ICT 3rd Sem Unit 3
ICT 3rd Sem Unit 3
Internet Security
Internet security refers to the practices, tools, and measures used to protect computers,
networks, and data from unauthorized access, attacks, and damage via the internet. It
involves safeguarding information from cyber threats such as viruses, hackers, data
breaches, and malicious activities.
Email security
Email security refers to measures and practices used to protect email accounts, messages,
and attachments from unauthorized access, theft, or misuse. It involves preventing threats
like phishing, malware, and hacking, ensuring that sensitive information remains private and
safe while using email for communication. This includes using strong passwords,
encryption, and anti-virus tools to safeguard emails from potential risks.
Internet security threats are various risks that target users, systems, and networks online,
leading to data theft, damage, or loss. Some of the most common internet security threats
include:
1. Malware: This includes harmful software such as viruses, worms, and ransomware
that can damage a system, steal data, or lock files until a ransom is paid.
2. Phishing: Cybercriminals use fake emails or websites to trick people into revealing
sensitive information, such as passwords or credit card numbers, by pretending to be
trusted organizations.
3. Man-in-the-Middle (MITM) Attacks: In these attacks, an attacker secretly intercepts
or alters communication between two parties, often to steal personal information like
login details.
4. Denial of Service (DoS) and Distributed Denial of Service (DDoS): These attacks flood
a website or server with excessive traffic to make it unavailable to users, disrupting
services.
5. SQL Injection: Attackers insert malicious code into a website’s database to access or
manipulate sensitive data, such as user information or financial records.
6. Spyware: This software secretly tracks a user’s online activities, often collecting
personal data or browsing habits without the user’s knowledge.
7. Keyloggers: Programs that record every keystroke a user makes, potentially capturing
sensitive information like passwords, credit card numbers, and personal messages.
1. Firewalls
A firewall acts as a barrier between trusted internal networks and untrusted external
networks (like the internet). It monitors and controls incoming and outgoing traffic based on
security rules, blocking unauthorized access and preventing attacks.
2. Multi-factor Authentication (MFA)
MFA enhances security by requiring two or more verification methods to access an account
or system. These can include something you know (password), something you have (mobile
device), or something you are (fingerprint or facial recognition).
3. URL Filtering
URL filtering restricts access to specific websites based on their content or security
reputation. It is commonly used to block malicious or harmful sites that could lead to
malware infection or phishing.
DLP involves strategies and tools to prevent unauthorized access, use, or transmission of
sensitive data, ensuring it is not lost, stolen, or leaked outside the organization.
5. Email Security
(As explained earlier) It protects emails from malicious threats like phishing, malware, and
unauthorized access. It can include encryption, spam filters, and secure email gateways to
ensure privacy and data integrity.
10 marks or 5 marks
Virus:
A computer virus is a type of software designed to cause harm to your computer. It can copy
itself and spread to other files or even other computers. Viruses often attach themselves to
files, programs, or emails. When you open or run these infected files, the virus activates and
can damage your system by deleting or corrupting files, slowing down your computer, or
stealing personal information. To spread, a virus usually relies on you or others to
unknowingly share infected files or links.
How Do Computer Viruses Attack and Spread?
In the early days of computers, viruses were spread between devices using floppy disks.
Nowadays, viruses can still be spread via hard disks and Universal Serial Bus (USB) devices,
but they are more likely to be passed between devices through the internet.
Computer viruses can be spread via email, with some even capable of hijacking email
software to spread themselves.
1. File Infector Virus: Attaches itself to executable files (like .com files). When the infected
file is run, the virus spreads and can corrupt or delete files.
2. Macro Virus: Infects documents or files that contain macros (e.g., Word or Excel files). It
activates when the document is opened and can spread to other documents.
3. Boot Sector Virus: Infects the boot sector of a computer's hard drive or USB drives. It can
prevent the computer from starting up properly.
4. Polymorphic Virus: Changes its code or appearance each time it spreads to avoid
detection by antivirus software. This makes it harder to detect and remove.
6. Trojan Horse: Appears as a legitimate program or file but contains malicious code that,
once run, can steal data, damage files, or allow unauthorized access.
7. Worm: Unlike viruses, worms do not require a host file. They self-replicate and spread over
networks, often causing network congestion and damage.
Antivirus Software
Antivirus software (computer protection software) is a program(s) that is created to search,
detect, prevent and remove software viruses from your system that can harm your system.
Other harmful software such as worms, adware, and other threats can also be detected and
removed via antivirus. This software is designed to be used as a proactive approach to cyber
security, preventing threats from entering your computer and causing issues. Most antivirus
software operates in the background once installed, providing real-time protection against
virus attacks.
A digital signature is an electronic signature that can be used to authenticate the identity of the
sender of a message or the signer of the document, and possibly to ensure that the original
content of the message or document that has been sent is unchanged. The basic idea behind the
Digital Signature is to sign a document. When we send a document electronically, we can also
sign it. Digital signature uses public and private keys to encrypt and decrypt data.
• Public key– Key which is known to everyone. Ex-public key of A is 7, this information is
known to everyone.
• Private key– Key which is only known to the person who’s private key it is.
