, you are automatically
authenticated to YouTube, AdSense, Google Analytics, and other Google apps. Likewise, if you
log out of your Gmail or other Google apps, you are automatically logged out of all the apps; this
is known as Single Logout.
SSO provides a seamless experience for users when using your applications and services. Instead
of having to remember separate sets of credentials for each application or service, users can
simply log in once and access your full suite of applications.

Whenever users go to a domain that requires authentication, they are redirected to the
authentication domain where they may be asked to log in. If the user is already logged in at the
authentication domain, they can be immediately redirected to the original domain without
signing in again.
How it works
Single Sign-on and Single Logout are possible through the use of sessions. There may be up to
three different sessions for a user with SSO:
 Local session maintained by the application
 Authorization Server session, if SSO is enabled

 Identity Provider session, if the user chose to log in through an Identity Provider (such as
Google, Facebook, or an enterprise SAML Identity Provider)

What is an SSO token?


An SSO token is a collection of data or information that is passed from one system to another
during the SSO process. The data can simply be a user’s email address and information about
which system is sending the token. Tokens must be digitally signed for the token receiver to
verify that the token is coming from a trusted source. The certificate that is used for this digital
signature is exchanged during the initial configuration process.
Is SSO secure?
The answer to this question is “It depends.”
There are many reasons why SSO can improve security. A single sign-on solution can simplify
username and password management for both users and administrators. Users no longer have to
keep track of different sets of credentials and can simply remember a single more complex
password. SSO often enables users to just get access to their applications much faster.
SSO can also cut down on the amount of time the help desk has to spend on assisting users with
lost passwords. Administrators can centrally control requirements like password complexity and
multi-factor authentication (MFA). Administrators can also more quickly relinquish login
privileges across the board when a user leaves the organization.
Single Sign-On does have some drawbacks. For example, you might have applications that you
want to have locked down a bit more. For this reason, it would be important to choose an SSO
solution that gives you the ability to, say, require an additional authentication factor before a user
logs into a particular application or that prevents users from accessing certain applications unless
they are connected to a secure network.

Are there different types of SSO?


There are a lot of terms that are used when we talk about Single Sign-On (SSO).
 Federated Identity Management (FIM)
 OAuth (specifically OAuth 2.0 nowadays)
 OpenID Connect (OIDC)
 Security Access Markup Language (SAML)
 Same Sign On (SSO)
SSO is actually a part of a larger concept called Federated Identity Management, thus sometimes
SSO is referred to as federated SSO. FIM just refers to a trust relationship that is created between
two or more domains or identity management systems. Single Sign-on is often a feature that is
available within a FIM architecture.
OAuth 2.0 is a specific framework that could also be considered part of a FIM architecture.
OAuth focuses on that trusted relationship allowing user identity information to be shared across
the domains.
OpenID Connect (OIDC) is an authentication layer that was built on top of OAuth 2.0 to provide
Single Sign-on functionality.
Security Access Markup Language (SAML) is an open standard that is also designed to provide
Single Sign-on functionality.

Same Sign On which is also often referred to as SSO is actually not the same as Single Sign-on
because it doesn’t involve any trust relationship between the entities that are doing the
authentication. It is more dependent on credentials being duplicated between systems and simply
passing in those credentials when necessary. It is not as secure as any of the Single Sign-on
solutions.
There are also some specific systems that commonly come up when we are discussing Single
Sign-on: Active Directory, Active Directory Federation Services (ADFS) and Lightweight
Directory Access Protocol (LDAP).
Active Directory, which nowadays is specifically referred to as Active Directory Directory
Services (ADDS), is Microsoft’s centralized directory service. Users and resources are added to
the directory service for central management and ADDS works with authentication protocols like
NTLM and Kerberos. Thus, users that belong to ADDS can authenticate from their machines and
get access to others systems that integrate with ADDS. This is a form of Single Sign-on.
Active Directory Federation Services (ADFS) is a type of Federated Identity Management
system that also provides Single Sign-on capabilities. It supports both SAML and OIDC. ADFS
is primarily used to set up trust between ADDS and other systems such as Azure AD or other
ADDS forests.

What is SSO software as a service?


Just as many other applications have moved to run within the Internet, so has SSO functionality.
Platforms like OneLogin that run in the cloud can then be categorized as a Software as a Service
(SaaS) SSO solution.
What is App-to-App SSO?
Lastly, you might have heard of App-to-App or Application-to-Application SSO. This is not
quite an industry standard yet. It is more of a term that has been used by SAPCloud to describe
the process of passing a user identity from one application to another within their ecosystem. It is
somewhat similar to OAuth 2.0 but again it is not a standard protocol or method and is currently
specific to SAPCloud.

