Unit 1 (CSS)
Unit 1 (CSS)
Unit 1 (CSS)
UNIT 1
COMPUTER SECURITY
In this digital era, we all want to keep our computers and our personal
information secure and hence computer security is important to keep our
personal information protected. It is also important to maintain our
computer security and its overall health by preventing viruses and
malware which would impact on the system performance
Now moving forward with this ‘What is Computer Security?” article let’s
look at the most common security threats.
Computer security threats are possible dangers that can possibly hamper the
normal functioning of your computer. In the present age, cyber threats are
constantly increasing as the world is going digital. The most harmful types of
computer security are:
Viruses
Computer Worm
A computer worm is a software program that can copy itself from one
computer to another, without human interaction. The potential risk here is
that it will use up your computer hard disk space because a worm can
replicate in greate volume and with great speed.
Phishing
Rootkit
Keylogger
Also known as a keystroke logger, keyloggers can track the real-time activity
of a user on his computer. It keeps a record of all the keystrokes made by user
keyboard. Keylogger is also a very powerful threat to steal people’s login
credential such as username and password.
These are perhaps the most common security threats that you’ll come across.
Apart from these, there are others like spyware, wabbits, scareware,
bluesnarfing and many more. Fortunately, there are ways to protect yourself
against these attacks.
Attacks
We want our security system to make sure that no data are disclosed to
unauthorized parties. Data should not be modified in illegitimate ways
Legitimate user can access the data .
Active attacks: the contents of the original message are modified in some
ways.
Examples of Vulnerabilities
Vulnerabilities are not introduced to a system; rather they are there from
the beginning. There are not many cases involving cybercrime activities
that lead to vulnerabilities. They are typically a result of operating system
flaws or network misconfigurations. Cyber security threats, on the other
hand, are introduced to a system like a virus download or a social
engineering attack.
Vulnerability scanning
Penetration testing
Google hacking
1. In error 404 hacking digital India part 1 chase , the cyber crime and
cyber attacks hack the information of users like bank detail and personal
information
2. It is real time incident . In this , attacker or hacker creates an attractive
video so that victim gets attracted and plays that video into system .
3. When we clicked on video to play then at the time of buffering ,
hacker can know our current location and GPS history but also have
complete access to our contacts , text messages , Facebook , Whatsapp
and most importantly our bank details , including our CVV number
4. Hackers are creating a kind Trojan file , and android apk files . The apk
files that will be distributed all over the internet . Those who download
this file will be hacked easily
CONTROL HIJACKING
The attacker uses a program that appears to be the server to the client and
appears to be the client to the server .
This attack may be used simply to gain access to the messages , or to
enable the attacker to modify them before retransmitting them .
1. Buffers are memory storage regions that temporarily hold data while it
is being transferred from one location to another .
Run-time Defenses
In order to prevent data loss, prevent data theft,minimize employee
downtime, and maximize IT productivity, businesses need an additional
line of preventative defense that can block attacks that antivirus doesn’t –
before any harm is done.An emerging category of software known as
Runtime Malware Defense offers a promising solution that works by
detecting and blocking malware and exploits at runtime