Computer and Network Security
Computer and Network Security
Cryptography: It is a
Integrity: This term
process of protecting the
certifies that the
information by storing on
information cannot be
disk. It is an art of writing
changed by unauthorized
data in hidden or secrete
users.
format.
3.1 Malware
✓ Malware is a short term used for MALicious softWARE. It is any software developed with an
intention to damage hardware devices, steal data, or cause any other trouble to the user.
Viruses, Worms, Ransomware, Trojans, and Spyware are some of the kinds of malware.
3.1.1 Modes of Malware distribution
✓ A malware once designed, can take many routes to reach your computer. Some of the
common distribution channels for malware are:
• Downloaded from the Internet: Most of the time, malware is unintentionally
downloaded into the hard drive of a computer by the user.
• Spam Email: We often receive an unsolicited email with embedded hyperlinks or
attachment files. These links or attached files can be malware.
• Removable Storage Devices: Often, the replicating malware targets the removable
storage media like pen drives, SSD cards, music players, mobile phones, etc. and infect
them with malware that gets transferred to other systems that they are plugged into.
• Network Propagation: Some malware like Worms have the ability to propagate from
one computer to another through a network connection.
3.2 Virus
✓ A virus is a piece of software code created to perform malicious activities and hamper
resources of a computer system like CPU time, memory, personal files, or sensitive
information.
✓ Some well-known viruses include CryptoLocker, ILOVEYOU, MyDoom, Sasser and Netsky,
Slammer, Stuxnet, etc.
✓ It is a software program that affects the system to corrupt the files in the form of executable
files. The first computer virus is creepers and is developed in 1986.
✓ The virus is used for destruction purpose. It can copy itself and gets attached by itself to
other files. The virus can attack over a network such as the Internet or removable disk like
floppy disk, DVD, CD, and Pen drive. Virus can infect the computer and spread the infection.
3.2.1 Types of Virus
✓ Append Virus: This virus appends its malicious code to the end of the host program's file.
After that, it alters the file's header in a way that the file's header is redirected to the start
of the malicious code of the append virus. Thus, this code is executed each time the
program runs. However, it does not destroy the host program; rather, it modifies it in a
way that it holds the virus code and enables the code to run itself.
3.2.2 Antivirus
Antivirus is software, also known as anti-malware. Initially, antivirus software was developed to
detect and remove viruses only hence the name anti-virus. However, with time it has evolved
and now comes bundled with the prevention, detection, and removal of a wide range of malware.
3.3 Worms
✓ The Worm is also malware that incurs unexpected or damaging behavior on an infected
computer system. The major difference between a worm and a virus is that unlike a virus, a
worm does not need a host program or software to insert its code into. Worms are
standalone programs that can work on its own.
✓ Also, a virus needs human triggering for replication (i.e. when a user opens/executes the
infected file), while a worm replicates on its own and can spread to other computers through
[email protected] 7|P age http://www.edutap.co.in
the network. Some prominent examples of worms include Storm Worm, Sobig, MSBlast,
Code Red, Nimda, Morris Worm, etc.
3.4 Ransomware
✓ It is a type of malware that targets user data. It either blocks the user from accessing their
own data or threatens to publish the personal data online and demands ransom payment
against the same.
3.5 Trojan
✓ It is malware, that looks like a legitimate software and once it tricks a user into installing it,
it acts pretty much like a virus or worm. However, a Trojan does not self-replicate or infect
other files, it spreads through user interaction such as opening an email attachment or
downloading and executing a file from the Internet. Some Trojans create backdoors to give
malicious users access to the system.
3.6 Spyware
✓ It is a type of malware that spies on a person or an organisation by gathering information
about them, without the knowledge of the user. It records and sends the collected
information to an external entity without consent or knowledge of the user.
✓ Spyware usually tracks internet usage data and sells it to advertisers. They can also be used
to track and capture credit card or bank account information, login and password
information or user’s identity.
3.7 Adware
✓ An Adware is malware that is created to generate revenue for its developer. An adware
displays online advertisements using pop-ups, web pages, or installation screens. Once an
adware has infected a substantial number of computer systems, it generates revenue either
by displaying advertisements or using “pay per click” mechanism to charge its clients against
the number of clicks on their displayed ads.
