Chapter 12 - E-SECURITY
INTRODUCTION
E-Security, also known as electronic
security, refers to the measures taken to protect electronic systems, devices,
and networks from unauthorized access, theft, damage, or disruption. As more
and more businesses and individuals rely on electronic systems for
communication, transactions, and data storage, the need for robust e-security
measures becomes increasingly important.
E-security involves the use of various
technologies, processes, and policies to protect electronic systems from a
range of threats, including hackers, viruses, malware, phishing, and identity
theft. Some common e-security measures include firewalls, antivirus software,
intrusion detection systems, encryption, access controls, and regular system
updates.
Firewalls are used to monitor and
control incoming and outgoing network traffic to prevent unauthorized access.
Antivirus software is designed to detect and remove viruses and other malware
from electronic devices. Intrusion detection systems use sensors and software
to detect unauthorized access attempts and alert security personnel. Encryption
involves the use of mathematical algorithms to convert sensitive information
into an unreadable format, making it more difficult for unauthorized users to
access or steal.
Access controls are used to limit
access to electronic systems, data, and networks to authorized users only. This
can include the use of passwords, biometric authentication, and smart cards.
Regular system updates are also important to ensure that known vulnerabilities
are patched and new security threats are addressed.
The benefits of e-security are
numerous. Effective e-security measures can protect electronic systems from
theft, damage, and disruption, reducing the risk of financial loss, data
breaches, and reputational damage. E-security can also increase user confidence
in electronic systems, encouraging more people to use e-commerce and other
online services.
However, e-security also has its risks.
Cybercriminals are constantly developing new methods to bypass e-security
measures, and even the most robust e-security measures can be compromised.
Additionally, e-security measures can be expensive to implement and maintain,
and they can also create barriers to user access and usability.
Overall, e-security is an essential
component of any electronic system, and it requires ongoing attention and
investment to remain effective.
MEANING
E-security refers to the measures and
techniques used to ensure the protection and security of electronic data and
systems. It is an essential component of electronic transactions, which
involves the exchange of sensitive information over the internet, such as
personal identification, financial transactions, and confidential business
data. E-security aims to prevent unauthorized access, theft, and tampering of
electronic data and systems, and to ensure the confidentiality, integrity, and
availability of electronic information.
With the increasing reliance on digital
technology and the growth of e-commerce, the need for e-security has become
paramount. Without adequate e-security measures, electronic transactions are
vulnerable to various forms of cyber-attacks, such as hacking, viruses,
malware, phishing, and identity theft.
E-security comprises a range of
technologies and techniques, including encryption, digital signatures,
firewalls, intrusion detection, access controls, biometrics, and security
protocols. These technologies and techniques aim to protect electronic systems
and data by preventing unauthorized access, detecting and blocking malicious
activities, and providing secure communication channels.
The implementation of e-security
measures requires a comprehensive approach that involves the cooperation of
various stakeholders, including users, technology providers, and regulatory
bodies. It is crucial to develop effective e-security policies and procedures
that are regularly updated and tested to keep up with the evolving threats and
vulnerabilities of electronic transactions.
In summary, e-security is essential to
ensure the protection and security of electronic transactions, and it requires
a comprehensive approach that involves the use of a range of technologies and
techniques to prevent unauthorized access, theft, and tampering of electronic
data and systems.
AREAS OF INTERNET
SECURITY/SECURITY THREATS
Internet security is a crucial aspect
of technology and involves protecting data and sensitive information from
unauthorized access, theft, or damage. The following are the major areas of
internet security and security threats:
Network Security: This involves securing the network infrastructure of an
organization against cyber threats. It includes firewalls, intrusion detection
systems, and other technologies that prevent unauthorized access to the
network.
Data Security: This
is concerned with securing the data stored in databases, servers, and other
storage devices. Data security measures include access controls, encryption,
and backup and recovery procedures.
Application Security: This
involves securing the software applications used in an organization against
hacking and cyber threats. Application security includes code reviews,
penetration testing, and other measures that identify and mitigate
vulnerabilities.
Cloud Security: This
is concerned with securing data and applications stored in cloud-based
services. Cloud security measures include access controls, encryption, and
backup and recovery procedures.
Mobile Security: This
involves securing mobile devices such as smartphones and tablets against cyber
threats. Mobile security measures include antivirus software, password protection,
and remote wipe capabilities.
Security threats are
numerous and varied, but the following are some of the most common:
Malware: Malware is a type of software that is designed to harm or
disrupt computer systems. Malware includes viruses, Trojans, and worms.
Phishing: Phishing
is a type of cyber attack where hackers try to obtain sensitive information
such as passwords and credit card numbers by impersonating a trustworthy
entity.
Denial of Service (DoS) attacks: A DoS
attack involves flooding a network or server with traffic, making it
unavailable to users.
Man-in-the-middle attacks: In a
man-in-the-middle attack, a hacker intercepts communication between two parties
and steals or alters information.
Password attacks: Password
attacks involve guessing or stealing passwords to gain access to a system or
network.
Social engineering: Social
engineering involves manipulating people into divulging sensitive information
or performing actions that can compromise security.
SECURITY RISKS/THREATS
Security risks or threats are events,
actions or circumstances that have the potential to cause harm to computer
systems, networks, data, and individuals. There are various types of security
threats, some of which are:
Malware: Malware
refers to malicious software such as viruses, worms, Trojans, and spyware.
Malware can infect computers and networks and cause damage by stealing data,
corrupting files, and disrupting system functions.
Phishing: Phishing
is a type of social engineering attack where cybercriminals send emails or
messages that appear to be from a trusted source, such as a bank or social
media platform. The aim is to trick users into revealing sensitive information
such as login credentials or credit card details.
Hacking: Hacking
involves gaining unauthorized access to computer systems or networks. Hackers
can steal data, modify or delete files, and cause system disruptions.
Denial of Service (DoS) attacks: DoS
attacks involve overwhelming a website or network with traffic to make it
unavailable to users. This can cause significant financial losses for
businesses that rely on their online presence.
Insider threats: Insider
threats are risks that come from within an organization. This can include
employees stealing or leaking sensitive data, or intentionally damaging
computer systems.
Ransomware: Ransomware
is a type of malware that encrypts files on a computer or network, making them
inaccessible to users. Cybercriminals demand payment in exchange for the
decryption key.
Advanced Persistent Threats (APTs): APTs
are sophisticated attacks that target specific organizations or individuals
over an extended period of time. APTs often use multiple attack vectors and can
be difficult to detect and mitigate.
These are just a few examples of the
many security risks and threats that exist in the digital world. As technology
continues to advance, new threats will inevitably emerge, making it essential
for individuals and organizations to stay vigilant and take appropriate
security measures to protect themselves.
(A) Physical risks
Physical risks in the context of
internet security refer to threats to the physical infrastructure of a network
or device. These risks can include:
Hardware failure: This
refers to the failure of the physical components of a device or network, such
as hard drives, power supplies, or other critical components. Hardware failures
can cause data loss or downtime, which can lead to security risks or other
problems.
Theft: Physical
theft of devices or data storage media can be a major security risk, especially
if the stolen items contain sensitive or confidential information. Laptops,
mobile devices, and USB drives are common targets for thieves.
Environmental damage: Natural
disasters such as floods, earthquakes, and fires can cause physical damage to
devices and networks, leading to data loss or downtime.
Power outages: Power
outages can cause data loss, corruption, or other security risks. They can also
make it difficult or impossible to access critical systems or data.
Human error: Accidents,
mistakes, and negligence by users can also cause physical security risks. For
example, a user might accidentally spill coffee on a keyboard, causing damage
to the device and potential data loss.
Overall, physical risks are an
important consideration in internet security, as they can lead to data loss,
downtime, and other security problems. Organizations must take steps to protect
their physical infrastructure, including implementing backup systems, securing
devices and storage media, and educating users on safe practices.
(B) Technical and other
Risks
Issuing e-cheques can offer several
benefits, such as faster and more secure transactions. However, there are also
technical and other risks associated with e-cheques that you should be aware
of:
Technical Risks:
Cybersecurity risks: E-cheques
are transmitted electronically, making them vulnerable to cyberattacks such as
hacking and phishing. These attacks can result in the interception or
alteration of e-cheque data, leading to fraudulent transactions.
Technology failures: E-cheques
rely on technology infrastructure such as internet connectivity, software, and
hardware, which can experience failures, leading to delays or errors in the
issuance and processing of e-cheques.
Integration issues: E-cheques
may require integration with multiple systems and platforms, including bank
systems, payment gateways, and third-party service providers. Integration
issues can lead to discrepancies and errors in the issuance and processing of
e-cheques.
Data privacy concerns: E-cheques
involve the transfer of sensitive financial data, making them vulnerable to
data privacy breaches. Personal information such as bank account numbers and
digital signatures can be stolen and used for fraudulent purposes.
Other Risks:
Legal risks: The legal framework governing e-cheques may differ across
jurisdictions, and there may be legal uncertainties and ambiguities regarding
their use. Issuing e-cheques without proper legal and regulatory compliance can
result in legal and financial liabilities.
Reversal risks: E-cheques,
like physical cheques, can be reversed if there are insufficient funds in the
account or if the cheque is dishonored for other reasons. However, the reversal
process for e-cheques can be more complex, leading to delays and disputes.
1.VIRUS,WORMS,TROJANS
Viruses, worms, and Trojans are types
of malicious software, or malware, that can infect computers and other digital
devices, and cause harm to the system or the user's data. Here's an overview of
each type of malware:
Virus: A
computer virus is a malicious program that attaches itself to other programs or
files and spreads from one computer to another when the infected file is
executed. A virus can cause a wide range of damage, such as deleting or
corrupting files, stealing personal information, and even causing system
crashes.
Worm: A computer worm is a self-replicating
program that spreads through a network or the internet without any human
intervention. Worms typically exploit vulnerabilities in the operating system
or other software to spread quickly and can cause significant damage to the
infected system or network.
Trojan: A
Trojan, or Trojan horse, is a type of malware that disguises itself as a
legitimate program or file to trick the user into downloading and executing it.
Once installed, a Trojan can perform a wide range of malicious activities, such
as stealing sensitive data, modifying or deleting files, and providing
unauthorized access to the infected system.
To protect against viruses, worms, and
Trojans, users should take several precautions, such as:
Install antivirus software: Antivirus
software can detect and remove malware from the system and prevent further
infections.
Keep software updated: Updating
operating systems, software, and applications can patch vulnerabilities that
malware can exploit.
Be cautious when downloading files: Users
should only download files from trusted sources and scan them for malware
before executing them.
Use strong passwords: Strong
passwords can prevent unauthorized access to the system, which can prevent
malware from being installed or activated.
By taking these precautions, users can
minimize the risk of infection by viruses, worms, and Trojans and protect their
digital devices and data.
1.Spyware
Spyware is a type of malicious
software, or malware, that is designed to collect sensitive information from a
user's computer or device without their knowledge or consent. Spyware can
monitor a user's internet activity, collect personal information, and transmit
it to a third-party without the user's knowledge. Spyware can be installed on a
device in several ways, including downloading an infected program or opening an
infected email attachment.
Some common types of
spyware include:
Key loggers: Key loggers
record every keystroke a user makes, including passwords and other sensitive
information, and send the data to a third-party.
Adware: Adware
is software that displays unwanted ads on a user's computer or device. Adware
can also collect user information and transmit it to third-party advertisers.
Tracking cookies: Tracking
cookies are small files that are stored on a user's computer or device and
track their internet activity. These cookies can be used to collect personal
information and transmit it to third-parties without the user's knowledge.
Remote Access Trojans (RATs): RATs
allow a remote attacker to take control of a user's computer or device and
monitor their activity, steal data, or install additional malware.
Spyware can be dangerous as it can compromise
a user's privacy and security. It can also slow down the performance of a
device and lead to instability and crashes. To protect against spyware, users
should take several precautions, such as:
Install antivirus software: Antivirus
software can detect and remove spyware from the system and prevent further
infections.
Use a firewall: Firewalls
can block unauthorized access to a device and prevent spyware from transmitting
data to third-parties.
Be cautious when downloading software: Users
should only download software from trusted sources and scan it for spyware
before installation.
Keep software updated: Updating
operating systems, software, and applications can patch vulnerabilities that
spyware can exploit.
By taking these precautions, users can
minimize the risk of infection by spyware and protect their privacy and
security.
MANAGEMENT OF
SECURITY BREACH AND BREACH AVOIDANCE
The
management of security breaches and breach avoidance is crucial in ensuring the
safety and security of digital systems and data. Here are some steps that
organizations can take to manage and prevent security breaches:
Risk Assessment: Conduct
regular risk assessments to identify potential vulnerabilities and threats to
the system. This includes reviewing the system architecture, access control
procedures, and data management policies.
