0% found this document useful (0 votes)
29 views8 pages

Computer ICSE 8

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 8

Page 1 of 8

Siksha Srijan Academy Of Technology and Management

SIKSHA SRIJAN ACADEMY OF TECHNOLOGY &


MANAGEMENT

Contact : 7449393135 / 6291355543

ICSE class 8

Computer

What is Cyber?
The term, ‘Cyber’ is used in relation to the culture of computers, information
technology, and virtual reality. The connection between internet ecosystems forms
cyberspace. The threat to cyberspace leads to an issue and gives rise to the need for
cybersecurity

Threats to Cyberspace:

1. Interconnectedness of Sectors
2. Increase in the number of exposure points
3. Concentration of assets

As per the NITI Aayog report, the threats to cyberspace have increased dramatically
over the last 10 years. The cyber attacks lead to the exposure of:

1. Sensitive information
2. Personal information and
3. Business information

The need for Cyber Security


Cyber Security protects the cyberspace from the following:

1. Cyber Attacks
2. Damage to Cyberspace
3. Misuse of Cyberspace
4. Economic Espionage

Cyber Security – Evolution


With the introduction of cyberattacks, cybersecurity initiatives have evolved. They
are mentioned in the table below:

Prepared by Swarnajit
Mukherjee
Page 2 of 8
Siksha Srijan Academy Of Technology and Management

Evolution of Cyber Security

Issues Cyber Security


Initiatives

Virus (1990s)  Anti-Virus


 Firewalls

Worms (2000) Intrusion Detection and


Prevention

Botnets (2000s DLP, Application-aware


– Present) Firewalls, SIM

APT Insiders Network Flow Analysis


(Present)

Cyber Threats and Cyber Security


There are types of cyber attacks that have evolved over a period of time:

1. Virus – It is a malware that self-replicates and spreads by inserting copies of


itself into other executable code or documents.
2. Hacking Websites – An unauthorized access to any website belonging in a
personal or professional space
3. Malicious Codes – It is a kind of security threat where any code present in
software tends to bring harmful effects, breach the security of the system, or
bring damage to the system.
4. Advanced Worm and Trojan – This is again a malware that camouflages as a
regular software however once accessed, brings damage to the hard drive,
background systems and corrupts allocation systems
5. Identity Theft and Phishing – It is a cyber attack involving fraudulent emails
posing as authorized entities in order to induce people to reveal their
information (personal and professional.)
6. DOS, DDOS – DOS stands for Denial-of-Service attack, and DDOS stands for
Distributed Denial-of-Service attack. The attackers make the machine or
network unavailable by disrupting services of the host network through the
flood of superfluous requests to overload systems. And when such flooding of
requests comes from various ends, it is termed as DDOS.
7. Cyber Espionage – Usually when a government’s or important organization’s
privacy is posed at risk due to illegal use of computer networks to seek
confidential information.

Prepared by Swarnajit
Mukherjee
Page 3 of 8
Siksha Srijan Academy Of Technology and Management
8. Cyber Warfare – Deliberately attacking the information systems through the
use of computer technology to disrupt the state’s activities, especially for
military purposes.

Cyber Attacks in India


The topmost causes of cyber attacks are:

1. Phishing and Social Engineering


2. Malware
3. Spear Phishing
4. Denial of Service
5. Out of Date Software Ransomware

The table below gives the list of cyberattacks that India has witnessed in the past:

Cyber Description of the


Attacks in Cyber Attacks
India

Coronavirus Microsoft has reported


Pandemic that cyber crooks are
Based Cyber using Covid-19 situation
Attack in 2020 to defraud
people through phishing
and ransomware in India
and the world

Phishing Union Bank of India


heist in July 2016

Wannacry In May 2017, various


Ransomware computer networks in
India were locked down
by the ransom-seeking
hackers.

Data Theft In May 2017, the food


tech company Zomato
faced the theft of
information of 17 million

Prepared by Swarnajit
Mukherjee
Page 4 of 8
Siksha Srijan Academy Of Technology and Management

users.

