0% found this document useful (0 votes)
19 views24 pages

Safely Accessing Website

The document discusses various threats to computer security, including malware, viruses, spyware, adware, spamming, eavesdropping, phishing, and pharming. It outlines the damage caused by these threats and provides solutions for protection, such as using antivirus software and preventive measures. Additionally, it explains the differences between HTTP and HTTPS, emphasizing the importance of secure connections for online safety.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views24 pages

Safely Accessing Website

The document discusses various threats to computer security, including malware, viruses, spyware, adware, spamming, eavesdropping, phishing, and pharming. It outlines the damage caused by these threats and provides solutions for protection, such as using antivirus software and preventive measures. Additionally, it explains the differences between HTTP and HTTPS, emphasizing the importance of secure connections for online safety.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Online Access and

Computer Security
✓ Introduction
✓ Threats to Computer Security
✓ Solutions to Computer Security threats
Threats to Computer Security
• A t hr eat is potential violation of security
• When a t h r e a t is actually executed, i t
becomes attack.
• Those who execute such actions, or cause
t h e m t o be executed are called attackers.

Malware:
Malware( short for “malicious software”) is a file or code, typically
delivered over a network, that infects, explores steals or conducts
virtually any behaviour an attacker wants.
Common threats
❖ Viruses (Worms, Trojans)

❖ Spyware
❖ Adware
❖ Spamming
❖ PC Intrusion (Denial of Service, Sweeping, Password Guessing)
❖ Phishing
Computer Viruses
• Are the malicious code/programs t h a t cause
damage t o data and files on a system.
• I t can attack any p a r t of computer system
like boot block, OS, system areas, files and
applications.
• 2 other similar programs also cause virus
like effects :
• Worms
• Trojans
Worms
• A w o r m is a self-replication programs which
eats up the entire disk space or memory. A
Wo r m keeps on creating its copies until all
the disk space or m e m o r y is filled.
• Worms h a r m t o a computer or a computer
net wor k by consuming bandwidth and slow
down the net wor k speed. A f t e r the w o r m
has infected a system, i t can propagate t o
other systems via internet or while copying
files f r o m one system t o another wit hout
user interaction.
Trojan Horses
• Is a program t h a t appears harmless (such as text
editor or a u t i l i t y program) but actually
performs malicious functions such as deleting or
damaging files.

• With help of Trojan, h a r m t h a t could be done by


hacker on target computer systems are:
• Data t h e f t
• Installation of unwanted softwares
• Keystroke logging
• Downloading or uploading of files. A n d m a n y more…
Damaged Caused by Viruses
• Damage or delete files : some viruses m a y
delete or damage r andom documents or
specific files t h a t are crucial t o you OS.
• Slow down your Computer
• Invade your email programs : some forms of
viruses m a y wreak even more havoc by
spreading themselves t o the contact in your
address book.
Spyware
• Is a software which is installed on your
computer t o spy on your activities and
r epor t this data t o people willing t o pay for
it.
• Spyware mostly get installed on your PC
w it h o ut your consent. They gets installed
when you visit any illegitimate website or
download music, videos etc.
Damage caused by Spyware
• Compromise you data, computing habits and
identity: i t can m o n i t o r information about your
computing habits like w h a t websites you visit,
record your keystroke (user name, password,
credit card number) which in the end can lead
to identity theft.
• Alter PC Settings: can alter settings like web
browser home page, placement of desktop icons,
which m a y be annoying
• Slows down you PC: can slows down system and
Internet speed and become big problem when
you are t r y i n g to use the programs on your PC,
watch videos online or downloading large files.
Adware
• Programs t h a t deliver unwanted ads t o your
computer generally in popups. They consume
bandwidth. Similar t o spyware but i t m a y
be installed w i t h your consent. Damages are:
• Adware tracks information like spyware

