PSEB 11th Computer Science -Eng Notes 2022-23 Chapter 3

 Chapter 3rd

Cyber Threats and Security


1.  Cyber word is taken among which of these?

a.  Cybercrime                      b. Cybernetic            c. Cyber-attack                    d. Cyber security

2.    Copying and selling of software or any computer-based material is known as:

a.  Phishing                            b. Stalking                c. Piracy                               d. Hacking

3.  A malware which acts like a spy in computer system:

a.  Spyware                           b. Computer virus    c. Adware                            d. Ransom ware

4.  Which type of security technique which converts password to special signs?

a.  Strong password             b. Firewall                c. Digital signature              d. Encryption

5.  IT act 2000 is known by which another name?

a.  IT act 2008                      b. ITA 2000              c. Information act               d. Income tax act

6.  An electronic environment in which internet users communicate with each other:

a.  World Wide Web            b. Internet                c. Cyber space                     d. Cyber cafĂ©

Que:2 Fill in the Blanks:

1.                               corrupt the computer system.

2.                               is a digital code which is used to Transmit or verify documents online.

3.  Antivirus software keeps our computer safe from                          

4.                               acts as secure wall in the computer system.

5.  Any unauthorized person alters the website with the use of                          

6.  URL’s of servers connected with internet are stored at                         

Ans:                1. Malware                          2. Digital Signature                        3. Virus

4. Firewall                           5. Web Jacking                               6. WWW

Que:3 Very Short Answer Type Questions

1.  When first IT act comes into? Ans: 17-October-2000

2.  Name any two antiviruses? Ans: AVG, Norton Antivirus

3.  Write full form of CERT-IN.

Ans: Indian Computer Emergency Response Team

4.  Write the complete form of ITA 2000. Ans: Information Technology Act 2000

Que:4 Short Answer Type Questions.

1.  What is Piracy? Define it?

Ans: Piracy is a cyber-crime in the series of cyber threats. When a software or other content is copied and sold in the market by a person without the consent of its original owner, such crime is called Piracy. Piracy causes financial loss to the original owner of the software or content. Nowadays, piracy of various software, audio and video contents becomes common.

2.  What do you know about Web Jacking?

Ans: Web Jacking is also a cyber-crime. This is an unauthorized action like hijacking. It involves hacking into a web site by a hacker for personal gain and altering the information on that web site. The website of the Ministry of Information Technology and the Bombay Crime Branch was recently hacked by web hackers which was an unauthorized online activity. Such activity by hackers is called Web-Jacking.

3.  What are Salami Attacks?

Ans: Salami attack is also a cyber-crime. Such online attacks are more common in the banking sector. In these online attacks, a small amount of money is transferred to Attacker’s account from the accounts of a person after regular short time-intervals. The customer is not even aware of  this


because such online attacks target only those accounts where the amount is often more and the transactions are frequent.

4.  Give a brief description about antivirus software?

Ans: Antivirus is software that protects our computer from any kind of virus. It is also called anti- malware because any virus is a malware against which it works. This software prevents viruses from entering into our computer and even if virus enters into the system, it removes viruses by scanning the computer system. Many types of antivirus software are available such as AVG, Avira, McAfee, Avast, Kaspersky, Ad-Aware, Norton etc.

 

5.  Differentiate between Cyber-Space and WWW (World Wide Web)?

Ans: Cyberspace is an electronic environment in the world of the Internet that cannot be seen or captured, but can only be felt emotionally. Internet users communicate with each other in this environment. This is different from the World Wide Web. WWW is an information system that stores the URLs of all web servers connected to the Internet and links to various web pages. It is WWW that creates the electronic environment called cyberspace.

6.  Tell four objectives of IT Act 2000?

Ans: The main objectives of the IT Act 2000 are as follows:

1.  Legalize electronic notification and data communication

2.  Facilitate online storage of data or information

3.  Establish a legal framework for the prevention of cyber crimes

4.  Recognition of Electronic Funds Transfer Policy in Banks

5.  Implementing e-commerce across India

6.  Promoting e-commerce

Que:5 Long Answer Type Questions

1.  What are Cyber Attacks? Describe five types of Cyber Attacks?

Ans: In the world of the Internet, all those activities or attempts that harm online computer networks or computer-based systems with the help of Internet are classified as cyber-attacks. Here are some of the major cyber-attacks:

         Piracy: It this type of cyber-attack, a person sells copied/downloaded software or other content in the market without the approval and consent of their original owner.

