SlideShare a Scribd company logo
1 of 10
WHAT IS INTERNET SECURITY ?
Internaet Security is a branch of computer
security specifically related to not only Internet,
often involving browser security and the World
Wide Web (WWW) , but also network security as
it applies to other applications or operating
systems as a whole .
Its objective is to establish rules and measures
to use against attacks over the Internet . The
Internet represents an insecure channelfor
exchanging information , which leads to a high
risk of intrusion or fraud , such as phishing ,
Slow Connections:
The slow and sluggish behaviour of you computer network is
perhaps the most common sign that indicates that your IT system
is under attack.
Unexpected Popups:
Your computer is surely compromised when windows the user
clicking anything on the screen.
Mysterious Computer Behaviour :
Strange behaviour of the computer system must be taken as a red
flag and a sign of trouble.
Inability to download updates :
The presence of malicious programs in the computer also
prohibits users from downloading important updates that will
make their operating system more secure.
Unfamiliar programs running in Task Manager:
***************************************************************************
I) MALICIOUS SOFTWARE :
 An internet user can be tricked or forced into downloading software
that is of malicious intent onto a computer, such software comes in
many forms, such as viruses, trojan horses, spyware and worms.
 Malware, short for malicious software, is any software used to disrupt
computer operation, gather sensitive information, or gain access to
private computer systems.
 A botnet is a network of zombie computers that have been taken over
by a robot or bot that performs large-scale malicious acts for the
creator of botnet.
 Computer viruses are programs that can replicate
their structures or effects by infecting other
files or structures on a computer to steal data.
 Computer worms are programs that can replicate
themselves throughout a computer network,
performing a malicious tasks throughout.
 Ransomware is a type of malware which restricts access to the
computer system that it infects , and demands a ransom paid to the
creator(s) of the malware in order for restriction to be removed.
 Scareware is scam software of usually limited or no benefit, containing
malicious payloads, that is sold to consumers via certain unethical
marketing practices.
Spyware refers to programs that surreptitiously
monitor activity on a computer system and
report that information to others without
the user’s consent.
One particular kind of spyware is key logging
malware. Keystroke logging, often referred to
as key logging or keyboard capturing , is the
action of recording (logging) the keys struck on a keyboard.
A trojan horse, commonly known as a trojan, is a general term for
malicious software that pretends to be harmless, so that a user will be
convinced to download it onto the computer.
*************************************
******************************
II) Denial-of- Service (DoS) attacks :
 A denial-of-service attack (DoS attack) or distributed denial-of-service
attack (DDoS attack) is an attempt to make a computer resource unavailable to
its intended users.
 According to a business who participated in an international business security
survey, 25% of respondents experienced a DoS
attack in 2007 and 16.8% experienced one in 2010.
 Dos attacks often use bots (or a botnet) to carry
out the attack.
III) Phishing :
 Phishing is an attack which targets online users
for extraction of their sensitive information such
as username, password and credit card information.
 It occurs when the attacker pretends to be a
trustworthy entity, either via email or web page.
 Victims are directed to fake web pages, which are dressed to look legitimate,
via spoof emails, instant messenger/social media or other avenues.
 Insurance group RSA said that phishing accounted for worldwide losses of $
10.8 billion in 2016.
III) Application Vulnerabilities :
 Applications used to access Internet resources may contain
security vulnerabilities such as memory safety bugs or flawed
authentication checks.
 The most severe of these bugs can give network attackers
full control over the computer.
 Most security applications and suites are incapable of
adequate defence against these kinds of attacks.
 A very widespread web-browser application vulnerability is the so- called
CROSS-ORIGIN RESOURCE SHARING (CORS) vulnerability for maximum
security and privacy.
 Security Suites ;
They contain a suite of firewalls, anti-virus, anti-spyware
and more. They also offer protection, portable storage
device safety check, private internet browsing, cloud
anti-spam, a file shredder or make security-related
decisions and several are free of charge.
Network layer security ;
TCP/IP protocols may be secured with cryptographic
methods and security protocols. These include SECURE
SOCKETS LAYER (SSL), succeeded by TRANSPORT LAYER
SECURITY (TSL) for web traffic, PRETTY GOOD PRIVACY
(PGP) for email and IPsec for the network layer security.
 Multi-factor authentication :
Multi-factor authentication (MFA) is a method of computer
access control in which a user
is granted access only after
successfully presenting several
separate pieces of evidence to
an authentication mechanism.
Internet resources, such as
websites and email, may be secured sing multi-factor
authentication .
 Security Token :
Some online sites offer customers the ability to use a six-digit code
which randomly changes after 30-60 seconds on a security token .The
keys on the security token have
built in mathematical
computations and manipulate
numbers based on the current
time built into the device.
This means that every 30 seconds there is only a certain array of
numbers possible which would be correct to validate access to the
online account.
__________________________________________________________
Some more tips to be secured online :-
Use good antivirus, internet security suite
Encrypt the hard drive(s)
Use a secured Wi-Fi connection(s)
Stay safe from tech support scams
Use a safe browser etc.
INTERNET SECURITY.pptx