The Government of India (GOI) has launched several digital initiatives to improve the quality
of higher education, promote online learning, and make educational resources more
accessible. These initiatives include:
1. SWAYAM: SWAYAM (Study Webs of Active Learning for Young Aspiring Minds)
is an online platform that offers free online courses for students in various
subjects, including engineering, science, humanities, and social sciences. It
aims to achieve the goal of education for all by providing high-quality learning
resources.
SWAYAM (Study Webs of Active Learning for Young Aspiring Minds) is an ambitious initiative
by the Government of India aimed at achieving the goal of inclusive and accessible
education for all. Launched under the Ministry of Education, SWAYAM offers free online
courses across a wide range of subjects, ensuring that quality education is available to
learners from all backgrounds, regardless of their geographical location or economic status.
- SWAYAM offers over 2,000 courses across various disciplines, including engineering, law,
medicine, management, social sciences, humanities, arts, and more.
- Courses range from basic level to advanced, covering both undergraduate and
postgraduate curriculum, along with diploma courses.
2. Quality Content:
- The courses are designed and delivered by experienced faculty from some of India’s top
universities and institutions, such as IITs, IIMs, and IISc.
- Content includes video lectures, reading materials, quizzes, assignments, and discussion
forums, ensuring an all-rounded learning experience.
3. Free Access to Learning:
4. Personalized Learning:
- The platform offers a self-paced learning environment, where learners can go through
courses at their own speed and convenience, making it easier for working professionals,
students, and anyone looking to upskill.
5. Certification:
- Certificates are issued by the respective course providers, often from prestigious
institutions, which are recognized in academia and industry.
- SWAYAM includes features like discussion forums, peer interaction, assignments, and
quizzes that promote active engagement.
- The interactive nature of the platform helps students clarify doubts, interact with peers
and instructors, and enhance their learning.
- SWAYAM aims to reach learners from remote and rural areas who may not have easy
access to physical learning resources or high-quality institutions.
Firewalls serve as the first line of defense against external threats, such as hackers and
malware attacks. In particular, firewalls combined with an intrusion prevention system (IPS)
are crucial in preventing malware and certain application layer attacks.
Firewalls first emerged in the early days of the internet when networks needed new security
methods that could handle increasing complexity.
Cryptography
In Cryptography, the techniques that are used to protect information are obtained
from mathematical concepts and a set of rule-based calculations known as algorithms to
convert messages in ways that make it hard to decode them. These algorithms are used for
cryptographic key generation, digital signing, and verification to protect data privacy, web
browsing on the internet and to protect confidential transactions such as credit card and
debit card transactions.
Features Of Cryptography
• Confidentiality: Information can only be accessed by the person for
whom it is intended and no other person except him can access it.
• Integrity: Information cannot be modified in storage or transition
between sender and intended receiver without any addition to
information being detected.
• Non-repudiation: The creator/sender of information cannot deny his
intention to send information at a later stage.
• Authentication: The identities of the sender and receiver are
confirmed. As well destination/origin of the information is confirmed.
• Interoperability: Cryptography allows for secure communication
between different systems and platforms.
• Adaptability: Cryptography continuously evolves to stay ahead of
security threats and technological advancements.
Copyright is a legal protection given to creators of original works, like books, music, art,
movies, and software. It gives them exclusive rights to use, reproduce, distribute, and display
their work, typically for a limited time. Copyright helps creators control how their work is
used, allowing them to earn from it while preventing unauthorized use or copying.
Copyright issues in ICT focus on protecting creators’ rights over digital content, software,
and media. These issues arise when people use or share such content without permission,
which can harm creators’ income and control over their work.
3. Content Sharing on Social Media: Users often post images, videos, and music
without permission, leading to copyright disputes. Social media platforms
must monitor and respond to copyright claims, but this remains challenging.
5. Fair Use Confusion: “Fair use” permits some use of copyrighted content for
education, commentary, and research, but its boundaries are unclear online,
creating disputes.
7. AI-Generated Content: AI can generate music, art, and text, but ownership is
unclear—whether it belongs to the creator of the AI, the user, or no one, as
copyright laws haven’t fully addressed AI-generated works yet.
10. Write about virtual labs
5 marks
Virtual labs are online platforms that simulate real-world lab environments. They allow
students and professionals to practice skills, experiment with tools, and conduct IT-related
activities like programming, network configuration, cybersecurity, and hardware
diagnostics, all from a web browser.
Virtual Labs is a project initiated by the Ministry of Education, Government of India, under
the National Mission on Education through Information and Communication Technology.
The project aims to provide remote access to Laboratories in various disciplines of Science
and Engineering for students at all levels from undergraduate to research.
Virtual Labs do not require any additional infrastructural setup for conducting
experiments at user premises. One computer terminal with broadband Internet connectivity
is all that is needed to perform the experiments remotely.
1. Accessibility: Users can access labs anytime, anywhere, reducing the need for physical
lab space and expensive equipment.
2. Cost-Effectiveness: Virtual labs are typically more affordable than physical labs, as they
don’t require hardware, software installations, or maintenance.
3. Hands-On Learning: They offer practical experience, allowing learners to try real-world
scenarios and projects.
4. Safety: Users can experiment in a risk-free environment. Mistakes can be reset easily,
which is especially useful in fields like cybersecurity.