         Web-Jacking: It this type of cyber-attack, hacker hacks websites for personal gain and alter the information on websites.

         Salami-Attack: In this type of cyber-attack, a small amount of money is transferred to Attacker’s account from the account of a person after regular short time-intervals.

         Stalking: In this type of cyber-attack, a person sends messages or inappropriate content to another person against their will using internet applications or social media.

         Hacking: In this type of cyber-attack, hackers tamper someone’s computer or social media account or a website in one way or another way.

2.  Describe the Causes of Cyber Attacks in Detail?

Ans: Following are some common causes of cyber-attacks:

         Easy Access to the Internet: Nowadays, the Internet has become very easy to use. People are unknowingly sharing their personal information on the Internet in a variety of ways. Doing so empowers cybercriminals to carry out cyber-attacks.

         Lack of Technical Knowledge: Though people are using the internet easily, but most of them do not have any technical knowledge about it. Such people get caught up in cyber attacker’s behaviour by providing their confidential information on unknown links or sites.

         Non-Use of Security and Privacy: Most people do not use any kind of security or privacy when using the Internet, which makes cyber criminals easy to harm their online accounts.

         Criminal Wisdom or Feeling of Revenge: Cyber-attacks are also on the rise due to the criminal intelligence and revenge of many people nowadays.

         Ignorance of IT Crime and Laws: The number of cyber-attacks is also increasing because most of the people do not have knowledge of IT crimes and related laws.


3.  What is Malware? Describe five types of Malwares?

Ans: The word Malware is made up of a combination of two English words Mal and Ware. The word Mal is derived from the word Malicious and the word Ware is derived from Software. Thus, we can say that a group of software is called Malware which is created to infect or damage a computer-based system in one form or another. Computer viruses are a common example of malware. Here are some common types of malware:

         Computer viruses: These malware softwares come into a computer and infect our data and computer systems.

         Adware: These malware softwares enters in the computer system without permission and silently sends users confidential information to cyber criminals through the Internet. This is how these softwares act like a spy.

         Ransomware: These malware softwares lock the entire computer system or any important document. The cyber-criminals then demand a ransom for unlocking the computer/document.

         Trojan Horse: These malware softwares initially behaves in a user-friendly way with the computer user and later take control of the computer from the real user and hand it over to the cyber-criminal.

         Browser hacking: These malware softwares hacks the user's web browser, change the browser settings without any consent and automatically opens some web sites on that browser.

 

4.  What is Cyber Security? Describe five types of Cyber Security Techniques?

Ans: A variety of techniques are used to prevent cyber-attacks. These different techniques are collectively called Cyber Security. Here are some key cyber security techniques:

         Authentication: This cyber security technique allows a computer user to determine who can use his computer system and who cannot.

         Strong Password: This cyber security technique uses a username and password to access a system. Passwords must be complex and strong so that hackers cannot break or steal them.

         Encryption: This cybersecurity technique converts the data that user sends over the network into unrecognizable special symbols so that nobody can interpret data during transmission.

         Antivirus: It is a software that protects our computer from any kind of virus. It is also called anti-malware. This software prevents viruses from entering into our computer and even if virus enters into the system, it removes viruses by scanning the computer system. AVG, Avira, Norton etc. are some of the popular antivirus softwares.

         Firewall: This cyber security protects computers and computer networks from viruses or any other type of cyber-attacks. It is a strong wall that protects our computer from all kinds of malware and does not allow any unauthorized person to access our computer.

 

5.  What is IT Act 2000? Describe its Features?

Ans: Keeping in view about cyber threats, Government of India had passed an Act on 17-October- 2000 to legalize the use of Information Technology, which was named as IT Act 2000. This act is also known as ITA 2000. Some of the salient features of this Act are:

Features of IT Act 2000:

1.  Digital signature is legally recognized in this Act.

2.  This Act gives full recognition to financial transactions made through electronic means.

3.  This Act deals exclusively with Cyber Crime and Electronic Commerce.

4.    This Act gives legal recognition to online submission of forms by Government Offices and Agencies.

5.  The Act establishes a Cyber Appeal Regulation Tribunal which deals with cyber appeals.

6.  According to this Act, a hearing against the order of the Cyber Appeal Regulation Tribunal can be held only in the Supreme Court.


No comments:

Post a Comment