Chapter 9 Book 8 Cyber Security
Learning Objectives
After studying this chapter, you will be able to:
Know about cyber security
Know about the different cyber attacks
Learn about the common cyber threats
Know about the different safety measures
Let’s Connect
INTRODUCTION
The internet has become an integral part of today's
generation of people, from communicating through
instant messaging and emails to banking, travelling,
studying and shopping, internet has touched every
aspect of life. With the growing use of the internet by
people, protecting important information has become a
necessity. Artist se pic
banawaye Some
what aisi
About Internet
A computer that is not having appropriate security controls can be infected with malicious
software and thus any type of information can be accessed in moments. Number of infected web
pages and malicious websites can be seen every day that infects the computer and allows
hackers to gain illegal access to other computer systems.
UNDERSTANDING CYBERSECURITY
• In the digital world, security refers to the
precautionary steps taken to protect
computing resources against cybercrime.
• It is a technique of protecting computers, Yeh copyrighted pic hai Aisi hi pic
networks, programs and data from
banwaye cyber security ki
unauthorized access or attacks that are aimed
for exploitation.
Cyber security is important because government, military, corporate, financial and medical
organizations collect, process and store unprecedented amounts of data on computers and
other devices.
A significant portion of that data can be sensitive information, whether it is intellectual property,
financial data, personal information or other types of data for which unauthorized access or
exposure could have negative consequences.
CYBERATTACKS
The internet is a digital jungle and there are a wide range of dangers waiting for you out there.
Web-based threats or online threats are malware programs that can target you when you're
using the Internet. In simple words, a web threat is any threat that uses the WWW {World
Wide Web) to facilitate cybercrime.
Aisi pic banaye
• A threat, in the context of computer security, refers to
anything that has the potential to cause serious harm
to a computer system.
• It is something that may or may not happen, but has
the potential to cause serious damage.
• Threats can lead to attacks on computer systems,
networks and more.
HACKING
Computers have become mandatory to run a successful business or an organization. It is not
enough to have isolated computer systems, they need to be networked to facilitate
communication with external businesses or organizations. This exposes them to the outside
world and hacking.
• Hacking is the process of gaining unauthorized access into a computer system or group of
computer systems or a website or a social media site or an email account.
• This is done through cracking of passwords and codes which gives access to the systems.
The person who undertakes hacking is known as the hacker. They can access your computer and
private information directly, if you are not protected by security software. They can monitor your
conversations or misuse the back-end of your personal website.
Pic banwaye
Hacker ki hacking kerte huye . Internet ki help lijiye
TYPES OF HACKERS
Hackers are classified according to the intent of their actions.
ETHICAL HACKER (WHITE HAT):
A white hat hacker is someone who gains access to systems with a view to fix the identified
weaknesses. They are appointed by the software companies.
CRACKER (BLACK HAT):
A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually
to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems
without authority with a view to identify weaknesses and reveal them to the system owner.
VIRUS ATTACKS
Just like humans can get viral infections, computer virus is a threat for our computer system and
cyber security too.
• Computer viruses are pieces of software that are designed to be spread from one computer to
another.
• Viruses are often attached to files for download, shared via CD's, DVD's or USB sticks.
• They're often sent as emaiI attachments or downloaded from specific web sites with the intent
to infect your computer and other computers on your contact list by using systems on your
network.
• Viruses are known to send e-mail spam, disable your security settings, corrupt and steal data
from your computer including personal information such as passwords, even going as far as
to delete everything on your hard drive.
ADWAREAND SPYWARE
Adware is a type of malware software that is designed to track your browsing habits and based on
that, show you advertisements and pop-ups. The ads often redirect your searches to advertising
websites and collect marketing-type data about you, behind your back, which is considered
malicious. The presence of adware on your computer is noticeable only in those pop-ups and
sometimes it can slowdown your computer's processor and internet connection speed.
Spyware works similar to adware, but is installed on your computer without your knowledge. Once
installed on your computer, spyware can monitor your keystrokes, read and delete your files,
reformat your hard drive and access your applications. Whoever is controlling the
spyware has access to your personal information including email addresses, passwords, even credit
card numbers without you even knowing.