Security Policies: Develop
and implement security policies and procedures that address the identified
risks. These policies should be regularly reviewed and updated to reflect
changes in the security landscape.
Access Control: Implement
strong access controls that limit the number of people who can access sensitive
data and systems. This includes using multi-factor authentication, password
policies, and restricting access based on job roles.
Encryption: Encrypt
sensitive data in transit and at rest to ensure that it cannot be intercepted
or stolen. This includes using secure protocols such as HTTPS, SSL, and TLS.
Incident Response Plan: Develop
an incident response plan that outlines the steps to be taken in the event of a
security breach. This should include procedures for notifying customers, law
enforcement, and other stakeholders.
Employee Training: Train
employees on security best practices, including password hygiene, social engineering,
and phishing attacks. This helps to ensure that employees are aware of the
risks and can take appropriate action to prevent security breaches.
Regular Testing: Regularly
test the system for vulnerabilities and weaknesses. This includes penetration
testing, vulnerability assessments, and security audits.
By
following these steps, organizations can effectively manage security breaches
and prevent them from occurring in the first place. It is important to note
that security is an ongoing process, and organizations should continuously
monitor and update their security practices to stay ahead of new threats and
vulnerabilities.
NEEDS/ELEMENTS/CONCERNS
OF E-SECURITY
The
needs, elements, and concerns of e-security can vary depending on the specific
context and situation. However, some common considerations include:
Confidentiality: Ensuring
that sensitive information is only accessible to authorized individuals or
entities.
Integrity: Ensuring
that information is accurate, complete, and not subject to unauthorized
modification.
Availability: Ensuring
that systems and data are available to authorized users when needed.
Authentication: Verifying
the identity of users and entities accessing systems or data.
Authorization: Granting
appropriate access privileges to users and entities based on their roles and
responsibilities.
Non-repudiation: Ensuring
that the originator of a communication or transaction cannot deny their
involvement.
Risk management: Identifying
potential risks and implementing measures to mitigate or manage those risks.
Compliance: Ensuring
that systems and processes adhere to relevant laws, regulations, and industry
standards.
Incident response: Having
a plan in place to detect, contain, and respond to security incidents or
breaches.
Training and awareness: Ensuring
that all stakeholders are educated and aware of e-security risks and best
practices.
Overall,
effective e-security requires a comprehensive and proactive approach that
considers the specific needs and concerns of an organization or system.
TECHNIQUES/TOOLS/SOLUTIONS
TO ADRRESS SECURITY BREACH SECURITY THREATS
There
are several techniques, tools, and solutions that can be used to address
security breaches and security threats in e-security. Some of these include:
Encryption: Encryption
is the process of converting plain text into a coded message to prevent
unauthorized access. By encrypting sensitive data, it becomes more difficult
for hackers to decipher and access the information.
Firewalls: Firewalls
are software or hardware devices that protect networks by preventing
unauthorized access to the system. Firewalls work by monitoring incoming and
outgoing traffic and blocking any suspicious activity.
Anti-virus software: Anti-virus
software is designed to protect computer systems from viruses, malware, and
other harmful software. It works by scanning the computer system and removing
any malicious software that it finds.
Two-factor authentication: Two-factor
authentication is a security measure that requires users to provide two forms
of identification before accessing a system. This can include a password and a
code sent to a user's mobile phone.
Intrusion detection and prevention systems: Intrusion
detection and prevention systems are designed to monitor network traffic for
signs of unauthorized access. They work by identifying suspicious activity and
blocking or alerting administrators to potential threats.
Penetration testing: Penetration
testing involves simulating an attack on a system to identify vulnerabilities
and weaknesses. This can help organizations to identify potential security
risks and take steps to address them.
Security policies and procedures: Developing
and implementing security policies and procedures is an important step in
addressing security breaches and threats. This can include guidelines for data
encryption, password management, and access control.
Overall,
a comprehensive approach to e-security involves a combination of these
techniques, tools, and solutions to protect against security breaches and
threats.
ENCRYPTION
Encryption
is the process of converting plaintext or unencrypted data into ciphertext or
encrypted data to prevent unauthorized access, interception or modification
during transmission or storage. It is one of the most widely used techniques in
modern cryptography to provide secure communication and protect sensitive
information.
Encryption
involves the use of mathematical algorithms and cryptographic keys to transform
the original data into unreadable and meaningless text. The ciphertext can only
be decrypted back to plaintext by someone who has the correct key to unlock it.
There are two main types
of encryption: symmetric and asymmetric.
Symmetric
encryption, also known as shared secret encryption, uses the same key for both
encryption and decryption of data. The sender and the receiver must have the
same secret key to be able to decrypt and read the message. Some common
symmetric encryption algorithms include AES, DES, and Blowfish.
Asymmetric
encryption, also known as public key encryption, uses two different keys for
encryption and decryption of data. One key, called the public key, is widely
distributed and used to encrypt data, while the other key, called the private
key, is kept secret and used to decrypt data. Some common asymmetric encryption
algorithms include RSA and Elliptic Curve Cryptography (ECC).
Encryption is used for a
variety of purposes, including:
Secure communication: Encryption
is used to secure sensitive information sent over the internet or other
communication networks, such as email, instant messaging, and online banking.
Data protection: Encryption
is used to protect sensitive data stored on computers or other digital storage
devices, such as passwords, credit card numbers, and personal identification
information.
Digital signatures: Encryption
is used to create digital signatures, which are used to verify the authenticity
and integrity of digital documents, such as contracts, legal agreements, and
financial transactions.
Compliance: Encryption
is often required by law or industry regulations to protect sensitive
information, such as health records, financial information, and government
secrets.
While
encryption provides a high level of security, it is not fool proof. Some of the
challenges and concerns associated with encryption include:
Key management: Proper key management is essential for ensuring the
security of encrypted data. Keys must be kept secret and protected from
unauthorized access or theft.
Performance: Encryption
can slow down data transmission and processing, which can be a concern for
time-sensitive applications.
Backdoors: Governments
and law enforcement agencies have been known to pressure companies to include
backdoors in their encryption systems to allow for surveillance and
intelligence gathering.
Quantum computing: The
development of quantum computers could potentially render current encryption
algorithms obsolete, as they are designed to be broken by these new
technologies.
Despite
these challenges, encryption remains an essential tool for protecting sensitive
information and securing communication networks.
What is a key?
In the
context of encryption, a key refers to a piece of information used to control
the transformation of plaintext into ciphertext or vice versa. It is a
parameter that determines the specific mathematical algorithm used in the
encryption or decryption process. A key can be a sequence of characters or a
string of bits, and its length and complexity determine the level of security
of the encryption. In general, a longer and more complex key makes it more
difficult to crack the encryption and provides stronger protection for the data
being encrypted.
Encryption Techniques
Encryption
techniques are used to convert plain text or data into encoded or cipher text
to ensure confidentiality, integrity, and authentication of the information.
There are several encryption techniques used in the industry, some of which
include:
Symmetric Key Encryption: Also
known as secret key encryption, this technique uses the same key for both
encryption and decryption. The symmetric key encryption technique is fast and
is commonly used to secure sensitive data such as credit card numbers,
passwords, and confidential documents.
Asymmetric Key Encryption: Also
known as public-key encryption, this technique uses two different keys for
encryption and decryption. One key is public and can be shared with anyone,
while the other key is private and kept secret by the owner. Asymmetric key
encryption is slower than symmetric encryption but provides better security and
is commonly used in online transactions and communication.
Hash Functions: Hash
functions are one-way encryption techniques that convert data into a fixed-size
message digest or hash. Hash functions are used to ensure data integrity and
are commonly used to store passwords in a database.
Digital Signatures: Digital
signatures are used to verify the authenticity of a digital message or
document. Digital signatures use public-key encryption to create a unique
signature that can only be generated by the owner of the private key.
Steganography: Steganography
is the practice of hiding messages or data within other messages or data.
Steganography is commonly used to hide sensitive data within images, audio
files, or videos.
Overall,
encryption techniques play a crucial role in ensuring the confidentiality,
integrity, and authenticity of sensitive information, and different techniques
are used based on the specific security requirements of an application or
system.
2. FIREWALLS
A firewall is a network security system
designed to control and monitor incoming and outgoing network traffic. It acts
as a barrier between a private internal network and the public Internet,
filtering out unwanted traffic and allowing authorized traffic to pass through.
The main purpose of a firewall is to prevent unauthorized access to or from a
private network.
There are two main types of firewalls: software
and hardware. A software firewall is a program installed on a computer or
server that acts as a filter for incoming and outgoing traffic. A hardware
firewall is a physical device that is connected to a network and acts as a
filter for incoming and outgoing traffic.
Firewalls work by examining each
incoming and outgoing packet of data and determining whether it meets certain
criteria based on a set of predefined rules. If the packet meets the criteria,
it is allowed to pass through the firewall. If it does not meet the criteria,
it is blocked or rejected.
Firewalls can be configured to filter
traffic based on a variety of criteria, such as IP address, port number, and
protocol type. They can also be configured to block specific types of traffic,
such as email or file sharing protocols, and to allow certain types of traffic,
such as web traffic or VPN traffic.
Some of the benefits of
using a firewall include:
Improved network security: A
firewall can prevent unauthorized access to a network and help protect against
malware and other security threats.
Increased privacy: A
firewall can help prevent personal or confidential information from being
transmitted outside of a network.
Better control of network traffic: A
firewall can help control network traffic and limit bandwidth usage, improving
network performance.
Compliance with regulations: Many
industries and countries have regulations that require the use of firewalls to
protect sensitive data.
However, there are also
some potential drawbacks to using a firewall, such as:
False sense of security: A firewall is not a complete solution to network security
and can create a false sense of security if not used in conjunction with other
security measures.
Configuration complexity: Firewalls
can be complex to configure and maintain, requiring a skilled IT professional
to manage them.
Performance impact: Firewalls
can impact network performance if not properly configured or if they are
overloaded with traffic.
Cost: Hardware firewalls can be
expensive, and even software firewalls can require a significant investment in
terms of time and resources to configure and maintain.
Benefits of firewall
Firewalls offer several
benefits in terms of network security, including:
Protection against unauthorized access: Firewalls
act as a barrier between your computer network and the outside world, blocking
unauthorized access attempts from hackers and malware.
Traffic monitoring: Firewalls
can monitor network traffic to identify and block potentially harmful traffic,
such as malware and unauthorized access attempts.
Policy enforcement: Firewalls
can be configured to enforce security policies and access rules, such as
blocking certain types of traffic or restricting access to certain websites.
Improved network performance: By
blocking unwanted traffic and reducing the number of unnecessary requests,
firewalls can improve network performance.
Centralized security management: Many
firewalls offer centralized management capabilities, allowing administrators to
monitor and manage network security from a single location.
Regulatory compliance: Firewalls
can help organizations meet regulatory compliance requirements, such as those
related to data privacy and security.
Overall, firewalls are a critical
component of a comprehensive network security strategy, helping organizations
protect against a range of threats and vulnerabilities.
3. PROXY
SERVER
A proxy server is an intermediary
server between a client and the internet. It acts as a gateway that forwards
requests from the client to the internet and then returns the response from the
internet back to the client. The purpose of a proxy server is to improve
security, privacy, and performance.
Proxy servers can be used
for various purposes, such as:
Caching: Proxy
servers can cache frequently accessed web pages and files, which can improve
performance by reducing the response time of subsequent requests.
Filtering: Proxy
servers can be used to filter out unwanted content, such as malware,
advertisements, and adult content, from the requests sent by clients.
Anonymity: Proxy
servers can be used to hide the identity of the client by masking their IP
address, which can help protect their privacy.
Load balancing: Proxy
servers can distribute incoming requests across multiple servers to improve
performance and ensure high availability.
Security: Proxy
servers can act as a barrier between the client and the internet, providing an
additional layer of security by blocking unauthorized access to the network.
Overall, the benefits of using a proxy
server include improved performance, security, privacy, and network management.
However, it is important to note that proxy servers can also introduce
additional complexity and may require additional resources to maintain and
manage.
Benefits of proxy
server
Some benefits of using a proxy server include:
Improved Security: Proxy servers act as a gateway between a user and the
internet, providing an additional layer of security by blocking potentially
harmful incoming traffic and preventing access to malicious websites.
Enhanced Privacy: Proxy
servers can be used to protect the privacy of users by hiding their IP
addresses and encrypting their data. This helps to prevent tracking and
monitoring of online activities by third parties.
Faster Access: Proxy
servers can improve access speed to websites by caching frequently accessed
pages and files, reducing the time it takes for them to load.
Reduced Bandwidth Usage: By
caching frequently accessed content, proxy servers can reduce the amount of
bandwidth used, leading to faster overall performance and reduced costs.
Content Filtering: Proxy
servers can be used to filter out unwanted content, such as ads or specific
types of websites, improving productivity and reducing distractions in the
workplace.
