DATA PROTECTION
Threats to Data:
A threat is a potential violation of security. When a threat it actually executed, it becomes attack. Those who execute such actions, or cause them to be executed are called attackers.
Some common threats the average computer user faces every day are as follows:
COMPUTER VIRUSES
Computer viruses are malicious codes/programs that cause damage to data and files on system. Viruses can attack any part of a computer’s software such as boot block, operating system, system areas, files and application program macros etc.
2 Another similar programs also cause virus like effects.
Worms : A worm is a self replicating program which eats up the entire disk space or memory. A worm keeps on creating its copies until all the disk space or memory is filled.
Trojan Horses: A Trojan Horse is a program that appears harmless (such as a text editor or a utility program, a game, etc) but actually performs malicious functions such as deleting or damaging files.
Malware is a general term used to refer to viruses, worms, spyware, adware, etc.
In other words, it is unwanted software that someone else wants to run on your computer. Malware infects your computer, making it behave in a way, which you do not approve of.
Damage Caused by Viruses
Damage or delete files
Slow down your computer
Invade your email program : Some forms of viruses may wreak even more havoc by spreading themselves to the contacts in your address book.
Spyware : It is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it. It tracks the user’s behavior and reports information back to a central source. These are used to spy on some one either for legal or illegal purpose.
Spyware mostly get installed on your PC without your consent. Typically, spyware finds its way onto PCs by “piggybacking” onto a file, or gets downloaded from the Internet when you visit a particular website. Pests such as spyware can often lurk silently on your computer until someone or something sets them off, or until they are found and properly removed.
Damage Caused by Spyware
Compromises your data, computing habits and identity: Spyware can monitor information about your computing habits, such as what websites you visit, or record your keystrokes, which in the end can lead to identity theft.
For example, spyware can record the keystrokes that you use while keying in a credit card number and send this number to a “cyberthief”.
Alter PC Settings: Some forms of spyware can also alter computer settings like your web browser home page setting or the placement of your desktop icons. This doesn’t do much damage to your PC, but it’s really annoying.
Slows down your PC: Spyware can rob your PC or system speed and Internet access efficiency. This can become a big problem when you’re trying to use the programs on your PC, watch videos online, or download large files.
Adware
These are the programs that deliver unwanted ads to your computer (generally in Pop-Ups form). They consume your network bandwidth. Adware is similar to spyware – however, it may be installed with your consent. So it is advised that you thoroughly read installation agreements before you allow installation of a software.
Damage Caused by Adware:
Adware tracks information just like spyware: Adware tracks information about your data and computing habits to produce targeted advertising, such as pop-up ads, on your computer screen.
Displays arrays of annoying advertising: When infected with adware, you will likely see frequent pop-up ads appear out of nowhere. This may even happen every time you open your web browser.
Slows down your PC: The adware software working in the background and the bombardment of ads can slow your PC to a crawl.
Spamming
Spamming refers to the sending of bulk-mail by and identified or unidentified source. In non-malicious form, bulk advertising mail is sent to many accounts. In malicious form (e.g., email bombing), the attacker keeps on sending bulk mail until the mail-server runs out of disk space.
Damage Caused by Spamming:
Spam reduces productivity: The billions of spam messages circulating across the Internet can disrupt email delivery, degrade system performance, and reduce overall productivity.
Spam eats up your time: Deleting spam emails seems like the simple solution, but it eats up a significant amount of productivity.
Spam can lead to worse things: Spam messages may contain offensive or fraudulent material and can ever be used to spread viruses.
PC Intrusion
Every PC (Personal Computer) Connected to the Internet is a potential target for hackers. Computers are under constant attack from cyber vandals.
PC Intrusion can occur in any of the following form:
Sweeper Attack: This is another malicious program used by hackers.
It sweeps i.e., deletes all the data from the system.
Denial of Services: This type of attack eats up all the resources of a system and the system or applications come to a halt.
Example of such an attack is flooding a system with junk mail.
Password Guessing: Most hackers crack or guess passwords of system accounts and gain entry into remote computer systems. And then they use it for causing damages in one or another form.