Single Sign-On (SSO)


Single Sign-On (SSO) is an authentication method that lets users access multiple applications
and services using a single set of login credentials. SSO can help businesses improve user
satisfaction and productivity, strengthen access security, and reduce IT operations expense and
complexity.
Why Single Sign-On
Today’s digital workers rely on a wide variety of applications to perform their jobs, including
traditional enterprise applications hosted in corporate data centers, SaaS solutions running in the
cloud, and mobile apps for smartphones and tablets. Each application relies on distinct identity
management and access control mechanisms, which creates challenges for users, IT operations
teams, and information security and compliance organizations.
SSO Features, Functions, and Benefits
Single Sign-On solutions help businesses simplify user access, improve security, and streamline
IT operations by centralizing, automating, and unifying identity management and access control
functions for all applications and services. Modern SSO solutions support traditional applications
hosted in enterprise data centers, applications running in private or public clouds, and third-party
SaaS solutions like Salesforce and Box.
Modern SSO platforms also support various on-premises and cloud-based credential stores and directory
services platforms like Active Directory, LDAP, and Google Directory to centralize and unify operations.

What is Single Sign On (SSO), and what does it do?


Single Sign On, also known as SSO, allows users to have access to multiple applications by
signing in using only one existing account. SSO is most useful when there are multiple systems
that can be accessed using a password, and we want to prevent repeated authentication to them
each time the user is disconnected from a given service. This is highly convenient for users,
since, by identifying themselves just once, it is possible to maintain a valid session for the rest of
the applications which use SSO.
SSO aims to simplify the user experience on the Internet by completely facilitating session sign-
in tasks.
Using the Single Sign On identification system, it is possible to have multiple accesses with a
single account; for example, by signing in to Gmail we will have account level access to its
various web applications, such as Google Docs, Google Maps, Google Books, etc.

Types of Single Sign On (SSO) Authentication


Enterprise Single Sign On (E-SSO)
This type of system works as a primary authentication, intercepting login requests when required
by secondary applications in order to fill out the user and password fields. The E-SSO system
allows for interaction with other systems that may disable the login screen.
Web single sign-on (Web-SSO)
This type of solution only works with applications which can be accessed through the web, and
its goal is the authentication of a user on several applications without the need to get identified
again.
Access data is intercepted by a proxy server that performs the communication and then transfers
the result to the computer that requested it. Unidentified users are redirected to an authentication
service, returning a successful login.
Federated identity
This type of Single Sign On involves an identity management solution that uses established
standards to enable applications to identify clients without the need for redundant authentication.
Open ID
Open ID is a decentralised SSO process in which the user identity is stored at a URL that any
server can verify.

Single Sign On (SSO) Advantages and Disadvantages 


Advantages Disadvantages
Streamlines user access to their Using a single password increases the chances of
applications password vulnerability
Reduces the load of memorising several
When SSO fails, access to all related systems is lost
passwords
Easy to implement and connect to new
Identity spoofing in user external accesses
data sources
The steps of SSO include:
 First, a user goes to the website or application they want to access, which is the
service provider. 
 During the next step, the service provider sends a request and redirects users to the
SSO system. 
 The third step involves a user being prompted to provide credentials. 
 The credentials are validated, then sent back to the service provider to confirm the
authentication. The user then gets access to the application. 
What is Multi-Factor Authentication (MFA)?
Multi-factor Authentication (MFA) is an authentication method that requires the user to
provide two or more verification factors to gain access to a resource such as an application,
online account, or a VPN. MFA is a core component of a strong identity and access management
(IAM) policy. Rather than just asking for a username and password, MFA requires one or more
additional verification factors, which decreases the likelihood of a successful cyber attack.
Why is MFA Important?
The main benefit of MFA is it will enhance your organization's security by requiring your users
to identify themselves by more than a username and password. While important, usernames and
passwords are vulnerable to brute force attacks and can be stolen by third parties. Enforcing the
use of an MFA factor like a thumbprint or physical hardware key means increased confidence
that your organization will stay safe from cyber criminals.
How Does MFA work?
MFA works by requiring additional verification information (factors). One of the most common
MFA factors that users encounter are one-time passwords (OTP). OTPs are those 4-8 digit codes
that you often receive via email, SMS or some sort of mobile app. With OTPs a new code is
generated periodically or each time an authentication request is submitted. The code is generated
based upon a seed value that is assigned to the user when they first register and some other factor
which could simply be a counter that is incremented or a time value.
Three Main Types of MFA Authentication Methods
Most MFA authentication methodology is based on one of three types of additional information:
 Things you know (knowledge), such as a password or PIN
 Things you have (possession), such as a badge or smartphone
 Things you are (inherence), such as a biometric like fingerprints or voice recognition