Load Balancing: Proxy
servers can be used to distribute traffic across multiple servers, improving
performance and reducing the risk of server overload or failure.
4. DIGITAL SIGNATURE
Digital signature is a technique used
in cryptography to verify the authenticity of digital documents or messages. It
provides a way to ensure that the content of a message or document has not been
tampered with and that the sender of the message is who they claim to be.
A digital signature is created using a
mathematical algorithm and a private key that only the sender possesses. The
signature is attached to the document or message and can be verified using the
sender's public key. If the signature is valid, it confirms the authenticity
and integrity of the message or document.
Digital signatures
provide several benefits, including:
Authenticity: Digital
signatures provide a way to verify that a message or document was created by a
specific sender and has not been altered since it was signed. This ensures that
the content is trustworthy and reliable.
Non-repudiation: Digital
signatures provide a way to prevent the sender from denying that they sent the
message or document. This is important in legal and business contexts where it
may be necessary to prove that a specific person sent a message or document.
Security: Digital signatures provide a secure way to transmit
information over the internet or other digital networks. The use of encryption
and key pairs ensures that the content is protected from unauthorized access.
Overall, digital signatures provide a
secure and reliable way to authenticate and verify the integrity of digital
documents and messages. They are widely used in industries such as finance,
healthcare, and government where security and authenticity are of utmost
importance.
Working of a digital
signature
A digital signature is a mathematical
technique used to verify the authenticity and integrity of a digital document
or message. It works by creating a unique digital fingerprint of the document
or message using a complex algorithm, which is then encrypted using the
sender's private key. This encrypted digital fingerprint, or signature, is then
appended to the document or message.
When the recipient receives the
document or message, they can use the sender's public key to decrypt the
digital signature and retrieve the original digital fingerprint. They can then
compare this digital fingerprint with a newly computed digital fingerprint of
the received document or message. If the two digital fingerprints match, it
proves that the document or message has not been altered or tampered with in
transit and that it originated from the sender who possesses the private key.
In simpler terms, a digital signature
works like a seal on a physical document that ensures its authenticity and
integrity.
A digital signature is a mathematical
technique used to verify the authenticity and integrity of a digital document
or message. It works by creating a unique digital fingerprint of the document
or message using a complex algorithm, which is then encrypted using the
sender's private key. This encrypted digital fingerprint, or signature, is then
appended to the document or message.
When the recipient receives the
document or message, they can use the sender's public key to decrypt the
digital signature and retrieve the original digital fingerprint. They can then
compare this digital fingerprint with a newly computed digital fingerprint of
the received document or message. If the two digital fingerprints match, it
proves that the document or message has not been altered or tampered with in
transit and that it originated from the sender who possesses the private key.
In simpler terms, a digital signature
works like a seal on a physical document that ensures its authenticity and
integrity.
A digital signature is a mathematical
technique used to verify the authenticity and integrity of a digital document
or message. It works by creating a unique digital fingerprint of the document
or message using a complex algorithm, which is then encrypted using the
sender's private key. This encrypted digital fingerprint, or signature, is then
appended to the document or message.
When the recipient receives the
document or message, they can use the sender's public key to decrypt the
digital signature and retrieve the original digital fingerprint. They can then
compare this digital fingerprint with a newly computed digital fingerprint of
the received document or message. If the two digital fingerprints match, it
proves that the document or message has not been altered or tampered with in
transit and that it originated from the sender who possesses the private key.
In simpler terms, a digital signature
works like a seal on a physical document that ensures its authenticity and
integrity.
5. BIOMETRIC SECURITY
Biometric security refers to the use of
physical or behavioral characteristics of individuals to authenticate their
identity for access control, authorization, or other security purposes.
Biometric identification systems typically capture unique and measurable
features of an individual's body or behavior, such as fingerprints, facial
features, iris scans, voice patterns, hand geometry, or gait, and use them to
create a digital template or signature that can be stored and compared with
future attempts to verify the individual's identity.
The working of biometric
security involves several steps:
Enrollment: The first step is to enroll the biometric information of an
individual into a database. This involves capturing the physical or behavioral
characteristic using a sensor, such as a fingerprint scanner or a camera.
Creation of a template: The
biometric information is then processed and converted into a digital template,
which is a unique representation of the individual's biometric feature. This
template is stored in a database for future reference.
Verification: When
an individual attempts to gain access to a system or resource that is protected
by biometric security, the system captures the biometric information and
compares it with the stored template. If the two match, the individual is
authenticated and granted access. If there is no match, access is denied.
Authentication: Once
the biometric information is verified, the individual is authenticated and
granted access to the protected system or resource.
Biometric security offers several
advantages over traditional authentication methods, such as passwords and PINs.
Biometric characteristics are unique to each individual and cannot be easily
replicated or stolen. Biometric authentication is also more convenient and
user-friendly than traditional methods, as users do not need to remember
passwords or carry identification cards. However, biometric security also poses
some risks, such as privacy concerns and the potential for false positives or
false negatives in the identification process.
Physiological
Biometric security refers to the use of
unique physiological or behavioral characteristics to verify the identity of an
individual. Physiological biometric security refers to the use of physical
attributes that are unique to an individual, such as fingerprints, facial
features, iris patterns, and DNA. These physical attributes are captured
through a process called biometric enrollment, where the individual's biometric
data is collected and stored in a secure database.
During biometric authentication, the
individual's biometric data is captured again and compared with the data in the
database to verify their identity. This process can be done through various
methods, such as scanning fingerprints or facial recognition. If the
individual's biometric data matches the data in the database, the
authentication is successful, and access is granted.
One advantage of physiological
biometric security is that it is difficult to fake or duplicate. Unlike
passwords or PINs, which can be easily stolen or shared, an individual's physical
attributes are unique and cannot be replicated. However, there are concerns
about the privacy and security of biometric data, as it can be hacked or
stolen. It is essential to ensure that biometric data is collected, stored, and
transmitted securely to prevent unauthorized access or theft.
Finger or hand
pattern recognition
Finger or hand pattern recognition is a
type of biometric authentication that uses the unique patterns on a person's
fingers or hands to verify their identity. This method of biometric
authentication is based on the fact that each person's fingers and hands have
unique characteristics such as the patterns of ridges and valleys on their
skin.
The process of finger or hand pattern
recognition involves the use of a scanner or sensor that captures an image of
the patterns on the person's fingers or hands. This image is then compared to a
previously stored image of the same person's finger or hand patterns. If the
two images match, the person's identity is verified and access is granted.
Finger or hand pattern recognition is
commonly used in applications such as access control systems, time and
attendance systems, and financial transactions. One of the benefits of this
biometric authentication method is that it is non-intrusive and does not
require physical contact with the authentication device, making it more
hygienic than other biometric authentication methods such as fingerprint
scanning.
However, finger or hand pattern
recognition may not be as accurate as other biometric authentication methods,
especially if the person's fingers or hands are dirty, wet, or injured. It may
also be susceptible to spoofing attacks using fake finger or hand patterns,
although advanced sensors and algorithms can help prevent such attacks.
Voice recognition
Voice recognition is a type of
biometric security that uses an individual's unique voice patterns to verify
their identity. The process involves the analysis of the speaker's voice to
create a voiceprint or a unique pattern of characteristics that are specific to
that individual's voice. The voiceprint can be created by analyzing different
characteristics of the speaker's voice, such as the pitch, tone, pronunciation,
and speed of speech.
To use voice recognition technology for
security purposes, the individual is typically required to speak a passphrase
or a series of words that are used to create the voiceprint. The system will
then compare the voiceprint with the one that is stored in its database to
authenticate the speaker's identity.
Voice recognition has several
advantages over other biometric security measures. It is non-intrusive, does
not require physical contact, and can be used for remote authentication. It is
also relatively easy to use and can be implemented using a smartphone or other
mobile device.
However, voice recognition technology
also has its limitations. It may not work well in noisy environments or if the
speaker has a cold or sore throat. It can also be vulnerable to spoofing or
imitation by a skilled impersonator. As a result, it is often used in
combination with other biometric measures, such as fingerprint or facial
recognition, to enhance security.
Iris recognition
Iris recognition is a type of biometric
authentication that uses the unique pattern of an individual's iris to verify
their identity. The iris is the colored part of the eye that surrounds the
pupil and contains a complex pattern of ridges, furrows, and freckles that is
unique to each individual.
To use iris recognition, an individual
must first enroll in the system by having their iris scanned and creating a
digital template of their unique pattern. This template is stored securely in a
database and can be used for future authentication.
When a person attempts to access a
system or location that requires iris recognition, they are asked to look into
a camera or scanner that captures an image of their iris. The image is then
compared to the stored template to verify the individual's identity.
Iris recognition is considered to be a
highly accurate form of biometric authentication, with an extremely low false
acceptance rate (FAR) and false rejection rate (FRR). It is also non-intrusive
and can be used in a variety of applications, such as airport security, border
control, and employee access control systems. However, it can be more expensive
and complex to implement than other biometric technologies.
Behavioral Techniques
Behavioral biometric techniques refer
to the recognition of an individual's identity based on his/her behavioral
characteristics such as the way he/she types on a keyboard, the way he/she uses
a mouse, his/her signature, gait, etc. These characteristics are unique to
every individual and can be used for authentication and identification
purposes.
Behavioral biometric techniques work by
creating a profile of a user based on his/her unique behavior patterns. This
profile is then used as a reference to verify the user's identity in future
interactions. For example, a user's typing patterns on a keyboard can be
analyzed to create a profile that includes characteristics such as the speed of
typing, the pressure applied on keys, the duration of keystrokes, etc. This
profile can then be used to authenticate the user in future interactions,
ensuring that only authorized individuals have access to the system.
Some common applications of behavioral
biometric techniques include user authentication for online banking, access
control for secure facilities, and fraud detection for financial transactions.
One advantage of these techniques is that they are non-intrusive and do not
require any physical contact with the user. However, they may not be as
accurate as physiological biometric techniques, and the accuracy can be
affected by factors such as environmental conditions and the user's state of
mind.
6. PHORCEFIELD
PHORCEFIELD
is a security technique that aims to protect computer systems and sensitive
information from unauthorized access. This technique is based on the idea of
creating a virtual force field that surrounds the computer system and prevents
any unauthorized user from accessing it.
The
PHORCEFIELD technique involves a combination of hardware and software
technologies to create the virtual force field around the computer system. The
hardware component usually consists of a network of sensors that are placed
around the computer system. These sensors can detect any attempt to breach the
force field, such as physical intrusion or unauthorized access attempts.
The
software component of PHORCEFIELD is designed to monitor the sensors and
analyze the data they collect. If the software detects any unauthorized access
attempt, it triggers an alert and initiates a response, such as shutting down
the system or locking the user out.
PHORCEFIELD
is particularly useful in situations where physical security is not sufficient
to protect sensitive information. For example, in a shared office environment
or a public space, it may not be possible to physically secure a computer
system. In such situations, PHORCEFIELD can provide an additional layer of
security to prevent unauthorized access.
One of
the key advantages of PHORCEFIELD is its ability to provide real-time
protection against security threats. The system is designed to respond quickly
to any security breach, which means that any attempted attack can be thwarted
before it can cause any damage. This is particularly important in situations
where sensitive information is at risk, such as in a corporate environment or a
government agency.
Another
advantage of PHORCEFIELD is that it is highly customizable. The system can be
tailored to meet the specific security needs of a particular organization or
system. This means that it can be adapted to work with a wide range of hardware
and software configurations.
However,
one of the limitations of PHORCEFIELD is that it can be expensive to implement.
The hardware and software components can be costly, and the system may require
significant ongoing maintenance and support. Additionally, the system may be
vulnerable to certain types of attacks, such as social engineering attacks,
which can circumvent the virtual force field.
In
summary, PHORCEFIELD is a powerful security technique that can provide an
additional layer of protection for computer systems and sensitive information.
While it has some limitations, it is a valuable tool for organizations that
need to protect their assets from unauthorized access.
7. MEASURES TO COMBAT
PHISHING
Phishing
is a fraudulent attempt to obtain sensitive information like login credentials,
credit card details, or other personal information by posing as a trustworthy
entity in an electronic communication. Here are some measures to combat
phishing:
Education and Awareness: The first and most important measure to combat phishing is
to educate and create awareness among people about the different types of
phishing scams, how they operate, and what precautions they can take.
Use of Anti-phishing Software: Anti-phishing
software and browser extensions can detect and block known phishing sites and
alert the user when they encounter a suspicious link or email.
Multi-Factor Authentication: Multi-factor
authentication (MFA) adds an extra layer of security to the authentication
process by requiring users to provide additional information beyond a password.
This could be a one-time code sent to their phone or a biometric factor such as
a fingerprint.
Email Filters: Email
filters can help detect and block phishing emails before they reach the user's
inbox. Organizations can use email filters to block emails from suspicious
domains or known phishing sources.
