Computer Security and Safety
Computer Security and Safety
371
372 Computer S .
c,enc~
1. Computrr Vinas, worms, Trojan Horses
Vims is a malirio11s computer program th at cause damage of data V./ h
. . 11
pcrm1ss10n of user. y 11· us, c,Hl
.. <I· rr 1·1ge any J>art of a computer's f
c1 ( oUt th
• so tware su , e
OS. svstcm fiks , macros etc. th a,
When vims infects your system, it replicates itself by modifying r,ther cc
·
program and msc11mg· ·1 1 c<>·1e m,put,--:r
1 s owt u · . . .
Some of the computer virus are : Logic Bomb virus, Directory Virus, B(°>')t -
. Vir,1
etc .
Major computer virus are :
,vorm : it is self replicating program which fills entire disk space I
·
creating its copy until all the disk space gets fll d
1 e •
. t k~.
:-)
Trojan Horses : It is not exactly a virus as it cannot replicate itself. Th .
. . T . h T .
possibility that a virus program may remam m roJan orse. fOJan horse are ere .is a
used to steal your login details such as 1ogm . 'd d mainj'•
1
1 an password. Example of T /
horse are : Remote Access Trojans, backdoor TroJans, .
Keylogging Trojans,roJanIRC
Trojans.
Bombs : These are just like Trojan horse but they have timing device and henc 3
~.
~,.
. n1,\'nn·
,..
• of ma 1cHrns p1og1am SJ)ics ir1 \/
, -.., 1vp1. . .. Jour \y\terr · ~
1711. · t,r internet act1v1t 1cs. It hclfls the h· ·k. . I Wit i<,ut Y<111r p12rmi '>'s ir,n
-k~ Yll . ,I(.; c:rs to r,11f ' . f .
111
111:ll , .,· ')' enters 1ll your systc111 hy " r>1'gg'yoL ac.: k'1n.. "icr In (irrn;it1<,n
. .
<,f hr,•,t
,1 111 1L
1 ,1c · ,l frnm the lnternct when you visit , P" .. I·
'I''' II I(, ••Jl1ll' <1 ur1ICU ctr Wdntc
g <~n t,, a file r,r get,
11
\ .
pama,.,or causrd by spyware:
t. n1cy may alter your sy~tcm settings
1 They can monitor your computing habits such as b. ..
,.. your keystro kes w111c . we snes you v1,1t or r·"'cord
. h may lead to identity theft. '"
1 They can record your keystroke while entering yo d b' .
. to "cyber thief' He can pull ur e It 1 credit card
-· number and send this
your bank account. · your money out from
4. Eavesdropping
The tenn eavesdropping is used to refer to the interception of the communication
such as phone call, video conferencing, fax transmission, chat, social networking
etc. between two parties.
It is an act to silently overhearing a conversion among random strangers.
Eavesdropping activities do not affect normal operation of transmission and
communication thus sender and recipient can hardly notice that the data has been
stolen. It is advised to use secure protocol HTTPS while browsing.
Damage caused by Eavesdropping:
1. Loss of privacy. It may unveil confidential business infonnation ..
2. Hackers can steal your login credentials.
3. Attacker may get your debit /credit card number and it may lead to financial
loss.
6. PC Intrusion
Intrusion occurs when computer is connected with internet. Jt <iccur,.
someone tries to ga in access lo any part O f your computer. Jt is an unauth V~heri
access to your computer system. <in1.1~d
7. Spamming
Spamming refers to the sending bulk mail by an identified or unidentified source.
The attackers keep mailing until the mail server runs out of disk space.
