0% found this document useful (0 votes)
2 views

Computer Security and Safety

The document discusses the various threats to computer security, including malware, adware, spyware, eavesdropping, phishing, and spamming, along with their potential damages. It emphasizes the importance of understanding these risks and implementing preventive measures such as using antivirus software, avoiding untrusted downloads, and employing strong passwords. Additionally, it provides guidelines for protecting personal data and maintaining system integrity while using the internet.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Computer Security and Safety

The document discusses the various threats to computer security, including malware, adware, spyware, eavesdropping, phishing, and spamming, along with their potential damages. It emphasizes the importance of understanding these risks and implementing preventive measures such as using antivirus software, avoiding untrusted downloads, and employing strong passwords. Additionally, it provides guidelines for protecting personal data and maintaining system integrity while using the internet.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

introduction

\Ve are living in the computer era where w .


.I
l)'where wit 1out any cost. We are not limitede to
can get any mformation rt,, f
t a any ime,
a1 . f . . a s ate or country we can a
iofom1at1on o t11e world. This is possible because of Internet. ccess
All of us know 99% infonnati on is freely available I .
. .k . . on nternet. But if you are
not aware about ns and secunty when working on internet th ' d
·
of your 11np01tan d , is may 1ea to loss
t ata.
In .this chapter we will discuss about the risk when working online and th ·
preventmg measures . eir

Threats to comput er security


A threat is a possible danger that might put your data on stake. A computer
threat can be "intention al" such as hacking or "accidental" such as malfunctioning
of or physical damage.
When a threat is executed it becomes attack and it is executed by attackers.
Malware are the programs written specifically to harm your computer system.
Malware includes viruses along with other type of software such as Trojan horse,
Adware, spyware, worms. Advance d malware such as "Ransomw are" are used to
commit financial fraud and attackers demand money from computer user.

Some of the common threats are :


1. Malware : Virus, Worms, Trojan horse
2. Adware
3. Spyware
4. Eavesdro pping
5. Phishing
6. PC Intrusion
7. Spammin g

371
372 Computer S .
c,enc~
1. Computrr Vinas, worms, Trojan Horses
Vims is a malirio11s computer program th at cause damage of data V./ h
. . 11
pcrm1ss10n of user. y 11· us, c,Hl
.. <I· rr 1·1ge any J>art of a computer's f
c1 ( oUt th
• so tware su , e
OS. svstcm fiks , macros etc. th a,
When vims infects your system, it replicates itself by modifying r,ther cc
·
program and msc11mg· ·1 1 c<>·1e m,put,--:r
1 s owt u · . . .
Some of the computer virus are : Logic Bomb virus, Directory Virus, B(°>')t -
. Vir,1
etc .
Major computer virus are :
,vorm : it is self replicating program which fills entire disk space I
·
creating its copy until all the disk space gets fll d
1 e •
. t k~.
:-)
Trojan Horses : It is not exactly a virus as it cannot replicate itself. Th .
. . T . h T .
possibility that a virus program may remam m roJan orse. fOJan horse are ere .is a
used to steal your login details such as 1ogm . 'd d mainj'•
1

1 an password. Example of T /
horse are : Remote Access Trojans, backdoor TroJans, .
Keylogging Trojans,roJanIRC
Trojans.
Bombs : These are just like Trojan horse but they have timing device and henc 3

it will go off only a particular date and time. "


Ransomware: Ransomware is an advanced type of malware that restricts ac~ess
to the computer system until the user pays a fee.
Damage caused by virus :
1. Modifies configuration setting of system
2. Damage computer files and OS
3. Destruct confidential data
4. Slow down the system
5 · Fill all the disk space and disrupts the normal functionality of the system
2. Adware

Adware is also known as advertising supported software. Adware deliwr


unwanted ads to your co
h . . mpu ter. The advertisemen
.
t are published on the screen Jt
~ ~t-tl1lm~ of Installation of a software. So it is advised that you thoroughly reJJ
rns a ation terms and d' ·
con Itlon before you allow installation of a software. The\'·
consume network bandwidth N
the ~ · ot a11 Adware has malicious intent but it. slo,,·s~ 00wn
periormance of system.
Damage caused by Ad ware:
1. Slow down the system
2. They record which I . resent
and feature rel t d nter~et Sites, the user visits frequently and to P
a e advertisements.
3. Wastage of user's time . .
by d1splaymg pop ups.
1cr securilY and Satety
-
r11Pu
Co 373

~.
~,.
. n1,\'nn·
,..
• of ma 1cHrns p1og1am SJ)ics ir1 \/
, -.., 1vp1. . .. Jour \y\terr · ~
1711. · t,r internet act1v1t 1cs. It hclfls the h· ·k. . I Wit i<,ut Y<111r p12rmi '>'s ir,n
-k~ Yll . ,I(.; c:rs to r,11f ' . f .
111
111:ll , .,· ')' enters 1ll your systc111 hy " r>1'gg'yoL ac.: k'1n.. "icr In (irrn;it1<,n
. .
<,f hr,•,t
,1 111 1L
1 ,1c · ,l frnm the lnternct when you visit , P" .. I·
'I''' II I(, ••Jl1ll' <1 ur1ICU ctr Wdntc
g <~n t,, a file r,r get,
11
\ .
pama,.,or causrd by spyware:
t. n1cy may alter your sy~tcm settings
1 They can monitor your computing habits such as b. ..
,.. your keystro kes w111c . we snes you v1,1t or r·"'cord
. h may lead to identity theft. '"
1 They can record your keystroke while entering yo d b' .
. to "cyber thief' He can pull ur e It 1 credit card
-· number and send this
your bank account. · your money out from

4. Eavesdropping
The tenn eavesdropping is used to refer to the interception of the communication
such as phone call, video conferencing, fax transmission, chat, social networking
etc. between two parties.
It is an act to silently overhearing a conversion among random strangers.
Eavesdropping activities do not affect normal operation of transmission and
communication thus sender and recipient can hardly notice that the data has been
stolen. It is advised to use secure protocol HTTPS while browsing.
Damage caused by Eavesdropping:
1. Loss of privacy. It may unveil confidential business infonnation ..
2. Hackers can steal your login credentials.
3. Attacker may get your debit /credit card number and it may lead to financial
loss.