How MFA helps prevent common cyberattacks


In 2020, cybercrime cost the world over $1 trillion, 37% of organizations were affected by
ransomware attacks, and 61% were affected by malware attacks. These facts show that
organizations have to deal with many serious cybercrimes. To protect their networks, systems
and data, they need robust cybersecurity controls and methods like Multi-Factor Authentication
(MFA).
But what types of cyberattacks does MFA protect against?

 Phishing
 Spear phishing
 Keyloggers
 Credential stuffing
 Brute force and reverse brute force
attacks
 Man-in-the-middle (MITM) attacks
What are cybersecurity standards?
Cybersecurity standards are collections of best practices created by experts to protect
organizations from cyber threats and help improve their cybersecurity posture.
Cybersecurity frameworks are generally applicable to all organizations, regardless of their size,
industry, or sector
Cybersecurity standards are collections of best practices created by experts to protect organizations
from cyber threats and help improve their cybersecurity posture. Cybersecurity frameworks are
generally applicable to all organizations, regardless of their size, industry, or sector.

Cyber Security Standards


 ISO 27001. This is one of the common standards that adhere to the organization to
implement an Information security management system. ...
 PCI DSS. PCI DSS stands for Payment Card Industry Data Security Standard. ...
 HIPAA. HIPAA stands for Health Insurance Portability and Accountability Act. ...
 FINRA. ...
 GDPR.
What is cybersecurity strategy?
A cybersecurity strategy is comprised of high-level plans for how an organization will go about
securing its assets and minimizing cyber risk. Much like a cybersecurity policy, the cybersecurity
strategy should be a living, breathing document adaptable to the current threat landscape and
ever-evolving business climate. Typically, cybersecurity strategies are developed with a three-to-
five-year vision but should be updated and revisited as frequently as possible.
While cybersecurity policies are more detailed and specific, cybersecurity strategies are more of
a blueprint for your organization to guide the key stakeholders as the company and business
environment evolve
Goals for your cyber strategy
One of the most critical goals for any cybersecurity strategy is achieving cyber resiliency.
Benefits of proactive cybersecurity
When it comes to managing risk, a proactive approach is always superior to a reactive one. But
being proactive, especially when new threats are discovered and detected at such an alarming
rate, is easier said than done.
IT security standards or cyber security standards
 Are techniques generally outlined in published materials that attempt to protect the cyber
environment of a user or organization.
 This environment includes users themselves, networks, devices, all software, processes,
information in storage or transit, applications, services, and systems that can be
connected directly or indirectly to networks.

The principal objective is to reduce the risks, including preventing or mitigating cyber-attacks.
The Cyber security provisions in this European standard are:
1. No universal default passwords 7. Ensure software integrity
2. Implement a means to manage reports of 8. Ensure that personal data is secure
vulnerabilities 9. Make systems resilient to outages
3. Keep software updated 10. Examine system telemetry data
4. Securely store sensitive security 11. Make it easy for users to delete user data
parameters 12. Make installation and maintenance of
5. Communicate securely devices easy
6. Minimize exposed attack surfaces 13. Validate input data