Strong Passwords: Users
should be advised to use strong, unique passwords for all their accounts, and
change them regularly. Passwords should be a combination of upper and lower
case letters, numbers, and special characters.
Report Phishing: Users should be encouraged to report phishing attacks to the
relevant authorities, such as the Anti-Phishing Working Group, their bank, or
the company whose brand was spoofed.
Regular Updates and Patches: Keeping
software and applications up to date with the latest security patches and
updates can help prevent cybercriminals from exploiting known vulnerabilities
in the system.
By
taking these measures, individuals and organizations can combat phishing and
protect their sensitive information from falling into the wrong hands.
8. MEASURES TO AVOID
SOCIAL ENGINEERING ATTACKS
Social
engineering attacks are a type of cyber attack where the attacker manipulates
individuals to obtain confidential information or access to sensitive systems.
Here are some measures to avoid social engineering attacks:
Education and Awareness: Individuals
should be educated on the common techniques used in social engineering attacks,
including phishing, baiting, and pretexting. It is important to be vigilant and
cautious while sharing personal or confidential information.
Two-Factor Authentication: Two-factor authentication provides an extra layer of
security by requiring the user to provide additional information or proof of
identity before granting access to a system. This can help prevent unauthorized
access in case an attacker has obtained the user's password through social
engineering.
Keep Software Up-to-date: Social
engineering attacks often exploit vulnerabilities in outdated software.
Regularly updating software can help prevent attacks from exploiting known
vulnerabilities.
Use Strong Passwords: Strong
passwords are critical in preventing social engineering attacks. Passwords
should be unique and complex, and users should avoid reusing passwords across
multiple accounts.
Limit Information Sharing: Personal and sensitive information should be shared only
with trusted parties. It is important to avoid sharing personal information,
such as login credentials or social security numbers, through unsolicited
emails or phone calls.
Verify Requested Information: If an
individual receives a request for sensitive information, it is important to
verify the authenticity of the request before providing any information. This
can be done by contacting the company or individual through a known and
verified method of communication.
Implement Security Controls: Organizations
should implement security controls, such as firewalls, intrusion detection and
prevention systems, and access controls, to prevent social engineering attacks.
Regular security assessments and penetration testing can help identify
vulnerabilities and provide recommendations for remediation.
9. LEGAL OBLIGATIONS
Legal
obligations in the context of e-security refer to the responsibilities that
individuals and organizations have to comply with relevant laws, regulations,
and standards related to information security. Some of the legal obligations
that individuals and organizations may be subject to in the context of
e-security include:
Data protection laws: Data
protection laws regulate the collection, storage, processing, and sharing of
personal information. Organizations that handle personal information are
required to comply with relevant data protection laws and regulations, such as
the EU's General Data Protection Regulation (GDPR) or the US's Health Insurance
Portability and Accountability Act (HIPAA).
Cybercrime laws: Cybercrime laws define and criminalize various types of
cyber offenses, such as hacking, malware attacks, and identity theft.
Individuals and organizations that engage in cybercrime are subject to legal
penalties, such as fines or imprisonment.
Intellectual property laws: Intellectual
property laws protect the rights of creators and owners of original works, such
as patents, trademarks, and copyrights. Individuals and organizations that
violate intellectual property laws may face legal consequences, such as being
sued for damages.
Contractual obligations: Individuals
and organizations may be subject to contractual obligations related to
e-security, such as confidentiality agreements, non-disclosure agreements, or
service level agreements.
Industry-specific regulations: Some industries, such as healthcare or finance, have
specific regulations related to e-security that organizations must comply with.
Failure
to comply with legal obligations related to e-security can result in
significant legal and financial consequences for individuals and organizations.
Therefore, it is important for individuals and organizations to be aware of
their legal obligations and take appropriate measures to ensure compliance.
GOOD PASSWORD
SELCTION STRATEGIES/POLICIES
Good
password selection strategies/policies are crucial for ensuring the security of
online accounts and data. Here are some strategies and policies for selecting
good passwords:
Length: The longer the password, the harder it is to crack.
Passwords should be at least 12 characters long.
Complexity: Passwords
should include a mix of upper and lower case letters, numbers, and symbols.
Avoid using easily guessable patterns like "12345" or
"qwerty".
Avoid common passwords: Avoid using commonly used passwords such as
"password", "123456", "qwerty",
"admin", "letmein", etc.
Unique passwords: Use
unique passwords for each account to avoid a single password being compromised.
Passphrase: Consider
using a passphrase instead of a password. Passphrases are easier to remember
and harder to crack.
Change passwords regularly: Change
passwords every 3-6 months to ensure security.
Two-factor authentication: Use
two-factor authentication wherever possible. It adds an additional layer of
security by requiring a second form of authentication in addition to the
password.
Password manager: Consider
using a password manager to generate and store strong passwords.
By
implementing these strategies and policies, individuals and organizations can
protect their online accounts and data from being compromised.
DATA RECOVERY
Date Recovery software:
Good
password selection strategies/policies are crucial for ensuring the security of
online accounts and data. Here are some strategies and policies for selecting
good passwords:
Length: The
longer the password, the harder it is to crack. Passwords should be at least 12
characters long.
Complexity: Passwords
should include a mix of upper and lower case letters, numbers, and symbols.
Avoid using easily guessable patterns like "12345" or
"qwerty".
Avoid
common passwords: Avoid using commonly used passwords such as
"password", "123456", "qwerty",
"admin", "letmein", etc.
Unique passwords: Use
unique passwords for each account to avoid a single password being compromised.
Passphrase: Consider
using a passphrase instead of a password. Passphrases are easier to remember
and harder to crack.
Change passwords regularly: Change passwords every 3-6 months to ensure security.
Two-factor authentication: Use
two-factor authentication wherever possible. It adds an additional layer of
security by requiring a second form of authentication in addition to the
password.
Password manager: Consider
using a password manager to generate and store strong passwords.
By
implementing these strategies and policies, individuals and organizations can
protect their online accounts and data from being compromised.
Data Back-up:
Data
backup refers to the process of creating and storing copies of electronic data
in case the original data is lost, damaged, or corrupted. The process is
crucial in ensuring data security and continuity of operations in the event of
unexpected data loss or system failure. Data backup can be done through several
methods, including physical backups and cloud-based backups.
Physical
backups involve creating and storing backup copies of data on physical storage
devices such as external hard drives, flash drives, or tapes. These backups can
be stored onsite or offsite, with offsite backups being more secure in case of
fire or theft. Physical backups can be automated or done manually, and the
frequency of backups can be customized based on the organization's data
retention policy.
Cloud-based
backups, on the other hand, involve the use of third-party cloud providers to
store backup copies of data. The process involves uploading data to the cloud,
where it is replicated and stored on multiple servers in different locations.
Cloud backups are highly scalable, and the cost of storing data is relatively
low. Additionally, cloud backups can be automated, allowing for continuous
backups without human intervention.
Regardless
of the backup method used, it is essential to ensure the security of the
backed-up data. This can be achieved through encryption and access control
measures that restrict access to the data to authorized personnel only.
Additionally, regular testing of the backup systems can help identify any
weaknesses in the backup process, allowing for timely corrective actions.
Unintrupted power supply.
Uninterruptible
Power Supply (UPS) is a device used to provide a constant and uninterrupted
power supply to electronic devices. It is typically used to protect computers,
servers, and other electronic equipment from power outages, voltage
fluctuations, and other power-related problems.
UPS
systems consist of a battery, an inverter, and a charger. When the input power
fails, the UPS switches to battery power, which is converted to AC power by the
inverter. The charger recharges the battery when the input power is restored.
UPS
systems come in different sizes and types, ranging from small units that can
power a single computer to large units that can provide power to entire data
centers. They are commonly used in industries where power outages can cause
significant damage, such as healthcare, finance, and telecommunications.
Some of the benefits of UPS systems include:
Protection against power surges and outages: UPS systems provide a constant and reliable power supply,
which protects electronic equipment from power-related problems.
Data protection: UPS
systems ensure that data is not lost due to power outages, which can cause data
corruption and loss.
Equipment protection: UPS
systems protect electronic equipment from damage caused by power fluctuations
and surges, which can shorten the lifespan of the equipment.
Increased productivity: UPS
systems ensure that electronic equipment is always operational, which reduces
downtime and increases productivity.
Overall,
UPS systems are an essential part of any organization's IT infrastructure, as
they provide reliable and uninterrupted power supply to electronic equipment,
protecting it from power-related problems and ensuring business continuity.
WEB SECURITY
Web
security refers to the practices and technologies used to protect websites, web
applications, and web services from cyber threats, such as hacking, data theft,
and malware infections. Web security is essential for businesses, organizations,
and individuals who rely on the internet for communication, commerce, and
collaboration.
There are several key
areas of web security, including:
Authentication and access control: This involves verifying the identity of users and
controlling their access to resources on a website or web application. This can
include user accounts, passwords, and role-based access controls.
Secure communications: This
involves ensuring that data transmitted between the client and the server is
encrypted and protected from interception or tampering. This can be achieved
using secure socket layer (SSL) or transport layer security (TLS) protocols.
Data protection: This
involves protecting sensitive data stored on the server, such as personal
information or financial data. This can be achieved through encryption, access
controls, and data backup and recovery measures.
Vulnerability management: This
involves identifying and mitigating vulnerabilities in web applications and
websites, such as SQL injection attacks or cross-site scripting (XSS) attacks.
This can be achieved through regular vulnerability scans, penetration testing,
and software updates.
Incident response and recovery: This
involves developing and implementing plans for responding to and recovering from
security incidents, such as data breaches or website defacements.
Effective web security
requires a combination of technology, policies, and practices, including:
Using
secure coding practices when developing web applications and websites.
Regularly
updating software and security patches to address vulnerabilities.
Implementing
firewalls, intrusion detection and prevention systems, and other security
technologies to protect web assets.
Implementing
strong access controls and authentication mechanisms, such as multi-factor
authentication.
Regularly
training staff on web security best practices, including how to identify and
respond to security threats.
Developing
and testing incident response plans to ensure a quick and effective response to
security incidents.
By
implementing these measures, organizations can significantly reduce the risk of
web-based attacks and protect their web assets from cyber threats.
Use password to
protect your website pages and whole website:
Using
passwords to protect website pages and the whole website is one way to enhance
web security. Here are some steps to do it:
Password protect website pages: This
involves setting up password protection on individual website pages that
contain sensitive information. To achieve this, you need to use a website
builder that allows you to set up password protection, or you can use a plugin
that provides this functionality.
Password protect the whole website: This
involves setting up password protection on the entire website, which means
users will have to enter a password to access any part of the site. To do this,
you need to use a web server that supports password protection, or you can use
a plugin that provides this functionality.
Use strong passwords: Make
sure to use strong passwords that are difficult to guess. Passwords should be
at least eight characters long and include a combination of letters, numbers,
and special characters.
Use two-factor authentication: Two-factor authentication adds an extra layer of security
by requiring users to enter a code in addition to their password. This code can
be sent via SMS or generated by an app on the user's phone.
Regularly update passwords: It is
important to regularly update passwords to prevent unauthorized access. This
should be done at least every six months.
Limit login attempts: Limiting the number of login attempts can prevent
brute-force attacks. This involves setting a limit on the number of times a
user can enter an incorrect password before being locked out.
By
implementing these measures, you can help to protect your website from
unauthorized access and ensure the security of sensitive information.
Securing your files
on the web?
To secure your files on
the web, you can follow these measures:
Password protect your files: One of
the easiest ways to secure your files on the web is to password protect them.
Many online file storage services offer this option where you can set a
password to your files, and only authorized users can access them.
Use encrypted cloud storage: Encrypted
cloud storage services offer an extra layer of security to your files. When you
upload files to the cloud, they are encrypted, which means that even if someone
gains unauthorized access to your files, they won't be able to read them.
Use secure file transfer protocol (SFTP): SFTP
is a secure way to transfer files over the web. It uses encryption to secure
the connection between the client and the server, ensuring that your files are
protected from prying eyes.
Use a virtual private network (VPN): A VPN
creates a secure connection between your device and the internet. It encrypts
your internet traffic, making it difficult for anyone to intercept your data,
including your files.
Keep your software up to date: Keeping
your software up to date is critical to protecting your files on the web. Make
sure you install the latest security patches and updates to your operating
system, web browser, and other software you use to access the internet.
Use strong passwords: Use
strong, unique passwords for all your online accounts, including your online
file storage service. Avoid using easily guessable passwords like
"password" or "123456," and use a mix of uppercase and
lowercase letters, numbers, and special characters.
Limit access to your files: Only
grant access to your files to authorized users. If you're sharing files with
someone else, make sure you're using a secure method like password-protected
links or encrypted cloud storage.
Creating Secure
passwords:
Creating
a secure password is an important step in protecting your personal and
sensitive information from being accessed by unauthorized individuals. Here are
some tips for creating a secure password:
Length: Choose a password that is at least 12-14 characters long.
