ONLINE AND SECURE
We use the Internet on daily basis. With the help of the Internet the world is connected more than it has ever been. The Internet has now become the backbone of communication and an information resource for humankind.
CONCEPT OF CYBER SECURITY
Today, we have become dependent on the computers and the Internet to run our day to day lives. Our general needs of life like communicating with our loved ones, doing business, tracking financial status, shopping, paying utility bills, etc. are now done online with the help of a computer and the Internet. Over the last couple of years, several applications and software have also evolved to run and exchange information o the web. People are creating newer and more innovative ways to cause harm to the average user on a computer. Cyber security is about protecting yourself and everyone else who are using the Internet and ensuring that they don't become the next victim.
- Confidentiality: This indicates that the information or the data that is typically meant for a defined set of people, is accessible to only that defined group. In case it is accessible outside or is made accessible to anyone outside the defined group, the confidentiality of that data/information is breached.
- Integrity: This suggests that the information should be controlled against and unauthorized modification, at rest or in communication. If the information gets tampered with, it will indicate a breach i integrity.
- Availability: This represents the availability of the resource, when required. In case it is not available at the time of requirement, this would indicate a breach of availability.
SECURITY RISKS (OFFLINE AND ONLINE)
Security risk is a term that defines and event or action that could be harmful for a computer hardware, software, data information or its processing capability Some breaches to computer security are planned and some are accidental, however, they can still have a grave impact on the user/owner of the resource. These illegal acts performed through a computer are referred to as a computer crime. Any illegal act involving are generally referred to as cyber crime.
Let's explore some forms of security breaches that are common in today's world.
- Ransomware: People install programs/software i our machines using various techniques and then encrypt the complete content of your personal drives, files and folders. They then demand ransom(money) in exchange for providing you access to your content/data.
- Data Theft/Hacking : When people break in the computers or the computer networks to steal confidential information, it is known as data theft or hacking. Hackers are computer experts who break into computer systems and networks. Hackers can be classified as, 'Blackkhat', 'Whitehat', and 'Greyhat' hackers.
- Virus Dissemination: Viruses are computer software programs that install themselves onto any system that they access to. When a leads to a disruption in the computer operations and the corruption because once they infect one machine on the Internet, they can use this as the base and infect other machines form the host. There are various kinds of viruses and we will discuss them in details in another section.
- Spoofing: Spoofing is an act of gaining unauthorized access to someone's computer to access someone's personal information. Intruder may steal someone's bank account details or passwords.
- Masquerade or Identity Theft: This is and act of accessing a compute using hacked credentials or stealing the password of networks or administrator command functions to access more privileged part of the system/networks.
- Digital Snooping: This is an act of electronic monitoring of the digital networks to uncover passwords or other sensitive data. Users or even system administrators have been found online at unusual or off-shift hours doing digital snooping. Hackers have now developed software like key-loggers that are active o a system in the background and not visible to the user; it silently captures each keystroke that is pressed on the system and then sends it back to their creator.
- Sabotage: Disgruntled employees can create mischief and sabotage a computer system. Employees make up the group that is most familiar with their employer's computers and applications of the examples of computer-related employee sabotage include hostage, etc. Logic bombs are also used by some employees to automate such operations.
- Email Attacks: Sending and receiving emails are the prime source for spreading computer viruses, malware, various sniffer programs, etc. Forms of email attacks, spamming and phishing have emerged as two security risk which have become quite popular in the past few years.
- Malware: Malware is class of software that is created with malafide intentions. Malwares are well thought, well-designed and meticulously engineered with and intent to cause damage or to steal information form the victim's computer system. Malware is a very broad classification and it can be further divided into two sub categories: Infectious Malware and Concealment Malware.
Virus (definition and types)
A Computer virus is a program that can multiply and spread itself from one computer system to another causing various types of damaging effects. It is a program or a piece of code that is loaded into the computer's memory without the user's knowledge and runs without the user's awareness. Viruses can also make copies or replicate themselves. However, computer viruses are man-made, making them different from the biological viruses. Even a simple virus can be dangerous as it ca make a copy of it over and over again. this will quickly use up the available memory and the other resources, bringing the system to a stop. A virus can be more dangerous if it is capable of transmitting itself across networks and bypassing security systems. There are myriads of viruses that exist today and many more being added into the cyberspace everyday. A virus is spread by the infected floppy disks, Universal Serial Bus (USB), or the Internet etc. Some of the more common types of viruses are as follows:
- Boot Sector Virus: This category of viruses infect the boot sector of the disks forcing them to loose data and in some cases, rendering them unusable altogether.
- Terminate and Stay Resident (TSR) Virus: These viruses, once loaded into the memory of the infected computer, remain stationed into the memory and infect any healthy disk used subsequently.
- Application Software Virus: These viruses infect the application programs, such as Microsoft word and use them for propagation as well. Macro virus were one such example of these.
- Time/Logic Bomb: A time/logic bomb is a virus or worm designed to activate at a certain date/time or when a specific condition is true and not immediately at the time of infection. Y2k or Year 2000 virus belonged to this category. It badly damaged the computer system at 00:00:01 am on the 18 Jan 2000 all over the world sending the cyber world into panic.
Online security
Trojan, Rootkits, Keylogger, Worms
A computer on a network is accessed by many uses. Files are shared between these users and computer on a network. This makes a computer and the network vulnerable to attacks by viruses because of the underlying network. Let us discuss some of the common threats to the computers.
- Trojan: A computer program that appears to be a useful software but actually causes damage, once installed or executed o the computer system is known as Trojan horse . This is the program that does more than its published specifications.
