SlideShare a Scribd company logo
1 of 20
Download to read offline
Online Access and
Computer Security
 Introduction
 Threats to Computer Security
 Solutions to Computer Security threats
for more updates visit: www.python4csip.com
Threats to Computer Security
• A threat is potential violation of security
• When a threat is actually executed, it
becomes attack.
• Those who execute such actions, or cause
them to be executed are called attackers.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Common threats
 Viruses (Worms, Trojans)
 Spyware
 Adware
 Spamming
 PC Intrusion (Denial of Service, Sweeping, Password Guessing)
 Phishing
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Computer Viruses
• Are the malicious code/programs that cause
damage to data and files on a system.
• It can attack any part of computer system
like boot block, OS, system areas, files and
applications.
• 2 other similar programs also cause virus
like effects :
• Worms
• Trojans
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Worms
• A worm is a self-replication programs which
eats up the entire disk space or memory. A
Worm keeps on creating its copies until all
the disk space or memory is filled.
• Worms harm to a computer or a computer
network by consuming bandwidth and slow
down the network speed. After the worm
has infected a system, it can propagate to
other systems via internet or while copying
files from one system to another without
user interaction
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Trojan Horses
• Is a program that appears harmless (such as text
editor or a utility program) but actually
performs malicious functions such as deleting or
damaging files.
• With help of Trojan, harm that could be done by
hacker on target computer systems are:
• Data theft
• Installation of unwanted softwares
• Keystroke logging
• Downloading or uploading of files. And many more…
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Damaged Caused by Viruses
• Damage or delete files : some viruses may
delete or damage random documents or
specific files that are crucial to you OS.
• Slow down your Computer
• Invade your email programs : some forms of
viruses may wreak even more havoc by
spreading themselves to the contact in your
address book.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Spyware
• Is a software which is installed on your
computer to spy on your activities and
report this data to people willing to pay for
it.
• Spyware mostly get installed on your PC
without your consent. They gets installed
when you visit any illegitimate website or
download music, videos etc.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Damage caused by Spyware
• Compromise you data, computing habits and
identity: it can monitor information about your
computing habits like what websites you visit,
record your keystroke (user name, password,
credit card number) which in the end can lead
to identity theft.
• Alter PC Settings: can alter settings like web
browser home page, placement of desktop icons,
which may be annoying
• Slows down you PC: can slows down system and
Internet speed and become big problem when
you are trying to use the programs on your PC,
watch videos online or downloading large files.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Adware
• Programs that deliver unwanted ads to your
computer generally in popups. They consume
bandwidth. Similar to spyware but it may
be installed with your consent. Damages are:
• Adware tracks information like spyware
• Display arrays of annoying advertising
• Slows down you PC
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Spamming
• Means sending of bulk-mail by an identified
or unidentified source. In non-malicious
form, bulk advertising mail is sent to many
accounts. In malicious form (email
bombarding) the attackers keeps on sending
bulk mail until the mail-server runs out of
disk space. Damages are:
• Spam reduces productivity: billions of spam messages
circulating across the Internet can disrupt email
delivery, degrade system performance and reduce
overall productivity
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Spamming
• Spam eats up your time: deleting spam emails like
the simple solutions, but it eats a significant amount
of productivity
• Spam can lead to worse things: spam messages may
contain offensive, fraudulent material and can even
be used to spread viruses.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Eavesdropping
• Do you ever find that when you are talking to
someone else, another person is secretly trying
to listen to your talks? What that person is
doing is 'eavesdropping'. Have you ever tried to
secretly listen to the conversation between two
teachers regarding your class? If yes, then what
you have done is 'eavesdropping'.
• In context of network security Eavesdropping
refers to unauthorized access to another person's
or organization's data while the data is on its
way on the network.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Eavesdropping
• This may be done in a number of ways:
• By setting up parallel telephone lines.
• By installing some software (spyware) in the
target computer.
• By installing some receiver which captures the
data while on its way.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Phishing
• It is criminally fraudulent process of
attempting to acquire sensitive information
such as usernames, passwords, credit card
information, CVV number etc. In phishing an
imposter uses an authentic looking email or
web-site to trick recipients into giving out
sensitive personal information. For example
an email asking to update your bank details
by clicking on a link or an email regarding
lucky winner of some amount.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Pharming
• Is an attack in which a hacker attempts to
redirect a website’s traffic to another bogus
website. Through pharming attack, the
attacker points you to malicious and
illegitimate website by redirecting the
legitimate URL. Even if the URL is entered
correctly, it can still be redirected to fake
website.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Solutions to Computer Security Threats
• There are 2 ways of safeguarding our
computer system:
• Active Protection: installing and properly using an
antivirus software that includes internet security
which include protection against threats such as
viruses, Sypware and PC intrusions – is vital for
proper protection against the hackers, intruders
and wrongdoers
• Preventive Measures: even though security
programs may actively detect and eliminate any
threats your PC encounters, you should always
help to prevent these issues from ever arising.
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Solutions to Virus, Adware and
Spyware
Active Protection Preventive measures
Use Anti-Virus and Anti-
spyware software
 scan all you system for virus
 disconnect infected system
immediately from you
network
 Restore the infected system
from clean backup
 Notify your antivirus
vendors so it can ensure its
signature database is up-
to-date
Download updates regularly
Run frequent full system scan
Keep you system up-to-date
Use Caution when
downloading files on the
Internet
Be Careful with email
 Don’t download or open
unsolicited email
attachments
 Don’t click on link in email
rather type the URL on
address bar
 Check for security alerts
 Disable running of scripts
and cookies
 Disconnect from the
internet when you are away
Disable cookie if possible
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Solutions to Spam, Eavesdropping
Active Protection Preventive measures
Use Anti-Spam Software
(i) Sender Filtering: this
method allows only messages
from your approved sender
list to reach you inbox- all
other mail is quarantined
for later review. It is done
on the basis of Digital
Certificates ( specially
formatted digital
information issued to
website, are used to verify
the identify of message
sender) and Digital
Signatures ( are way of
authenticating the identity
of creators or producers of
digital information)
(ii) Keyword filtering
 Keep you email address
private
 Use encrypted connection
always if you have to provide
sensitive information i.e.
HTTPs
 Install personal firewall on
computer connected to the
Internet to check incoming
and outgoing information and
connections
 Avoid online transaction from
public network or public
Wi-Fi
 Install protection software
such as Internet Security
software
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com
Solution to Phishing and Pharming
Active Protection Preventive measures
 Take the computer offline (it
may reduce the probability of
infecting other devices in the
same network with malware)
 Backup all files on the hard
drive
 List the information given to
phishing scammers
(depending on what was
leaked one may need to
change password, block
credit/debit card, BUT
DON’T USE THE SAME
COMPUTER TO CONTACT
AGENCIES)
 Run Antivirus software
 Contact Credit Agencies to
report any possibilities of
identify theft
 Don’t open emails from
unknown sources or click on
links embedded in suspect
messages
 Check security guidelines of
website such as PayPal so
that you can distinguish
between legitimate and bogus
emails
 Also rather than clicking on
link you can type general link
on you web browser. If you
are in double DON’T CLICK
VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR &
SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR
for more updates visit: www.python4csip.com