Longer passwords are harder to crack.
Complexity: Use a
mix of uppercase and lowercase letters, numbers, and symbols. Avoid using
predictable words or patterns.
Uniqueness: Use a
different password for each account you have. This will prevent a hacker from
accessing all your accounts if they crack one password.
Avoid personal information: Do not
use your name, birthday, or other personal information in your password. This
information can be easily guessed or obtained by hackers.
Use a password manager: Consider
using a password manager to generate and store your passwords securely.
Update regularly: Change
your passwords regularly, especially for accounts with sensitive information.
By
following these tips, you can create strong and secure passwords to help
protect your personal information online.
PRIVACY
Privacy
refers to the right of an individual to keep their personal information and
data confidential and to control how it is used and shared by others. In
today's digital world, privacy has become an increasingly important concern as
more and more of our personal information is stored and shared online.
There are many aspects to
privacy, including:
Personal information: This
includes any information that can be used to identify an individual, such as
their name, address, phone number, email address, social security number, and
so on.
Financial information: This
includes any information related to an individual's finances, such as bank
account numbers, credit card numbers, and other financial data.
Health information: This
includes any information related to an individual's health or medical history,
such as medical records, prescription information, and so on.
Location data: This
includes any information related to an individual's location, such as GPS data
or IP addresses.
Communication data: This
includes any information related to an individual's communications, such as
emails, text messages, and social media messages.
There
are many different threats to privacy, including hackers, identity thieves,
government surveillance, and corporate data collection. To protect our privacy,
it is important to take steps such as using strong passwords, encrypting
sensitive data, using privacy tools like VPNs, and being careful about what
personal information we share online.
Private information
Private
information refers to any personal or sensitive data that is not intended for
public disclosure. This can include a wide range of information such as name,
address, date of birth, social security number, medical records, financial
records, and other sensitive data. Private information is often protected by
laws and regulations to prevent unauthorized access, use, or disclosure.
Protecting
private information is important because it can be used for identity theft,
fraud, or other criminal activities. Companies and organizations that collect,
store, or process private information must take appropriate measures to
safeguard the data and prevent unauthorized access or disclosure. This can
include implementing security measures such as encryption, access controls, and
monitoring systems.
Individuals
can also take steps to protect their own private information, such as using
strong passwords, avoiding sharing sensitive information online, and monitoring
their credit reports and financial accounts for signs of unauthorized activity.
It is important for both organizations and individuals to understand the risks
associated with private information and take appropriate steps to protect it.
Clean out your search
history
Cleaning
out your search history can help protect your privacy by preventing others from
accessing your search queries and potentially sensitive information. Here are
some steps you can follow to clean out your search history:
Open
your web browser and navigate to the settings or options menu. The location of
this menu may vary depending on the browser you are using.
Look
for the option to clear your browsing history or search history.
Select
the time range for which you want to clear your search history. You may have
the option to clear your entire history or just a specific time period.
Select
the types of data you want to clear, such as search history, cookies, or cache.
Click
the "Clear" or "Delete" button to remove the selected data
from your browser.
Some
browsers may also offer the option to enable private browsing or incognito
mode, which will prevent your browsing history from being saved in the first
place.
By
regularly cleaning out your search history and taking other steps to protect
your privacy, you can help ensure that your personal information remains
secure.
Clean out your cache
Cleaning
out your cache is a good practice to help protect your privacy while using the
internet. A cache is a collection of data that your web browser saves on your
computer or device to help speed up page loading times and improve your
browsing experience. However, it can also contain sensitive information such as
website logins, form data, and browsing history, which could be accessed by
someone else using your device.
To clean out your cache:
Open
your web browser and go to the settings or options menu.
Look
for the option to clear your browsing data or history.
Select
the option to clear your cache or temporary files.
Choose
the time range for which you want to clear your cache (e.g., last hour, last
day, last week, etc.).
Click
the "Clear" or "Delete" button to remove the cached data
from your device.
It's
important to note that clearing your cache may also log you out of websites you
were previously logged into and delete any saved login information or
preferences. However, this can be a good security measure if you're using a
public or shared device, or if you're concerned about others accessing your
personal information.
Avoid registrations
Avoiding
registrations can be a strategy to protect privacy, as it reduces the amount of
personal information that is shared online. However, it may not always be
practical or desirable, as many websites and services require user registration
in order to function properly. Additionally, not registering may limit access
to certain features or content.
It's
important to weigh the potential benefits and risks of registering for a
particular website or service, and to carefully consider what information is
being shared. Users should also read the privacy policies of websites and
services to understand how their information will be used and shared. If
possible, users may want to consider using a disposable or temporary email
address when registering, or providing as little personal information as
possible.
Site blocking
Site
blocking refers to the process of restricting access to a website or a web page
on a particular network or device. This can be done for various reasons, such
as to prevent access to inappropriate content, to protect against malware and
viruses, or to comply with local laws and regulations.
There are different ways
to implement site blocking, including:
Hosts file blocking: This
involves modifying the hosts file on a device or network to prevent access to
specific websites.
DNS-based blocking: This
involves configuring the DNS server to block access to specific websites by
redirecting requests to a different IP address.
Firewall-based blocking: This
involves configuring the firewall to block access to specific websites or web
content.
Browser extensions or add-ons: This
involves installing a browser extension or add-on that can block access to
specific websites or content.
Site
blocking can be effective in protecting against various online threats, but it
can also be controversial, as it can potentially limit access to legitimate
content and infringe on individual rights to access information. It is
important to consider the implications and potential risks before implementing
site blocking measures.
How to block a website
using internet explorer
You
can block a website using Internet Explorer by following these steps:
Open
Internet Explorer and click on the gear icon in the top right corner to open
the Tools menu.
Select
"Internet options" from the drop-down menu.
In the
Internet Options window, go to the "Privacy" tab and click on the
"Sites" button.
In the
Per Site Privacy Actions window, type in the URL of the website you want to
block under the "Address of website" field.
Click
on the "Block" button to add the website to the blocked list.
Click
"OK" to save the changes and close the window.
After
following these steps, the website you specified will be blocked in Internet
Explorer.
Answer the following
questions in 1-15 words. Each question carries one mark.
Q.1. What is PIN?
Ans. PIN
stands for Personal Identification Number. It is a unique numeric code used for
authentication and security purposes. A PIN is typically used as a password to
access a specific service or device, such as an ATM card, a mobile phone, or a
computer. PINs are generally four to eight digits long and are intended to be
easy for the user to remember but difficult for others to guess or access. PINs
are considered more secure than passwords because they are usually only stored
locally and cannot be intercepted during transmission like passwords can.
Q.2. What is
Encryption?
Ans. Encryption
is the process of converting plain text or data into a coded message that can
only be read by authorized parties who possess a decryption key or password.
Q.3. What is
decryption?
Ans. Decryption
is the process of converting encrypted or encoded data back into its original
form or plaintext, so that it can be read and understood. It is the opposite of
encryption, which involves converting plaintext into cipher text using a
cryptographic algorithm and a key. Decryption requires the use of the same key
or a matching key to the one used in encryption, allowing the cipher text to be
transformed back into the original message.
Q.4. What is cipher
text?
Ans. Cipher
text refers to the scrambled and unreadable form of a message or data that has
been encrypted using a specific algorithm and a key. Cipher text is designed to
be unreadable by anyone who does not have access to the appropriate decryption
key, ensuring the confidentiality and security of the information being
transmitted or stored.
Q.5. What is key?
Ans. In
cryptography, a key is a piece of information (a parameter) that determines the
functional output of a cryptographic algorithm. It is a crucial part of the
cryptographic process because it is used to encrypt and decrypt data. The
encryption key is used to transform the plaintext into cipher text, while the
decryption key is used to transform the cipher text back into plaintext. The
security of the encryption system depends on the secrecy and complexity of the
encryption key.
Q.6. Write different
types of keys?
Ans. There
are several different types of keys used in encryption and decryption,
including:
Symmetric Key: A
single secret key is used both for encryption and decryption.
Asymmetric Key: Two
different keys (public and private key) are used for encryption and decryption.
Session Key: A
temporary key that is generated for a particular session and is used for the
encryption and decryption of data in that session.
Public Key: A key
that is freely distributed to anyone who wants to communicate with a particular
entity.
Private Key: A key
that is kept secret and is used only by the owner of that key for decryption
purposes.
Shared Key: A key
that is shared among two or more parties for encryption and decryption of data.
Secret Key: A key
that is used for encryption and decryption of data, but is kept secret from all
parties except the ones involved in the communication.
Master Key: A key
that is used to generate other keys, such as session keys, in a cryptographic
system.
These
are some of the common types of keys used in cryptography, each with their own
specific purposes and applications.
Q.7. What is the use
of public key?
Ans. The
public key is used for encrypting data, allowing anyone to send encrypted
messages to the owner of the corresponding private key. It is a fundamental
component of public key cryptography and enables secure communication and
authentication over an insecure network like the internet.
Q.8. What do you mean
by Hackers?
Ans.
Hackers are individuals who use their knowledge and skills in computer
programming and security to gain unauthorized access to computer systems or
networks. They may do this for a variety of reasons, such as to steal sensitive
information, cause damage to the system, or simply for the challenge of
breaking into a secure network. Some hackers use their skills for ethical
purposes, such as testing the security of a system or network to identify
vulnerabilities that need to be addressed. However, others use their skills for
malicious purposes, such as stealing personal information, financial
information, or other sensitive data.
Q.9. Under which act
Cyper crimes are debit in India?
Ans. Cyber
crimes are dealt with under the Information Technology (IT) Act, 2000 in India.
This act provides legal recognition to electronic documents and digital
signatures, and lays out penalties for various types of cyber crimes such as
hacking, identity theft, cyber stalking, and data theft. The IT Act was amended
in 2008 to further strengthen provisions related to cyber security and increase
the punishment for cyber crimes.
Q.10. What is Adware?
Ans. Adware
is a type of software that is designed to display unwanted advertisements or
pop-ups on a user's computer or mobile device. It can also track a user's
browsing habits and send that information to advertisers, allowing them to
display more targeted ads. Adware is often bundled with free software downloads
or can be installed through malicious websites, and it can slow down a
computer's performance and make it more vulnerable to other types of malware.
Q.11. What are
physical risks?
Ans. Physical
risks are those security threats that pose a danger to the physical security of
a computer system, its components, or its users. These risks include theft,
vandalism, natural disasters, and accidents. They can lead to loss or damage of
hardware, software, and data, and can also compromise the safety of people who
use or manage the system. Examples of physical risks include theft of laptops
or mobile devices, damage to servers or other equipment due to fires or floods,
and injury to individuals due to poor ergonomic design or improper use of
equipment. To mitigate physical risks, organizations should implement physical
security measures such as access control, surveillance cameras, fire alarms,
and emergency procedures.
Q.12. What are the
types of encryption?
Ans. There
are two main types of encryption:
Symmetric Encryption: Uses a
single secret key to both encrypt and decrypt information.
Asymmetric Encryption: Uses a
pair of keys (public and private) to encrypt and decrypt information.
Q.13. What are the
types of encryption?
Ans. Encryption
can be broadly classified into two types:
Symmetric Encryption: In
this type of encryption, the same secret key is used for both encryption and
decryption of the data. It is a faster process and is commonly used for large
amounts of data.
Asymmetric Encryption: In
this type of encryption, a pair of public and private keys is used. The public
key is used for encryption, while the private key is used for decryption. It is
a slower process but is more secure than symmetric encryption.
Q.14. What do you
mean by firewalls?
Ans. A
firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. It acts as a
barrier between a private internal network and the public Internet, and it can
be hardware, software, or a combination of both. Firewalls are used to prevent
unauthorized access to or from a private network, and they can also be used to
control the flow of network traffic to and from specific IP addresses or ports.
Firewalls can help to protect a network from a variety of security threats,
including viruses, malware, and unauthorized access attempts.
Q.15. What is meant
by proxy server?
Ans. A
firewall is a network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. It acts as a
barrier between a private internal network and the public Internet, and it can
be hardware, software, or a combination of both. Firewalls are used to prevent
unauthorized access to or from a private network, and they can also be used to
control the flow of network traffic to and from specific IP addresses or ports.
Firewalls can help to protect a network from a variety of security threats,
including viruses, malware, and unauthorized access attempts.
Answer these Questions in
5-10 lines.
Q.1. What do you mean
by internet security?
Ans: Internet
security refers to the protection of internet-connected systems, including
hardware, software, and data, from threats such as cyber-attacks, malware,
viruses, and unauthorized access. It involves the use of various security
measures, protocols, and technologies to ensure the confidentiality, integrity,
and availability of information on the internet. Internet security aims to
prevent data breaches, identity theft, and other types of cybercrime by
safeguarding the internet infrastructure and protecting users from various
online threats.