S. Phishing and Pharming


Phishing is a technique used by hackers to acquire your personal_infom13tio~
th as password credit
~uch /debit card number, account data etc, by se nJing lil en~;.Ul
at is designed t~ look an authentic email from your bank (Whi~h lppears genume-
lo You) and 1s· in . k you 1•nto clicking on a malicious lmk or ltt~l~hment..
• tended to tnc
. l)ha.rnung· 1s . to re d'1rect the targeted users to. frauduknt
• the practice ·. , ,,el°'stt~
· l • th,
W ithout its kn 1 f . d 1 t website looks .mthentl\:ate to nu~~u1" ~ ~
U\er ow edge. These I au u en . . lo so the fraudstt.·r stt.·al y1..,ur
. Where
Ptr~(jn• . You then enter your credentials, tf you l • '
a1information.

harnagc caused by Phishing and Pharming


1
· Financial loss
2
· Loss of confidential information
374
Com Put~r ~
1JCinn,
,'J
3. Wastage of internet bandwic.lth

6. PC Intrusion
Intrusion occurs when computer is connected with internet. Jt <iccur,.
someone tries to ga in access lo any part O f your computer. Jt is an unauth V~heri
access to your computer system. <in1.1~d

It can occur in any of the fo11owing form :


I. Destruct credentia1s: most hackers crack or guess passwords 0 f i
• ' sy,te
accounts and gain entry mto remote computer system. rn
2. Sweeper attack: hackers deletes aJI the data from the computer system.
3. Denial of Service : They may _change the settings of computer system and
some programs may stop runnmg.
Damage caused by PC Intrusion
I. Your computer may not work properly.
2. You may have loss your data
3. Hackers may change your password or may damage system data.

7. Spamming
Spamming refers to the sending bulk mail by an identified or unidentified source.
The attackers keep mailing until the mail server runs out of disk space.
Damage caused by Spamming
I . Wastage of time in deleting spam emails
2. Spam mail can contain virus to harm our system
3. Spam degrades system performance and disrupts email delivery.

Solutions to computer security threats


We should follow some guidelines to protect or system from above discussed
threats. Roughly 32% computers of the world are infected with some type of
malware.
Some of the common guidelines are:
1. Use the best_antivirus software, which not only provides protection to your
PC but also rntemet protection and guards against cyber threats.
2. Do not download untrusted email attachments
3. Never dow?load software from unreliable sites
Here we 'Jl ct· d' cussed
wi iscuss real solution of particular threat that we have 15
so far.
ter
r,t1
secun•ty and Safety
'\~'Il-
375
l, .,•rus Adware, Trojan Horse and spywa
• rt to ' •
·~l1t1° . •
" re
!'I \ nti -v1nis
and Antt-Sp ywa re software
.\ . Ll~C f'\ • •
· . ,•our ant1v1rus sof twa re updated
8. ~cep - by download· .
C. }\.eep your system up- to -da te by dow mg regu 1ar updates .
nloading updates for OS
D- Pett ·onn full svs tem sca n at leas t once in a mon
. ., .. th by a t· ·
E. Disable cookies an 1v1rus so ftware

F. oownload files wi th sec ure protocol


and websites, if it warns never ignore
it.
G. AYoid clicking spa m mai ls.
"~ cookies are small tex t files tha t contain
information about the user. When you
isit some web site , it sav es the coo kie
file onto your system and when next
~me you visit tha t web site , it pick s info
rmation from that cookie file.

t _ C • ~ \ ct>ro~:,,.'settings/ coooe s

- @ Bl o c k ~ cookift

Sit• ca'\"" aookln 10 lmjJro\le yo.a


b,u-,nin g •lP"ftt<lctl, for exai11Pilt. t
o ~ you 1egne! ., or
• t o ~ 11ems In you, shopping can
• ~CIIO Ck

~ Pnnqa nds«\f fly


S!tn can, use VOCK cookies ID- you browim
cJ ICIMty IQOSS dtffcnnt SttPS, for eump;
0 P<'f90l'lal1z.e ads i:.a11R S on I04Tlll .. to
sAH may bruit.

C, 5-tl,tn gnt Q Block a• cook~ (r,ot ~ e d )

, CINf c:oolun and sit. data when you quit


ctuom•

Send a "Oo Not Track' !@ques t with lj


your browsing traffic

, Pnlload pages for fast« brows.ig and _.ct,ln


.. __ _ Pr&- fe~ inlonna llon from pa<Jel, includ;n
may 1ndude C:OOl(IU. If you ollow coak\H
g
g _P8\lf'' )'O'-I
M¥e not,.... vis•led 11\form~-on t . ~ ...
.

Solution to spam and Eavesdropping


..
A
I"\.
use email sen der filt enn
. .
· g. sen der f1ltenng
. done on the basis. of digital
is
certificate and dig ital signature.
. way as identification
.
Digital Certificate: Dig ital certific works m same
at~ It is issued by Governmc~t.
card suc h as pas spo rt and d nve· r's licenses. ·r th"' identtty
h rs
.
When a digital cert ific ate 1s ted too t e they may vendY c
gran. tit of the message sen er.
of owner. It is use d to verify the iden .
y . . the identity of a spe~ific
Digital Signature: It is a way o fnsa authenttcaung th cipi
ction. It provides e ~ hasent with a
digital doc um ent mes sag e, or tra not been
' ted by the sender an
guarantee tha t the mes sag e was crea
376
CornPuter Q_ ;
\JC,~-.
modified by a third party. It is used to authentica ting th .d . -~
. e J entu
of digital informat10n. Yof er~_
·1
B. Avoid conductin g online transactio n on public Wi-Fi. ·
c. Use secure protocol like HTfPS
D. usc strong password.

Solution to PC Intrusion
A. Use strong password
B. Give access to authorized user only
C. Install personal firewall
D. Disconnec t from internet when it is not in use.
E. Always ask for login before use any system file.
F. Use proper file access permissio n when sharing files on the internet

File access permissions are given for three set of users


1. Owner: who created the file
2. Group: Authorize d users who are working with the owner
3. Others: all other user. Anyone wants to access the file.
File access permission are the privileges given to user to access the file.
Read Permission: if a user has read permissio n, user can read and view t:
file.
Write Permission: if a user has write permissio n, user can edit and write ir.~.:
the file.
Execute Permission: if a user has execute permissio n. user can execute t~
file.