Damage caused by Spamming
I . Wastage of time in deleting spam emails
2. Spam mail can contain virus to harm our system
3. Spam degrades system performance and disrupts email delivery.
t _ C • ~ \ ct>ro~:,,.'settings/ coooe s
- @ Bl o c k ~ cookift
Solution to PC Intrusion
A. Use strong password
B. Give access to authorized user only
C. Install personal firewall
D. Disconnec t from internet when it is not in use.
E. Always ask for login before use any system file.
F. Use proper file access permissio n when sharing files on the internet
" I ,
I I'"'' , 1'!·
1 1d, ,, /
1
f,,,, ,,,, 111,;1 1/1 ,,,,,,,, ' ,,, ",; ,.,.. . ,, ,, ·. ,
ul ,, I. ,1 ~-,,,, /
1 1
1 ;/ !/,II d11f ~,, ,, , I
' I ' , , l' I
' ; I .
I I',, ,,, /I ,, ,1,d ,,1,,,. 1 // I
,l ,1 1,1, ' ' '
1 ', ,I , , ,
111 , •mill, :111 1,, , , :11, •,(1,,w ,d 111 l'/11, t,:,w, ' II" ;,
f•,,, ~, I I ,ll, ·1111;!, flu 'mill
; 1'11,1 •; l1w11:dl
.• :I,,, :di 11,,, ''''"''"'''' 1,,,,J,h11, " ''' .,,,,,111f,; 'lll •i>;;t It )', ., ,,,·.· '" •.: .. I
1
,,,,11 ·11,,.,. ,,, ,,, ,1 111111,11,,i ,,,, ,,,,,,I/, ,1 " "'/ ,,, ,.,, .,,,, ,j f1/ :,;. I '.. :'. I :- ·, ' : ... , . ·,
,,,,,,,,, lllll,11 I,,,,,.) ,,,
111i '1.1,,,f l/'.11/:,/ j,,,, ,,j !;IJf l·m '" , ,, f.:.:•l ,,.,, ,
tybw Gufoty
11:,11,, ,1,,1/ 1111: " '·" 1,f i111r111•·1 h 11,11,.f,111;'. 1,•: 11 f..1;•J.,, ·;,-., '... , ·.,., " ... :,:.: •
~-•J 'llilf111,111 II',,. 11J i1111·.11 11 ,t, J11 /i:11,, .I 111:,1 J,, ,,,,,,, / ll,r1,;:s :,, < •: ,, ... , I. · t ·: · • - • ·
'i,1,,,I 1 1/jw/ llw 1hk 1,J i111i,1111·I, 11111,111';•:,j Ill f•"•J':f ·1..,1 ,.,,,, .,:J ·•-·.•.:.·, ,. ·· · .: · ·
'//, l,:1•11· 11 ·;1111·,1,li1·, J,
' 1 :v,·,,1 it ,
L
J7S
Cornpu tor S
Clnnte
.-\s ~ ,,u ,n, f inll't nrl f,,r PnlirH' sht,ppin}-!. fill int form~
.'-<llll<.'
P-•~ nwnts. Ust' s,,d.il mcdi,1 ;md ~iH' Put pt·r ~t)n,11 inf()r111.1 1ion .
·1hi"
1nd 1
01
i;rn, k1ng
. But \\t• , f'' :il11. '},
ll'-l' for lu1mful n·.1s,ll1 lilt' h.1d,ing. stal"-ing and idcnlity fr.ind 1111
il•f1 1
'\ t'• · ·
1 I I1cn I1.,c I... rr ~1t-.1l., somcnnc·Ci·
~· "~e
~ 1
• ~\' tt. ldt.'ntitJ· tlu•n is a I) pe
,,
(ll r:tlll ''
mh,muti,,n. )Pf.ill details Ill Slt'a l llllllll' Y nnd fnin othcr hcndits. ld1.•nti1
y rtr:,:1
a ~tokn idt'nr / t C,in
t,lk.t' pl.h.'l' hx fin.mci:ll gain. ltl pmdw st' medical drug using
Y,,r h,
l'timinals h' ,fo rri mc with the use of stolen iden tity.
y,,n may prcYcnt this by using pri\'alc and Anonymous hrowsing.