- Rootkits: A rootkit is a malicious software which hides the programs form the normal methods of detection and enables continued privileged access to a computer.
- Keylogger: As the Internet grows rapidly, new kinds of security threats are reported on a daily basis. the Keylogger is a well known malware that can be built into Trojan horse and used to steal personal information.
Safety Issues for Teenagers on the Internet
At any moment of time, millions of users are online: at home, at school, at a friend's house, almost everywhere. Most people online engage in activities like emailing, browsing, instant messaging, visiting social networking sites while working on the Internet. All these activities are very popular and fun but also need one to be careful.
- Online Dangers through emails:
- Online Dangers through Blogs:
- Online dangers through Chatting:
- Online dangers through Websites:
- Ransomware: People install programs/software i our machines using various techniques and then encrypt the complete content of your personal drives, files and folders. They then demand ransom(money) in exchange for providing you access to your content/data.
- Data Theft/Hacking : When people break in the computers or the computer networks to steal confidential information, it is known as data theft or hacking. Hackers are computer experts who break into computer systems and networks. Hackers can be classified as, 'Blackkhat', 'Whitehat', and 'Greyhat' hackers.
- Virus Dissemination: Viruses are computer software programs that install themselves onto any system that they access to. When a leads to a disruption in the computer operations and the corruption because once they infect one machine on the Internet, they can use this as the base and infect other machines form the host. There are various kinds of viruses and we will discuss them in details in another section.
- Spoofing: Spoofing is an act of gaining unauthorized access to someone's computer to access someone's personal information. Intruder may steal someone's bank account details or passwords.
- Masquerade or Identity Theft: This is and act of accessing a compute using hacked credentials or stealing the password of networks or administrator command functions to access more privileged part of the system/networks.
- Digital Snooping: This is an act of electronic monitoring of the digital networks to uncover passwords or other sensitive data. Users or even system administrators have been found online at unusual or off-shift hours doing digital snooping. Hackers have now developed software like key-loggers that are active o a system in the background and not visible to the user; it silently captures each keystroke that is pressed on the system and then sends it back to their creator.
- Sabotage: Disgruntled employees can create mischief and sabotage a computer system. Employees make up the group that is most familiar with their employer's computers and applications of the examples of computer-related employee sabotage include hostage, etc. Logic bombs are also used by some employees to automate such operations.
- Email Attacks: Sending and receiving emails are the prime source for spreading computer viruses, malware, various sniffer programs, etc. Forms of email attacks, spamming and phishing have emerged as two security risk which have become quite popular in the past few years.
- Malware: Malware is class of software that is created with malafide intentions. Malwares are well thought, well-designed and meticulously engineered with and intent to cause damage or to steal information form the victim's computer system. Malware is a very broad classification and it can be further divided into two sub categories: Infectious Malware and Concealment Malware.
Virus (definition and types)
A Computer virus is a program that can multiply and spread itself from one computer system to another causing various types of damaging effects. It is a program or a piece of code that is loaded into the computer's memory without the user's knowledge and runs without the user's awareness. Viruses can also make copies or replicate themselves. However, computer viruses are man-made, making them different from the biological viruses. Even a simple virus can be dangerous as it ca make a copy of it over and over again. this will quickly use up the available memory and the other resources, bringing the system to a stop. A virus can be more dangerous if it is capable of transmitting itself across networks and bypassing security systems. There are myriads of viruses that exist today and many more being added into the cyberspace everyday. A virus is spread by the infected floppy disks, Universal Serial Bus (USB), or the Internet etc. Some of the more common types of viruses are as follows:
- Boot Sector Virus: This category of viruses infect the boot sector of the disks forcing them to loose data and in some cases, rendering them unusable altogether.
- Terminate and Stay Resident (TSR) Virus: These viruses, once loaded into the memory of the infected computer, remain stationed into the memory and infect any healthy disk used subsequently.
- Application Software Virus: These viruses infect the application programs, such as Microsoft word and use them for propagation as well. Macro virus were one such example of these.
- Time/Logic Bomb: A time/logic bomb is a virus or worm designed to activate at a certain date/time or when a specific condition is true and not immediately at the time of infection. Y2k or Year 2000 virus belonged to this category. It badly damaged the computer system at 00:00:01 am on the 18 Jan 2000 all over the world sending the cyber world into panic.
Online security |
Trojan, Rootkits, Keylogger, Worms
A computer on a network is accessed by many uses. Files are shared between these users and computer on a network. This makes a computer and the network vulnerable to attacks by viruses because of the underlying network. Let us discuss some of the common threats to the computers.
- Trojan: A computer program that appears to be a useful software but actually causes damage, once installed or executed o the computer system is known as Trojan horse . This is the program that does more than its published specifications.
- Rootkits: A rootkit is a malicious software which hides the programs form the normal methods of detection and enables continued privileged access to a computer.
- Keylogger: As the Internet grows rapidly, new kinds of security threats are reported on a daily basis. the Keylogger is a well known malware that can be built into Trojan horse and used to steal personal information.
At any moment of time, millions of users are online: at home, at school, at a friend's house, almost everywhere. Most people online engage in activities like emailing, browsing, instant messaging, visiting social networking sites while working on the Internet. All these activities are very popular and fun but also need one to be careful.
- Online Dangers through emails:
- Online Dangers through Blogs:
- Online dangers through Chatting:
- Online dangers through Websites:
0 Comments:
एक टिप्पणी भेजें
If you have any doubt, Please let me know