Online Access and Computer Security · – Adware tracks your information just like spyware....

17
Online Access and Computer Security Based on CBSE Curriculum Class -11 By- Neha Tyagi PGT CS KV 5 Jaipur II Shift Jaipur Region Neha Tyagi, PGT CS II Shift Jaipur

Transcript of Online Access and Computer Security · – Adware tracks your information just like spyware....

Page 1: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Online Access and Computer Security Based on CBSE Curriculum

Class -11

By- Neha Tyagi PGT CS KV 5 Jaipur II Shift Jaipur Region

Neha Tyagi, PGT CS II Shift Jaipur

Page 2: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Introduction

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• We live in a world at a time which is often called Information

Age.

• Internet has revolutionized the world and people are getting

used to having access to whatever information they want

anytime, anywhere.

• Unfortunately, this also has resulted in increased security

concerns.

• This chapter talks about the threats that are associated with

online access and the measures to prevent and counter them.

Page 3: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Threats to Computer Security

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• A Threat is a potential violation of security. When a threat is

actually executed, it becomes attack. Those who executes such

actions, or cause them to be executed are called attackers.

• Some common threats the average computer user faces

everyday are- 1. Viruses :

2. Worms

3. Trojans

4. Spyware

5. Adware

6. Spamming

7. PC Intrusion:

8. Denial of Service

9. Sweeping

10. Password Guessing

11. Phishing

• They are also known as Malware that harms your computer.

Page 4: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Computer Viruses

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• Computer Virus are malicious code/programs that cause damage to data

and files on a system.

• Virus can attack any part of a computer’s software such as boot sector,

operating system, system areas, files, applications-program-macro etc.

• Two other similar programs also cause virus like effects. These are-

• Worms: a worm is a self replicating program which eats up the entire disk

space or memory. A worm keeps on creating its copies until all the disk

space or memory is filled.

• Trojans Hoursesa A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computerDamages caused by Viruses:

– Damage or Delete files.

– Slow down your computer.

– Invade your email programs.

Page 5: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Spyware

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• Spyware is a software which is installed on your computer to spy on

your activities and report this data to people willing to pay for it.

• Spyware mostly get installed on your PC without your consent.

• Roughly 32% computers of the world are infected with some type of

Malware.

• Damages caused by Spyware :

• Compromises your data,

computing habits and identity.

– Alter PC settings.

– Slow down your PC.

Page 6: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Adware

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• These are the programs that deliver unwanted ads to your

computer. They consume your network bandwidth. Adware is similar

to spyware. You have to be very careful while installing a software.

• Damages caused by Adware:

– Adware tracks your information

just like spyware.

– Displays arrays of annoying

advertising.

– Slow down your PC.

Page 7: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Spamming

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

Spamming refers to the sending of bulk-mail by an identified

or unidentified source.in malicious form, the attacker keeps

on sending bulk mail until the mail-server runs out of disk

space.

• Damages caused by Spamming-

• Spam reduces productivity.

• Spam eats up your time.

• Spam can lead to worse things.

Page 8: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

PC Intrusion

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

Every PC connected to the internet is a potential target for

hackers. PC intrusion can occur in any of the following form-

• Sweeper Attack :

This is another malicious program used by

hackers which sweeps all the data from the

system.

• Denial of Services:

This eats up all the resources of the system

and the system come to a halt.

• Password Guessing:

Most hackers crack or guess passwords of

system accounts and gain entry into remote

computer systems.

Page 9: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Eavesdropping

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• Unauthorized monitoring of other people's communications is

called Eavesdropping.

• Eavesdropping can be carried out through all communication

devices and media of today-telephone, emails, messaging,

other internet services.

• To prevent this, email messages have to be encrypted and

digital signature are also effective.

Phishing and Pharming • In Phishing, an imposter uses an authentic looking e-mail or

website to trick recipients into giving out sensitive personal

information which may later used for cyber crimes and frauds.

• Pharming is an attack in which a hacker attempts to redirect a

website’s traffic to another, bogus website. Even if the URL is

correct, it can still be redirect to a fake website.

Page 10: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Cookies

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• A Cookie is a small piece of data sent from a website and stored in a user’s

web browser. Some cookies disappears after user closes his browser while

others, know as tracking cookies, remain saved and load the next ime user

visits the same website.

• These cookies help track user’s browsing sessions and load information

faster, but create some security and privacy concerns as well.

These security and privacy concerns are-

1. Session Data : when you visit a website regularly, you may not have to

enter your user name and password to get in because the information is

being pulled from a tracking cookie. If somebody found out the encryption

key and acquired your cookies, he could discover your passwords.

2. Tracking Information : when you visit certain websites with

advertisements, those ads create cookie that store and track your online

patterns.

3. Public Computers : when you work on a public computer in a similar

manner as you work on personal computer, the people who have access

to those computer may access your information also.

Page 11: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Solutions to Computer Security Threat

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• The entire computer security is based on a system of

actions and safeguards which have been categorized

in two ways-

1. Active Protection : It includes installing and using

an antivirus that have internet security also which

shows protection against threats such as viruses,

spyware and PC intrusion.

2. Preventive Mesures : Even though security

programs may actively detect and eliminate any

threats your PC encounters, you should always help

to prevent these issues from ever arising.

Page 12: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Solutions to Virus, Adware and Spyware

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• Active Protection :

1. Use Anti-Virus and Anti-Spyware.

2. Download updates regularly.

3. Run frequent full-system scans.

• Preventive Measure :

1. Keep your system up-to-date.

2. Use caution when downloading files on the Internet.

3. Be careful with email.

4. Disable cookies, if possible.

Page 13: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Solutions to Spam and Eavesdropping

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• Active Protection :

1. Use Anti-Virus.

2. Update your Anti-Virus regularly.

• Preventive Measure :

1. Keep your email address private.

2. Use encryption in emails.

3. Be careful with E-mails.

4. Install Internet security services.

Page 14: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Solution to PC intrusion

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• Active Protection :

1. Authorization

2. Authentication

3. Firewall

• Preventive Measure :

1. Use Proper File Access Permission.

2. Disconnect from internet when away.

Page 15: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Solutions to Phishing and pharming attack

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• Active Protection :

1. Take the computer offline.

2. Backup all files on the hard drive.

3. List the information given to Phishing scammers.

4. Run Antivirus software.

5. Contact credit agencies to report any possibilities of

identity theft.

• Preventive Measure :

1. Don’t open emails from unknown sources.

2. When in doubt, do not click.

Page 16: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Firewall

Neha Tyagi, PGT CS KV 5 Jaipur II Shift

• An Internet Firewall is a device or a software that is designed to

protect your computer from data and viruses that you do not want. A

firewall is so called because of the real firewalls used to secure

buildings.

• Software Firewall: A software firewall is a special type of

software running on a computer. It protects your computer from

outside attempts to control or gain access.

• Hardware Firewall: It is a physical piece of equipment

designed to perform firewall duties. A hardware firewall may actually

be another computer or dedicated piece of equipment which serves

as a firewall.

Page 17: Online Access and Computer Security · – Adware tracks your information just like spyware. –Displays arrays of annoying advertising. –Slow down your PC. Spamming Neha Tyagi,

Thank you

Please follow us on our blog

Neha Tyagi, KV 5 Jaipur II Shift

www.pythontrends.wordpress.com