Security Threats
Introduction to Cyber Security
Cyber Security is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes.
Classification: Common Threats
- Malware: Malicious software including Viruses, Worms, and Trojans.
- Phishing: The practice of sending fraudulent emails that resemble emails from reputable sources to steal sensitive data.
- Ransomware: A type of malware that locks the user out of their files until a ransom is paid.
- Social Engineering: Manipulating people into giving up confidential information.
The Cyber Security Master Table
| Threat Type | Key Feature | Essential Fact |
|---|---|---|
| Computer Virus | Requires host file | Replicates and spreads to other files |
| Worm | Self-replicating | Does not need a host to spread |
| Trojan Horse | Appears useful | Contains a hidden malicious payload |
| Spyware | Secretly monitors | Tracks keystrokes and browsing data |
| Spam | Junk Mail | Unsolicited bulk emails |
| Encryption | Data Scrambling | Converting data into a secret code |
| Decryption | Data Unscrambling | Reversing encryption with a key |
Key Scientific Facts
- A Firewall can be either hardware or software; its main job is to filter incoming and outgoing network traffic.
- Cryptography is the science of using mathematics to encrypt and decrypt data.
- Captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is used to ensure that a web user is human and not a bot.
- Anti-virus Software (like Norton or McAfee) scans for and removes malicious programs from a computer system.
- A "Patch" is a software update released by developers to fix security vulnerabilities in an operating system or application.
Subject Card Prompts (Flashcards)
- Q: What is the full form of 'Captcha'?
- A: Completely Automated Public Turing test to tell Computers and Humans Apart.
- Q: Which malicious program is named after a hollow wooden horse from Greek mythology?
- A: Trojan Horse.
- Q: What is a self-replicating program that spreads across a network without user interaction?
- A: A Worm.
- Q: What is the process of converting readable data into an unreadable format?
- A: Encryption.
Practice MCQ
"Which of the following refers to unsolicited, unwanted bulk emails sent for advertising or malicious purposes?"
A) Malware
B) Spyware
C) Spam
D) Phishing
(Correct: C - Spam)