CS 2023unit III
CS 2023unit III
CS 2023unit III
Hello Everyone
Welcome back to our MOOC course. Today we shall be learning Unit III and that is Internet
Security.
We all are quite familiar and used to with internet don’t we? Yes of course. Internet is a vast pool
of information and resources. Also we have numerous applications such as facebook, instagram,
tik tok to name some, which we use by connecting to the internet. Also we are quite used to with
sending and receiving emails via internet.
Internet actually is an inter-connected network of networks. Internet consists of thousands and
thousands of networks connected via some cables, most commonly fiber optic cables across
several continents. These cables also are laid under the sea and oceans across Atlantic and
pacific. These undersea cables also falls under critical infrastructure. This infrastructure needs
protection in order to function smoothly. While saying protection we are saying physical security
and logical security.
Physical security means protecting network infrastructure such as servers, cables and other
networking devices from some physical damages. Physical damage might cause by natural
phenomenon such as flooding, earthquakes, fire, hurricanes etc. and sometimes by intentional
purposes such as sabotage, vandalism etc. Either way we need to be vigilant and try to maintain
network infrastructure in maximum protection by adopting strong physical security means.
Likewise our internet infrastructure might be vulnerable from logical threats that covers all
aspects of online digital infrastructure — including networks, websites, and browser security —
and also involves applications or software services that rely on network or internet connections.
Here in this section we shall discuss in these aspect in detail.
Malware: Malware is malicious software that infects your device. Computer viruses and
ransomware are some of the many different types of malware.
Ransomware: One of the most devastating types of malware, ransomware hijacks your
computer files and encrypts them, which is some mechanism that locks your information,
until you pay to have them decrypted which is a mechanism that unlocks your information.
Botnets: Networks of infected computers are called botnets, which are controlled via
secrete remote access and used to launch Distributed Denial of Service attacks that can
crash websites.
Hacking: Hackers are known for exploiting vulnerabilities in computer security systems
to access files and data. They may try to spy on you online or install malware on your
system.
Phishing: Usually starting with links sent via email or text, phishing tricks you into giving
over personal data — like login credentials or financial information. Phishing is one of the
most common internet security threats today.
Wi-Fi threats: Many internet security threats target Wi-Fi networks, either by gaining
access to routers or hacking smart home devices.
Raise awareness
You have a responsibility to help keep your system secure. Make sure that we understand our
role and any relevant policies and procedures, and update with regular cyber security awareness
and training.
You should use security software, such as anti-spyware, anti-malware and anti-virus programs,
to help detect and remove malicious code if it slips into your network.
Spam is unsolicited communication that now makes up the majority of email traffic. Your
internet service provider should offer you spam filtering as a default feature of your
dedicated email service.
Spam filters detect unwanted emails based on suspicious word patterns and other clues,
and divert them to a separate folder or mailbox after classifying them as spam. You can
buy separate spam filters or programs to reduce the spam you receive and securely
manage your inbox
There are also some best practices to boost our internet security with the following best-
practices:
To conclude, I recommend you to be vigilant towards the threat posed while we are using
internet. It is our responsibility to use the internet in a safe way and not to act in such a way that
your action can harm others. Thankyou.