More Related Content

Similar to INTERNET SECURITY.pptx

Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptxVIRAJDEY1
 
Information security
Information securityInformation security
Information securityIshaRana14
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingMuhammad FAHAD
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 

Similar to INTERNET SECURITY.pptx (20)

Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
 
Network security
Network securityNetwork security
Network security
 
Information security
Information securityInformation security
Information security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
computer security
computer securitycomputer security
computer security
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 

Recently uploaded

Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 

Recently uploaded (20)

Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 

INTERNET SECURITY.pptx

  • 1.
  • 2. WHAT IS INTERNET SECURITY ? Internaet Security is a branch of computer security specifically related to not only Internet, often involving browser security and the World Wide Web (WWW) , but also network security as it applies to other applications or operating systems as a whole . Its objective is to establish rules and measures to use against attacks over the Internet . The Internet represents an insecure channelfor exchanging information , which leads to a high risk of intrusion or fraud , such as phishing ,
  • 3. Slow Connections: The slow and sluggish behaviour of you computer network is perhaps the most common sign that indicates that your IT system is under attack. Unexpected Popups: Your computer is surely compromised when windows the user clicking anything on the screen. Mysterious Computer Behaviour : Strange behaviour of the computer system must be taken as a red flag and a sign of trouble. Inability to download updates : The presence of malicious programs in the computer also prohibits users from downloading important updates that will make their operating system more secure. Unfamiliar programs running in Task Manager: ***************************************************************************
  • 4. I) MALICIOUS SOFTWARE :  An internet user can be tricked or forced into downloading software that is of malicious intent onto a computer, such software comes in many forms, such as viruses, trojan horses, spyware and worms.  Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.  A botnet is a network of zombie computers that have been taken over by a robot or bot that performs large-scale malicious acts for the creator of botnet.  Computer viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer to steal data.  Computer worms are programs that can replicate themselves throughout a computer network, performing a malicious tasks throughout.
  • 5.  Ransomware is a type of malware which restricts access to the computer system that it infects , and demands a ransom paid to the creator(s) of the malware in order for restriction to be removed.  Scareware is scam software of usually limited or no benefit, containing malicious payloads, that is sold to consumers via certain unethical marketing practices. Spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user’s consent. One particular kind of spyware is key logging malware. Keystroke logging, often referred to as key logging or keyboard capturing , is the action of recording (logging) the keys struck on a keyboard. A trojan horse, commonly known as a trojan, is a general term for malicious software that pretends to be harmless, so that a user will be convinced to download it onto the computer. ************************************* ******************************
  • 6. II) Denial-of- Service (DoS) attacks :  A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users.  According to a business who participated in an international business security survey, 25% of respondents experienced a DoS attack in 2007 and 16.8% experienced one in 2010.  Dos attacks often use bots (or a botnet) to carry out the attack. III) Phishing :  Phishing is an attack which targets online users for extraction of their sensitive information such as username, password and credit card information.  It occurs when the attacker pretends to be a trustworthy entity, either via email or web page.  Victims are directed to fake web pages, which are dressed to look legitimate, via spoof emails, instant messenger/social media or other avenues.  Insurance group RSA said that phishing accounted for worldwide losses of $ 10.8 billion in 2016.
  • 7. III) Application Vulnerabilities :  Applications used to access Internet resources may contain security vulnerabilities such as memory safety bugs or flawed authentication checks.  The most severe of these bugs can give network attackers full control over the computer.  Most security applications and suites are incapable of adequate defence against these kinds of attacks.  A very widespread web-browser application vulnerability is the so- called CROSS-ORIGIN RESOURCE SHARING (CORS) vulnerability for maximum security and privacy.  Security Suites ; They contain a suite of firewalls, anti-virus, anti-spyware and more. They also offer protection, portable storage device safety check, private internet browsing, cloud anti-spam, a file shredder or make security-related decisions and several are free of charge.
  • 8. Network layer security ; TCP/IP protocols may be secured with cryptographic methods and security protocols. These include SECURE SOCKETS LAYER (SSL), succeeded by TRANSPORT LAYER SECURITY (TSL) for web traffic, PRETTY GOOD PRIVACY (PGP) for email and IPsec for the network layer security.  Multi-factor authentication : Multi-factor authentication (MFA) is a method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism. Internet resources, such as websites and email, may be secured sing multi-factor authentication .
  • 9.  Security Token : Some online sites offer customers the ability to use a six-digit code which randomly changes after 30-60 seconds on a security token .The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every 30 seconds there is only a certain array of numbers possible which would be correct to validate access to the online account. __________________________________________________________ Some more tips to be secured online :- Use good antivirus, internet security suite Encrypt the hard drive(s) Use a secured Wi-Fi connection(s) Stay safe from tech support scams Use a safe browser etc.