Safely Accessing Website
Safely Accessing Website
Computer Security
✓ Introduction
✓ Threats to Computer Security
✓ Solutions to Computer Security threats
Threats to Computer Security
• A t hr eat is potential violation of security
• When a t h r e a t is actually executed, i t
becomes attack.
• Those who execute such actions, or cause
t h e m t o be executed are called attackers.
Malware:
Malware( short for “malicious software”) is a file or code, typically
delivered over a network, that infects, explores steals or conducts
virtually any behaviour an attacker wants.
Common threats
❖ Viruses (Worms, Trojans)
❖ Spyware
❖ Adware
❖ Spamming
❖ PC Intrusion (Denial of Service, Sweeping, Password Guessing)
❖ Phishing
Computer Viruses
• Are the malicious code/programs t h a t cause
damage t o data and files on a system.
• I t can attack any p a r t of computer system
like boot block, OS, system areas, files and
applications.
• 2 other similar programs also cause virus
like effects :
• Worms
• Trojans
Worms
• A w o r m is a self-replication programs which
eats up the entire disk space or memory. A
Wo r m keeps on creating its copies until all
the disk space or m e m o r y is filled.
• Worms h a r m t o a computer or a computer
net wor k by consuming bandwidth and slow
down the net wor k speed. A f t e r the w o r m
has infected a system, i t can propagate t o
other systems via internet or while copying
files f r o m one system t o another wit hout
user interaction.
Trojan Horses
• Is a program t h a t appears harmless (such as text
editor or a u t i l i t y program) but actually
performs malicious functions such as deleting or
damaging files.
HTTP
All the communications sent over regular HTTP connections are in ‘plain text’ and can
be read by any hacker that manages to break into the connection between your
browser and the website. This presents a clear danger if the ‘communication’ is on an
order form and includes credit card details or social society number.
Important Questions to Prepare
1. What is an IP address?
2. What is social networking?
3. Write down names of any 4 social networking sites and explain their purpose.
4. What are the merits and demerits of social networking sites?
5. What is Cyber Trolling?
6. Write down the medium/ways of trolling.
7. What is Cyber Stalking?
8. Write down the medium/ways of trolling. Ans: YouTube video comments, Blog
comments, Forums, Email, FB, Twitter, Instagram, Social Networking sites and
Anonymous ways of networking.
9. Name three data security concepts
Ans: The three concepts are encryption, user authentication and data backup.
10. What is personal information?
Ans: Personal information is the information that identifies you or could identify you. For
example, your name or address.
11. What is information technology security?
Ans: IT security is a term which is concerned with the protection of hardware, software
and a network of an organization, from the perils of disaster and external
attacks(through virus,hacking,etc.)
12. What do you mean by a hacker?
Ans: A hacker is an expert computer programmer who enjoys finding out the inner workings
of computer systems or networks. Some have a reputation of using their expertise to illegally
break into secure programs in computers hooked up to the internet or other networks.
13. What is social media?
The term social media refers to web and mobile technologies and the practice to share
content, opinions, insights, experiences and perspective online. There are many prominent
examples of social media platforms, including Facebook, Twitter, YouTube , Linkedln and
blogging sites, among others.
14. Define 5 methods to prevent identity theft.
(i) Never share your password or account numbers over email or instant messaging.
(ii) Do not follow links from emails while conducting financial transactions; instead enter the
URL yourself.
(iii) Be wary of callers, pop-ups, websites, or emails asking for personal information.
(iv) Look for “https” or a padlock icon before doing any financial transactions in a website.
(v) Install firewall, anti-spyware and anti-virus software and update it often.
15. What is the purpose of web browsers?
Web browser is used to run the software application that allows retrieving, presenting and
traversing information from one place to another.
• Web browser provides resources using the WWW(World Wide Web). This can be
identified by URI(Uniform Resource Identifier)
• It fetches data like web page, image, video or other piece of content from the server and
displays accordingly.
17. Define Cyber safety.
18. What is private browsing?
19. Write at least four tips of Cyber safety
20. What do you mean by cyber crime?
21. What is the role of firewall?
22. Define digital footprint.
23. Define cookies.
24. How do websites track us?
25. What do you mean by the following terms
Virus, Worms, Malware, Trojan horse, spyware, adware, Cyber forensics.
26. Why do we need a secure connection while doing net banking?
27. How will you identify from a URL whether the website you are visiting is safe or
not?
28. Differentiate between http and https.
29. What is cyber law? (IT Act 2000)
30. Analyze any two cyber prevention and protection methods.