Chapter 12 12th Security Aspects
Chapter 12 12th Security Aspects
Security Aspects
Question 1
Question 2
What is a computer virus ? Name some computer viruses that were popular in recent
years.
Answer
A computer virus is a piece of software code created to perform malicious activities
and hamper resources of a computer system like CPU time, memory, personal files, or
sensitive information. It infects other computer systems that it comes into contact with
by copying or inserting its code into the computer programs or software (executable
files).
Some computer viruses that were popular in recent years are CryptoLocker,
ILOVEYOU, MyDoom, Sasser and Netsky, Slammer, Stuxnet, etc.
Question 3
Question 4
Question 6
Question 7
Briefly explain two threats that may arise due to a keylogger installed on a computer.
Answer
Two threats that may arise due to a keylogger installed on a computer are :
Question 8
Question 9
Question 10
1. Using antivirus, anti-malware, and other related software and updating them on a
regular basis.
2. Configure browser security settings.
3. Always check for a lock button in the address bar while making payments.
4. Never use pirated or unlicensed software. Instead go for Free and Open Source
Software (FOSS).
5. Applying software updates and patches released by its manufacturers.
6. Taking a regular backup of important data.
7. Enforcing firewall protection in the network.
8. Avoid entering sensitive (passwords, pins) or personal information on unknown or
public computers.
9. Avoid entering sensitive data on an unknown network (like Wi-Fi in a public
place) using personal computer also.
10. Avoid clicking on links or downloading attachments from unsolicited emails.
11. Scan any removable storage device with an antivirus software before
transferring data to and from it.
12. Never share our online account or banking password/pins with anyone.
13. Remove all the programs that we don’t recognise from our system.
14. Do not install an anti-spyware or antivirus program presented to us in a
pop-up or ad.
15. Use the pop-up window's 'X' icon located on the top-right of the popup to
close the ad instead of clicking on the 'close' button in the pop-up. If we notice an
installation has been started, cancel immediately to avoid further damage.
Question 12
Q13 What are the risks associated with HTTP ? How can we resolve these risks by
using HTTPS ?
Answer
HTTP sends information over the network in plain text, leaving it vulnerable to attacks
from hackers who can intercept and manipulate the data. On the other hand, HTTPS
encrypts the data before transmission and requires SSL (Secure Sockets Layer) or
TLS (Transport Layer Security) protocols, along with an SSL digital certificate, to
ensure secure communication between the client and server.
Q14 List one advantage and disadvantage of using Cookies.
Answer
The advantage of using cookies is :
Cookies are used by websites to store browsing information of the user, which helps in
enhancing the user experience and making browsing time more productive.
The disadvantage of using cookies is :
Some third-party cookies might share user data without the user's consent for
advertising or tracking purposes.
Q 15 Write a short note on White, Black, and Grey Hat Hackers.
Answer
1. White Hat Hackers — If a hacker uses their knowledge to find and help fix
security flaws in the system, they are termed as White Hat hackers or Ethical
Hackers. These hackers have good intentions and are actually security experts.
Organizations hire these hackers to check and fix their systems for potential
security threats and loopholes. Technically, white hats work against black hats.
2. Black Hat Hackers — If hackers use their knowledge unethically to break the
law and disrupt security by exploiting the flaws and loopholes in a system, then
they are called black hat hackers or Crackers.
3. Grey Hat Hackers — These are a class of hackers who are neutral. They hack
systems by exploiting their vulnerabilities, but they don’t do so for monetary or
political gains. Grey hats take system security as a challenge and hack systems
just for the fun of it.
Question 17