Priratr Hrow~in~ : pri\'at c browsing is used when you Jo not w int to
. . . • r-:vcJI
. your data while surfing on interne t.
htstorv :mJ shann g
.n,ur sc:U\'h -
PriYatc browsing is a type of browsing wherein user opens winJow in in~o,~n it)
. e, I(
k
mode t'r through proxy or VPN and docs not store coo tcs ahout
your on line acti\ ity.
\\'c can use priYate browsing tl1rough:
·· on
Incognito browsing :You c~ui do this by opening "new incognito window
udgo.
browser. You may also use private browser and search engine like Dud.D
Proxy : it works as middle layer between your computer and website.
VPN :virtual private network is used to add security to private and
public
networks such as password on Wi-Fi hotspot.
Anonymous browsing : Anonymous browsing means to surf
internet without
location etc. It is
re\'ealing your personal information like IP address, MAC address,
mainly used by government, journalists etc.
, - - - - - - - -- - - - - - -
* '\:.--l
FTCP Product M." U Ttchmtmt e M.19& Ntwt.lt
Newwii,dow
'•' I f I •
New .n<:ogntto wwndow
•
Boo~ b
fcM
Zoom
s...~ ~ 11.k
'11\d..
Pnnt. ..
Tooll
Htitoty
Oownlo.dl
•""' .. ~ ....~,om .-
wt"'9'
AbN~(~
.\:: : ~.......~~'\ "' :~::\_~~ l,'..t\ ) \'Ur i\~,'ntity inf'-,nn~uh.,n. ~,,luti,,n c.,f this is priv•
.,, :
._ . . . . '\,. i.
" ' ' ' ' \ ' " , .. , ~ .. , ,,.._ ~ ....., i \\ ··' ~'
..,.,,., .. , , , ...., , . , ',\ l , ..-', \ '\..' ,, t;,
' ' ' \...' 1. ,,~,
'\ , "--~i t'lrltt'r)
''l~,
'- " ~
l" "~• . . . ;, ·
', " ' 4 "'- .. , " ,..
, ~,,~1.r
'- \,
,,
' u\:'h hi~t'-,r" Yl'Ur 1·~J~t ,~ou put on so- ial
'~-
t , ,, ',; , ,
t'"'" \. '-' ' 1'\
f ,,\. .., ~~
I'' 1
\.. '- llill..' ' • 4li • ' ..
:: •.- :\\ \.'.: l'I.::·._; ~:~"--~ ..l:~' ..1a \ i~tt't~, t'-' ru1,1k. \Ye \.'.;U\ lH~lk~ thctn ('('llfidcntial by ch30g· '
~...:·:: ~:: :,
.
: --..:..~: .1~
~ · \ ' \ I, ,,J \.. '.' ltlf rul,h\.· \\'i -Fi . m~l \.' t'llll'Uk'~
HTTP vs HTTPS
User
Noaw.al HTTP(lllt
Insecure Conn~tlon
381
ritY and Safety
LJter secu
cot11P ve the comput er
,crlY logout befo.re. yo.u lea .
3, pro1, .
at1on and ·sw •· pa sL•w , >rd w hen us•mg pu bl'1c
trn n g se 11s1l1vc mf orm < "' · ,,
l ·cJ cn
A 11
4, ,,v
co n1put rr.
l cookies from compute r.
~. Always clear histor y an< in
and op en attachm en t, se nd hy unknown source
k
~- Do not click on the lin
email.
s
. Avoid clicking on pop-up
7
8. Use fir ewall
.
and avoid savi ng cookies
9, Use incognito window ormation .
e and secu re protocol while entering crucial inf
Io. Ensure safe sit
social networking sites.
11. Be careful when using
s placed on web page .
