Ss 3
Ss 3
1. Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware. ·
2. Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect.Successful security begins
in the design stage, well before a program or device is deployed. ·
3. Information security protects the integrity and privacy of data, both in storage and in transit.
4. Operational security includes the processes and decisions for handling and protecting data assets. The
permissions users have when accessing a network and the procedures that determine how and where
data may be stored or shared all fall under this umbrella.
● Common Causes of Cyber attacks
4.Virus: A virus is a contagious program or code that attaches itself to another piece of software, and then
reproduces itself when that software is run. Most often this is spread by sharing software or files between
computers.
.
Phone Call: This is
In Person:
Rahul, the System
What your credit
Admin. What is your card number,can you
password? told me I forgot
mine?
● Statistics of cyber crime in India
motivated.
● Use Government Email (NIC Email) for official communication: NlC email facility or Government Instant Messaging
Platforms (such as CDAC's Samvad, NIC's Sandesh, etc.) is recommended in the Ministry/Departments for the
communication of Confidential and Restricted information. However, utmost care should be taken during the
classification of information and before the communication of the same over interne
○ Features:-
■ Email platform is supported by 2-level authentication factor i.e. KAVACH which enables extra security.
■ The feature of BRIEFCASE which is used to store the personalized data similar to google
● How to prevent cyber attacks?(contd.)
● Avoid Digital Assistant devices: While discussing official information avoid usage of digital assistant devices like
Amazon's Echo, Apple's HomePod, Google Home, etc. and may not be kept in office. Further, Digital Assistants (such
as Alexa, Siri, etc.) should be turned off in the smart phones/watches used by the employee. Smart phones may be
deposited outside the meeting room during discussion on classified issues.
○ Benefits of avoiding digital assistant devices:
■ Decrease the chances of incident that results in unauthorized access to information.
■ Increase accountability
https://economictimes.indiatimes.com/tech/technology/india-most-targeted-country-by-cy
ber-attackers-report/articleshow/104989856.cms
https://iasscore.in/data-story/cyber-crimes-in-india
THANK
YOU!!!