3.8 Keyloggers
✓ A keylogger can either be malware or hardware. The main purpose of this malware is to
record the keys pressed by a user on the keyboard. A keylogger makes logs of daily keyboard
usage and may send it to an external entity as well. In this way, very sensitive and personal
information like passwords, emails, private conversations, etc. can be revealed to an external
entity without the knowledge of the user.
4 Spam
Spam encompasses a range of activities across digital platforms such as messaging, forums, chats,
emails, and advertisements. However, email spam is perhaps the most recognized form.
HTTP transmits data over the network without encryption, making it susceptible to attacks by
hackers. Therefore, it's suitable for websites sharing public information like news portals and
blogs.
In contrast, HTTPS encrypts data before transmission and requires an SSL Digital Certificate for
decryption at the receiver's end. This ensures enhanced security for websites handling sensitive
information.
6 Firewall
A computer firewall serves as a network security mechanism crafted to safeguard a trusted
private network from unauthorized access or traffic stemming from an untrusted external
network, such as the Internet or distinct sections within the same network.
Firewalls can be deployed through software, hardware, or a combination of both. They function
as the primary line of defense against malware infiltration.
A firewall acts as a network filter and based on the predefined security rules, it continuously
monitors and controls the incoming and outgoing traffic.
7 Cookies
A computer cookie, a small file, or data packet, is stored by a website on the client's computer
and can only be modified by the originating website. The client's computer serves as a host for
storing the cookie, which is utilized by websites to retain browsing information.
There are various types of cookies depending on their functions. Session cookies, for instance,
monitor the ongoing session and automatically end it upon timeout, as seen in banking websites
were leaving an e-banking page open results in automatic closure after a period of inactivity.
Similarly, authentication cookies are employed by websites to verify whether the user is already
logged in (authenticated) or not. This eliminates the need for repeated logins when navigating
different pages or links within the same website.
Identity theft occurs when someone wrongfully obtains and uses another person's personal data, such as
their name, Social Security number, credit card number, or other identifying information, usually for
financial gain.
Phishing, Hacking, 3rd Party Cookies, Spyware, Dumpster Diving, Malware can also lead to identity theft
[email protected] 10 | P a g e http://www.edutap.co.in
9.2 Mail Bomb
✓ An excessively large email (typically many thousands of messages) or one large message
sent to a user’s email account. This is done to crash the system and prevent genuine
messages from being received.
9.3 Scareware
✓ A common trick cybercriminal uses to make users think that their computer has become
infected with malware to get them to purchase a fake application.
9.4 Sniffers
✓ A software program used to monitor the traffic in a network. The hackers may use the
sniffed data to access important confidential data.
9.5 Rootkit
✓ A program designed to hide objects such as processes, files or Windows registry entries
(often including its own).
9.6 Phishing
✓ This is acquiring the personal and sensitive information of a person through official
looking emails. Users of online banking and e-commerce websites are more prone to this
attack.
10 Internet Safety
✓ Strong Passwords: Avoid using easily guessable information like birthdates or pet names.
Consider using a password manager to generate and store complex passwords securely.
✓ Two-Factor Authentication (2FA): Enable two-factor authentication wherever possible. This
adds an extra layer of security by requiring a second form of verification, such as a code sent
to your phone, in addition to your password.
✓ Update Software Regularly: Keep your operating system, antivirus software, web browsers,
and other applications up to date with the latest security patches and updates to protect
against vulnerabilities.
✓ Secure Wi-Fi Connections: Use encrypted Wi-Fi connections at home and in public places.
Avoid connecting to public Wi-Fi networks without using a VPN (Virtual Private Network) for
added security.
✓ Be Cautious of Phishing: Be wary of unsolicited emails, messages, or calls asking for personal
information or urging urgent action. Avoid clicking on suspicious links or downloading
attachments from unknown sources.
✓ Privacy Settings: Review and adjust privacy settings on social media platforms and other
online services to control who can see your information and posts. Limit the amount of
personal information you share publicly.
✓ Safe Browsing Habits: Exercise caution when visiting websites, downloading files, or clicking
on links. Stick to reputable websites and avoid downloading software from unknown sources
to minimize the risk of malware infections.
✓ Use Secure Websites (HTTPS): Look for the padlock icon and "https://" in the URL when
accessing websites, especially when entering sensitive information like passwords or credit
card details. This indicates a secure connection.