Eavesdropping
Unauthorised monitoring of other people’s communications is called Eavesdropping.
Eavesdropping is a passive attack in which an attacker gains access to the communication-medium through which some communication is taking place and then listens to the communication and gets information about the content of the message.
Eavesdropping can be carried out through all communication devices and media of today – telephone systems, emails, instant messaging, other Internet services (e.g., chat rooms, social networking websites, etc. , mobile devices etc.
Eavesdropping activities do not affect normal operation of transmission and communication; thus both the sender and the recipient can hardly notice that the data has been stolen, intercepted or defaced.
For example, while sending emails, if the email message is not encrypted and digital signature has not been used, then the attacker can exploit these security loopholes. Because of these security lapses, the attacker can launch a Man-in-the-Middle attack on the network and intercept the message being transmitted. The attacker can then deface the message and send it to the recipient. The recipient is then deceived into believing the defaced message is the real message and may act as per the defaced message and may provide personal or sensitive information.
Similarly sending or providing confidential information over insecure protocols like HTTP makes the information more prone to eavesdropping attack.
Phishing and Pharming
Phishing: It is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, credit card information, account data etc. In phishing, an imposter uses an authentic looking email or web-site to trick recipients into giving out sensitive personal information.
For instance, you may receive an email from your bank (which appears genuine to you) asking to update your information online by clicking at a specified link. Though it appears genuine, you may be taken to a fraudulent site where all your sensitive information is obtained and later used for cyber-crimes and frauds.
Pharming (pronounced “farming”) is an attack in which a hacker attempts to redirect a website’s traffic to another, bogus website. Through pharming attack, the attacker points you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
In this the attacker convinces you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.
Cookies
A cookie, also known as a web cookie or a browser cookie, is a small piece of data sent from a website and stored in a user’s web browser (in a text file) while a user is browsing a website. Some cookies disappear after user closes his browser while other, known as tracking cookies, remain saved and load the next time user visits the same websites.
These cookies help track user’s browsing sessions and load information faster, but create some security and privacy concerns as well. These security and privacy concerns are
2. Tracking Information
3. Public Computers
Firewall
A firewall is a network security system, either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules.
Firewall is used to prevent unauthorized access in a network.
These are of 2 types:
Cyber Crimes
Any criminal offense that is facilitated by or involves the use of electronic communications or information systems, including any electronic device, computer, or the internet is referred to as Cyber Crime.
Types:
(i) Hacking :
Spoofing : It refers to a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a trusted source known to the receiver.
If spoofing attack, a hacker or malicious individual impersonates another user or device on a network, duping users or systems into believing they are legitimate or authentic.
Phishing: It is the practice of attempting to acquire sensitive information from individuals over the internet, by means of deception.
Social Engineering/Pretexting : They pose as a legitimate business or government officials to obtain your personal information from financial institutions, telephone companies, and other sources.
(ii) Cyber Trolls and Bullying
(iii) Cyber Stalking: Kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk.
�(iv) Scams: Any fraudulent business practice that extracts money from an unsuspecting ignorant person is called a scam. Scams committed over the Internet are called online scams.
OPEN SOURCE PHILOSOPHY
Free Software : Software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so.
No payments are needed to be made for free software.
Open Source Software: Freely used (making modifications, constructing business models around the software and so on) but it does not have to be free of charge.
Free and Open Source Software (FOSS) : It is free of cost as well as source code is available free ie we can modify the source code.
OPEN SOURCE PHILOSOPHY
Free Software : Software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so.
No payments are needed to be made for free software.
Open Source Software: Freely used (making modifications, constructing business models around the software and so on) but it does not have to be free of charge.
Free and Open Source Software (FOSS) : It is free of cost as well as source code is available free ie we can modify the source code.
OPEN SOURCE PHILOSOPHY
Free Software : Software is freely accessible and can be freely used, changed, improved, copied and distributed by all who wish to do so.
No payments are needed to be made for free software.
Open Source Software: Freely used (making modifications, constructing business models around the software and so on) but it does not have to be free of charge.
Free and Open Source Software (FOSS) : It is free of cost as well as source code is available free ie we can modify the source code.