Q.2. What are main
techniques of internet security?
Ans: There
are several techniques used in internet security to protect against various
threats, some of which include:
Firewalls: Firewalls
are used to monitor and filter network traffic to prevent unauthorized access
to a network or computer system.
Encryption: Encryption is the process of converting data into a code to
prevent unauthorized access. This can be done using various techniques such as
symmetric key encryption and public key encryption.
Antivirus and Anti-malware software: These programs are used to detect and remove viruses,
malware, and other malicious software from a computer or network.
Two-factor authentication: This
involves the use of two different methods to authenticate a user's identity,
such as a password and a security token.
Intrusion Detection and Prevention Systems: These systems monitor network traffic for signs of malicious
activity and can automatically take action to prevent attacks.
Virtual Private Networks (VPNs): VPNs
are used to create a secure and encrypted connection between a user's computer
and a remote network, such as a corporate network.
Patch Management: Regularly
updating software and security patches can help to prevent vulnerabilities from
being exploited by attackers.
Backup and Disaster Recovery: Regular
backups of important data and disaster recovery plans can help to ensure that
data is not lost in the event of a security breach or other disaster.
Q.3. What are the
benefits of fire wall?
Ans: A
firewall provides several benefits for internet security, including:
Network security: Firewall provides network security by preventing
unauthorized access to the network, thus protecting against hackers and other
cyber threats.
Protection against malware: Firewalls
can block malware, including viruses, worms, and Trojan horses, from entering
the network.
Regulation of incoming and outgoing traffic: Firewalls
can regulate incoming and outgoing traffic, allowing only approved traffic to
enter or leave the network.
Improved privacy: Firewalls
can protect the network from eavesdropping and unauthorized access to sensitive
data, thus improving privacy and confidentiality.
Access control: Firewalls can limit access to certain websites,
applications, or services, reducing the risk of data theft or damage.
Monitoring and logging: Firewalls
can monitor network activity and generate logs of traffic, providing valuable
information for analyzing network security threats and incidents.
Q.4. What is proxy
server?
Ans: A proxy server is an intermediary
server between a client device and other servers. It acts as a gateway between
a local network and a larger scale network such as the internet. When a client
device makes a request, the request is sent to the proxy server instead of
being sent directly to the destination server. The proxy server then forwards
the request to the destination server, receives the response, and sends it back
to the client device.
One of
the key benefits of a proxy server is that it can help improve security by
acting as a buffer between the client device and the internet, helping to
prevent direct contact between the two. It can also be used to block access to
certain websites or online content, and can help to improve network performance
by caching frequently requested data. Additionally, a proxy server can be used
to help protect user anonymity by masking the user's IP address and location.
Q.5. What are the
benefits of proxy server?
Ans: There
are several benefits of using a proxy server, including:
Increased security: Proxy
servers can act as an additional layer of security between your device and the
internet, helping to protect against cyber threats such as malware, phishing,
and other attacks.
Improved privacy: By
using a proxy server, you can keep your IP address and other sensitive
information private, which can help protect your online identity and keep your
personal data safe.
Access to restricted content: Some websites and online services may be restricted in
certain countries or regions. By using a proxy server located in a different
country, you can bypass these restrictions and access content that would
otherwise be unavailable.
Improved performance: Proxy
servers can help improve network performance by caching frequently accessed web
pages and reducing the amount of bandwidth used by individual devices.
Anonymity: Proxy servers can provide anonymity by masking your IP address
and other identifying information, making it more difficult for websites and
online services to track your online activity.
Q.6. What do you mean
by cryptography?
Ans: Cryptography
is the practice of secure communication in the presence of third parties. It is
the technique of converting original plaintext into coded or ciphered text
through the use of encryption algorithms and keys. Cryptography is used to
ensure the confidentiality, integrity, and authenticity of data being
transmitted or stored. It involves techniques such as encryption, decryption,
digital signatures, and key exchange, which help to protect sensitive
information from unauthorized access and ensure that it can be transmitted
securely over insecure communication channels such as the internet.
Q.7. What do you mean
by cryptography?)
Ans: Cryptography
is the practice of securing communication from adversaries. It is a method of
converting plain text into an unintelligible form called cipher text, which can
be easily decoded using a secret key or password by an authorized person.
Cryptography is used to protect sensitive information like passwords, credit
card numbers, and other confidential data from unauthorized access. It is an
essential part of modern communication systems, including computer networks,
electronic commerce, and secure communication channels like VPNs. Cryptography
also includes techniques like digital signatures, which help to verify the
authenticity and integrity of electronic documents.
Q.8. What is
confidentiality?
Ans: Confidentiality
is the property of information to not be made available or disclosed to
unauthorized individuals, entities, or processes. In other words,
confidentiality ensures that sensitive information is kept secret and only
accessible to those who are authorized to view it. Confidentiality is an
essential aspect of information security and is often achieved through
encryption and access control mechanisms.
Q.9. What is the
significance of integrity with regard to e-security?
Ans: In
the context of e-security, integrity refers to the protection of information
from unauthorized modification or alteration. Maintaining integrity is
important because any unauthorized modification of data can undermine the
accuracy, reliability, and trustworthiness of the information.
For
example, if an attacker gains access to a website's database and alters the
information stored there, the integrity of the website's data is compromised.
This can result in the dissemination of false or misleading information, which
can damage the reputation of the website and cause financial harm to the
organization that operates it. In addition, if the data is sensitive or
confidential, such as financial or personal information, the alteration can
also result in identity theft or other malicious activities. Therefore,
ensuring the integrity of data is critical to maintaining trust in online
interactions and safeguarding against e-security threats.
Q.10. What is the
significance of authenticity with regard to e-security?
Ans: Authenticity refers to the verification of
the identity of a user or system. In the context of e-security, authenticity is
significant because it helps ensure that a user or system is who they claim to
be, and that information or transactions are not being manipulated by
unauthorized parties.
Maintaining
authenticity is important for preventing fraudulent activities such as identity
theft and unauthorized access to sensitive information or systems. For example,
authentication methods such as passwords, biometric identification, and digital
certificates help ensure that only authorized users are granted access to a
system or data. Digital signatures also help ensure the authenticity of
electronic documents, verifying that they have not been tampered with or modified.
Overall, maintaining authenticity is an essential aspect of e-security for
protecting against unauthorized access and maintaining the integrity of digital
information.
Q.11. What is virus ?
Ans: A
virus is a type of malicious software or malware that can replicate itself by
inserting its own code into other computer programs or files. Once a virus
infects a computer system, it can cause damage to files, applications, and even
the entire operating system. Viruses can spread through email attachments,
infected websites, or software downloads, and can often go undetected by
anti-virus software. They are typically designed to steal personal information,
corrupt data, or cause other types of harm to the system.
Q.12. Explain worms
Ans:
Worms are self-replicating malware that spreads through computer networks
without the need for a host program or file. They can exploit vulnerabilities
in operating systems, network protocols, and applications to spread and infect
other computers. Once a computer is infected, the worm can perform various
actions, such as stealing information, installing other malware, or using the
computer as part of a botnet to launch attacks on other targets. Unlike
viruses, worms do not need to attach themselves to a host program or file,
making them more dangerous and difficult to detect and remove.
Q.13. What is Trojan Horse?
Ans.
A Trojan Horse, often referred to simply as a "Trojan," is a type of
malicious software (malware) that disguises itself as a legitimate program or
file in order to trick users into downloading and installing it on their
computers. Once installed, the Trojan can perform a variety of malicious
actions, such as stealing sensitive information, allowing remote access to the
infected computer, and disabling security software. Unlike viruses and worms,
Trojans do not replicate themselves or infect other files. They typically rely
on social engineering tactics, such as email phishing scams, to distribute
themselves.
Q.14. What is spyware?
Ans.
Spyware is a type of software that is designed to collect information from a
computer system without the user's knowledge or consent. This information can
include things like browsing history, login credentials, keystrokes, and other
sensitive data. Spyware can be installed on a computer through a variety of
methods, including phishing emails, malicious downloads, or bundled with other
software. Once installed, it can run in the background, sending the collected
information to a remote server. Spyware is often used for malicious purposes,
such as identity theft, fraud, or espionage.
Q.15. What is key loggers?
Ans.
Key loggers, also known as keystroke loggers or keyboard capturers, are a type
of software or hardware device that can track and record every keystroke made
on a computer keyboard. The purpose of a key logger is to collect sensitive
information such as usernames, passwords, credit card numbers, and other
personal or confidential data that users type on their keyboards. Key loggers
can be installed on a computer through malicious software or by physical access
to the device, and can operate in the background without the user's knowledge
or consent. They can pose a serious security threat to individuals and
organizations by compromising sensitive information and facilitating identity
theft or other malicious activities
Q.16. What is phishing?
Ans.
Phishing is a cybercrime in which an attacker attempts to trick a victim into
divulging sensitive information, such as login credentials or financial
information, by posing as a trustworthy entity in an electronic communication,
such as an email or instant message. The attacker may create a fake website
that looks like a legitimate one or use other means to trick the victim into
providing personal information. Phishing attacks are often conducted on a large
scale and can be highly effective, causing significant financial and
reputational damage to individuals and organizations.
Q.17. What is Vishing?
Ans.
Vishing, short for "voice phishing," is a type of social engineering
attack where attackers use a phone call to trick victims into divulging
sensitive information, such as passwords or credit card numbers. The attacker
may pose as a trusted entity, such as a bank or a government agency, and use
various techniques to make their story seem credible and urgent, such as
claiming there has been suspicious activity on the victim's account. The goal
of vishing is to steal personal or financial information from the victim and
use it for fraudulent purposes.
Q.18. What is Baiting?
Ans.
Baiting is a social engineering technique in which an attacker offers a
tempting or desirable item or service in order to trick a victim into providing
sensitive information or performing an action that they should not. Baiting
attacks often involve offering the victim a free download, a gift card, or some
other type of reward that requires the victim to provide personal information
or take some other action that puts them at risk. Once the attacker has
obtained the desired information or access, they can use it for malicious
purposes such as identity theft, financial fraud, or network infiltration.
Q.19. What is E-Mail spoofing?
Ans.
Email spoofing is a type of cyber attack in which the attacker sends emails
that appear to be from a legitimate sender but are actually sent from a fake or
fraudulent email address. The purpose of email spoofing is to trick the
recipient into opening the email and taking some action such as providing
sensitive information, downloading malware, or clicking on a malicious link.
Email spoofing can be used for phishing attacks, spamming, and other types of
cybercrime.
Q.20. What is quid pro quo?
Ans.
Quid pro quo is a social engineering technique in which an attacker offers
something of value to a victim in exchange for information or access. For
example, an attacker may pose as an IT support person and offer to fix a
computer problem in exchange for the victim's login credentials. The attacker
may also offer something like a free gift card or prize in exchange for the
victim's personal information. The goal of this technique is to gain access to
sensitive information or systems by tricking the victim into divulging
information or performing an action that gives the attacker access.
Q.21. Explain Tailgating?
Ans.
Tailgating, in the context of information security, refers to a social
engineering technique where an unauthorized person gains access to a restricted
area or system by following an authorized person through a secure entrance
without proper authentication. The term "tailgating" comes from the
practice of following closely behind a vehicle to gain access to a secure
parking lot or garage.
For
example, if an employee swipes their access card to enter a secure area and
someone else follows closely behind them, the unauthorized person can enter the
restricted area without needing their own access card. Tailgating can also
occur when someone holds open a secure door for someone else without checking
their identification or access credentials.
Tailgating
is a physical security vulnerability that can be mitigated through the use of
security measures such as turnstiles, mantraps, security guards, and access
controls. It is important for organizations to train their employees on the
risks of tailgating and to encourage them to report any suspicious behavior to
security personnel.
Q.22. What is Bruite Forcing?
Ans.
Brute forcing is a technique used by attackers to guess a password or
encryption key by systematically trying every possible combination until the
correct one is found. It is often used as a last resort when other methods of
gaining access to a system have failed. Brute forcing can be done manually or
with the help of automated tools and is considered a type of brute force
attack. It can be used to target a wide range of systems, including websites,
databases, and encrypted files. To prevent brute force attacks, systems can
implement measures such as rate limiting, two-factor authentication, and
complex password requirements.
The answer to these questions should be given in 15-20 lines.
Q.1. What are the steps to be taken for internet
security? Explain them.
Ans.
Here are some steps that can be taken for internet security
Use strong
passwords: Use
strong passwords for all your accounts and devices. Avoid using common or
easily guessable passwords, such as "password" or "123456".
A strong password should be at least 12 characters long and include a
combination of uppercase and lowercase letters, numbers, and symbols.
Keep software up
to date: Regularly
update your operating system, web browsers, antivirus software, and other
software on your devices. This helps to patch any known vulnerabilities and
improve security.