Virus attack ki ek pic banaye aur yaha dale jaise neeche di
hui hai
PHISHING
Phishing is method of social engineering with the goal of obtaining sensitive data such as
passwords, usernames, credit card numbers etc.
• You receive an email that is made to look as though it comes from a legitimate company(banker,
insurance companies) you normally do business with.
• The email, for example, might tell you that some sort of service normally provided to you is due to
expire soon.
• The email directs you to a phony Web site made to look like the site of the company you do
business with.
• Once there, you are asked to provide personal information such as credit card details or social
security number so that your service which was hatted, can be continued.
KEYLOGGER
Similar to a part of spyware, a keylogger (short for keystroke
logger) is a software or technology that tracks or logs the keys
struck on your keyboard, typically in a covert manner so that you
don't know that your actions are being monitored. This is usually
done with malicious intent to collect your account information,
credit card numbers, user names, passwords and other private data.
TROJAN
Trojans leave your computer completely unprotected, which can mean that hackers can steal any
data from your system. Trojans often present themselves as harmless computer programs so
that hackers can penetrate your computer without being detected.
Internet ki help se aisi pic banaye
ROGUE SECURITY SOFTWARE
Leveraging the fear of computer viruses, scammers have found a new way to commit Internet
fraud. Rogue security software is a malicious software that misleads users to believe there is a
computer virus installed on their computer or that their security measures are not up to date.
Then they offer to install or update users' security settings.
They'll either ask you to download their program to remove the alleged viruses or to pay for a tool.
Both cases lead to actual malware being installed on your computer.
RANSOMWARE
Ransomware is a type of malware that restricts access to your computer or your files and displays a
message that demands payment for the restriction to be removed. When the payment is
made, the criminal provides a decryption key that will give the victim access to their systems again.
Pic banaye
DDOS ATTACKS
In a DDoS (distributed denial-of-service) attack, crooks overload an organization's servers in order to
make its website
temporarily unavailable. This can serve one of the two purposes.
It could be an act of revenge against an organization, or a distraction that allows the crooks to break
into the organization while its staff are focusing on restoring its website.
OVERSEAS MONEY TRANSFER SCAM
You'll receive an email from someone claiming to represent a foreign government or someone
formerly involved with a foreign government. The person will claim that, through a change in
leadership or death, he or she has been left with a large amount of money.
They will ask your help getting the money out of the country and if you help you can receive a large
share of the money. The message will go on to ask you to respond to the emaiI with bank
account information and other personal information.
CVBER SAFETY MEASURES
INSTALL ANTI-VIRUS SOFTWARE
• Antivirus software is the 'policeman' at the gate of the computer system. It protects the
computer from incoming threats which seeks out, destroys and warns of possible threats to
the system.
• It provides two-way protection which puts a check in every incoming and outgoing data/mail
through the Internet and blocks the same if it finds something suspicious during
transmission.
New viruses are coming out all the time. It is the job of the antivirus software to keep up with the
latest threats. This is achieved by daily updates of the anti-virus database definitions, which
counteract the latest threats to provide constant protection.
UPDATE YOUR OPERATING SYSTEM & SOFTWARE
Keep your computer up to date. Check from time to time if there are updates on the operating
system and software available. The updates will help fix certain irregularities in your system that
may decrease the risk of threats entering your computer.
SET UP FIREWALLS
Firewalls are effective gatekeepers between your computer and the internet and one of the major
barriers to prevent cyberthreats such as viruses and malware.
A firewall is an application that protects your computer from the hackers gaining unauthorized
access to your computer. Setting up a personal firewall will dramatically reduce the possibility of
your computer being attacked by Internet threats. Software firewalls often come as part of
an operating system. For example, Windows include Windows Firewall and you should always turn it
on.
AVOID PUBLIC WI-FI
Do not easily trust public Wi-Fi. Anyone malicious in your surroundings may be secretly accessing
your accounts or stealing your passwords through the Wi-Fi. It is recommended
that you use a Virtual Private Network or VPN that encrypts your connection by connecting to a safe
and secure server in the middle.
USE STRONG PASSWORDS
A strong password is the equivalent of a dead bolt on a door. The more difficult it is to gain entrance
to your accounts, the safer your accounts are. Make your passwords difficult to figure out,
by using a combination of letters, numbers and special characters and most importantly, change
them regularly.
