Cyber Threats and Security
Cyber Threats and Security
Cyber Threats and Security
AND CYBER
SECURITY
UNIT 2 :SESSION 3
SECURITY CONCERN
With the increase in use of the network for accessing data and
resource sharing, security is becoming a prime concern. The Internet
represents an insecure channel for exchanging information, which
leads to a high risk of intrusion or fraud, such as phishing, viruses,
trojans, worms and more.
MALWARE
The term malware refers to malicious software (programs) designed with the intention to
affect the normal functionality by causing harm to the system, or with the intention of getting
unauthorized access to the system or denying access to legitimate users of computing
resources. A malware may be a virus, worm, Trojan horse.
VIRUS: A virus is a software code that may harm your system by overwriting or corrupting
the system files. A computer virus is similar in action to viruses in our body which replicate
themselves and affect body cells. The affected part is called the infected area. The virus
spreads when an infected file is passed from system to system. Viruses can be harmless or
they can modify or delete data. Opening a file can trigger a virus. Once a program virus is
active, it will infect other programs on the computer.
WORM: A worm is often received via network, and it automatically keeps on creating
several copies of itself on the hard disk thereby flooding the hard disk. When a worm is
received as an email attachment, it is automatically forwarded to the recipients leading to
network congestion. Thus, a worm may crash the system and entire network. No host
application is required for worms to replicate themselves e.g. Code Red Worm which makes
more than 2,50,000 copies of itself in approximately 9 hours.
TROJAN HORSE: A Trojan horse or Trojan is a type of malware that is often disguised as
legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain
access to users' systems. Users are typically tricked by some form of social engineering into
loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-
criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.
In the late 1990s, Trojan Horse named Sub7 was created which took advantage of security
flaws of earlier version browsers such as Internet Explorer and Chrome to illegally access
the host computer.
EAVESDROPPING
Never click on a suspicious link specified on a web page or send through a mail for which you are not
sure about its authenticity.
Make sure that passwords are strong and are changed frequently. Passwords are the means for
authenticating users, thereby allowing access to networked systems. Weak passwords have smaller
length and use a small subset of possible characters, and thus, are subjected to be cracked easily. One
should also avoid setting obvious passwords such as names, mobile numbers, or date of birth.
Passwords should be strong, having long length and including characters such as numbers and
punctuation signs.
Neverdisclose personal information such as date of birth, home address, personal phone number,
account details, passwords, credit and debit card details, work history details.
Reportphishing issues to the concerned authorities or at cybercrime.gov.in. In case of unsolicited
mails, mark them as spam mails.
Security of the communication made over the Internet can be indicated by the
security of protocol being used. Secure Hypertext Transfer Protocol (HTTPs) is a
secure version used for communication between client and host on the Internet. So,
ensure that all communications are secure, especially online transactions. The
security of the website can be ensured if there is a padlock on the left side of the
address bar. It indicates that the website has a SSL (Secure Socket Layer) digital
certificate issued by a trusted party which ensures and proves the identity of the
remote host.
Ensure that the web browser being used for accessing the web is updated and is
secure. For example, chrome browser is up to date, if the security patch indicated by
three dots on top right corner are grey in color. Green, orange and red color security
patches indicate that browser update is available for two, four and seven days
respectively.
Be selective while making friends on the social networking site. Do not send or
accept friendship requests from any unknown user. Also, trust the authenticity of a
message only if you are sure about its origin (sender).
Do not post any offensive content on social networking site as it may lead to a
criminal action against you.
Beware before spreading any kind of a rumour as it may be treated as a cyber-crime.
If someone is harassing or threatening you, take snapshot of it as a proof, and block
the person. Also, report the incident to the site administrator.
Use updated antivirus and firewall, secure browsing, and password management
techniques.
Make sure that the website address is properly spelled. Because there may be two
websites with almost the same name, one being a phishing website.
Delete cookies periodically. A cookie is a small piece of information
about the client browsing a website. On receiving a request from a
client, the server records the client information such as domain name
and registration id on the server site in the form of a file or a string.
The server sends this cookie along with the response requested by
the client. At the client side, the browser stores this cookie received
from the server in a directory called cookie directory. By obtaining
access to these cookies, hackers may gain unauthorized access to
these websites. Thus, cookies should be deleted occasionally along
with the temporary files stored on our system during web browsing.