CLASS -11 COMPUTER SCIENCE
CHAPTER- 22 ONLINE ACCESS & COMPUTER SECURITY
🔔To download textbook pdf click on the ''DOWNLOAD'' button below -
NOTES FOR COMPLETE UNDERSTANDING -
- Threats to Computer Security :
- A Threat is a potential violation of security.
- When a threat is actually executed, it becomes attack.
- Those who executes such actions, or cause them to be executed are called attackers.
- Some common threats the average computer user faces everyday are:
- Viruses
- Worms
- Trojans
- Spyware
- Adware
- Spamming
- PC Intrusion
- Denial of Service
- Sweeping
- Password Guessing
- Phishing
- They are also known as Malware that harms your computer.
- Computer Viruses :
- Computer Virus are malicious code/programs that cause damage to data and files on a system.
- Virus can attack any part of a computer’s software such as boot sector, operating system, system areas, files, applications-program-macro etc.
- Two other similar programs also cause virus like effects. These are-
- Worms: a worm is a self replicating program which eats up the entire disk space or memory. A worm keeps on creating its copies until all the disk space or memory is filled.
- Trojans Horses : A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer
- Damages caused by Viruses: – Damage or Delete files. – Slow down your computer. – Invade your email programs.
- Spyware :
- Spyware is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it.
- Spyware mostly get installed on your PC without your consent.
- Roughly 32% computers of the world are infected with some type of Malware.
- Damages caused by Spyware :
- Compromises your data, computing habits and identity.
- Alter PC settings.
- Slow down your PC
- Adware :
- These are the programs that deliver unwanted ads to your computer.
- They consume your network bandwidth. Adware is similar to spyware.
- You have to be very careful while installing a software.
- Damages caused by Adware:
- Adware tracks your information just like spyware.
- Displays arrays of annoying advertising.
- Slow down your PC.
- Spamming :
- Spamming refers to the sending of bulk-mail by an identified or unidentified source.in malicious form, the attacker keeps on sending bulk mail until the mail-server runs out of disk space.
- Damages caused by Spamming-
- Spam reduces productivity.
- Spam eats up your time.
- Spam can lead to worse things.
- PC Intrusion :
- Every PC connected to the internet is a potential target for hackers. PC intrusion can occur in any of the following form.
- Sweeper Attack : This is another malicious program used by hackers which sweeps all the data from the system.
- Denial of Services: This eats up all the resources of the system and the system come to a halt.
- Password Guessing: Most hackers crack or guess passwords of system accounts and gain entry into remote computer systems.
- Eavesdropping :
- Unauthorized monitoring of other people's communications is called Eavesdropping.
- Eavesdropping can be carried out through all communication devices and media of today-telephone, emails, messaging, other internet services.
- To prevent this, email messages have to be encrypted and digital signature are also effective.
- Phishing and Pharming
- In Phishing, an imposter uses an authentic looking e-mail or website to trick recipients into giving out sensitive personal information which may later used for cyber crimes and frauds.
- Pharming is an attack in which a hacker attempts to redirect a website’s traffic to another, bogus website. Even if the URL is correct, it can still be redirect to a fake website.
- Cookies :
- A Cookie is a small piece of data sent from a website and stored in a user’s web browser. Some cookies disappears after user closes his browser while others, know as tracking cookies, remain saved and load the next time user visits the same website.
- These cookies help track user’s browsing sessions and load information faster, but create some security and privacy concerns as well. These security and privacy concerns are-
- Session Data : when you visit a website regularly, you may not have to enter your user name and password to get in because the information is being pulled from a tracking cookie. If somebody found out the encryption key and acquired your cookies, he could discover your passwords.
- Tracking Information : when you visit certain websites with advertisements, those ads create cookie that store and track your online patterns.
- Public Computers : when you work on a public computer in a similar manner as you work on personal computer, the people who have access to those computer may access your information also.
- Solutions to Computer Security Threat :
- The entire computer security is based on a system of actions and safeguards which have been categorized in two ways-
- Active Protection : It includes installing and using an antivirus that have internet security also which shows protection against threats such as viruses, spyware and PC intrusion.
- Preventive Measures : Even though security programs may actively detect and eliminate any threats your PC encounters, you should always help to prevent these issues from ever arising
- Solutions to Virus, Adware and Spyware :
- Active Protection :
- Use Anti-Virus and Anti-Spyware.
- Download updates regularly.
- Run frequent full-system scans.
- Preventive Measure :
- Keep your system up-to-date.
- Use caution when downloading files on the Internet.
- Be careful with email.
- Disable cookies, if possible.
- Solutions to Spam and Eavesdropping :
- Active Protection :
- Use Anti-Virus.
- Update your Anti-Virus regularly.
- Preventive Measure :
- Keep your email address private.
- Use encryption in emails.
- Be careful with E-mails.
- Install Internet security services.
- Solution to PC intrusion :
- Active Protection :
- Authorization
- Authentication
- Firewall
- Preventive Measure :
- Use Proper File Access Permission.
- Disconnect from internet when away.
- Solutions to Phishing and pharming attack :
- Active Protection :
- Take the computer offline.
- Backup all files on the hard drive.
- List the information given to Phishing scammers.
- Run Antivirus software.
- Contact credit agencies to report any possibilities of identity theft.
- Preventive Measure :
- Don’t open emails from unknown sources.
- When in doubt, do not click.
- Firewall :
- An Internet Firewall is a device or a software that is designed to protect your computer from data and viruses that you do not want.
- A firewall is so called because of the real firewalls used to secure buildings.
- Software Firewall:
- A software firewall is a special type of software running on a computer. It protects your computer from outside attempts to control or gain access.
- Hardware Firewall:
- It is a physical piece of equipment designed to perform firewall duties.
- A hardware firewall may actually be another computer or dedicated piece of equipment which serves as a firewall.
🔔MORE MATERIALS TO BE UPLOADED STAY TUNED🔔