MAKE BACKUPS
Backups may not sound like a way to keep your computer safe, but if something damages the
computer or you have a security problem, you can quickly recover if you have a recent backup of
all your data. Hard drives crash, computers are stolen, accounts are hacked but if you have a backup,
you can at least get all of your data back.
There are many ways to perform a backup, such as both by hardware (USB drives and external
hard drives) and using software (archiving and cloud). Keep backed up data in a secure location.
DOWNLOAD FROM TRUSTED WEBSITES
Just like suspicious emails, unknown websites and downloads may contain potential risks that do
harm to your devices or data.
Along with the possibility of significant legal penalties, downloading music and movies from illegal
websites can be harmful to your machine. These downloaded files are sometimes riddled with
viruses and spyware.
Hardware safety and security
The physical components of a computer system are called hardware. Hardware devices can be seen
and
touched. CPU, Monitor, Printer, Scanner, Hard Drive, CD's, RAM, Modem, Port and Cables are all
hardware
devices of a computer system.
All the data are represented by binary digits 0 and 1. To maintain the hardware security and safety,
you
must follow some guidelines as given below:
1. Computers Must be Kept Clean: There must be regular cleaning of dust and debris, and also we
should avoid eating and drinking near the computer.
2. Computers Should be Kept at Moderate Temperature: High or low temperature may damage
motherboard's memory and disk drives' memory.
3. All Computers Should be Connected to Surge Protectors: The surge protectors will prevent voltage
surges from damaging the system.
4. Computers and Disks Must be Kept Clear of Static Electricity: Since static electricity can
destroy stored information. To avoid zapping your computer components (like computer memory and
hardware) with static electricity other precaution is to ground the static electricity before touching
any of the internal components.
5. Aware of Keyloggers: A hardware keylogger is a small piece of hardware that is manually attached
to the keyboard wiring plugged into the PC's CPU. It is placed at an intermediate position between
the CPU plug and keyboard's wire. It captures all your keyboard strokes while typing. You need not
worry about keylogger for your personal computer until a close one use this.
Cleaning of Hardware Components
Proper cleaning and maintenance of all the components of a computer system is required for its
proper functioning. Let us see how to maintain the hardware components of a computer system.
Monitor
Use a soft cotton cloth to clean the screen of the monitor.
Do not spray any liquid directly on its screen.
Do not touch its mouse with finger, pen or any other hardware components. Instead use the
mouse pointer or stylus for the same activity.
Keyboard
Use a soft brush in order to clean the space between any two keys.
Do not eat or drink while working on the computer system.
Do not use wet cloth to clean it.
Mouse
Use mousepad beneath the mouse, for its proper functioning.
If you are using optical mouse, clean it from above and below using a soft cotton cloth.
If you are using mechanical mouse, then you can open the cover of the mouse to remove the
ball inside it. Clean this ball separately.
CD/DVD
Always keep the CD/DVD in proper cases to keep them scratch-free.
Do not touch the surface of CD/DVD with hands.
Spray a special cleaning liquid on CD/DVD, to clean their surface.
CPU Cabinet
Always clean the CPU cabinet from all sides using a clean soft cotton cloth.
For cleaning the inner part of the CPU cabinet, use a blower. Do not use wet cloth.
Do not touch the tiny parts attached to the motherboard.
Digital Camera
Do not touch the lens of the camera.
To remove the dust, use a soft clean cloth.
You can use a cleaning liquid, but don’t spray directly on the lens.
SOFTWARE SAFETY, SECURITY AND CARE
A software is a set of instructions used to perform a specific task or operations. It tells the
hardware what
to do. Without software, hardware is useless.
We should take good care of computer software. Windows 7 provides many ways to provide
safety for
the computer software. The Control Panel is a part of Microsoft Windows Graphical User
Interface (GUI)
which allows users to view and change basic system settings as given below:
• Windows firewall
• Spyware and unwanted software protection
• Antivirus
• Windows password protection (User Account Control)
Let us know about these system settings.
1. Windows Firewall: Windows Firewall IS a software component of Microsoft windows that
provides packet filtering functions. If your computer is connected to a network,
firewall acts as a bridge between your computer and other systems or server from which you
are getting the data. To turn on windows firewall:
1. Double-click on the Control Panel icon available on the desktop. The Control Panel
window appears.
