2. • What are the security aspects of using the Internet and understand
what methods are available to help minimize the risks.
• Which Internet risks associated with malware, including viruses,
spyware and hacking.
OBJECTIVE:
9. Programmers create a virus
program that deletes all files.
They hides the virus in a word
processing document and
attach the document to an
email message
They send the email message to thousands of users around the
world.
Some users open the attachment and their
computer s become infected with the virus
Some users when do not recognize the name of the sender of the
email message. They immediately delete such emails and protect
their system from virus.
10. 6. Spyware
1. Spyware / key- logging is software that
monitors key presses on a user’s keyboard,
and relays the information back to the hacker.
2. Spyware is a form of malware that hides in
your devices, monitors your activities , and
steals sensitive information like bank details
and passwords.
• Security Risk:
• Methods to remove risk
11. 7. War Driving
War driving is the act of searching for Wi-Fi wireless networks by a
person usually in a moving vehicle, using a laptop or Smartphone. It is
also known as Access-Point Mapping.
• Security Risk:
• Methods to remove risk:
12. 8. Phishing
It is the act of attempting to
acquire sensitive information
like username passwords, and
credit card details by showing
as a trustworthy source.
Phishing is carried out through
emails or by luring the users to
enter personal information
through fake websites.
Criminals often use websites
that have a look and feel of
some popular website, which
makes the users feel safe to
enter their details there.
13. 8. Phishing (Protection)
1. The most powerful weapon against
phishing is common sense and the following
rules that every user should oblige to.
2. If you are the customer of the site delete
the email immediately. Don’t click on the link
or reply.
3. If you are a customer and you are not sure
if the email is legit, do one of the following:
(a). Contact the institute by phone or contact
at the official website and ask if the mail is
official.
(b). Instead of using the link provided open
the website by typing in the official link there.
14. 9. Pharming
1. Hacker creates a fake website which
appears similar to the original website.
2. Hacker poisons the DNS servers thus
domain names are resolved into fake IP
address.
3. User types the URL of the original website
in the browser.
4. The DNS server directs user to the fake
website designed by the hacker.
5. User not knowing that it is a fake website
shares his confidential information such as
login, password etc.
6. Hacker gets the user confidential
information from his fake website and uses
it to access the original website.
7. Hacker exploits user confidential
information to his liking. HOW TO PROTECT OUR COMPUTER SYSTEM: