close

Security Threats

Introduction to Cyber Security

Cyber Security is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes.

Classification: Common Threats

  • Malware: Malicious software including Viruses, Worms, and Trojans.
  • Phishing: The practice of sending fraudulent emails that resemble emails from reputable sources to steal sensitive data.
  • Ransomware: A type of malware that locks the user out of their files until a ransom is paid.
  • Social Engineering: Manipulating people into giving up confidential information.

The Cyber Security Master Table

Threat Type Key Feature Essential Fact
Computer Virus Requires host file Replicates and spreads to other files
Worm Self-replicating Does not need a host to spread
Trojan Horse Appears useful Contains a hidden malicious payload
Spyware Secretly monitors Tracks keystrokes and browsing data
Spam Junk Mail Unsolicited bulk emails
Encryption Data Scrambling Converting data into a secret code
Decryption Data Unscrambling Reversing encryption with a key

Key Scientific Facts

  • A Firewall can be either hardware or software; its main job is to filter incoming and outgoing network traffic.
  • Cryptography is the science of using mathematics to encrypt and decrypt data.
  • Captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is used to ensure that a web user is human and not a bot.
  • Anti-virus Software (like Norton or McAfee) scans for and removes malicious programs from a computer system.
  • A "Patch" is a software update released by developers to fix security vulnerabilities in an operating system or application.

Subject Card Prompts (Flashcards)

  • Q: What is the full form of 'Captcha'?
  • A: Completely Automated Public Turing test to tell Computers and Humans Apart.
  • Q: Which malicious program is named after a hollow wooden horse from Greek mythology?
  • A: Trojan Horse.
  • Q: What is a self-replicating program that spreads across a network without user interaction?
  • A: A Worm.
  • Q: What is the process of converting readable data into an unreadable format?
  • A: Encryption.

Practice MCQ

"Which of the following refers to unsolicited, unwanted bulk emails sent for advertising or malicious purposes?"

A) Malware

B) Spyware

C) Spam

D) Phishing

(Correct: C - Spam)

Back to Basic Computer