2. Click on the Windows Defender Firewall option. The following window appears on
your screen.
3. Click on the Turn Windows Defender on or off option. The Customize Settings
window appears.
4. Choose Turn on Windows Defender Firewall radio button. Click on OK to save the changes.
If you want the firewall to prevent all programs from communicating including programs
that you have previously allowed to communicate through firewall, then select Block all
incoming connections.
2. User Account Control: User Account Control (UAC) can help in preventing unauthorised
changes to your computer. This can prevent the security of your computer or can affect
settings for other people that use the computer.
To turn UAC on or off, use the following steps:
1. Open Control Panel window and click on User Accounts.
2. Click on Change User Account Control Settings option. The given window appears.
The following window appears.
• To turn off UAC, move the slider to the "Never notify" position and then click OK.
• To turn on UAC, move the slider to the "Always notify" and then click OK.
KNOW MORE
If you are prompted for the administrator password for confirmation, type the password.
You will need to restart your computer for UAC to be turned off.
Summary
Cyber security refers to a set of techniques used to protect the integrity of
networks, programs.
and data from attack, damage or unauthorized access.
• 'Malware' is short for 'malicious software', that are computer programs designed to
infiltrate
and damage computers without the users consent.
• A cyber attack is a strike against a computer system, network, or internet-enabled
application
or device.
• Hacking is the process of gaining unauthorized access into the computer system or
group of
computer systems or website or soda I media site or an email account.
• A computer virus is a malicious software program loaded onto the user's computer
without
his/her knowledge and performs malicious actions.
• Phishing is a cybercrime and a method oftryingto gather personal information using
deceptive l
e-m ails and websites.
• Adware is a type of malware software that is designed to track data of browsing habits.
• Spyware is a type of malware that collects and shares information about a computer or
network without the users consent.
• Keylogger is a software or technology that tracks or logs the keys struck on keyboard
without
users knowledge or permission.
• Antivirus software is a program or set of programs that are designed to prevent, search for,
detect and remove computer viruses and other malicious software.
Test Yourself
A. Multiple choice questions.
1. The term that refers to the security precautionary steps taken to protect
computing resources
against cyber crime.
(a) E-Security (b) Computer Security (c) Cyber Security
2. A crime in which a computer or computer technology is used as the object
of the crime.
(a) Computer Crime (b) Cyber Crime (c) Electronic Crime
3. Cyber crime is crime that involves:
(a) Computer (b) Internet (c) Smartphone
4. It is the process of gaining unauthorized access into a computer system or
a website.
(a) Hacking (b) Checking (c) Cracking
5. Computer viruses are designed for one of the following.
(a) Steal Data (b) Corrupt Data (c) Delete Data
B. Fill in the blanks.
C. State True or False.
1. Cybercrime is a legal activity done through computer with Internet connection.
2. Computer virus is a kind of program that disrupts the normal functioning of a
computer.
3. To protect data and important information, passwords should not be changed.
4. It is OK to give your credit card information in an e-mail if the store you were
shopping online asks for it.
5. Using phone number as a password is always recommended a secured password.
D. Answer the following questions.
1. What is Cyber Security and its importance?
2 . Differentiate between Adware and Malware.
3. Define the term cyber crtime.
4. Define antivirus.
E. Life Skills
Charu's computer got infected with a virus, which led to slower processing speed
of the system. Which software should she buy in order to solve this problem?
Activity Corner
Fun in Searching
Find and encircle 8 meaningful terms extracted from this chapter. See across,
downwards and upwards.
H
S P Y W A R E
U C
R H A C K I N G B
I D E R N
V W R O A
I A W J
T R S O
N K E Y L O G G E R
A R T
Fun in Exploring
Explore the use of firewall and using Control Panel turn on the Windows Firewall.
Fun in the Lab
• With the help of lnternet, find out the names of some latest computer viruses
and antivirus programs.
• In the school computer lab see how anti virus works.
• Learn how to update the anti virus programs.
• Learn how to scan a folder on hard disk/ pen drive.
Art Integrated Project
Create a poster on an A3/A4 size sheet on the topic “Precautions against Cyber
crimes”. Make it attractive and eye-catching.
Teacher’s Notes