0% found this document useful (0 votes)
10 views9 pages

Cns QB

NA

Uploaded by

Shreya Sakhare
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
0% found this document useful (0 votes)
10 views9 pages

Cns QB

NA

Uploaded by

Shreya Sakhare
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 9

15)

Malware is malicious software and refers to any software that


is designed to cause harm to computer systems, networks, or
users. Malware can take many forms. Individuals and
organizations need to be aware of the different types of
malware and take steps to protect their systems, such as using
antivirus software, keeping software and systems up-to-date,
and being cautious when opening email attachments or
downloading software from the internet.
Malware is software that gets into the system without user
consent to steal the user’s private and confidential data,
including bank details and passwords. They also generate
annoying pop-up ads and change system
settings. Malware includes computer viruses, worms, Trojan
horses, ransomware, spyware, and other malicious programs.
They get into the system through various means:

1. Along with free downloads

2. Clicking on suspicious link.

3.Opening mails from malicious source.

4.Visiting malicious websites.

5.Not installing an updated version of antivirus in the


system.

Types:

1.Virus
2.Worm

3.Trojan Horse

4.Trapdoor/Backdoor

Any two types –


Virus : It refers to a program which damages computer
systems and/or destroys or erases data files.
A computer virus is a malicious program that self-replicates
by copying itself to another program. In other words, the
computer virus spreads by itself into other executable code or
documents.
The purpose of creating a computer virus is to infect
vulnerable systems, gain admin control and steal user
sensitive data.
Hackers design computer viruses with malicious intent and
prey on online users by tricking them.

Trojan horse - The Trojan horse gets its name from the well-
known story of the Trojan War. It is a malicious piece of code
with the ability to take control of the system.
Trojan Horse is a destructive program.
It usually pretends as computer games or application
software.
If executed, the computer system will be damaged. Trojan
Horse usually comes with monitoring tools and key loggers.
These are active only when specific events are alive. These are
hidden with packers, crypters and wrappers.Hence, difficult to
detect through antivirus. These can use manual removal or
firewall precaution.

16)
Trojan horse - The Trojan horse gets its name from the well-
known story of the Trojan War. It is a malicious piece of code
with the ability to take control of the system.
Trojan Horse is a destructive program.
It usually pretends as computer games or application
software. If executed, the computer system will be damaged.
Trojan Horse usually comes with monitoring tools and key
loggers. These are active only when specific events are alive.
These are hidden with packers, crypters and wrappers.Hence,
difficult to detect through antivirus. These can use manual
removal or firewall precaution.

It is intended to steal, damage, or do some other harmful


actions on the computer system.
It attempts to deceive the user into loading and running the
files on the device.
Once it executes, it permits cybercriminals to execute various
tasks on the user's system, like modifying data from files,
deleting data from files, etc. The trojan horse cannot replicate
itself, unlike many viruses or worms.

A Trojan virus spreads by spamming a huge number of users'


inboxes with genuine-looking e-mails and attachments. If
cybercriminals induce users to download malicious software,
it may affect the users' devices. Malicious malware could be
hidden in pop-up ads, banner adverts, or website links.

1. Viruses are computer programs that connect to other


software or programs to harm the system, whereas worms
duplicate themselves to slow down the computer system.
On the other hand, rather than replicating, a Trojan horse
stores critical data about a computer system or a network.
2. A virus attacks an executable file and attaches itself to it to
change the file, whereas a worm attacks system and
application flaws. On the other hand, a trojan horse
appears to be a beneficial application that contains hidden
code that is executed to perform undesirable or harmful
operations.
3. A virus's execution and transmission rely on the transfer of
infected files, whereas worms replicate without human
action and utilize a network to embed themselves in other
systems. On the other hand, a trojan horse works as utility
software and is executed.
4. A virus could not be remotely controlled. On the other
hand, Worms and trojan horses may be remotely
controlled.
5. The virus is primarily utilized to modify or erase system
data, whereas worms are utilized to excessive using system
resources and slow it down. On the other hand, a trojan
horse may be utilized to steal user data to obtain access to
the user's computer system.
6. Viruses may spread slowly, whereas worms may spread
quickly. In contrast, trojan horses may also spread slowly
Both viruses and worms damage user documents, files, and
other data as they spread from one system to another.
However, a virus may replicate within a system after being
infected, and it may not spread to other systems without the
assistance of a human. On the other hand, worms utilize
network weaknesses to spread rather than attaching
themselves to the host. In terms of how it is transmitted, a
Trojan horse differs from a virus or a worm. A Trojan horse
cannot reproduce itself, it should be noted. Users typically
download or install them with the main purpose of stealing
important data.

Once they have infected the computer system, viruses,


worms, and trojan horses are tough to remove, so it is always
essential to have a reliable antivirus program and firewall
installed on your computer system. As a security precaution,
you should only ever download computer applications and
apps from reputable and official sources.

14)
What is Phishing?
"Phish" is pronounced like the word "fish" - the analogy is that
anyone who throws a backed hook out (phishing email) and
expects you to bite. Phishing is a crime where people share
their confidential information like passwords and credit
card numbers with hackers.
There is more than one way to reel in the hunt with real
fishing, but the phishing strategy is the most common.
When the victim opens the email, then they see a scary
message to overcome by their better judgment by filling them
in fear. The message demands immediate action; otherwise
suffers some consequences.
Phishing is a cyber-attack which uses the email as a weapon.

