Anash Khan XI C' 11102
Anash Khan XI C' 11102
SECURITY
Anash Khan
XI ‘C’
11102
INTRODUC
• We TION
live in a worldat
Information
a timewhichis oftencalled
Age.
• Internet has revolutionized the world and people are
getting used to having access to whatever information
they want anytime, anywhere.
• Unfortunately, this also has resulted in increased
security concerns.
• This chapter talks about the threats that are associated
with online access and the measures to prevent and
counter them.
THREATS TO COMPUTER
• A SECURITY
Threat is a potential violation of security. When a
threat is actually executed, it becomes attack. Those
who executes such actions, or cause them to be
executed are called attackers.
• Some common threats the average computer user
faces everyday are-
1. Viruses :
2. Worms
3. Trojans
4. Spyware
5. Adware
6. Spamming
7. PC Intrusion:
8. Denial of Service
9. Sweeping
10. Password Guessing
11. Phishing
COMPUTER
• Computer VIRUSES
Virus are malicious code/programs that cause
damage to data
and files on a system.
• Virus can attack any part of a computer’s software such as boot
sector, operating system, system areas, files, applications-
program-macro etc.
• Two other similar programs also cause virus like effects. These
are-
• Worms: A worm is a self replicating program which eats up the
entire disk space or memory. A worm keeps on creating its copies
until all the disk space or memory is filled.
• Trojans Hourses: A destructive program that masquerades as a begin
application. Unlike viruses, Trojan horses do not replicate themselves but they
can be just as destructive. One of the most insidious types of Trojan horse is a
program that claims to rid your computer of viruses but instead
introduces viruses onto your computerDamages caused by Viruses:
– Damage or Delete files.
– Slow down your computer.
– Invade your email programs.
SPYWA
• RE
Spyware is a software which is installed on your computer
to spy on your activities and report this data to people
willing to pay for it.
• Spyware mostly get installed on your PC without your
consent.
• Roughly 32% computers of the world are infected with
some type of Malware.
• Damages caused by
Spamming-
• Spam reduces productivity.
• Spam eats up your time.
• Spam can lead to worse
things.
PC INTRUSION
EVERY PC CONNECTED TO THE
INTERNET IS A POTENTIAL TARGET FOR
HACKERS. PC INTRUSION CAN OCCUR IN ANY OF THE
FOLLOWING FORM-
• Sweeper Attack :
This is another malicious program
used by hackers which sweeps all the
data from the system.
• Denial of Services:
This eats up all the resources of the
system and the system come to a
halt.
• Password Guessing:
Most hackers crack or guess
passwords of system accounts and
gain entry into remote computer
systems.
EAVESDROPP
• Unauthorized
ING
monitoring of other people's
communications is called Eavesdropping.
• Eavesdropping can be carried out through all
communication devices and media of today-
telephone, emails, messaging, other internet
services.
• To prevent this, email messages have to be encrypted
and digitalPhishing
signature areand
also effective.
• In Phishing,Pharming
an imposter uses an authentic looking e-
mail or website to trick recipients into giving out
sensitive personal information which may later used
for cyber crimes and frauds.
• Pharming is an attack in which a hacker attempts to
redirect a website’s traffic to another, bogus website.
Even if the URL is correct, it can still be redirect to a
fake website.
SOLUTIONS TO COMPUTER
SECURITY THREAT
• The entire computer security is based on a
system of actions and safeguards which have
been categorized in two ways-
1. Active Protection : It includes installing and
using an antivirus that have internet security
also which shows protection against threats
such as viruses, spyware and PC intrusion.
2. Preventive Mesures : Even though security
programs may actively detect and eliminate
any threats your PC encounters, you should
always help to prevent these issues from
ever arising.
SOLUTIONS TO VIRUS, ADWARE
AND SPYWARE
•Active Protection :
1. Use Anti-Virus and Anti-Spyware.
2. Download updates regularly.
3. Run frequent full-system scans.
•Preventive Measure :
1. Keep your system up-to-date.
2. Use caution when downloading files on the
Internet.
3. Be careful with email.
4. Disable cookies, if possible.
SOLUTIONS TO SPAM AND
EAVESDROPPING
•Active Protection :
1. Use Anti-Virus.
2. Update your Anti-Virus
regularly.
•Preventive Measure :
1. Keep your email address
private.
2. Use encryption in emails.
3. Be careful with E-mails.
4. Install Internet security
services.
SOLUTION TO PC
INTRUSION
•Active Protection :
1. Authorization
2. Authentication
3. Firewall
•Preventive Measure :
1. Use Proper File Access
Permission.
2. Disconnect from internet when
away.
FIREW
ALL
• An Internet Firewall is a device or a software that is designed
to protect your computer from data and viruses that you do
not want. A firewall is so called because of the real firewalls
used to secure buildings.
•Software Firewall: A software firewall is a special type
of software running on a computer. It protects your
computer from outside attempts to control or gain access.
•Hardware It is a physical piece of
equipment
designed to perform firewall duties. A hardware firewall may
Firewall
actually
:
be another computer or dedicated piece of
equipment which serves as a firewall.