Solution to Phishing and Pharming


A Disconnect f ·
rom mternet when you are not using it
B. Use strong P' , d
.., ,tsswor and change it time to time
C. Do not conduct r b . . .
on me ankmg or transactio n on public \V1-F
n. Do not ope ~ . - 1
-. . . . n email from unknown source
L. Matntaan activit O • • t on we
system. Y r audit logs to track who has been doing wba
F. l>o not <.:li•·k u
... nncccss·l r k
Cl Do not alw· . · ·' ry Ill · or if any doubt. d
dys Use the . recor
Your password. same device, they may use key logger to
r-- ., , ,.,
i ,,, /' I/ 1,f

j I', .,, ,,,/ti j, ,,fl , flll,j1 t f '/'11 1# t, . fl ft l


' , , II
I ' 1
, 11I I I
/,~ 1
I 11/ I I,,,/'' .,,, I 1,11,t,'llt, If • '

" I ,
I I'"'' , 1'!·
1 1d, ,, /
1
f,,,, ,,,, 111,;1 1/1 ,,,,,,,, ' ,,, ",; ,.,.. . ,, ,, ·. ,

I' I I 1-1111 I j1 '" ,,,,,,' / , / I .. , , , .j ,,,., ,, 1,. ,'I,/,,.'/

ul ,, I. ,1 ~-,,,, /
1 1
1 ;/ !/,II d11f ~,, ,, , I
' I ' , , l' I
' ; I .
I I',, ,,, /I ,, ,1,d ,,1,,,. 1 // I
,l ,1 1,1, ' ' '
1 ', ,I , , ,

i,,,, , . ,,,.,/III,! ,. ,,,,t


,,,,, I :,,, ,,,,
J
II I ,,,,, II • , I • 11 •,· 1
I'·'' 111.I 1 1

111 , •mill, :111 1,, , , :11, •,(1,,w ,d 111 l'/11, t,:,w, ' II" ;,
f•,,, ~, I I ,ll, ·1111;!, flu 'mill
; 1'11,1 •; l1w11:dl

.• :I,,, :di 11,,, ''''"''"'''' 1,,,,J,h11, " ''' .,,,,,111f,; 'lll •i>;;t It )', ., ,,,·.· '" •.: .. I
1

,,,,11 ·11,,.,. ,,, ,,, ,1 111111,11,,i ,,,, ,,,,,,I/, ,1 " "'/ ,,, ,.,, .,,,, ,j f1/ :,;. I '.. :'. I :- ·, ' : ... , . ·,
,,,,,,,,, lllll,11 I,,,,,.) ,,,
111i '1.1,,,f l/'.11/:,/ j,,,, ,,j !;IJf l·m '" , ,, f.:.:•l ,,.,, ,

tybw Gufoty

11:,11,, ,1,,1/ 1111: " '·" 1,f i111r111•·1 h 11,11,.f,111;'. 1,•: 11 f..1;•J.,, ·;,-., '... , ·.,., " ... :,:.: •
~-•J 'llilf111,111 II',,. 11J i1111·.11 11 ,t, J11 /i:11,, .I 111:,1 J,, ,,,,,,, / ll,r1,;:s :,, < •: ,, ... , I. · t ·: · • - • ·
'i,1,,,I 1 1/jw/ llw 1hk 1,J i111i,1111·I, 11111,111';•:,j Ill f•"•J':f ·1..,1 ,.,,,, .,:J ·•-·.•.:.·, ,. ·· · .: · ·
'//, l,:1•11· 11 ·;1111·,1,li1·, J,

,,, 1,1I11,'yl,,,1 I •j y II',f1•11: ii I iJ1i, ,,:,J i,


I , I l,;,J1 /l ',<, l,f i1,l 1·11,•·I "> I<, Cl.; •1'' >,!•, I/ ., , . ) ' " ,; . J
1
, ,,,, "' 1,1111:1111111 ,

~ ." u..··Jw,~ luttrn.tl


.,,,.t IY lm1wil111: 11.,. wl'f 1 111111 lifr II ti Iy 1111 •t,., ti '"' " t'-i}I-
1
l • . , w, 11 hu,. ,,. ' ''' wd, ;1_·i ll I')i .. iJIJ lll1jll•t\ ,:;l f, oil i,j 11, . t
111
I I,, ;1: d:iy•i we t,,,u11,1 ,,v, ,111
. 11 1 ,,y V✓1 11k 1111/1; it h i1JJp1,,ta 11 1 "' ''" 1 · 1" ' • 1
,,., ·••1,J ii.:-;:.'} It "1 1..:n.
,1y
I11111 I I I, '/ / tt ,. 1,1 , ·· ·,11, ,; ' .• ,,, V ,., ,

' 1 :v,·,,1 it ,

L
J7S
Cornpu tor S
Clnnte

.-\s ~ ,,u ,n, f inll't nrl f,,r PnlirH' sht,ppin}-!. fill int form~
.'-<llll<.'

P-•~ nwnts. Ust' s,,d.il mcdi,1 ;md ~iH' Put pt·r ~t)n,11 inf()r111.1 1ion .
·1hi"
1nd 1
01
i;rn, k1ng
. But \\t• , f'' :il11. '},
ll'-l' for lu1mful n·.1s,ll1 lilt' h.1d,ing. stal"-ing and idcnlity fr.ind 1111
il•f1 1
'\ t'• · ·
1 I I1cn I1.,c I... rr ~1t-.1l., somcnnc·Ci·
~· "~e
~ 1
• ~\' tt. ldt.'ntitJ· tlu•n is a I) pe
,,
(ll r:tlll ''
mh,muti,,n. )Pf.ill details Ill Slt'a l llllllll' Y nnd fnin othcr hcndits. ld1.•nti1
y rtr:,:1
a ~tokn idt'nr / t C,in
t,lk.t' pl.h.'l' hx fin.mci:ll gain. ltl pmdw st' medical drug using
Y,,r h,
l'timinals h' ,fo rri mc with the use of stolen iden tity.
y,,n may prcYcnt this by using pri\'alc and Anonymous hrowsing.
Priratr Hrow~in~ : pri\'at c browsing is used when you Jo not w int to
. . . • r-:vcJI
. your data while surfing on interne t.
htstorv :mJ shann g
.n,ur sc:U\'h -
PriYatc browsing is a type of browsing wherein user opens winJow in in~o,~n it)
. e, I(
k
mode t'r through proxy or VPN and docs not store coo tcs ahout
your on line acti\ ity.
\\'c can use priYate browsing tl1rough:
·· on
Incognito browsing :You c~ui do this by opening "new incognito window
udgo.
browser. You may also use private browser and search engine like Dud.D
Proxy : it works as middle layer between your computer and website.
VPN :virtual private network is used to add security to private and
public
networks such as password on Wi-Fi hotspot.
Anonymous browsing : Anonymous browsing means to surf
internet without
location etc. It is
re\'ealing your personal information like IP address, MAC address,
mainly used by government, journalists etc.