12. Avoid clicking on ad
1. Id en tit y th ef t your
u oft en en ter yo ur pe rso nal information related to
While working online, yo ho us e address etc. As we have
already
ac co un t, yo ur
business, yo ur bank ma ny ways through which
hackers can
ph ish ing . Th ere are
discussed about
ation:
obtain your personal inform tion
ed by ha ckers to ac qu ire your personal informa
us
Phishing is a technique nu mb er, account data etc , by send
ing an
/de bit ca rd
such as password, credit m your bank .
ail tha t is designe d to look an authentic email fro
em mation such
r cri me of att em pti ng to acquire sensitive infor ta
It is a type of cy be ation , ba nk account da
dit / de bit ca rd in fo rm
, cre
as username, passwords
etc. u through
olv es cri mi na ls ma kin g direct contact with yo
Social Engineering inv se as a customer service agen
t so you will
. Th ey us ua lly po
phone call or email the company
orm ation as ne ed ed . Th is is typically a password,
give necessary inf
ormation etc .
where you work, bank inf
Cy be r troll an d Bullying
t
n who int en tio na lly up set people on the interne
,C f• troll refers to a perso
382
Computer S .
Ciel)~
5. Online Fraud
Online fraud is a cyber crime which make use of internet and could involve
hiding of informat ion or providin g incorrec t informat ion. For example if you
do online shopping and e-comm erce company makes false promises , is a part
of cyber crime.
6. Scams
Any fraudulent business that extracts money from a person is called a scam.
Scams can be anything like :
► Job offer scams
► Lottery scams
► Beneficiary scams
► Online dating scams
► Charity fraud scams
~~ . Child Pornograph_,-
happens?
What to do if cy be r crime "·~ (';;'f \.·ri~~~
e care of you r d.lr .1 but if :my l"'f the r.:-.:1.S'-"'n if J.ny
You should tak f"-"li~e .
your known :lfld rer,m it w
iuppens. you must infonn to in .1~~ f''l :-.' e
tion tec hnology a.:-t. ~000 pcnniu td us w n:'f\.'11 it
The infonna
station .
clle c~ her l·rime unit '-'f .rny
"·icy im-si'X'\.·ti, ~ '-'f
crime may be reponeJ in
The
s (@1mineJ.
the ce \\ here the crime wa
pla
•_..
figure <1ut the cn tJ ca _c · . s for
helps in draw up cffcct1ve stratcg1e inve stig atin g the crim e. 1 ·h
3. Evidence Identification
·
This step calls for evaluatm g an d 1·dentifying the collected evidenc e and presentin!!
it in a digital format so that 1·t can be easily understood. All the co 11ecte ...
. d data
should be organized by Forensics Tool Kit
(Ff K).
4. Evaluation
This key steps lets you decide whether fore
nsics investigation evidence can be
used to draw legal conclusion.
[,•· Date
~- Name Usage/ Focus
Launched
03
ls. It provides features Ma y,20
Linkedln It is a plat form mainly for professiona
sections for work
to mak e profile looks like resume with
award and other work
experience, education, certification,
g job.
rela ted information. It helps in searchin
king sites
Appropriate usage of social net wor
days . Everyone of any age has introduced
Social media is very popular in these
with the name of these sites.
we say "ev ery coin has two sidc:s'".
Use of social media is jus t like that
Sometimes it may be good sometimes
it may be danger.
tprint there. Every step you rake !c:ai~s
As you go anywhere and leave your foo fri_c:~d;
e as when you post som eth ing or visit
an impression on sandy surface. Sam J
leave a permanent footprint calle digit: d
page or search something onJine you as lhc.~
rds and traces of indi vidual activities
footprint. These footprints are the reco
use the internet. dl)Jlc' :11n·
' tpnn
Th ese JOo · ts may be used by cyber inves tiga tors when someone
cyber crime.
h
You must know rhe right online bc ,l\ilir.
As you ha ve read cyber crimes above. -
online.
privacy poli cy and security while working .01 ll( Ji,
'
h . k s lh a~ by making faJse profile and pos ting fa lse infomi~lll '. . ,,hr,
If
~n~ _t m_
or iJJegal downloads with out gewug t,lU.:-
such a~tJVJt!es IJke child pornography
he/she 1s rrustaken. 1
I V 1II H1
, f f,,,J ,,,'-.
