Skip to main content

CYBER SECURITY

Crime which is done on Internet or Computer is called Cyber Crime.  We should be very alert when using internet because there are many malicious programs hidden on internet. These programs are called Malware. Examples of malware programs are Virus, Woms, Trojan Horse, Spyware.

Take test

Types of Malware-

1. Computer Virus- Computer virus are human made software programs which are made with wrong intentions. Full form of virus is "Vital Information Resources Under Seize". Once a virus entered in our computer it affects and destroy the information and resources of computer. Virus creates its own copy when someone opens virus infected files.

2. Worm- Worm is also a types of malware which destroy the memory and stops the working of the computer by making its own copy in hundreds. Full form of worm is "Write Once Read Many". 

Note- Difference between virus and worm is that virus needs a host program to execute but worm don't need any host program.

3. Trojan Horse-A Trojan horse or Trojan is a type of malware that is often masked as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Once activated, Trojans can enable cyber-criminals to spy on you by deleting data, blocking data, modifying data, copying data, disrupting the performance of computers or computer networks. Unlike computer viruses and worms, Trojans are not able to self-replicate.

4. Spyware- spyware is a software used for gathering information of any person or any organisation in a secret way and use this information for own benefit.


5. Rootkit
Rootkits are designed to conceal certain objects or activities in your system. Often their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.

How malware comes in computer is an important question. Some common methods or way are-
  • By affected external storage device like pen drive, CD etc.
  • By pirated softwares
  • Some suspicious links on internet like website or website link.
WHY CYBER SECURITY IS IMPORTANT


Common forms of cyber crime:Common forms of cyber crime include:
  • Phishing: using fake email messages to get personal information from internet users;
  • Misusing personal information (identity theft);
  • Hacking: shutting down or misusing websites or computer networks;
  • spreading hate and inciting terrorism;
  • distributing child pornography;
  • Grooming: making sexual advances to minors.

HOW TO PROTECT OUR INFORMATION FORM CYBER-CRIME? Is a big question. If we pay some precautions then it is easy to handle cyber-crime
  • Protect your laptop, mobile, computer from cyber-crime using strong password
  • Use of antivirus 
  • open only known websites/links
  • take a regular backup of data
  • Don't give your personal information related to banking/profession etc to others
  • A rigorous anti-malware solution – such as Kaspersky Anti-Virus – will detect and prevent Trojan attacks on your PC, while Kaspersky Mobile Security can deliver world-class virus protection for Android smartphones. Some other antivirus are Quick Heal, Norton antivirus and Avast internet security 
WHAT TO DO WHEN SOMEONE FACE CYBER CRIME
Do complaint in Cyber Cell when you face any Cyber Crime. In India there is a law related to cyber. Crime which is called  INFORMATION TECHNOLOGY ACT 2000.

Note- India's first cyber crime investigator is Pattathil Dhanya Menon



Digital Footprint 


INTELLECTUAL PROPERTY-Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
The right given for intellectual property to its owner is called Intellectual Property Right like Copyright, Patent, Trademark.


Multiple choice questions
1. …………… is a web browser application
(a) Google (√)
(b) Windows
(c) Word
(d) Excel
2. Virus and Worms are a………………….program
(a) Browser       
(b) Malware (√)
(c) Search Engine
(d) Useful
3. The crime on the computer is called-
(a) WWW crime                               
(b) Global crime
(c) International crime                  
(d) Cyber crime (√)
4. Example of intellectual property rights-
 (a) Patent          
 (b) Copy Right
 (c) Trademark  
 (d) a,b,c(√)
5. Some of the famous Browsers are
 (a) Google Chrome                                       
 (b) Windows
 (c) Internet Explorer                                     
 (d) Both a, c (√)

Fill In the blanks-  
1. IPR is called Intellectual Property Right.
2. In case of cyber crime we can make complaint at Cyber Cell.
3. Meaning of NROER is National Repository of Open Educational Resources.

Tick (√) on Correct statement and (x) on false statement.

1. To resolve the problem of cyber crime we can take help of I.T. Act-2000. (√)
2. The full form of VIRUS is “Visual Information Resources Under Seize”. (√)
3. We don’t have any right on the product made by us. (x)

Comments

Popular posts from this blog

INTRODUCTION TO ICT

Full form of the ICT is " Information and Communication Technology". ICT is combination of various information and Communicatiion technologies to search information in effective way ICT is a broad term we can say a package used in every field specially in education. ICT is helpful in all fields of our daily life like banking, education, health etc. To use ICT we need appropriate softwares. ICT Vocabulary list Computer- Computer is an electronic machine which is used to store and manipulate the data and give the desired information as a output. Hardware - Computer hardware  part or includes physical parts or components of a computer such as central processing unit, mouse, keyboard etc. Software File Folder RAM ROM Storage Unit CPU Operating System Desktop.   Desktop is the first screen that appears on monitor after the operating system is loaded.