, - - - - - - - -- - - - - - -
* '\:.--l
FTCP Product M." U Ttchmtmt e M.19& Ntwt.lt
Newwii,dow
'•' I f I •
New .n<:ogntto wwndow

Boo~ b
fcM
Zoom

s...~ ~ 11.k
'11\d..
Pnnt. ..
Tooll
Htitoty
Oownlo.dl

•""' .. ~ ....~,om .-
wt"'9'
AbN~(~

~-- M<l910W\Cf p.aga [1)


Hllp ll
379
•ty and Safety
secun
1.11er

eo'1'p , truck yo ur onlinc nrtivity


'I ryts . ur location ,
, c\l
vis it a wr hs 1tc, yo ur wch brows er may reveal yo
110' . ·r you ation. It can
11
ress (M AC add ress) and store yo ur personal inform
w1tc ~'~ add . . mful
1'.lch1t1C ·1 to tI11n
s
. 'fl 11.s rnf
. I parties . ormat,on may he used for har
\',,,,r 11 • ·Jc these dcta1
. , ,,nl\'l
~,~,
Jfcl~C -
rll ·ay of tracking arc :. .
The,~, on network ( here
dre ss :lP add res s ts a uni qu e address of yo ur device
Ad d . ation through IP
IP A we bsi
.
te can ete nm ne yo ur rough geographical loc
. , et).
,.-~intd11 .
address. e in a browser, the browser
f{TTP Referrer :W hen you Jump to another web pag
from.
Us the website where you cam e bpage,
po p up ads or lin ks to an outside website on a we
re When you click on yo ur IP
te wi ll get op ene d and internally information abo ut
(hen the linked websi ow n as the
typ e wi ll be pro vid ed to the linked website, it is kn
address, machine
,rrrP referrer. g small inf on nat ion about
your computer storin
Cookies : cookies are text file on ur computer.
y. We bsi te tha t you hav e visited can store cookies in yo
your online activit cookie remembers
le : wh en you sig n int o you r online banking website, a
for examp that website browser
in inf orm atio n and nex t time when you try to access
your log
cookie file.
restore that information from ver.
s are inv isib le to you and they are accessed by web ser
By default, the coo kie
created.
can be set when the cookie is
The time of expiry of a cookie

Cookies can be of four type


visited
coo kie : Fir st par ty coo kie s are created by the website
1. First party o fill information
the use r. Th ey sto re you r login id, password and aut
by
frequently visit.
etc for some website that you
main that are
pa rty coo kie : Th ird par ty cookies are created by do
2. Third track users and
r. Third party cookies also
not directly visited by the use ising. Third
ir bro ws ing his tor y for ad targeting and behavioral advert
save the your webpage.
unwanted advertisements on
party cookies may result many
ou t or wh en
coo kie s: Ses sio n coo kie s get expire when use r log
3. Session rem em ber the
d by e-commerce website to
session expires. These are use
user.
product placed in cart by the
stays on the use r's
Pe rsiste nt coo kie s: As the name suggest these cookies
4.
are also called super cookies.
browser for long time. These
they are difficult to
per coo kie s are also coo kie s same as other cookies but
Su h cookie
kie s stores coo kie dat a in mu ltiple places for example in flas
delde. Super coo your browsing history:
r in~ his tory , HT ML 5 storage etc. If you deleted
ii you l>r o~s
from other location.
. . bllo,mation 1s repopulated
r
t ·~,'r' \ ~\'Ht : l' , ,, ~ ,\t,'!~{ \~ .\ ~,, n \\ .U \' \' t l'l\'f':"" \l'.'<."d t,y :-.c_,cr.\l llc.'h\Of\ing
r~\' t,,'\'~' l: \'- i~~,' \' ~~,' \~~.H "'' ~~~h.',·t ~ ~\' \\ th\' \\d'~th' ~l'll an.' rr)111f! t<, rc~'ach. For
,''\,, ::~.:': ,, ~\'~ t ..,: \' ~,' i~, h~\_~ \.'t.n.ut ft \' \H l ,ln.,il hl ~-llh"' tll.;.\11 (\f \)tllinc ~ht.'rping oa
\"' .. ,, ...
-. .......·~ ..-' , .. ,,~,,, l'''''
"-!,' '"· '"
'"''" \~ \' ,,, ~·' \'"~' '--r ,~ ·h'fnt " F,-nn1'k
' u,' \..·'r ",' ., • c.,f u~t'f accnt
' i;\ hro~
........,.._...

.\:: : ~.......~~'\ "' :~::\_~~ l,'..t\ ) \'Ur i\~,'ntity inf'-,nn~uh.,n. ~,,luti,,n c.,f this is priv•
.,, :
._ . . . . '\,. i.
" ' ' ' ' \ ' " , .. , ~ .. , ,,.._ ~ ....., i \\ ··' ~'
..,.,,., .. , , , ...., , . , ',\ l , ..-', \ '\..' ,, t;,
' ' ' \...' 1. ,,~,
'\ , "--~i t'lrltt'r)
''l~,
'- " ~

l" "~• . . . ;, ·
', " ' 4 "'- .. , " ,..
, ~,,~1.r
'- \,
,,
' u\:'h hi~t'-,r" Yl'Ur 1·~J~t ,~ou put on so- ial
'~-
t , ,, ',; , ,
t'"'" \. '-' ' 1'\
f ,,\. .., ~~
I'' 1
\.. '- llill..' ' • 4li • ' ..

:: •.- :\\ \.'.: l'I.::·._; ~:~"--~ ..l:~' ..1a \ i~tt't~, t'-' ru1,1k. \Ye \.'.;U\ lH~lk~ thctn ('('llfidcntial by ch30g· '

~...:·:: ~:: :,
.
: --..:..~: .1~

Some ideas to ensure confidentiality of information :

-\:-, \\ f \.',trli(' r \\ h"'tl ~ "'U ~urf any \\'C1'sitc USC rri\·ate


f:.i\ ( utk.t~J
'-'r ..~::1..'r~ ~ n:.._)~1~ t,,"''\ ~in~. This \\',.\Y \\·~1'sitc ,,·,,uh.t n,,t ~ 3ble to sltll
\..\,'td "'~ l'!l ~\.)llr ,'\)lll('Utc r.