When you embrace proactive security, your organization will be positioned to:
 Ensure that cybersecurity aligns with your business vision
 Foster a security-conscious culture
 Understand your high-risk areas
 Implement an assessment program to identify risks, threats, and vulnerabilities
 Approach security beyond compliance
 Invest equally in prevention, detection, and response
How to develop a cybersecurity strategy: Step-by-step guide
A cybersecurity strategy isn't meant to be perfect, but it must be proactive, effective,
actively supported and evolving. Here are the four steps required to get there.
A cybersecurity strategy is a high-level plan for how your organization will secure its assets
during the next three to five years.
How do you build a cybersecurity strategy for your business?
Building a cybersecurity strategy for your business takes effort, but it could mean the difference
between surpassing your competitors and going out of business in the coming years. Here's the
basic steps you can follow to develop your strategy.
Step 1. Understand your cyber threat landscape
Before you can understand your cyber threat landscape, you need to examine the types of cyber
attacks that your organization faces today. Which types currently affect your organization the
most often and most severely: malware, phishing, insider threats or something else? Have your
competitors had major incidents recently, and if so, what types of threats caused them?
Step 2. Assess your cybersecurity maturity
Once you know what you're up against, you need to do an honest assessment of your
organization's cybersecurity maturity. Select a cybersecurity framework, like the NIST
Cybersecurity Framework. Use it first to assess how mature your organization is in dozens of
different categories and subcategories, from policies and governance to security technologies and
incident recovery capabilities. This assessment should include all of your technologies, from
traditional IT to operational technology, IoT and cyber-physical systems.
Step 3. Determine how to improve your cybersecurity program
Now that you know where you are and where you want to be, you need to figure out the
cybersecurity tools and best practices that will help you reach your destination. In this step, you
determine how to improve your cybersecurity program so that you achieve the strategic
objectives you've defined.
Step 4. Document your cybersecurity strategy
Once you have management approval, you need to ensure your cybersecurity strategy is
documented thoroughly. This includes writing or updating risk assessments, cybersecurity plans,
policies, guidelines, procedures and anything else you need to define what is required or
recommended in order to achieve the strategic objectives. Making it clear what each person's
responsibilities are is key.
What is Cyber Security Culture?
The concept of cyber security culture refers to the attitudes, knowledge, assumptions, norms
and values of the workforce of an organisation with respect to cyber security. These are shaped
by the goals, structure, policies, processes, and leadership of the organisation.
A good cyber security culture is one in which both the organisational determinants of culture
(policy, process, leadership, social norms etc.) and the individual determinants of culture
(attitudes, knowledge, assumptions etc.) align with the organisation’s approach to cyber security,
manifesting in cyber security conscious behaviours.
Why is it important to invest in a good cyber security culture?
A cyber-savvy mindset and cyber secure culture help deliver growth through digital trust,
improve an organisation’s reputation with customers and build employee pride. They create an
environment where good cyber hygiene becomes standard practice so the whole organisation can
operate more securely with less effort, freeing up time and energy for the core business.
What Are the Top Five Cybercrimes?
#1 Phishing
Phishing refers to emailing or contacting someone by pretending to belong to a well-known and
famous organization. Cybercriminals use phishing to lure people into providing sensitive
information like credit card details and addresses. Some other forms of phishing include
smishing (SMS phishing) and vishing (video phishing). 
#2 Cyber Extortion
Cyber extortion is a crime where someone holds your data hostage till your company pays the
ransom. Cybercriminals gain access to your computers and steal confidential data. They often
gain this access by sending suspicious emails containing malware—malicious software—that
hijacks your computer. They can resort to blackmail, denial of service, locking you out of your
system, and more.
To keep your company safe from cyber extortion, you can opt for cyber liability insurance,
install anti-virus software, maintain numerous data backups, and educate your employees.
#3 Data breach
Data breaches can happen by accident or intentionally. Poor technological firewalls and
reckless employee behavior can result in a data breach. Often, hackers use phishing emails and
malware to steal sensitive and confidential information, resulting in a data breach.
#4 Identity theft
Identity theft happens when a person pretends to be someone else to commit fraud.
Cybercriminals steal your personal information, like identity cards, credit cards and the like, to
make transactions. The most common type of identity theft is financial identity theft. There are
also other types, like medical identity theft, child identity theft and more. 
Often, criminals find your paper receipts containing bank details and use them to commit identity
theft. To avoid that, shift to using digital financial statements across your company. For the
things that have to be in paper form, use a quality shredder to ensure that you dispose of them
safely. Additionally, have strong passwords and ensure that only a select few have access to all
company files. You don’t need to share every single piece of information with each employee. 
#5 Harassment
Harassment takes on many forms for small businesses. For instance, in April 2021, singer Demi
Lovato came under fire for harassing a local frozen yogurt shop on Instagram. She accused them
of triggering her “eating disorder” by placing the sugary yogurt options before the vegan ones.
There was also another instance of a woman bullying a Houston cafe online for speaking up
against the Texas abortion law. Harassment hurts the business’ reputation and often leaves a
mental scar on the person being harassed.To protect your team from harassment, you must have
a stringent anti-harassment policy in place. 

What is Vulnerability.
Vulnerability describes the characteristics and circumstances of a community, system or
asset that make it susceptible to the damaging effects of a hazard. There are many aspects of
vulnerability, arising from various physical, social, economic, and environmental factors.
Vulnerability is the inability to resist a hazard or to respond when a disaster has occurred. For
instance, people who live on plains are more vulnerable to floods than people who live higher up.
In actual fact, vulnerability depends on several factors, such as people's age and state of health,
local environmental and sanitary conditions, as well as on the quality and state of local buildings
and their location with respect to any hazards.