• Display arrays of annoying advertising

• Slows down you PC


Spamming
• Means sending of bulk - mail by an identified
or unidentified source. In non-malicious
f o r m , bulk advertising mail is sent t o m a n y
accounts. In malicious form (email
bombarding) the attackers keeps on sending
bulk mail until the mail-server runs out of
disk space. Damages are:
• Spam reduces productivity: billions of spam messages
circulating across the Internet can disrupt email
delivery, degrade system performance and reduce
overall productivity
Spamming
• Spam eats up your time: deleting spam emails like the
simple solutions, but i t eats a significant amount of
productivity
• Spam can lead to worse things: spam messages may
contain offensive, fraudulent material and can even
be used to spread viruses.
Eavesdropping
• Do you ever find t h a t when you are talking t o
someone else, another person is secretly t r y i n g to
listen t o your talks? What t h a t person is doing is
'eavesdropping'. tfave you ever tri ed t o secretly
listen to the conversation between t w o teachers
regarding your class? If yes, then w h a t you have
done is 'eavesdropping'.

• In context of network security Eavesdropping


refers t o unauthorized access to another person's
or organization's data while the data is on its
way on the network.
Eavesdropping
• This m a y be done in a number of ways:
• By setting up parallel telephone lines.

• By installing some software (spyware) in the


target computer.
• By installing some receiver which captures the
data while on its way .
Phishing
• I t is criminally fraudulent process of
a t t e m pt i n g t o acquire sensitive information
such as usernames, passwords, credit card
information, CVV number etc. In phishing an
imposter uses an authentic looking email or
web-site t o t r i c k recipients into giving out
sensitive personal information. For example
an email asking t o update your bank details
by clicking on a link or an email regarding
lucky winner of some amount.
Pharming
• Is an attack in which a hacker attempts t o
redirect a website’s traffic to another bogus
website. Through pharming attack, the
attacker points you to malicious and
illegitimate website by redirecting the
legitimate URL. Even if the URL is entered
correctly, i t can still be redirected t o fake
website.
Solutions to Computer Security Threats

• There are 2 ways of safeguarding our


computer system:
• Active Protection: installing and properly using an
antivirus software t h a t includes internet security
which include protection against threats such as
viruses, Sypware and PC intrusions – is vital for
proper protection against the hackers, intruders
and wrongdoers
• Preventive Measures: even though security
programs m a y actively detect and eliminate any
threats your PC encounters, you should always
help to prevent these issues f r o m ever arising.
Solutions to Virus, Adware and
Spyware
Active Protection Preventive measures
Use Anti-Virus and An t i - ✓ Keep you system up-to-
spyware software date Use Caution when
✓ scan all you system for virus downloading files on the
✓ disconnect infected system Internet
immediately f r o m you ✓ Be Careful with email
network ✓ Don’t download or open
✓ Restore the infected system unsolicited email
f r o m clean backup attachments
✓ Notify your antivirus ✓ Don’t click on link in email
vendors so i t can ensure its rat her type the URL on
signature database is u p - address bar
to-date ✓ Check for security alerts
Download updates regularly ✓ Disable running of scripts
Run frequent full system scan and cookies
✓ Disconnect form the
i n t e r n e t w hen you are away
✓ Disable cookie if possible
Solutions to Spam, Eavesdropping
Active Protection Preventive measures
Use Anti-Spam Software ✓ Keep you email address
(i) Sender Filtering: this private
method allows only messages ✓ Use encrypted connection
f r o m your approved sender always if you have to provide
list t o reach you inbox- all sensitive information i.e.
other mail is quarantined for HTTPs
later review. I t is done on ✓ Install personal firewall on
the basis of Digital computer connected to the
Certificates ( specially Internet to check incoming
formatted digital and outgoing information and
information issued to connections
website, are used t o verify ✓ Avoid online transaction from
the identify of message public network or public
sender) and Digital Wi-Fi
Signatures ( are way of ✓ Install protection software
authenticating the ident it y such as Internet Security
of creators or producers of software
digital information
Keyword Filtering
Solution to Phishing and Pharming
Active Protection Preventive measures
✓ Take the computer offline (it ✓ Don’t open emails from
may reduce the probability of unknown sources or click on
infecting other devices in the links embedded in suspect
same network with malware) messages
✓ Backup all files on the hard ✓ Check security guidelines of
drive website such as PayPal so that
✓ List the information given to you can distinguish between
phishing scammers legitimate and bogus emails
(depending on what was ✓ Also rather than clicking on
leaked one may need to link you can type general link
change password, block on you web browser. If you are
credit/debit card, BUT in double DON’T CLICK
DON’T USE THE SAME
COMPUTER TO CONTACT
AGENCIES)
✓ Run Antivirus software
✓ Contact credit agencies for any
possibilities of identity theft.
HTTP Vs HTTPS
HTTPS
When you request an HTTPS connection to a web page, the website will initially send
its SSL( Secure Socket Layer) certificate to your browser. This certificate contains the
public key needed to begin the secure session. Based on this initial exchange, your
browser and the website then initiate the SSL handshake. The SSL handshake involves
the generation of shared secrets to establish a uniquely secure connection between
yourself and the website.
When a trusted SSL Digital Certificate is used during a HTTPS connection, users will see
a padlock icon in the browser address bar. When an Extended Validation Certificate is
installed on a website, the address bar will turn green. In HTTPS all communications
are securely encrypted.