~ · \ ' \ I, ,,J \.. '.' ltlf rul,h\.· \\'i -Fi . m~l \.' t'llll'Uk'~

HTTP vs HTTPS
User
Noaw.al HTTP(lllt

Insecure Conn~tlon
381
ritY and Safety
LJter secu
cot11P ve the comput er
,crlY logout befo.re. yo.u lea .
3, pro1, .
at1on and ·sw •· pa sL•w , >rd w hen us•mg pu bl'1c
trn n g se 11s1l1vc mf orm < "' · ,,
l ·cJ cn
A 11
4, ,,v
co n1put rr.
l cookies from compute r.
~. Always clear histor y an< in
and op en attachm en t, se nd hy unknown source
k
~- Do not click on the lin
email.
s
. Avoid clicking on pop-up
7
8. Use fir ewall
.
and avoid savi ng cookies
9, Use incognito window ormation .
e and secu re protocol while entering crucial inf
Io. Ensure safe sit
social networking sites.
11. Be careful when using
s placed on web page .
12. Avoid clicking on ad

Cyber Crime involves


ilitat ed by any ele ctron ic device (computer) and
Any crime that is fac
cyber crime.
internet is referred to as ", the use of computer as a
tool to
lled "c om pu ter crime
Cyber crime is also ca fraud , child pornography, steali
ng identity,
as co mm itt ing
further illegal end such are etc.
ng, int ell ec tua l pr op ert y, buying and selling malw
stalki
common cybercrime :
Let us discuss about some

1. Id en tit y th ef t your
u oft en en ter yo ur pe rso nal information related to
While working online, yo ho us e address etc. As we have
already
ac co un t, yo ur
business, yo ur bank ma ny ways through which
hackers can
ph ish ing . Th ere are
discussed about
ation:
obtain your personal inform tion
ed by ha ckers to ac qu ire your personal informa
us
Phishing is a technique nu mb er, account data etc , by send
ing an
/de bit ca rd
such as password, credit m your bank .
ail tha t is designe d to look an authentic email fro
em mation such
r cri me of att em pti ng to acquire sensitive infor ta
It is a type of cy be ation , ba nk account da
dit / de bit ca rd in fo rm
, cre
as username, passwords
etc. u through
olv es cri mi na ls ma kin g direct contact with yo
Social Engineering inv se as a customer service agen
t so you will
. Th ey us ua lly po
phone call or email the company
orm ation as ne ed ed . Th is is typically a password,
give necessary inf
ormation etc .
where you work, bank inf

Cy be r troll an d Bullying
t
n who int en tio na lly up set people on the interne
,C f• troll refers to a perso
382
Computer S .
Ciel)~

by 1t1ost in1!.. . sarcas l ic or in su lti ng commen ts ahout so meone in a


n onr1 1·
communit y such as forum . blog de . nc
Trolling is a cy hcr ~.-rime und is related to cyhcr bullying .
JO
Cyhrr bullying takes place over di gi tal dev ices like cell phone, cornputcr
C')ibcr hullyin(T can occur through SMS, Text, and apps, or online in soc:ial .e~:.
.::- . . . . rnecJ 1•
foru ms or ga min g where people can view, participa te m , or share cc ~
,' ' . . . f , . intent
Cybcr bullying include sharmg personal or pnvatc m ormat10n about S<>rn ·
else causing embmns sment or hmm·1·rntton. · C(inc
s
3. Cyber Stalking
Cyb er stalkino
o
is a crime in which hackers uses internet or other electro .
. . n1c
media to harass an individual, a group _or com~um ty by s~n~mg message or
email. Stalkers collect all the personal mformat1on about v1ct1m and post this
informat ion on any illegal website posing as if the victim is posting thi,
information. Stalkers will always make contact with the victim through email
having f1iendly or threatening content.

4. Spreading Rumours Online


People often make fake profile with different name on social networking sites
and post false information or commen t that could hurt others or spread rumours
that may panic religious sentimen ts of other people. Spreadin g rumours is a
cyber crime and is a punishab le offence.
Section 505(1) of Indian Penal Code, 1860 is the punishm ent for making,
publishing or circulating any statement, rumour or report which may cause fear
or alarm to the public, or to any section of the public.

5. Online Fraud

Online fraud is a cyber crime which make use of internet and could involve
hiding of informat ion or providin g incorrec t informat ion. For example if you
do online shopping and e-comm erce company makes false promises , is a part
of cyber crime.

6. Scams

Any fraudulent business that extracts money from a person is called a scam.
Scams can be anything like :
► Job offer scams
► Lottery scams
► Beneficiary scams
► Online dating scams
► Charity fraud scams
~~ . Child Pornograph_,-

9. SQL Inj ection

10. Data diddling


'r.:::-:::~r s,-s:~;:1_ Csi=~
erin~ c1f tb u d!lrin ~ er.rrY ic:\.1 a 1.'l"
It is 3.Il un3utho riz ed alt
3tt3 ~ke r-n uy m ~ - ci': ~e~ .:- I-:'J L"':J:rdr ~-:J ~: :-: is
-~r I~
this te~hnique. the
tr.1ck.

happens?
What to do if cy be r crime "·~ (';;'f \.·ri~~~
e care of you r d.lr .1 but if :my l"'f the r.:-.:1.S'-"'n if J.ny
You should tak f"-"li~e .
your known :lfld rer,m it w
iuppens. you must infonn to in .1~~ f''l :-.' e
tion tec hnology a.:-t. ~000 pcnniu td us w n:'f\.'11 it
The infonna
station .
clle c~ her l·rime unit '-'f .rny
"·icy im-si'X'\.·ti, ~ '-'f
crime may be reponeJ in
The
s (@1mineJ.
the ce \\ here the crime wa
pla

Computer Forensic s . 'c', re~.m.iin~ rn,,f


n.:-h L)f Ji,giul fl,rensi"·s s"·i.:.'11.
Compute r forensi~ s is J l:lra S) st.:·m 1\., re.'"''-'' c>r J.ll.l fn.,m ekYtf\.'I~i"·
dia . It pru , iJe s leg Jl
found in digital sodal me
devices. \.)ll S ~"·ause l,ur ,.k~ ·nJ
~·n. .·~ l1ll im --•m.;;-c
r'-1 k in JX) rJci
It plays an im ponant
Cl)r

reasing day by J.1y.