,~, ) ~ fY 1
1 J'J',{ <,:;:~-;;;·,~~ :
,111 · 1lw J II'✓ If
,,,111~1:, 111 I I,:,1 ',., i
IJfj '/ I'I) •, /
ii f 'cu,l•k
1 t\d w, 11 1• tJ , 1Jf1~,1_J
•I 'I,, p1 11l1 ·1I y11 111 ('1/llljlfdl'/
, yL l ,' /',, ,
IJIJIJ / I1,IJ, I</(JI) :JJ'J')Jt1
' f,t;f:) </:J i ,,,.,,
11 l•111·w11 II f) , (J/JYJ';
Answer
1.c 2. b 3.d 4.a S.c 6.d 7. a 8.b 9.c JO.a
11. C 12. a 13.d 14.b 15.c 16. a 17. C ]8. C 19. C 20.b
21.a 22. C 23.d 24.d 25.d 26.D 27.d 28.a 29. C JO.c
socurity ond Snfoty 391
utor
c,,,,,P
,, ,- -- - 'Jttt bt M e d ~
< .. . . . . . .
I, j • ,
~p:l l l ·
'
. .
is a sci[ rcpl icnting program wt 11.c ci1ts up the entire disk
·h ,
....................... Arc use ful rcl1· '·1t1tt1cn ·1·tca t'ing t hc 1'dent ·ity of creator of
2· ··....... ...
·t· l infonnation .
d1P, I ,l
ine.
hentica ting the creator's identity onl
J. ............................... is a way of aut d
m
.......... ..... Is a general term use d lo refer to - , , wor s, spyware, a ware.
viruses
4. ..
communicati on ·ts ca11 ed............ .
_ una uth ori zed monitoring of oth er people's
5 sensitive
cess to attemptin g to acquire
6. ........... .:.... Is the fra udu len t pro
infonnat1on of other's.
use .
pre ven t una uth ori zed acc ess on a network ...... .......... can be
7. To
..
dentified source is called ...............
8. Sending bulk emails from uni
t website
t the targeted users to fraudu len
9................. is the practice to redirec
without its knowledge.
restricts acc ess
.. .................... ..... ..... is an advanced type of malware that
IO.
user pays a fee.
to the computer system until the
rs get
...... .. ........ Of info rma tion ens ures that only the authorized use
11. The .....
data.
access to sensitive and protected
r's online
....... Are traces and records the use
12. When you go online ....... ..... ......
activities.
called cyb er
way to hurt a targeted person is
13. Person who post in sarcastic
mode
Private browsing can be done by opening website in ..............
14.
it refers to as
wser send you on another URL,
15. When you click on a link bro
and your rough
to know your device on network
16. ..................... Address is used
geographical location. against cyber
Is a primary law in India dealing
17. ... ..... ... .. . ... ... .. .. .. .. .... .. .....
crime. called a ......... .
extracts money from a person is
18. Any fraudulent business that
19. .. ........ and ..... ........... are
social networking sites.
a child under
exploitation (visual or wri tten) of
20. .................. defined as sexual
age of 18. ............ .
be .. ........... , .......... ....... And .....
21. File access permission can
as soon as session expires.
22. ................ cookies get expire
392
Computer Scie
nee
r/naw«4
- ----~ :.::::.
1. Worm
:~~~==-----........ . . . 2. Digital Signature
3. D i,; i1al n-rlificatc 4. Mc.1lwarc
5. Eavesdropping 6 . f'hi shing
7. fire wall H. Spamming
9. Phanning JO. Ran somwarc
11 . Confidentiality l 2. Digital footprint
13. trol1 14. Incognito
1s. HTTP refc1Tcr 1,,. Jp
17. InfonnationTcchnology Act, 2000 18. Scam
19. Facebook, twitter ( any two) 20. Child pornography
21. Read, write, execute 22. Session