Examples may include:


 poor design and construction of buildings, 
 inadequate protection of assets,
 lack of public information and awareness,
 limited official recognition of risks and preparedness measures, and
 disregard for wise environmental management. 
There are four (4) main types of vulnerability:
1. Physical Vulnerability may be determined by aspects such as population density levels,
remoteness of a settlement, the site, design and materials used for critical infrastructure and
for housing (UNISDR).
Example: Wooden homes are less likely to collapse in an earthquake, but are more vulnerable to
fire.
2. Social Vulnerability refers to the inability of people, organizations and societies to with stand
adverse impacts to hazards due to characteristics inherent in social interactions, institutions and
systems of cultural values. It is linked to the level of well being of individuals, communities and
society. It includes aspects related to levels of literacy and education, the existence of peace and
security, access to basic human rights, systems of good governance, social equity, positive
traditional values, customs and ideological beliefs and overall collective organizational systems
(UNISDR).
Example: When flooding occurs some citizens, such as children, elderly and differently-able,
may be unable to protect themselves or evacuate if necessary.
3. Economic Vulnerability. The level of vulnerability is highly dependent upon the economic
status of individuals, communities and nations The poor are usually more vulnerable to disasters
because they lack the resources to build sturdy structures and put other engineering measures in
place to protect themselves from being negatively impacted by disasters. 
Example: Poorer families may live in squatter settlements because they cannot afford to live in
safer (more expensive) areas.
4. Environmental Vulnerability. Natural resource depletion and resource degradation are key
aspects of environmental vulnerability.
Example: Wetlands, such as the Caroni Swamp, are sensitive to increasing salinity from sea
water, and pollution from stormwater runoff containing agricultural chemicals, eroded soils, etc.
What is Risk
Risk (or more specifically, disaster risk) is the potential disaster losses (in terms of lives, health
status, livelihoods, assets and services) which could occur to a particular community or a society
over some specified future time period.
Risk can be calculated using the following equation: Risk = Probability of Hazard x Degree of
Vulnerability.
There are different ways of dealing with risk, such as:
Risk Acceptance: an informed decision to accept the possible consequences and
likelihood of a particular risk.
Risk Avoidance: an informed decision to avoid involvement in activities leading to risk
realization.
Risk Reduction refers to the application of appropriate techniques to reduce the
likelihood of risk occurrence and its consequences.
Risk Transfer involves shifting of the burden of risk to another party. One of the most
common forms of risk transfer is Insurance.
computer security, also called cybersecurity, the protection of computer systems and information from
harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used
to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms

A computer virus is a malicious piece of computer code designed to spread from device to device. A
subset of malware, these self-copying threats are usually designed to damage a device or steal data.

Types of Computer Viruses

 Boot Sector Virus. Your computer drive has a sector solely responsible for pointing to the
operating system so that it can boot into the interface. ...
 Web Scripting Virus. ...
 Browser Hijacker. ...
 Resident Virus. ...
 Direct Action Virus. ...
 Polymorphic Virus. ...
 File Infector Virus. ...
 Multipartite Virus.

What is the meaning of single sign on?


Single sign-on (SSO) is an authentication method that enables users to securely authenticate
with multiple applications and websites by using just one set of credentials.

What is an example of multifactor authentication?


What are multi-factor authentication examples? A common example of multi-factor
authentication is using a password together with a code sent to your smartphone to
authenticate yourself. Another example is using a combination of a card (something you have)
and a PIN (something you know)
What are the two most commonly used authentication factors in multifactor
authentication?
Two-factor authentication methods rely on a user providing a password as the first factor and a
second, different factor -- usually either a security token or a biometric factor, such as a
fingerprint or facial scan
How MFA helps prevent common cyberattacks

 Phishing.
 Spear phishing.
 Keyloggers.
 Credential stuffing.
 Brute force and reverse brute force attacks.
 Man-in-the-middle (MITM) attacks.

What is Computer
Security?
The meaning of the term computer security has evolved in recent years. Before the problem of
data security became widely publicized in the media, most people’s idea of computer security
focused on the physical machine.

Traditionally, computer facilities have been physically


protected for three reasons:
• To prevent theft of or damage to the hardware
• To prevent theft of or damage to the information
• To prevent disruption of service

You might also like