and electronic de\'ice are in~ that in!i..•rprt·ts de "·tn,ni1..· J~H
J tt,r
r forensics is a S) stl!mati~ pnx·ess
Comp ute
in a court of law.
384 Computer Scie
~
,. ~h:-
hvc ps to <.'ompulrr fon• nc,1•{S
.. invc
. -~tigation :

1. Elementary Ann lysi~


. · f . . t' ator~ to initiate a elementary
lt necessa ry for orcn st ~.s JnfVCS btg r crJ·.,me. An
1\ analy\jc
· t0
· · I d tatl s o cy c in-d epth elem entary anal
1

•_..
figure <1ut the cn tJ ca _c · . s for
helps in draw up cffcct1ve stratcg1e inve stig atin g the crim e. 1 ·h

2. Evi dence acquisition


. amount of data (volatile or non volatile;
It refers to co 11 ec f1ng the maximu'fm. g . .
from all the likely source and v~n ymnd
the data integnty . Volat1le data .include
session details, network connection, a . process running etc while non volatiie
-data veri . t'
fication calls for the hard disk mvest1ga 100 •

3. Evidence Identification
·
This step calls for evaluatm g an d 1·dentifying the collected evidenc e and presentin!!
it in a digital format so that 1·t can be easily understood. All the co 11ecte ...
. d data
should be organized by Forensics Tool Kit
(Ff K).
4. Evaluation
This key steps lets you decide whether fore
nsics investigation evidence can be
used to draw legal conclusion.

5. Reporting and documentation

Reporting and documenting the analyzed resu


lt involve communicating the details
of the performed actions and tools used
during the investigation. Final reports
are shared with the parties associated with
the governing body of law .
Cyber Law and IT Act

Cyber law is also called IT law, is a part


of legal system that deals with th~
internet. Generally it refers as the Law
of internet. Cyber law covers legal issu~
which are related to the use of communicat s
ive, transactional, and distributive aspt!cts
of network, information technologies and
devices . Cyberspace can be defined as
environment that involves interactions betw an
een people, software and services .
The Information Technology Act, 2000
(also known as ITA-2000, or th~ IT
Act) was notified on 17 October 2000.
It is the primary law in India dealing with
cybercrime and electronic commerce. It is
International Trade Law. based on United Nation Commis sion on

The objective ofIT Act is to deliver lawful


recognition for transactions through
electronic data interchange (EDI) and othe
r means of electronic communication,
commonly referred to as electronic com
crime. merce or E-Commerce and reduce cybe
r
security and Safety
uter ~
~
d
T j\d fac ilita te elec troni c filt' ng O f ocume t 8 · h
fhC I am end the Indi an Pen·aI Codc the Ind n . WJt the Government
. ,,nd further lo
~ .
,· EVJ'dence Act, 1872,
•1cs ' nooks Ev1 <lcn cc Act , 189 l and th R ' an '
:i f k •rs·
flL,
c csc rve Ban k of India Act 19
h~ 13;1n t: •
o4 . . . ' 34 .
1·11c IT Act 2000 contam s 13 chapter and 7 section s The I t 1" .
I . the LT. Act d . . · · as our sections
1. , section s 91 to 94 111 2000 ea1s with the amendm ents to the
fl;1flll ) l Code 1860
foliiall Pena . .. .
. .
of cl t .c records, d1g1
Chapter 2 deals wtth the authentication ec roni tal ~1gnatures

ct~- • m penalty for any


Chapter 11 deals with offences and penaltie s. Th e maximu
.
to 1 crore.
Jamage to computer system 1s a fine up

common social networking sites


fonn where people can setup their profile
A social_networ~ng site is an online plat
who have already setup their profile on
and commurucate with other online people,
same platfonn, called online friends.
re are man y soc ial netw orking sites. Some of the popular social networking
The
sites are:

[,•· Date
~- Name Usage/ Focus
Launched

sages. It allows you to February,


Facebook Pos t and sha re photo, videos and mes 200 4
pos t shared by you r
view , like /unl ike and com men t on the
friends.
tos and videos. October,
sharing real time pho
Instagram It offers features for 2010

03
ls. It provides features Ma y,20
Linkedln It is a plat form mainly for professiona
sections for work
to mak e profile looks like resume with
award and other work
experience, education, certification,
g job.
rela ted information. It helps in searchin

ing things you like. 2011


Pinterest It is a pinboard for organizing and shar

kmarking, and Internet June.20


05
Reddit It focuses on News reader, social boo
forums.
post small July, 1006
Twitter It is a microblogging site when you can
messages.
ging 2009
Focuses on blogging and micro blog
r:Y"..--
JS6

king sites
Appropriate usage of social net wor
days . Everyone of any age has introduced
Social media is very popular in these
with the name of these sites.
we say "ev ery coin has two sidc:s'".
Use of social media is jus t like that
Sometimes it may be good sometimes
it may be danger.
tprint there. Every step you rake !c:ai~s
As you go anywhere and leave your foo fri_c:~d;
e as when you post som eth ing or visit
an impression on sandy surface. Sam J
leave a permanent footprint calle digit: d
page or search something onJine you as lhc.~
rds and traces of indi vidual activities
footprint. These footprints are the reco
use the internet. dl)Jlc' :11n·
' tpnn
Th ese JOo · ts may be used by cyber inves tiga tors when someone
cyber crime.
h
You must know rhe right online bc ,l\ilir.
As you ha ve read cyber crimes above. -
online.
privacy poli cy and security while working .01 ll( Ji,
'
h . k s lh a~ by making faJse profile and pos ting fa lse infomi~lll '. . ,,hr,
If
~n~ _t m_
or iJJegal downloads with out gewug t,lU.:-
such a~tJVJt!es IJke child pornography
he/she 1s rrustaken. 1