✓ Data Backup: Regularly back up important files and data to an external hard drive, cloud
storage service, or another secure location to protect against data loss due to malware,
hardware failure, or other incidents.
✓ Educate Yourself: Stay informed about common online threats and scams. Educate yourself
and your family members about internet safety practices and encourage open communication
about online experiences and concerns.
[email protected] 12 | P a g e http://www.edutap.co.in
10.1 Protecting Children Online
Protecting children online requires special attention and measures due to their vulnerability.
Here are some specific strategies to help keep children safe on the internet:
✓ Parental Controls: Use parental control features available on devices, routers, and internet
browsers to restrict access to inappropriate content. These controls can limit the websites
children can visit, set time limits for internet usage, and block or filter explicit content.
✓ Safe Search Settings: Enable safe search settings on search engines to filter out explicit
content from search results. This helps prevent children from accidentally accessing
inappropriate material while browsing the web.
✓ Education and Communication: Educate children about online safety, including the risks of
sharing personal information, interacting with strangers, and engaging in cyberbullying.
Encourage open communication and teach them to report any suspicious or uncomfortable
online encounters.
✓ Supervised Internet Use: Monitor children's online activities and supervise their internet
usage, especially for younger children. Co-browsing with them can help you guide their
online experience and address any concerns or questions they may have.
✓ Set Ground Rules: Establish clear rules and guidelines for internet use, such as which
websites are allowed, time limits for screen time, and appropriate online behavior. Make
sure children understand the consequences of breaking these rules.
✓ Privacy Settings: Review and adjust privacy settings on social media accounts and other
online platforms to restrict who can view and interact with your child's profile or posts.
Teach children to be cautious about sharing personal information online.
✓ Cyberbullying Awareness: Educate children about cyberbullying and encourage them to
speak up if they experience or witness bullying online. Teach them how to block or report
abusive behavior and seek help from a trusted adult.
✓ Safe Messaging Apps: Choose messaging apps and online platforms with built-in safety
features designed for children, such as age-appropriate content filters, moderation tools,
and options for parental supervision.
✓ Regular Check-Ins: Have regular conversations with children about their online experiences
and any challenges they may be facing. Create a supportive environment where they feel
comfortable sharing their concerns or seeking help if needed.
✓ Lead by Example: Be a positive role model for responsible internet use. Practice good
online habits yourself and demonstrate respectful and safe behavior in your interactions
online.
11 Incognito mode
It also known as private browsing or privacy mode, is a feature available in most web browsers
that allows users to browse the internet without storing local data such as browsing history,
cookies, or cached files. However, it's important to note that incognito mode does not make you
completely anonymous online.
[email protected] 13 | P a g e http://www.edutap.co.in
it is closed. This means that once the Incognito window is closed, all data associated with
that session is deleted, providing users with a level of privacy and anonymity does not
present in regular browsing.
✓ In Incognito Mode, downloaded files are not saved directly to the device's local storage.
However, it's essential to note that while the downloaded files themselves aren't stored
locally after the Incognito session ends, users should still exercise caution.
✓ Once a file is downloaded in Incognito Mode, it typically resides temporarily in the device's
RAM or cache. While this may provide a level of privacy during the browsing session, the file
could still potentially leave traces on the device. For instance, if the user accesses the
downloaded file directly from the browser before the Incognito session ends, it might leave
a temporary cache or history entry.
11.2 Uses
✓ Privacy: It prevents others who may have access to your device from seeing your browsing
history.
✓ Testing: Web developers often use incognito mode to test websites without interference
from their browsing history or cached data.
✓ Logging into Multiple Accounts: It allows users to log into multiple accounts on the same
website simultaneously.
✓ Avoiding Cookies: Incognito mode can help users avoid being tracked by cookies, which are
often used for advertising purposes.
11.3 Limitations
✓ While Incognito Mode provides a level of privacy by not storing data locally, it does not make
users completely anonymous online. Internet service providers, websites visited, and
network administrators may still be able to track users' online activities.
✓ Additionally, activities such as downloading files or bookmarking pages while in Incognito
Mode may still leave traces on the device or network.
[email protected] 14 | P a g e http://www.edutap.co.in