HTTP
All the communications sent over regular HTTP connections are in ‘plain text’ and can
be read by any hacker that manages to break into the connection between your
browser and the website. This presents a clear danger if the ‘communication’ is on an
order form and includes credit card details or social society number.
Important Questions to Prepare
1. What is an IP address?
2. What is social networking?
3. Write down names of any 4 social networking sites and explain their purpose.
4. What are the merits and demerits of social networking sites?
5. What is Cyber Trolling?
6. Write down the medium/ways of trolling.
7. What is Cyber Stalking?
8. Write down the medium/ways of trolling. Ans: YouTube video comments, Blog
comments, Forums, Email, FB, Twitter, Instagram, Social Networking sites and
Anonymous ways of networking.
9. Name three data security concepts
Ans: The three concepts are encryption, user authentication and data backup.
10. What is personal information?
Ans: Personal information is the information that identifies you or could identify you. For
example, your name or address.
11. What is information technology security?
Ans: IT security is a term which is concerned with the protection of hardware, software
and a network of an organization, from the perils of disaster and external
attacks(through virus,hacking,etc.)
12. What do you mean by a hacker?
Ans: A hacker is an expert computer programmer who enjoys finding out the inner workings
of computer systems or networks. Some have a reputation of using their expertise to illegally
break into secure programs in computers hooked up to the internet or other networks.
13. What is social media?
The term social media refers to web and mobile technologies and the practice to share
content, opinions, insights, experiences and perspective online. There are many prominent
examples of social media platforms, including Facebook, Twitter, YouTube , Linkedln and
blogging sites, among others.
14. Define 5 methods to prevent identity theft.
(i) Never share your password or account numbers over email or instant messaging.
(ii) Do not follow links from emails while conducting financial transactions; instead enter the
URL yourself.
(iii) Be wary of callers, pop-ups, websites, or emails asking for personal information.
(iv) Look for “https” or a padlock icon before doing any financial transactions in a website.
(v) Install firewall, anti-spyware and anti-virus software and update it often.
15. What is the purpose of web browsers?
Web browser is used to run the software application that allows retrieving, presenting and
traversing information from one place to another.
• Web browser provides resources using the WWW(World Wide Web). This can be
identified by URI(Uniform Resource Identifier)
• It fetches data like web page, image, video or other piece of content from the server and
displays accordingly.
17. Define Cyber safety.
18. What is private browsing?
19. Write at least four tips of Cyber safety
20. What do you mean by cyber crime?
21. What is the role of firewall?
22. Define digital footprint.
23. Define cookies.
24. How do websites track us?
25. What do you mean by the following terms
Virus, Worms, Malware, Trojan horse, spyware, adware, Cyber forensics.
26. Why do we need a secure connection while doing net banking?
27. How will you identify from a URL whether the website you are visiting is safe or
not?
28. Differentiate between http and https.
29. What is cyber law? (IT Act 2000)
30. Analyze any two cyber prevention and protection methods.

You might also like