rev d . pnn. ts. \\'h··iL1..•\·er )l ll


er you go or wha er you o, you Jeave your toor
Wh. erev prints .
..
do onlme get s added to your digital foot ·. ·r (lnlJJ 1~
ch . ·1 . s you \'1~1 • •oira.1
Whatever .you sear on soci
. . , ema, , post lk ch k . al med ia or th e sire
k up your d ie
purchase, locatwn visited through t·aceb,>c ~c ·-ms etc, a 11 ma ·c
387
. and satety
5ecuritY
..Jer . . . ·" U11 like your
iJI'( . . \ (ootpnn\s arc also rcferrcll \o as " d1g,1ta l tattoo s
igit,, · · .
•11t~· D J which may f nl1c away , l\1. g1la\ .
footp
.
nnl rema
• , f. , l<l w1II not
ins s,, c ,u
,,
r
~'"
·11'l.,ri l'O !o..ltl
,
~,ill'~tv~ a\\iaY•. tprints
can \)Co \' \wu \ypc s · ( l) Activ~ footprint wh1c
· tI arc lcf·t hy
-t . 'l:ll tt)O . ' . . '
IM~' activit y you do k1mw m 1:1-\y. (2 ) vassivc footp rint , whkl' . d h
i arc form c Y
~" l'' ','."c. acti\it y and you do not eve n know about it e.g. your ~carc hcd,
your
' llO 10C
,,1Jr ·111cnl so on.
:,1incra}
.,,cy settings
pi,
When you use soc1a . \
m~d'1a, you shou \<l always check and ~ct up priva cy ~ettin g
lllli account settings .. By sc\t1~1 g up privac y sellin g> y~)~ cart contr
ol : who can send
te4]UCSt to you, what mfo~m at10n or post ~bout you 1s v1s1hle to your friend
s or other s.
ltshou\d be your practi ce to set up pnvac y settin gs for all types of
your ~ocia l
media profile.

Protocols / Etiqu ettes when use social medi a


l. Be secure , alw ays use strong passw ord for your profil e
2. Setup privac y settin gs .
3. Be nice and hones t about your identi ty
4. Be reliab le, do not post false inform ation
5. Avoid over sharin g
6. Respe ct other 's sentim ents
7. Monit or comm ents
8. Do not drink and tweet
9 • Distin guish your faceb ook busin ess page with your person al
accou nt
lO. Do not appro ach strang ers and ask them to be friend
11. If someo ne does not want to be your friend , respect their decisi on
l 2. Check gramm ar and spellin g before post
13 · Go easy on tone .
14 • Appl y golde n rules,
respo nd politely
1S . Alway s provid e va\uah \e, network-appropriate cont~n t for )t'ur auJi\.'lh:~
16 - Do not
use exces sive hash lag (#)
17 · Do
not use fak e names.
1~- Do
not beg for facebo uk likes .
19 · Never ~hare
your perso nal information lH\\im.·
20 I) 0
· not argue on post ..
21 p . . . f' •hl
· rotect your identi ty and do nol p,1..: ~ 1b Wh\.'I\ ·Mll\\'-''\1 \1.' .J\\1,,' " t\\)l H:~p,H h.l

Properly to your post


' /\ I l,11 d H ,111111111,1
1:y 11,l11 ,I
I A11 y ,d1l,, r.1
t f )1111 I· 111 ,d lrl 1111 rY ll/ll j1k I ,I
11 M, Al, I'

I V 1II H1
, f f,,,J ,,,'-.
,~, ) ~ fY 1
1 J'J',{ <,:;:~-;;;·,~~ :
,111 · 1lw J II'✓ If
,,,111~1:, 111 I I,:,1 ',., i
IJfj '/ I'I) •, /

ii f 'cu,l•k
1 t\d w, 11 1• tJ , 1Jf1~,1_J
•I 'I,, p1 11l1 ·1I y11 111 ('1/llljlfdl'/
, yL l ,' /',, ,
IJIJIJ / I1,IJ, I</(JI) :JJ'J')Jt1
' f,t;f:) </:J i ,,,.,,

11 l•111·w11 II f) , (J/JYJ';

r , A111i vii11,i d, :,J)';:-;b;r


·, . l<ry l11r.rr1 ln ll , ...... , ........ ..

i i. l"i 1111 w 111 1· fJ . Ar1tivfru·>


r , f.pyw111 ,. d. All t)f tf,~·,i;
,, . h1rwn ll N1111• 111:rd lo pn,h:cl :11~aill',I
11 . I•ill· all ur ks b. Viru \ attad·:
r , 1>11111 dti w 11 :ill11drn d. Unaut}1<Jriz0d a~c.t·>·>
/ , ....................................... iN 111-; l:d lo verify the identity of me))ag~ ·. _,:;;:::::
n. I>i1•.il:il <\ ·, lil'irnll~ h. J>igitaJ Signature
H. Mr Alkl' is 1111 l' X11 111pk of ................. sof'twarc.
a. V11111, I>. Antiviru
r . h11·wnl l
d. Photo editing
•J . Wliirh of lhl· followi111 is ll'Nponsibl e for breaking the flow of your in::-~ ::t
1
,

l1111w:-. i111•, hy sltowi,11 1• 1111w11111\.'. d ad1-. fro111 time to time


/\. A111 ivi11 11', I>. KcyJoggcr
l '. Adwu1l' d. Firmware
IO ......... .................... tl·frrs lo lhc Sl'nding of bulk mail by an identified or
1111idrnlil'il·d sourn·.
11 . Spa111111i11g
r. Plt,11111i11g b. Phishing
d. Spoofing
security and Safety
,puter 389
eor.
. . file on user's· con1p,it rr 11at cont· · · f
1:- •:1 ~,natl text
It .,, t1. •
tl , J swrcJ hy v1s1tcd website : am in ormat1on about user
31\ •
.3. \ 1t1lS b. Mt1 1ware
'-~ · Co<.11'-ie I Spam
l.,

J..., r rivatc browsi


. ng can be done by open browser in ................ mode
a. In cocrmto
e ·
b. Duplicate
l:, • private d . Al I of these
_c redit card fraud may include :
13
a. Stealing of credit card b. Unauthorized use of credit card
c. Both of the above d. None of these
l4. Cyber crime refers to :
a. The theft of digital information
b. Any crime that involves computer and network
c. Any crime that uses computer to harm national security
d. Toe use of computer to commit financial or identity fraud
15. Which of the following is not a cyber crime ?
a. Cyber Bullying b. Identity Theft
c. Sending mail to misspelled email id d. Cyber stalking
16. Which of the following is not done by cyber criminals?
a. Report vulnerability in any system b. Unauthorized account access
c. Email spoofing and spamming d. Mass attack using Trojans
17. Https:// in a URL means it is .. ....................... Connection.
a. Simple b. Slower
c. Secure d. Sure
18. Which address is used to identify your computer on network ?
a. Home Address b. Office Address
c. IP Address d. MAC address
19. Which of the following is not a social networking site ?
b. Linkedln
a. Twitter
d. Facebook
C. Gmail
20. Which of the following is social networking site ?
a. Gmail b. Wooxie
d . Naukri.com
c. Hotmail
21. ............. ...refers to the safe use of internet as to ensure safety and security of
personal information.
b. Cyber Crime
a. Cyber safety
390