More Related Content

Similar to 019. SAFELY ACCESSING WEBSITE .pdf

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechHelpSystems
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfLucaMartins7
 
Security and Privacy.PDF
Security and Privacy.PDFSecurity and Privacy.PDF
Security and Privacy.PDFChetanmalviya8
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxMarlynLiagao
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationSecurity Innovation
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryInvincea, Inc.
 

Similar to 019. SAFELY ACCESSING WEBSITE .pdf (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
Security and Privacy.PDF
Security and Privacy.PDFSecurity and Privacy.PDF
Security and Privacy.PDF
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
Web Security
Web SecurityWeb Security
Web Security
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 

Recently uploaded

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

019. SAFELY ACCESSING WEBSITE .pdf

  • 1. Online Access and Computer Security  Introduction  Threats to Computer Security  Solutions to Computer Security threats for more updates visit: www.python4csip.com
  • 2. Threats to Computer Security • A threat is potential violation of security • When a threat is actually executed, it becomes attack. • Those who execute such actions, or cause them to be executed are called attackers. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 3. Common threats  Viruses (Worms, Trojans)  Spyware  Adware  Spamming  PC Intrusion (Denial of Service, Sweeping, Password Guessing)  Phishing VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 4. Computer Viruses • Are the malicious code/programs that cause damage to data and files on a system. • It can attack any part of computer system like boot block, OS, system areas, files and applications. • 2 other similar programs also cause virus like effects : • Worms • Trojans VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 5. Worms • A worm is a self-replication programs which eats up the entire disk space or memory. A Worm keeps on creating its copies until all the disk space or memory is filled. • Worms harm to a computer or a computer network by consuming bandwidth and slow down the network speed. After the worm has infected a system, it can propagate to other systems via internet or while copying files from one system to another without user interaction VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 6. Trojan Horses • Is a program that appears harmless (such as text editor or a utility program) but actually performs malicious functions such as deleting or damaging files. • With help of Trojan, harm that could be done by hacker on target computer systems are: • Data theft • Installation of unwanted softwares • Keystroke logging • Downloading or uploading of files. And many more… VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 7. Damaged Caused by Viruses • Damage or delete files : some viruses may delete or damage random documents or specific files that are crucial to you OS. • Slow down your Computer • Invade your email programs : some forms of viruses may wreak even more havoc by spreading themselves to the contact in your address book. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 8. Spyware • Is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it. • Spyware mostly get installed on your PC without your consent. They gets installed when you visit any illegitimate website or download music, videos etc. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 9. Damage caused by Spyware • Compromise you data, computing habits and identity: it can monitor information about your computing habits like what websites you visit, record your keystroke (user name, password, credit card number) which in the end can lead to identity theft. • Alter PC Settings: can alter settings like web browser home page, placement of desktop icons, which may be annoying • Slows down you PC: can slows down system and Internet speed and become big problem when you are trying to use the programs on your PC, watch videos online or downloading large files. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 10. Adware • Programs that deliver unwanted ads to your computer generally in popups. They consume bandwidth. Similar to spyware but it may be installed with your consent. Damages are: • Adware tracks information like spyware • Display arrays of annoying advertising • Slows down you PC VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 11. Spamming • Means sending of bulk-mail by an identified or unidentified source. In non-malicious form, bulk advertising mail is sent to many accounts. In malicious form (email bombarding) the attackers keeps on sending bulk mail until the mail-server runs out of disk space. Damages are: • Spam reduces productivity: billions of spam messages circulating across the Internet can disrupt email delivery, degrade system performance and reduce overall productivity VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 12. Spamming • Spam eats up your time: deleting spam emails like the simple solutions, but it eats a significant amount of productivity • Spam can lead to worse things: spam messages may contain offensive, fraudulent material and can even be used to spread viruses. