Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore E-LESSON-4

E-LESSON-4

Published by Teamlease Edtech Ltd (Amita Chitroda), 2020-11-05 09:35:45

Description: E-LESSON-4

Search

Read the Text Version

IDOL Institute of Distance and Online Learning ENHANCE YOUR QUALIFICATION, ADVANCE YOUR CAREER.

BCA 2 All right are reserved with CU-IDOL Internet Computing and Ethics Course Code: BCA-113 Semester: First SLM Unit: 4 e-Lesson No.: 4 www.cuidol.in Unit- 4 (BCA113)

Internet Security 33 OBJECTIVES INTRODUCTION Student will be able to define basic of internet In this unit we are going to learn basic of security and ethical issues. internet security and ethical issues. Student will be able to learn about cyber crime and Also define cyber crime and how they are its categorization. categorized ,define malwares and their types also. Student will be able to learn about virus and its types. Student will be able to know about malware and its Brief explanation of virus, their types and types. how to detect them. www.cuidol.in Unit- 4 (BCQA11031) INASlTl ITriUgThEt OarFeDrIeSsTeArNvCeEd AwNitDh OCNUL-IIDNOE LLEARNING

TOPICS TO BE COVERED 4  Introduction to Internet Security  About Ethical issues  About Various Cyber crimes  About Computer Virus  About Malware www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

What is Internet Security 5  Internet security is a broad term that refers to the various steps individuals and companies take to protect computers or computer networks that are connected to the Internet.  One of the basic truths behind Internet security is that the Internet itself is not a secure environment.  As a result, unscrupulous hackers and scam artists have ample opportunities to intercept and change the information.  It would be virtually impossible to secure every computer connected to the Internet around the world. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

Privacy v/s Security 6  Privacy defines the ability to protect personally  Security refers to protection against identifiable information . unauthorized access.  Privacy means protecting sensitive information  Security provides protection for data and related to individuals and organizations. information including the ones that are stored electronically.  Privacy cannot be achieved without security.  Privacy program focuses on personal  Security can be achieved without privacy.  Security program focuses on all sorts of information such as names , address , social security numbers , log in credential , financial information assets that an organization account information ,etc. collects.  It refers to protection of privacy right with  It implement security protocol to provide respect to processing of personal data. confidentially , integrity and availability of information assets www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

Ethical issues 7  Ethical issues refers to the code of responsible behaviour on the Internet. Just as we are taught to act responsibly in everyday life with lessons such as \"Don't take what doesn't belong to you\" and \"Do not harm others,\" we must act responsibly in the cyber world as well.  The basic rule is \"Do not do something in cyberspace that you would consider wrong or illegal in everyday life.\" www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

Major to take to control ethical issues 8  Do not use rude or offensive language.  Do not cyberbully.  Do not plagiarize.  Do not break into someone else's computer.  Do not use someone else's password.  Do not attempt to infect or in any way try to make someone else's computer unusable. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

CYBERCRIME 9  Cybercrime is any criminal activity that involves a computer, networked device or a network.  Most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them, while others use computers or networks to spread malware, illegal information, images or other materials. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

TYPES OF CYBER CRIME 10  Generally there are two types of cyber crime  Crimes that target networks or devices  DOS attack  Cyber extortion  Crimes using devices to participate in criminal activities  Cyberstalking  Phishing www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

CYBER LAW 11  Cyber law is referred as the law of internet.  It is the part of overall legal system that deals with the internet , cyberspace , and their respective legal issues.  Cyber law covers a fairly broad area , encompassing several subtopics including freedom of expression , access to and usage of the internet , and online privacy.. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

WHY ARE CYBER LAW NEEDED? 12  Like any law, a cyber law is created to help protect people and organizations on the Internet from malicious people on the Internet and help to maintain order. If someone breaks a cyber law or rule, it allows another person or organization to take action against that person or have them sentenced to a punishment. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

Virus 13  A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

Types of viruses 14  BOOT DECTOR VIRUS  Web Scripting Virus  BROWSER HIJACKER  Resident Virus  DIRECT ACTION VIRUS.  POLYMORPHIC VIRUS.  MULTIPARTITE VIRUS.  MACRO VIRUS www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

DETECTATION OF VIRUS 15  Heuristic scanning is used to detect new/unknown viruses. It examines application program code and looks for particular commands to relate it with malicious programs. The process scans various programs i.e. boot record, macro files, executable files for virus-like instructions www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

