2. Malware or malicious software is any
software intentionally designed to cause
damage to a computer, server, client, or
computer network
A wide variety of malware types exist,
including computer viruses, worms, Trojan
horses, ransomware, spyware, adware.
3. Ransomware is a type of malware from cryptovirology that
threatens to publish the victim's data or perpetually block
access to it unless a ransom is paid. While some simple
ransomware may lock the system in a way which is not
difficult for a knowledgeable person to reverse, more
advanced malware uses a technique called cryptoviral
extortion, in which it encrypts the victim's files, making
them inaccessible, and demands a ransom payment to
decrypt them
4. Spyware describes software with malicious behavior that
aims to gather information about a person or
organization and send such information to another entity
in a way that harms the user.
Trojan horse is any malware which misleads users of its
true intent. The term is derived from the Ancient Greek
story of the deceptive Trojan Horse that led to the fall of
the city of Troy.
5. Phishing is a form of fraud in which an attacker masquerades as a
reputable entity or person in email or other forms of
communication. Attackers will commonly use phishing emails to
distribute malicious links or attachments that can perform a variety
of functions. Some will extract login credentials or account
information from victims.
Eavesdropping is the act of secretly listening to the private
conversation or communications of others without their consent in
order to gather information.
6. Proprietary software consists of software that is licensed by the
copyright holder under very specific conditions. In general, you can use
the software, but you are not allowed to modify the software or
distribute it to others.
The original source code for the software is not available, which means
you can't see the actual code written by the programmers. Proprietary
software is, therefore, also referred to as closed-source software.
Shareware is proprietary software that is made available to users at no
cost under certain conditions. It is distributed on a trial basis with the
understanding that the user may need or want to pay for it later.
Freeware is a software which is distributed for free use but not for
modification to the users. Its source code is not distributed free. Ex.
Google chrome, internet explorer
7. Open-source software, as the name suggests, is software for which the
source code is released. This means that users can look at exactly how
the software was created using one or more programming languages.
This is done on purpose so that anyone can benefit from using the code.
A typical license for open-source software gives users the right to modify
and distribute the software.
W3C : World Wide Web Consortium is an international organization
committed to improving the web or to set standard for web.
8. Plagiarism
Plagiarism is the representation of another author's language,
thoughts, ideas, or expressions as one's own original work.
or
Plagiarism is the practice of taking credit for someone else's words
or ideas. It's an act of intellectual dishonesty.
Generally, plagiarism is not in itself a crime, copyright infringement,
violation of moral rights. In academia and industry, it is a serious
ethical offense
9. Types of Plagiarism –
1. Direct plagiarism is the act of copying another person's work word for
word.
2. Paraphrased plagiarism involves making a few changes to someone else’s
work, then passing it off as your own.
3. Mosaic plagiarism is a combination of direct and paraphrased plagiarism.
This type involves tossing various words, phrases, and sentences into your
essay without providing quotation marks or attributions.
4. Accidental plagiarism occurs when citations are missing, sources are cited
incorrectly, or an author shares an idea without a citation that isn't as common
of knowledge as they thought. Accidental plagiarism is often the result of a
disorganized research process and a last-minute time crunch.
10. Here are some instances that can be regarded as
plagiarism while using images, videos and music:
• If you copy any image and use it for your work without crediting the
source, then that will be plagiarism.
• If the music produced by someone is partially or exactly similar to already
existing music.
• Using parts of videos in your own video without permission or credit.
• For performing copyrighted music without mentioning the source.
• Recreating any painting or image with the same set-up or precisely the
same idea, then it will be considered plagiarism.
• Illegal distribution of any content that has copyright will be punishable as
it will be considered as plagiarism.
11. Steps to control plagiarism :
1.Appreciating and recognizing genuine content.
2.Encouraging usage of latest and updated editions of content.
3.Educate the students about policies of plagiarism.
4.Using plagiarism detection application like PlagScan and
iTenticate etc.
5. Cite your source with full name, date of the publication and
any other required information. Using a direct quote always use
quotation marks to mention that the words are not yours and
then mention the sources with it.
12. SSL – SECURE SOCKET LAYER
It provide security to the data that is transferred between web browser and
server. SSL encrypt the link between a web server and a browser which
ensures that all data passed between them remain private and free from
attack.
• Secure Socket Layer is networking protocol used at transport layer to
provide secure connection between client and sever over internet.
• It is mainly used when using accessing important details like credit card
number, money transfer etc.
• Text transferred between web server and web browser is encrypted.
• Green colored address bar ensures extended validation
• SSL connection requires SSL certificate.
13.
14. Difference between HTTP and HTTPS :
1.HTTP URL in your browser's address bar is http:// and the
HTTPS URL is https://.
2.HTTP is unsecured while HTTPS is secured.
3.No SSL certificates are required for HTTP, with HTTPS it is
required that you have an SSL certificate and it is signed by a CA.
4.HTTP doesn't require domain validation, where as HTTPS
requires at least domain validation and certain certificates even
require legal document validation.
5.No encryption in HTTP, with HTTPS the data is encrypted
before sending.