Types of Phishing Attacks


There are eleven types of phishing that are widely used by the
attackers.
Standard E-mail Phishing: It is the most common and easiest
way of

phishing. It attempts to steal sensitive information by emails


that appear to be from a legitimate organization.
Malware Phishing: Using the same email phishing techniques,
it encourages targets to click on links or download
attachments so that the malware can be installed on the
device.
Spear Phishing: Spear phishing focuses on business officers,
public personalities, and other lucrative targets.
Smishing: It is SMS-enabled Phishing that distributes
malicious short links to Smartphone users. It comes as
account notices, award notifications, and in political
messages.
Vishing: Vishing is a malicious calling from a government
agency or any organization. They try to extract our personal
information, such as banking or credit card information.
Clone Phishing: In this type of attack, a shadowy actor tamper
with a person's email account, maliciously swapping a valid
link, attachment, or any other element, changes existing email
and spreads the person's message to spread the infection.
Man-in-the-Middle Attack: The attacks are happened by
building public wi-fi networks at shopping malls or public
places. Once involved, the middle man can fish for
information or run malware on devices.
BEC (Business Email Compromise): A commercial email
agreement includes an email request from someone or a
target company requesting immediate action, be it a money
transaction or a gift card. The strategy is estimated to account
for about half of all cybercrime-related trade losses in 2019.
Whaling- Whaling targets high-profile and senior executives
in an organization. The content of the whaling effort will exist
as a routine communication or high-level executive business.

Example of a Phishing E-mail:


Suppose you saw any messages in your inbox. Do you see any
indication that it is a scam? Let's have a look.
o The email looks like it is from a company that you trust
easily.
o A normal greeting in the email is, "Hi Dear." If we have an
account with the business, it won't use a common greeting
in this way.

o It invites you to click on a link to update the payment


details and look as genuine as a bank website.
We can use the following steps to protect ourselves from the
phishing attack.
1. Protect the computer by using security software.
2. Update mobile phone by setting software to protect
against hackers. These updates can give you significant
protection against security threats.
3. Protect your accounts using multi-factor authentication.
Some accounts provide additional security by requiring
two or many credentials to access our account. It is called
multi-factor authentication. The additional credentials we
need to log into your account fall into two categories:
o You have some passcodes that you get by a text
message.
o Sometimes we are scanning your fingerprint, eye
retina, and face.
If they receive your username and password, multi-factor
authentication makes it difficult for scammers to log into your
accounts.
4. Back up your laptop and phone data, keep it safe.

In the context of computer networks and systems (CNS),


security goals are the fundamental principles that guide the
design, implementation, and management of secure systems.
These goals are essential to protect data, systems, and
networks from unauthorized access, attacks, and other
security threats. The primary security goals are
Confidentiality, Integrity, and Availability, commonly referred
to as the CIA triad.

### 1. **Confidentiality**
- **Definition:** Confidentiality ensures that sensitive
information is accessed only by authorized individuals and is
protected from unauthorized access.
- **Significance:** This is critical for protecting personal
data, proprietary business information, and other confidential
material. Without confidentiality, sensitive information could
be exposed to unauthorized users, leading to privacy
breaches, identity theft, or corporate espionage.

### 2. **Integrity**
- **Definition:** Integrity ensures that data is accurate and
unaltered, both during storage and transmission. It protects
data from unauthorized modification.
- **Significance:** Maintaining data integrity is crucial for
ensuring that information is reliable and trustworthy. If data
integrity is compromised, it can lead to incorrect decisions,
financial loss, and damage to the reputation of individuals or
organizations.

### 3. **Availability**
- **Definition:** Availability ensures that systems, data, and
services are accessible and usable by authorized users
whenever needed.
- **Significance:** Availability is vital for the smooth
operation of businesses and services. If systems are
unavailable due to attacks (e.g., Denial of Service attacks) or
other failures, it can result in significant disruptions, financial
losses, and a loss of customer trust.

### 4. **Additional Goals**


- **Authenticity:** Ensures that users and systems can
verify the identity of each other. This prevents impersonation
and unauthorized access.
- **Accountability:** Ensures that actions can be traced
back to the responsible party. This is important for auditing,
detecting security breaches, and enforcing policies.
- **Non-repudiation:** Ensures that once a transaction has
occurred, neither party can deny the action. This is crucial in
legal and financial transactions.

### **Significance of Security Goals**


- **Protection Against Threats:** Security goals are designed
to protect against various cyber threats, including hacking,
malware, and insider threats.
- **Compliance and Legal Requirements:** Many industries
are subject to regulations (e.g., GDPR, HIPAA) that require
strict adherence to security practices based on these goals.
- **Trust and Reputation:** Ensuring the security of data and
systems builds trust with customers, partners, and
stakeholders. A security breach can severely damage an
organization's reputation.
- **Operational Continuity:** By ensuring the availability of
systems and the integrity of data, organizations can maintain
continuous operations, even in the face of attacks or system
failures.

In summary, the security goals of Confidentiality, Integrity,


and Availability are foundational to protecting information
and systems from a wide range of threats, ensuring that they
remain secure, reliable, and accessible when needed.

You might also like