MALWARE 16  Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

TYPES OF MALWARE 17  ADWARE - Adware is a type of malware that automatically delivers advertisements. Common examples of adware include pop-up ads on websites and advertisements that are displayed by software.  BOT - Bots are software programs created to automatically perform specific operations. While some bots are created for relatively harmless purposes.  BUG -In the context of software, a bug is a flaw produces an undesired outcome. These flaws are usually the result of human error and typically exist in the source code or compilers of a program  RANSOMWARE - Ransomware is a form of malware that essentially holds a computer system captive while demanding a ransom. The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages that are intended to force the user to pay the malware creator to remove the restrictions and regain access to their computer www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

TYPES OF MALWARE 18  ROOTKIT - A rootkit is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs. Once a rootkit has been installed it is possible for the malicious party behind the rootkit to remotely execute files, access/steal information, modify system configurations, alter software , install concealed malware, or control the computer as part of a botnet.  SPYWARE - Spyware is a type of malware that functions by spying on user activity without their knowledge. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more.  TROJAN - A Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. A Trojan can give a malicious party remote access to an infected computer. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

PREVENTION AND REMOVAL 19  Following are some ways to prevent malware and to detect them-  Install and run anti-malware and firewall software. When selecting software, choose a program that offers tools for detecting, quarantining, and removing multiple types of malware.  Keep software and operating systems up to date with current vulnerability patches. These patches are often released to patch bugs or other security flaws that could be exploited by attackers.  Be vigilant when downloading files, programs, attachments, etc. Downloads that seem strange or are from an unfamiliar source often contain malware. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

MULTIPLE CHOICE QUESTIONS 20 Q1…………… is to protect data and passwords. a) Encryption b) Authentication c) Authorization d) Non-repudiation Q2. Which is not an objective of network security? a) Identification b) Authentication c) Access control d) Lock Q3.which is the type of malware among the following : a) All of these b) TROJAN c) SPYWARE d) ROOTKIT Answers: 1.a) 2.d) 3. a) Unit- 4 (BCA113) All right are reserved with CU-IDOL www.cuidol.in

MULTIPLE CHOICE QUESTIONS 21 Q4.What is not the type of virus: a) POLYMORPHIC VIRUS. b) MULTIPARTITE VIRUS. c) MACRO VIRUS d) None of the above Q5.Which is not the type of cyber crime: a) Phishing b) Dos Attack c) Virus d) Cyberstalking Q6.What are not the Major to take to control ethical issues : a) Do not use rude or offensive language. b) Do not cyberbully. c) Do not plagiarize. d) Do break into someone else's computer. Answers: 4. d) 5. c) 6.d) www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

SUMMARY 22  The term \"Internet connectivity\" refers to the way people are connected to network of networks (internet). It may include dial-up telephone lines, broadband connections, and wireless devices.  Internet security is a broad term that refers to the various steps individuals and companies take to protect computers or computer networks that are connected to the Internet.  Privacy defines the ability to protect personally identifiable information whereas Security refers to protection against unauthorized access.  Ethical issues refers to the code of responsible behaviour on the Internet. Just as we are taught to act responsibly in everyday life with lessons such as \"Don't take what doesn't belong to you\" and \"Do not harm others,\" we must act responsibly in the cyber world as well. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

SUMMARY 23  Cybercrime is any criminal activity that involves a computer, networked device or a network.  A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

FREQUENTLY ASKED QUESTIONS 24 Q1. Differentiate between privacy and security. Ans: Privacy defines the ability to protect personally identifiable information. Whereas Security refers to protection against unauthorized access. For Further details please refer to slide 6 and the subject SLM unit 4. Q2. What is cybercrime? Explain different types of cybercrime. Ans: Cybercrime is any criminal activity that involves a computer, networked device or a network. For further details please refer to the subject SLM unit 4. Q3. Define computer virus. Describe its different types. Ans: A computer virus is a malicious program that self-replicates by copying itself to another program. For Further details please refer to the subject SLM unit 4. www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

REFERENCES 25  https://www.yourdictionary.com/internet-security  https://searchsecurity.techtarget.com/definition/cybercrime  https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/ www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL

26 THANK YOU www.cuidol.in Unit- 4 (BCA113) All right are reserved with CU-IDOL


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook