Introduction To It Systems Unit-5 (Set-1)
Introduction To It Systems Unit-5 (Set-1)
Worms: A worm is technically not a virus but a program very similar to a virus. It has
the ability to self-replicate causes harm to a system. It can be executed without the
help of any other program.
5. What are the symptoms to know the presence of virus in your system ?
Ans:
Your system becomes very slow.
System terminates abnormally.
Showing problem while booting.
Showing insufficient memory or memory full even you have fewer amounts of
data.
Showing unexpected performance while working.
7. What is Firewall ?
A firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. It acts as a barrier
between a trusted network (like your home or office network) and an untrusted
network (like the internet).
Benefits of using a firewall:
Protection against unauthorized access:
Blocking malicious traffic:
Protecting sensitive data:
Enhancing network security
8. What is VPN ?
Ans: VPN stands for Virtual Private Network, it is a technology that creates a secure,
encrypted connection over a less secure network, such as the internet. It works by
creating a private tunnel between your device and a VPN server, masking your IP
address and encrypting your internet traffic.
9. What is IP spoofing ?
Ans:IP spoofing is a technique where an attacker disguises the source IP address of a
network packet to trick a target system into believing the packet originated from a
legitimate source. This allows the attacker to bypass security measures and potentially
launch malicious attacks.
12. What are the safety measures to be taken while doing online
transaction?
Ans:
Here are some safety measures to take while doing online transactions:
Official Website: Always access your bank's official website directly from your
browser's address bar. Avoid clicking on links in emails or texts. Always check
(https://).
Beware of Phishing Attempts: Be wary of emails or calls requesting personal
information. Your bank will never ask for sensitive details via email or phone.
Secure Wi-Fi: Avoid using public Wi-Fi networks for online transactions. If you
must, use a VPN to encrypt your connection.
Strong Passwords: Create strong, unique passwords for each online account.
Avoid using easily guessable information.
Use Two-Factor Authentication (2FA): Enable 2FA whenever possible to add an
extra layer of security.
13.what are the safety measures to be taken while doing online shopping ?
Ans:
Here are some safety measures to take while doing online shopping:
Secure Websites: Only shop from trusted website or on websites with a secure
connection (https://). Look for the padlock symbol in the address bar.
Trusted Sellers: Choose reputable online retailers with good reviews and
customer feedback.
Payment Security: Use trusted payment methods. In case of any doubt, always
purchase products on cash on delivery.
Secure Wi-Fi: Avoid using public Wi-Fi networks for online transactions. If you
must, use a VPN to encrypt your connection.
Keep Software Updated: Regularly update your operating system and security
software to protect against vulnerabilities.
Beware of Phishing: Be cautious of suspicious emails, texts, or calls. Never share
personal information with unsolicited requests.
15. What are different tools and techniques used to protect your
computer from information threats.
The tools and techniques used to protect your computer from information
threats are Firewall, Antivirus software, VPN, Backup, Cryptography, Digital
signature, Authorization, Authentication etc.
16. Write down different ways through which malware can approach your
system?
Ans:
Malwares can approach your system any one of the following ways.
When we download directly from some untrusted link/ website.
By email from unknown link
Corrupted storage/ removable devices
Unsecure WIFI
By Network propagation etc.
19.What is Malware?
Ans: Malware is short for malicious software and is used as a single term to refer to
viruses; Trojans, horses, worms, Spywares etc.
22.what is USB and write the name of two USB storage media ?
Ans: USB (Universal Serial Bus) is a standard for connecting and transferring data
between computers and electronic devices. It also provides a power supply to devices.
USB ports are widely used for connecting peripherals such as keyboards, mice, printers,
and storage devices.
Two examples of USB storage media are: Pen Drive, Media card
Spyware: A malware that spy the user's information with the aim to harm them.
E.g., cookies on webpages and keyloggers can log everything including your credentials.
Adware: It is malware that is designed to create revenue for its developers. It is also
termed advertising-supported software. It tracks user's behaviour and sells out that
information to interested third parties. To avoid adware, use an adblocker.
Keyloggers: A spyware that is designed for stealing the data via recording the keystrokes
pressed by the user on their keyboard. An attacker may track your typing in a real-time
manner or afterward via a file used to store the keystrokes.
Ex. Computer Spy, Kidlogger, syprix are some examples of keyloggers.
Sweepers: These are programs to wipe out data from the targeted machines.
Backdoor: If malicious users gain access to the system, they can install a program, used
to create another way (backdoor) to enter into the system. The purpose is to gain
unauthorized access to the system.
Ex. Deep Throat, Portal of Doom, Subseven, NetBus are some popular backdoors.
Email Phishing: The most common type, where attackers send fraudulent emails.
Smishing: Phishing attacks via SMS messages.
Vishing: Phishing attacks through voice calls.
Spear Phishing: Targeted attacks aimed at specific individuals or organizations.
Whaling: High-profile phishing attacks targeting executives or celebrities.