Petya Container handling


Ransomware functions at a terminal
operated by the Danish
firm AP Moller-Maersk at
Mumbai’s Jawaharlal
Nehru Port Trust got
affected

Mirai Botnet In September 2016,


Mirai malware launched
a DDoS attack on the
website of a well-known
security expert.

Cyber Security – Who are the Cyber Attackers?


There are kinds of cyber players who harm cybersecurity:

 Cyber Criminals
 Cyber Terrorists
 Cyber Espionage
 Cyber Hacktivist

As per the Niti Ayog report, the following are the sets of the group behind the
cybersecurity breaches

Outsiders

Internal Actors

State-affiliated actors

Multiple parties

Attacks in partnerships

Prepared by Swarnajit
Mukherjee
Page 5 of 8
Siksha Srijan Academy Of Technology and Management

Organized Criminal Groups

Find the difference between Malware and Virus by visiting the linked article.

Cyber Security – Cyber Swachhta Kendra


It is the Botnet Cleaning and Malware Analysis Centre under the Indian Computer
Emergency Response Team (CERT-In) under the Ministry of Electronics and
Information Technology (MeitY). The aim of Cyber Swachhta Kendra is to promote
awareness among Indian citizens to secure their data in computers, mobile phones,
and other electronic devices.

Cyber Security – Indian Laws & Government Initiatives


There are various legislations that support cybersecurity in India. The table below
mentions these:

Laws Important Facts


related to
Cyber
Security in
India

Information  Came into force in


and October 2000
Technology  Also called Indian
Act, 2000 Cyber Act
 Provide legal
recognition to all e-
transactions
 To protect online
privacy and curb
online crimes

Information The amendments in the IT


Technology Act mentioned:
Amendment
Act 2008  ‘Data Privacy’
(ITAA)  Information

Prepared by Swarnajit
Mukherjee
Page 6 of 8
Siksha Srijan Academy Of Technology and Management

Security
 Definition of Cyber
Cafe
 Digital Signature
 Recognizing the
role of CERT-In
 To authorize the
inspector to
investigate cyber
offenses against
DSP who was given
the charge earlier

National Indian Government is


Cyber coming up with the
Security National Cyber Security
Strategy Strategy 2020 entailing
2020 the provisions to secure
cyberspace in India. The
cabinet’s nod is pending
and it will soon be out for
the public.

Cyber MeitY in collaboration with


Surakshit National e-Governance
Bharat Division (NeGD) came up
Initiative with this initiative in 2018
to build a cyber-resilient
IT set up

Q1

What is Cyber Crime?


A crime that involves a computer and a network to induce attacks in an individual’s,
businesses’ and governments’ privacy.

What is Select Case ?


Select Case is a conditional statement, that helps you test a variable for
equality against a set of values. Each value is referred to as a case, and a
variable that is being switched on should be checked for all the select
cases.
Prepared by Swarnajit
Mukherjee
Page 7 of 8
Siksha Srijan Academy Of Technology and Management

The Select Case statement provides you with an easy way of testing for
the contents of a variable. However, it is only suitable for use when a
variable in question has only a limited number of options.

Syntax of Select Case Statement in VB.Net


The Select Case statement is declared in VB.Net using following syntax:
Select [ Case ] your_expression
[ Case expression_list
[ statement(s) ] ]
[ Case Else
[ else statement(s) ] ]
End Select

while Loops ( Condition-Controlled Loops )


 Both while loops and do-while loops ( see below ) are condition-controlled,
meaning that they continue to loop until some condition is met.
 Both while and do-while loops alternate between performing actions and
testing for the stopping condition.
 While loops check for the stopping condition first, and may not execute the
body of the loop at all if the condition is initially false.
 Syntax:

while( condition )

body;

where the body can be either a single statement or a block of statements within
{ curly braces }.

1. Example:

int i = 0;

while( i < 5 )

printf( "i = %d\n", i++ );

printf( "After loop, i = %d\n", i );

Prepared by Swarnajit
Mukherjee
Page 8 of 8
Siksha Srijan Academy Of Technology and Management

Prepared by Swarnajit
Mukherjee

You might also like