Use antivirus
software: Install
reputable antivirus software on your devices to protect against malware and
viruses. Make sure to keep the antivirus software up to date.
Enable firewall: Enable firewall on your
devices and network to control incoming and outgoing traffic. This helps to
block unauthorized access and malicious traffic.
Use encryption: Use encryption to protect
sensitive information, such as passwords, credit card details, and personal
information. This can be done by using secure communication protocols, such as
HTTPS, SSL, and TLS.
Be cautious of
suspicious emails and websites: Be cautious of suspicious emails, websites, and links. Do
not click on links or download attachments from unknown or suspicious sources.
Phishing emails and websites are designed to steal your personal information,
so be careful.
Backup your data: Backup your important data
regularly. This helps to protect against data loss due to hardware failure,
malware attacks, or other disasters
Use a Virtual
Private Network (VPN): Use
a VPN to encrypt your internet connection and protect your online privacy. A
VPN helps to hide your IP address and location, marking it difficult for
attackers to track your online activity.
Enable two-factor
authentication:
Enable two-factor authentication (2FA) on your accounts wherever possible. This
adds an extra layer of security and makes it more difficult for attackers to
access your accounts.
Be aware of
social engineering attacks: Be aware of social engineering attacks, such as phishing,
vishing, and baiting. Attackers use social engineering techniques to trick you
into revealing sensitive information, so be cautious and stay alert.
Q.2. Write any four security threats to internet
transactions.
Ans:
Phishing:
It is a type of cyber attack in which attackers send fake emails, messages, or
make fake websites that look like legitimate ones. They trick people into
giving out their sensitive information such as passwords, credit card details,
and other personal information.
Malware: Malware is a type of
software designed to harm computer systems or steal sensitive information. It
includes viruses, worms, Trojan horses, spyware, and adware. Malware can infect
computers and steal personal information, cause system crashes or make the
computer unusable.
Man-in-the-middle
attacks:
In this type of attack, an attacker intercepts the communication between two
parties and eavesdrops on their conversation. They can read, modify or inject
messages between the two parties, and even impersonate them
DDoS attacks: Distributed Denial of
Service (DDoS) attacks are designed to overwhelm the resources of a website,
server, or network by flooding them with traffic from multiple sources. This
causes the website or network to become unavailable to legitimate users.
Q.3. What do you mean by confidentiality? What is its
importance?
Ans:
Confidentiality is the principle of keeping sensitive or confidential
information private and secure, ensuring that only authorized individuals can
access or view it. It is a critical aspect of information security,
particularly for sensitive information such as personal identification data,
financial information, or classified information. The importance of
confidentiality lies in the fact that without it, sensitive information can be
exposed, leading to serious consequences such as identity theft, financial
fraud, or loss of competitive advantage for businesses. By implementing
appropriate confidentiality measures such as encryption, access controls, and
secure transmission protocols, individuals and organizations can ensure that
their sensitive information remains confidential and secure.
Q.4. What do you mean by authenticity?
Ans:
Authenticity is the quality or condition of being genuine, true, or legitimate.
In the context of e-security, authenticity refers to the assurance that
electronic data, messages, or transactions come from a trusted and verifiable
source and have not been altered or tampered with during transmission or
storage. Authenticity ensures that the information can be trusted and relied
upon by the intended recipient. This is important in maintaining the integrity
and trustworthiness of electronic communications and transactions.
Q.5. What do you mean by electronic signature? Write
about its mechanism.
Ans:
An electronic signature is a digital representation of a person's signature
that can be used to sign documents and verify the authenticity of the signer.
It is a type of electronic data that is attached to an electronic document or
message and serves as a sign of the signer's intention to agree to the terms
outlined in the document or message. Electronic signatures are commonly used in
e-commerce, online contracts, and other digital transactions where a signature
is required.
The mechanism of an electronic signature
involves several steps:
Signature
creation: The
person creating the electronic signature must use a method that is unique to
them, such as a password or biometric identifier, to create the signature.
Signature
verification: The
signature must be verified to ensure that it was created by the intended person
and that it has not been tampered with.
Message digest: A unique message digest or
hash is created from the document or message that needs to be signed.
Encryption: The message digest is
encrypted using a private key that is associated with the signer's electronic
signature.
Decryption: The encrypted message
digest is decrypted using the signer's public key.
Signature
verification:
The decrypted message digest is compared to the original message digest to
ensure that the document or message has not been altered since it was signed.Once
these steps are complete, the electronic signature is considered legally
binding and can be used to verify the authenticity of the signed document or
message. Electronic signatures can be created using various technologies,
including digital certificates, smart cards, and biometric identifiers, and are
recognized as a valid form of signature in many countries around the world.
Q.6. What are the areas of internet security?
Ans: Internet
security refers to the measures taken to protect computer systems, networks,
and data from unauthorized access, use, modification, or destruction. There are
several areas of internet security, including:
Network Security: This involves protecting
the computer network from unauthorized access, viruses, and other threats.
Network security measures may include firewalls, intrusion detection systems,
and antivirus software.
Application
Security: This
involves securing the applications that run on computer systems, including web
applications, email applications, and other software. Application security
measures may include access controls, encryption, and authentication.
Information
Security: This
involves protecting the confidentiality, integrity, and availability of
information stored on computer systems or transmitted over networks.
Information security measures may include encryption, access controls, and
backup and recovery systems.
Endpoint
Security: This
involves securing the devices that access the network, including laptops,
desktops, and mobile devices. Endpoint security measures may include antivirus
software, encryption, and remote wiping capabilities.
Cloud Security: This involves securing data
and applications that are hosted in the cloud. Cloud security measures may
include access controls, encryption, and intrusion detection systems.
Social
Engineering: This
involves the use of psychological manipulation to deceive individuals into
revealing sensitive information or performing actions that are not in their
best interest. Social engineering attacks may include phishing, pretexting, and
baiting.
Physical
Security: This
involves securing the physical infrastructure of computer systems, including
servers, routers, and other network components. Physical security measures may
include access controls, video surveillance, and security guards.
These
areas of internet security are all interconnected, and a holistic approach to
internet security is required to ensure the safety and security of computer
systems, networks, and data.
Q.7.What are the various techniques of e-securities?
Ans: E-Securities
refer to electronically traded financial instruments such as stocks, bonds, and
other securities. The use of electronic technologies has revolutionized the way
securities are traded, making it more efficient and faster than traditional
trading methods. There are various techniques of e-securities, some of which
are:
Electronic
Trading Platforms: These
are online platforms that allow investors to buy and sell securities
electronically. Examples include the NASDAQ and the New York Stock Exchange
(NYSE).
Automated Order
Matching: This
is a process where buy and sell orders are matched electronically by a computer
system. This is done without the need for human intervention, making it more
efficient and faster than traditional trading methods.
Straight Through
Processing (STP): This
is a system where trade details are captured electronically and transmitted to
various parties involved in the trade, including brokers, custodians, and
settlement agents.
Online Investment
Accounts: These
are investment accounts that can be managed online, allowing investors to buy
and sell securities, view their portfolio, and receive investment advice.
Electronic
Settlement: This
is a process where securities and cash are settled electronically, reducing the
time and costs associated with traditional settlement methods.
Digital
Signatures: Digital
signatures are used to authenticate and verify the identity of investors and
other parties involved in electronic trading of securities. They are used to
ensure the integrity and security of electronic transactions.
Block chain Technology: Block chain technology is a
decentralized digital ledger that can be used to store and manage information
about securities transactions. It provides a secure and transparent way of
recording and verifying transactions, reducing the risk of fraud and errors.
Q.8. Define the breach of security. Explain the areas of
internet security.
Ans:
Breach of
Security: A breach of security refers
to an incident where an unauthorized individual or entity gains access to
sensitive information, systems, or networks. This can occur due to a variety of
reasons, including human error, system vulnerabilities, or malicious attacks. A
breach of security can result in data theft, damage to computer systems, and
financial losses.
Areas of Internet
Security:
Internet security involves protecting computer systems, networks, and data from
unauthorized access, use, modification, or destruction. The areas of internet
security include:
a. Network
Security: This
involves protecting the computer network from unauthorized access, viruses, and
other threats. Network security measures may include firewalls, intrusion
detection systems, and antivirus software.
b. Application
Security: This
involves securing the applications that run on computer systems, including web
applications, email applications, and other software. Application security
measures may include access controls, encryption, and authentication.
c. Information
Security: This
involves protecting the confidentiality, integrity, and availability of
information stored on computer systems or transmitted over networks.
Information security measures may include encryption, access controls, and
backup and recovery systems.
d. Endpoint
Security: This
involves securing the devices that access the network, including laptops,
desktops, and mobile devices. Endpoint security measures may include antivirus
software, encryption, and remote wiping capabilities.
e. Cloud Security: This involves securing data and applications that are
hosted in the cloud. Cloud security measures may include access controls,
encryption, and intrusion detection systems.
f. Social
Engineering: This
involves the use of psychological manipulation to deceive individuals into
revealing sensitive information or performing actions that are not in their
best interest. Social engineering attacks may include phishing, pretexting, and
baiting.
g. Physical
Security: This
involves securing the physical infrastructure of computer systems, including
servers, routers, and other network components. Physical security measures may
include access controls, video surveillance, and security guards.
All
these areas of internet security are interconnected, and a comprehensive
approach to internet security is required to protect against security breaches
and ensure the safety and security of computer systems, networks, and data.
Q.9.What is the significance of digital signature with
regard to transaction over internet?
Ans: The
significance of digital signatures with regard to transactions over the
internet is that they provide a secure and reliable way to authenticate and
verify the identity of the parties involved in the transaction. A digital
signature is an electronic signature that is based on cryptographic techniques
and provides a high level of security and non-repudiation.
When
a digital signature is used in an online transaction, it ensures that the
transaction is not tampered with and that the parties involved are who they
claim to be. This is achieved through the use of digital certificates, which
are issued by trusted third-party organizations called Certificate Authorities
(CAs). The digital certificate contains the public key of the individual or
organization and is used to verify the digital signature.
Digital signatures provide several benefits
for transactions over the internet, including:
Non-repudiation: Digital signatures provide
a high level of non-repudiation, which means that the signer cannot deny that
they signed the document or message. This helps to ensure the integrity of the
transaction and provides a way to hold the signer accountable.
Security: Digital signatures provide
a high level of security by using encryption and authentication techniques to
ensure that the transaction is secure and cannot be tampered with.
Efficiency: Digital signatures make
online transactions more efficient by reducing the need for physical
signatures, which can be time-consuming and costly.
Legality: Digital signatures are
legally recognized in many countries and can be used in legal proceedings to
prove the authenticity of a document or message.
Overall,
the use of digital signatures in transactions over the internet provides a
secure, efficient, and legally recognized way to authenticate and verify the
identity of the parties involved in the transactio.
Q.10. What are the ways to authenticate a person?
Ans.
There are several ways to
authenticate a person, including:
Passwords: The most common form of
authentication, passwords are a string of characters that are known only to the
user and the system.
Biometrics: This involves using unique
physical or behavioral characteristics of an individual, such as fingerprints,
facial recognition, voice recognition, and retinal scans.
Tokens: These are physical devices,
such as smart cards, that a user carries with them and uses to authenticate
their identity.
Multi-factor
authentication: This
involves combining two or more forms of authentication to provide greater
security. For example, a system might require a password and a fingerprint scan
to authenticate a user.
Certificates: These are digital certificates
issued by trusted third parties that provide proof of identity.
Security
questions: These
are questions that only the user would know the answer to, such as the name of
their first pet or their mother's maiden name.
One-time
passwords: These
are passwords that are valid for only one use, typically generated by a token
or a mobile app.
The
choice of authentication method depends on the level of security required and
the user's preferences and convenience.
ESSAY TYPE QUESTIONS
Q.1. What is internet security? What are the various
steps of securing different types of data in e-transactions?
Ans.
Internet security refers to the measures taken to protect internet-connected
systems, including hardware, software, and data, from unauthorized access and
attacks. E-transactions involve the exchange of sensitive information, and thus
require a high level of security to prevent unauthorized access or misuse of
the data.
The following are some of the steps to
secure different types of data in e-transactions:
Use strong
passwords: Use
strong and unique passwords for different accounts, and avoid using easily
guessable passwords like names or dates of birth.
Use encryption: Use encryption to protect
sensitive information while it is being transmitted over the internet.
Encryption converts the information into a code that can only be deciphered by
authorized users.
Implement
firewalls:
Firewalls are network security systems that monitor and control incoming and
outgoing network traffic. They help prevent unauthorized access to your
network.
Use antivirus
software: Antivirus
software is designed to detect and remove malicious software, such as viruses,
worms, and trojans, from your computer.
Regularly update
software: Keep
your software up-to-date with the latest security patches and updates to
prevent vulnerabilities that could be exploited by hackers.