22. Use someone else's personal social Jnctlh . . C0rtiPu1a11


tenncd as : ' ttccoun1 t<, P<>st . ·•r.i\
a F d S<,rr1erhin,1 .
. rau . b. ,r.
vJoIat,cm
. ~. i"'il'i,,
c. Identity theft d On1 · .
. . . · Jne Stcafin
23. \Vluch of the followmg ts true about social media p g
. rotocof?
a. You should be secure onlme b. You sh Id ·
, ou be A h
c. You should be reliable online d. All of th ut entic r rii·I
ese 1
in~
24. When someone steals someone else's personal infonnati
fraud, It· IS
· ca11 ed................ on to comm·it thf<fit
~1 -~

a. Hacking b. Computer Piracy


c. Infringement d. Identity theft
25. Which of the following is not a cyber crime ?
a. Phishing b. Scam
c. Child pornography d. Unlike social media post
26. Which of the following is a cyber crime ?
a. Cyber Bullying b. Cyber Stalking
c. Cyber Troll d. AU of these
27. Which of the following is a computer threat ?
a. Eavesdropping b. PC Intrusion
c. Phishing d. All of these
28. Which of the following is a computer threat ?
a. Eavesdropping b. Cyber Stalking
c. Spam d. None of these
29. Firewall can be implement as :
a. Proxy firewall b. Private Firewall
c. Software Firewall d. None of these
30. Which of the following is a type of firewall ?
a. Packet filtering firewall b. Proxy firewall
c. Both of the above d. None of the above

Answer
1.c 2. b 3.d 4.a S.c 6.d 7. a 8.b 9.c JO.a
11. C 12. a 13.d 14.b 15.c 16. a 17. C ]8. C 19. C 20.b
21.a 22. C 23.d 24.d 25.d 26.D 27.d 28.a 29. C JO.c
socurity ond Snfoty 391
utor
c,,,,,P
,, ,- -- - 'Jttt bt M e d ~
< .. . . . . . .
I, j • ,

~p:l l l ·
'
. .
is a sci[ rcpl icnting program wt 11.c ci1ts up the entire disk
·h ,

....................... Arc use ful rcl1· '·1t1tt1cn ·1·tca t'ing t hc 1'dent ·ity of creator of
2· ··....... ...
·t· l infonnation .
d1P, I ,l
ine.
hentica ting the creator's identity onl
J. ............................... is a way of aut d
m
.......... ..... Is a general term use d lo refer to - , , wor s, spyware, a ware.
viruses
4. ..
communicati on ·ts ca11 ed............ .
_ una uth ori zed monitoring of oth er people's
5 sensitive
cess to attemptin g to acquire
6. ........... .:.... Is the fra udu len t pro
infonnat1on of other's.
use .
pre ven t una uth ori zed acc ess on a network ...... .......... can be
7. To
..
dentified source is called ...............
8. Sending bulk emails from uni
t website
t the targeted users to fraudu len
9................. is the practice to redirec
without its knowledge.
restricts acc ess
.. .................... ..... ..... is an advanced type of malware that
IO.
user pays a fee.
to the computer system until the
rs get
...... .. ........ Of info rma tion ens ures that only the authorized use
11. The .....
data.
access to sensitive and protected
r's online
....... Are traces and records the use
12. When you go online ....... ..... ......
activities.
called cyb er
way to hurt a targeted person is
13. Person who post in sarcastic
mode
Private browsing can be done by opening website in ..............
14.
it refers to as
wser send you on another URL,
15. When you click on a link bro
and your rough
to know your device on network
16. ..................... Address is used
geographical location. against cyber
Is a primary law in India dealing
17. ... ..... ... .. . ... ... .. .. .. .. .... .. .....
crime. called a ......... .
extracts money from a person is
18. Any fraudulent business that
19. .. ........ and ..... ........... are
social networking sites.
a child under
exploitation (visual or wri tten) of
20. .................. defined as sexual
age of 18. ............ .
be .. ........... , .......... ....... And .....
21. File access permission can
as soon as session expires.
22. ................ cookies get expire
392
Computer Scie
nee

r/naw«4
- ----~ :.::::.
1. Worm
:~~~==-----........ . . . 2. Digital Signature
3. D i,; i1al n-rlificatc 4. Mc.1lwarc
5. Eavesdropping 6 . f'hi shing
7. fire wall H. Spamming
9. Phanning JO. Ran somwarc
11 . Confidentiality l 2. Digital footprint
13. trol1 14. Incognito
1s. HTTP refc1Tcr 1,,. Jp
17. InfonnationTcchnology Act, 2000 18. Scam
19. Facebook, twitter ( any two) 20. Child pornography
21. Read, write, execute 22. Session

J. What is virus and anti-virus software?


2. What measure should you take to keep your data secure ?
3. Explain PC Intrusion.
4. Explain phishing, pharming.
5. What is cyber safety, why it is important ?
6. Describe digital footprints.
7. Ho w to protect your identity by identity theft ?
8. Explain computer forensics.
9. What is denial -of - service ?
10. What are different type of threats to computer security ?
1J. ExpJain Eavesdropping.
12. What is the need to take backup of data ?
13. What is the need of firewall in a computer's security system?
14. What arc Malware ?
15 . What arc the soJut ion of PC Intrusion?
16. Why ~r am is a bi g internet issue ?

I 7. What measures 8hould you take t.o maiutain confidentiality of information?


18. Describe any five cybcr crime.
19. What is data privacy?
20. Describe cybcr bullying.
cornputer Security and Safety 3?3

21. Describe cyber stalking.


22. What do you understand by identity fraud?
23. What is cyber crime ? how can you report it?
24. What is private browsing? Explain in detail?
25 . What do you understand by digital certificate and digital signature ?
26. Mention any ten rules, you should follow when using social media.
27. Suppose you are writing an email to your teacher. Which etiquettes you should
follow?
28. How would you know if you are being cyber bullied ?
29. How to secure your password and why it is necessary ?
30. What privacy setting you should set up in your social media account?
31. What are active footprints and passive footprints?
32. Describe social media sites you are using and why?
33. What to do if cyber crime happened?
. . . ?
34. How evil eyes track your onhne activity.
. ?
. How to ensure of safe browsmg •
35
36 . Write name of any five anti virus program.

37. Explain cookies in detail.


38. What is cyber space ?
39. What is Adware?
40. What is spyware?
d. · 1 ·gnature ?
41 . What is the need of ig1ta s1 .

You might also like