INTERNET WORLD

Introduction to Internet Internet means: The Internet or simply the Net is a worldwide network of computer networks. It is an interconnection of large and small networks around the globe. Application\Uses of Internet : 1) Exchange messages using e-mail (Electronic mail). 2) Transfer files as well as software. 3) Browse through information on any topic on web. 4) Communicate in real time (chat) with others connected to the Internet. 5) Search databases of government, individuals and organizations. 6) Read news available from leading news groups. 7) Send or receive animation and picture files from distant places. 8) Set up a site with information about your company’s products and services. Internet Vocabulary List Internet – a network that links networks worldwide by satellite and telephone Web – a collection of electronic files linked together; anatomy similar to a spider’s web Search engine – a computer program that searches for specific words or

ICT MULTIPLE CHOICE QUESTIONS

Multiple choice questions  1. Which command is used to draw Horizontal line in LOGO?  (a) RT 45 FD 100                                  (b) RT 90 FD 90  (√)  (c) FD 100 RT 90                                   (d) LT 90 FD 100  2. Which command of LOGO is used for calculations?  (a) EXECUTE                (b) REPEAT         (c) PRINT (√)                  (d) LEFT  3. What is the moving unit of turtle ?  (a) INCH        (b) CENTIMETER    (c) STEPS                   (d) PIXEL (√)  4. What is LOGO?  (a) PROGRAMMING LANGUAGE (√)                (b) PROGRAM   (c) COMMAND                                                    (d) INSTRUCTION  5. RT command is used for  (a) Move turtle                                                                  (b) turn turtle right (√)  (c) run turtle                                                                       (d) hide turtle  6. The full form of U.R.L is  (a) Uniform Research Locator            (b) Uniform res

ICT FILL IN THE BLANKS

Fill In the blanks-    1.   The smallest glowing square on the computer screen is called  PIXEL . 2.   On typing  HOME  command in input box turtle returns in the mid of the screen. 3.   The instructions written in a sequence are called  PROGRAM . 4.   To run the command  EXECUTE  button or  ENTER  key of keyboard is pressed 5. The meaning of W.W.W is  WORLD WIDE WEB . 6.  The address of any websites can be typed on  ADDRESS  bar. 7.  A  WEB PAGE  mainly divided into two parts- Title and Body. 8.   GOOGLE  and  YAHOO  are famous search engine Programs. 9.     FILL SCREEN block change the colour of screen. 10.  The code of the yellow colour is 20 . 11.  We have to indicate the RADIUS and ANGLE to use the Arc block. 12.   CLEAN Block clears the screen. 13.   PU and PD blocks are used to draw dotted lines. 14.   Slide show view is sequential presentation of slides in full screen mode. 15.  Presentation software is a sof

SPREAD SHEET

Spreadsheet -  Spreadsheet is an computer application used to store data in tabular form i.e. in the form of rows and columns. Spreadsheets are used to store, sort, analyse and manage the data of different organisations and offices. Examples are Microsoft Excel, Libre Office Calc, Google Sheets etc. What is data? Everything has some attributes and fixed value of attribute is called data. Attributes Value/Data Name Mango Type Fruit Taste Sweet Data Types Data can be represented in different types which is called data type. Different datatypes in spreadsheets are- Text - combination of letters and numbers is called text data. Exp name: shahid, class: vi A Numeric- combination of numbers is called numeric data. Exp weight: 20.5 kg Date- Date is written inthe format DD-MM-YYYY. Exp. 02-10-1889 Image- Image data types is used to store images, pictures. Audio- any sound file comes under this datatype. Exp r

ICT TRUE AND FALSE

Tick (√) on Correct statement and (x) on false statement. 1.         The geometric shapes cannot be draw using LOGO. (x) 2.        REPEAT Command can be used to draw a shape two time. (√) 3.         To work with computer we need programming language. (√) 4.        ST command is used to display Turtle. (√) 5.      Ans of PRINT 4-2+3 or PRINT 4-(2+3) is -1  (√) 6.         Linux is an Operating System. ( √  ) 7.         Computer is an Electronic device. ( √ ) 8.         Laptop is bigger than desktop in size. (  x) 9.        ROM is Primary Storage Unit. (  √)) 10.        MS Paint is an example of Software. (  √) ) 11.      The last page of any website is called Home page. (x) 12.      Any type of information can be searched through Browser. (√) 13.     We can’t search Images on Internet. (x) 14.      Mozilla Firefox is a Browser program. (√) 15.     Shopping can’t be done through browser. (x) 16.    It is not possible to change the colour of shape in the