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 13. Eavesdropping • Do you ever find that when you are talking to someone else, another person is secretly trying to listen to your talks? What that person is doing is 'eavesdropping'. Have you ever tried to secretly listen to the conversation between two teachers regarding your class? If yes, then what you have done is 'eavesdropping'. • In context of network security Eavesdropping refers to unauthorized access to another person's or organization's data while the data is on its way on the network. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 14. Eavesdropping • This may be done in a number of ways: • By setting up parallel telephone lines. • By installing some software (spyware) in the target computer. • By installing some receiver which captures the data while on its way. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 15. Phishing • It is criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, credit card information, CVV number etc. In phishing an imposter uses an authentic looking email or web-site to trick recipients into giving out sensitive personal information. For example an email asking to update your bank details by clicking on a link or an email regarding lucky winner of some amount. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 16. Pharming • Is an attack in which a hacker attempts to redirect a website’s traffic to another bogus website. Through pharming attack, the attacker points you to malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to fake website. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 17. Solutions to Computer Security Threats • There are 2 ways of safeguarding our computer system: • Active Protection: installing and properly using an antivirus software that includes internet security which include protection against threats such as viruses, Sypware and PC intrusions – is vital for proper protection against the hackers, intruders and wrongdoers • Preventive Measures: even though security programs may actively detect and eliminate any threats your PC encounters, you should always help to prevent these issues from ever arising. VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 18. Solutions to Virus, Adware and Spyware Active Protection Preventive measures Use Anti-Virus and Anti- spyware software  scan all you system for virus  disconnect infected system immediately from you network  Restore the infected system from clean backup  Notify your antivirus vendors so it can ensure its signature database is up- to-date Download updates regularly Run frequent full system scan Keep you system up-to-date Use Caution when downloading files on the Internet Be Careful with email  Don’t download or open unsolicited email attachments  Don’t click on link in email rather type the URL on address bar  Check for security alerts  Disable running of scripts and cookies  Disconnect from the internet when you are away Disable cookie if possible VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 19. Solutions to Spam, Eavesdropping Active Protection Preventive measures Use Anti-Spam Software (i) Sender Filtering: this method allows only messages from your approved sender list to reach you inbox- all other mail is quarantined for later review. It is done on the basis of Digital Certificates ( specially formatted digital information issued to website, are used to verify the identify of message sender) and Digital Signatures ( are way of authenticating the identity of creators or producers of digital information) (ii) Keyword filtering  Keep you email address private  Use encrypted connection always if you have to provide sensitive information i.e. HTTPs  Install personal firewall on computer connected to the Internet to check incoming and outgoing information and connections  Avoid online transaction from public network or public Wi-Fi  Install protection software such as Internet Security software VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com
  • 20. Solution to Phishing and Pharming Active Protection Preventive measures  Take the computer offline (it may reduce the probability of infecting other devices in the same network with malware)  Backup all files on the hard drive  List the information given to phishing scammers (depending on what was leaked one may need to change password, block credit/debit card, BUT DON’T USE THE SAME COMPUTER TO CONTACT AGENCIES)  Run Antivirus software  Contact Credit Agencies to report any possibilities of identify theft  Don’t open emails from unknown sources or click on links embedded in suspect messages  Check security guidelines of website such as PayPal so that you can distinguish between legitimate and bogus emails  Also rather than clicking on link you can type general link on you web browser. If you are in double DON’T CLICK VINOD KUMAR VERMA, PGT(CS), KV OEF KANPUR & SACHIN BHARDWAJ, PGT(CS), KV NO.1 TEZPUR for more updates visit: www.python4csip.com