Be cautious of
phishing scams: Phishing
scams are fraudulent attempts to obtain sensitive information, such as
usernames, passwords, and credit card details. Be cautious of emails, texts, or
calls that ask for your personal information.
Use multi-factor
authentication:
Multi-factor authentication adds an extra layer of security by requiring users
to provide multiple forms of authentication, such as a password and a fingerprint
or facial recognition.
Use secure
networks: When
accessing the internet, use secure networks, such as password-protected Wi-Fi
networks, to prevent unauthorized access to your device and data.
By
following these steps, you can help secure your e-transactions and protect your
sensitive data from unauthorized access or misuse.
Q.2. What is the requirement of internet security?
Discuss in detail?
Ans.
Internet security is the practice of protecting computer systems, networks, and
data from unauthorized access, theft, damage, or any other form of malicious
activity. With the increasing reliance on the internet for business and
personal communication, it has become more important than ever to implement
proper internet security measures.
The requirement of internet security is
primarily driven by the following factors:
Protection of
sensitive information:
Internet security is necessary to protect sensitive information such as
financial information, personal information, and intellectual property from
unauthorized access, modification, or theft.
Business
continuity: Businesses
rely heavily on internet-connected systems to manage their operations. Any
security breach can cause significant damage, including loss of data, financial
loss, and damage to reputation.
Regulatory
compliance:
Various regulatory bodies have established guidelines and regulations for
protecting sensitive information. Non-compliance can result in legal
liabilities, fines, and loss of reputation.
Privacy concerns: Internet security is important
to protect individuals' privacy from data breaches, identity theft, and
unauthorized surveillance.
To ensure internet security, various steps
can be taken to secure different types of data in e-transactions, such as:
Encryption: Sensitive data such as credit
card numbers, social security numbers, and other financial information can be
encrypted to prevent unauthorized access.
Firewalls: Firewalls can be installed
to prevent unauthorized access to a network or a computer system.
Secure
communication protocols: Secure
communication protocols such as HTTPS, SSL, and TLS can be used to secure data
in transit.
Anti-virus and
anti-malware software: Anti-virus
and anti-malware software can be used to protect systems from malicious
software that can harm or compromise the system.
Access control: Access control measures
such as strong passwords, two-factor authentication, and biometric
authentication can be used to prevent unauthorized access to systems and data.
Regular software
updates: Regular
software updates can help to patch vulnerabilities and protect against known
threats.
Employee
training: Employees
should be trained on safe internet practices, including how to identify and
avoid phishing scams, how to use strong passwords, and how to avoid downloading
malicious software.
In
summary, the requirement of internet security is critical to ensure the
protection of sensitive information, maintain business continuity, comply with
regulatory requirements, and protect individuals' privacy. Various steps can be
taken to secure different types of data in e-transactions, and it is important
to stay vigilant and up-to-date with the latest security measures to protect
against evolving threats.
Q.3. What are the main threats in internet transactions?
Discuss in detail.
Ans. Internet
transactions are becoming increasingly popular due to their convenience and
ease of use. However, there are several security threats that can compromise
the security of these transactions. The main threats in internet transactions
are:
Identity theft: Identity theft is the act
of stealing someone's personal information, such as their name, address, and
social security number, to commit fraud or other illegal activities. This
information can be obtained through phishing attacks, malware, and other social
engineering techniques.
Malware: Malware is a type of
software that is designed to harm computer systems, steal data, or take control
of a computer. Malware can be spread through email attachments, downloads, and
other methods.
Phishing: Phishing is a type of
social engineering attack where attackers try to trick users into revealing
sensitive information, such as usernames, passwords, and credit card numbers.
Phishing attacks can be carried out through email, social media, or other communication
channels.
Man-in-the-middle
attacks: A
man-in-the-middle attack occurs when an attacker intercepts and alters
communication between two parties. This can be done through techniques such as
packet sniffing or DNS spoofing, and can be used to steal data or redirect
users to malicious websites.
Denial-of-service
attacks: A
denial-of-service attack is an attack that is designed to prevent users from
accessing a particular website or service. This can be done through techniques
such as flooding the server with traffic or exploiting vulnerabilities in the
system.
Payment fraud: Payment fraud is the use of
stolen credit card information or other payment details to make unauthorized
purchases. This can be done through phishing attacks or by exploiting vulnerabilities
in payment systems.
To
protect against these threats, it is important to use strong passwords, keep
software and security systems up to date, and avoid clicking on suspicious
links or downloading unknown software. It is also important to use trusted
websites and services, and to be aware of the risks associated with online
transactions. Finally, it is important to monitor credit card and bank
statements regularly to detect any unauthorized transactions.
Q.4. What do you mean by confidentiality , integrity s
authentication in e-transaction?
Ans: Confidentiality,
integrity, and authentication are three key components of e-transaction
security. Each of these components plays a critical role in ensuring that
electronic transactions are secure and reliable.
Confidentiality
refers to the protection of sensitive information from unauthorized access or
disclosure. In e-transactions, confidentiality can be maintained by using
encryption techniques to protect the information being transmitted, such as
credit card numbers, passwords, and personal information. This ensures that
only authorized parties can access and read the information.
Integrity
refers to the accuracy and completeness of data being transmitted during an
e-transaction. It is important to ensure that the data being transmitted is not
altered or modified during transmission, as this can compromise the integrity
of the transaction. To maintain integrity, e-transaction systems use techniques
such as checksums, digital signatures, and message authentication codes to
verify that the data being transmitted has not been tampered with.
Authentication
refers to the process of verifying the identity of the parties involved in an
e-transaction. It is important to ensure that the parties involved in a
transaction are who they claim to be, to prevent fraud and unauthorized access
to sensitive information. Authentication can be achieved through various means,
such as passwords, biometric data, digital certificates, and two-factor
authentication.
Overall,
confidentiality, integrity, and authentication are essential components of
e-transaction security. By ensuring that sensitive information is protected,
data integrity is maintained, and parties are authenticated, e-transaction
systems can provide a secure and reliable way to conduct business online.
Q.5. What do you mean by digital signature? What are the
requirements of digital signature?
Ans: A
digital signature is a mathematical technique used to validate the authenticity
and integrity of a digital document, message or software. It works by using a
combination of a private key and a public key. The private key is kept secret
and is used to create the signature, while the public key is available to
anyone and is used to verify the signature.
To
ensure the security of digital signatures, there are certain requirements that
must be met:
Authentication: The signer's identity must
be authenticated using a valid form of identification.
Non-repudiation: The signer must not be able
to deny that they signed the document.
Integrity: The digital signature must
be created using a secure process that ensures the document has not been
tampered with.
Encryption: The digital signature must
be encrypted using a secure algorithm to protect it from being intercepted or
modified during transmission.
Key management: The private key used to
create the digital signature must be securely stored and managed to prevent
unauthorized access.
By
meeting these requirements, digital signatures can provide a high level of
security and reliability for online transactions and communications.
Q.6. What is the significance of digital signature
required for secure e-commerce?
Ans.
Digital signatures are important for secure e-commerce transactions because
they provide a way to verify the authenticity and integrity of electronic
documents and messages. A digital signature is created using a cryptographic
algorithm that uses a private key to sign the document, and a corresponding
public key is used to verify the signature.
When
a digital signature is used to sign a transaction, it ensures that the
transaction has not been tampered with and that it came from the expected
sender. This helps prevent fraudulent transactions, as well as accidental
errors or changes to the transaction.
Digital
signatures also provide non-repudiation, meaning that the sender cannot deny
having sent the message or transaction once it has been signed with their
private key. This helps establish accountability and trust between parties in
e-commerce transactions.
Overall,
the use of digital signatures is a crucial aspect of secure e-commerce,
providing a way to verify the authenticity and integrity of transactions,
protect against fraud, and establish trust between parties.
Q.7.Explain precautionary measures required for secure
e-commerce.
Ans: There
are several precautionary measures that can be taken to ensure secure
e-commerce. Here are some important ones:
Use SSL/TLS
encryption: SSL
(Secure Sockets Layer) or TLS (Transport Layer Security) encryption protocols
ensure secure communication between the client (user) and the server
(e-commerce website). This helps in preventing unauthorized access and data
interception.
Implement
two-factor authentication: Two-factor
authentication adds an extra layer of security by requiring the user to provide
two forms of identification before accessing their account. This can be a
combination of a password and a one-time code sent to the user's mobile phone.
Use firewalls and
anti-virus software: Firewalls
can prevent unauthorized access to the website, while anti-virus software can
help protect the website and users from malware and other security threats.
Keep software
up-to-date: Make
sure that all software used for e-commerce is kept up-to-date with the latest
security patches and updates to prevent vulnerabilities from being exploited.
Secure payment
gateway: Use
a secure payment gateway that complies with industry standards such as PCI DSS
(Payment Card Industry Data Security Standard).
Limit access to
sensitive data: Only
allow authorized personnel to access sensitive data such as customer
information and payment details. This can be done by using role-based access
control and implementing strict access control policies.
Regularly audit
the website: Regularly
auditing the website for security vulnerabilities and threats can help identify
and address potential security risks before they can be exploited.
Overall,
taking these precautionary measures can help ensure secure e-commerce and
protect both the website and its users from security threats and data breaches.
Q.8. What is virus, worms and trozan horse? explain the
difference among the three.
Ans: Viruses,
worms, and Trojan horses are all types of malicious software that can cause
harm to a computer system or network. However, they differ in their method of
propagation and the type of damage they cause.
A
virus is a program or piece of code that is designed to replicate itself and
spread from one computer to another by attaching itself to a file or program.
Once the virus is executed, it can cause damage to the system by deleting
files, corrupting data, or stealing information.
A
worm is a self-replicating program that spreads over a network or the Internet
by exploiting security vulnerabilities in computer systems. Unlike viruses,
worms do not need to attach themselves to a program or file in order to
replicate, but can spread independently.
A
Trojan horse is a program that disguises itself as a legitimate software but is
designed to cause damage to the system or steal sensitive information. Unlike
viruses and worms, Trojan horses do not replicate themselves, but rely on
social engineering techniques to trick users into executing them.
In
summary, viruses replicate themselves by attaching to files or programs, worms
spread independently over networks or the Internet, and Trojan horses disguise
themselves as legitimate software. Each of these types of malicious software
has different characteristics and can cause different types of damage to a
computer system or network.
Q.9. Explain precautions regarding computer security.
Ans: To
ensure computer security, it is important to take the following precautions:
Install and
regularly update anti-virus software: Anti-virus software helps detect and
remove viruses and other malicious software that can harm your computer and
compromise your personal information. Make sure to keep your anti-virus
software up-to-date.
Use strong
passwords and change them regularly: Use strong passwords that include a
combination of upper and lower case letters, numbers, and symbols. Change your
passwords regularly to prevent unauthorized access.
Keep your
operating system and software up-to-date: Make sure to install software updates
and security patches as soon as they become available. These updates often
include fixes for security vulnerabilities that can be exploited by hackers.
Be careful when
downloading and installing software: Only download software from reputable
sources, and be cautious when installing new software. Some software may come
bundled with adware or other unwanted programs.
Use a firewall: A firewall can help block
unauthorized access to your computer from the internet or other networks.
Be cautious when
opening email attachments: Only
open email attachments from trusted sources, and be suspicious of any unexpected
or unsolicited attachments.
Use secure
connections: When
accessing sensitive information or making online purchases, make sure to use a
secure connection (https) to ensure that your information is encrypted and
protected.
Backup your data
regularly: Regularly
backup your important files and data to an external hard drive or cloud storage
to protect against data loss due to hardware failure or malware attacks.
By
taking these precautions, you can help ensure the security of your computer and
personal information.
Q.10. Explain good password selection
strategies/policies.
Ans: A
strong and secure password is important for protecting personal and sensitive
information. Here are some good password selection strategies/policies:
Use a long
password: Passwords
should be at least 12 characters long. The longer the password, the harder it
is for attackers to crack.
Use a mix of
characters: A
good password should contain a mix of upper and lowercase letters, numbers, and
symbols.
Avoid personal
information: Do
not use personal information such as names, birthdays, or phone numbers in your
password.
Use unique
passwords: Use
a different password for each account, especially for important accounts like
email and banking.
Change your
passwords regularly: Change
your passwords every 90 days to keep your accounts secure.
Use a password
manager: Consider
using a password manager to generate and store unique passwords for each
account.
Enable two-factor
authentication: Enable
two-factor authentication whenever possible for an additional layer of security.
Be cautious of
phishing scams: Be
cautious of phishing scams that attempt to steal your password. Never share
your password with anyone.
By
following these strategies, you can create strong and secure passwords to
protect your personal and sensitive information.
Q.11. What is phishing? Give measures to combat phishing?
Ans: Phishing
is a type of cyber attack where an attacker sends fraudulent messages that
appear to be from a legitimate source, such as a bank or social media platform,
to trick individuals into providing sensitive information like login credentials
or credit card numbers.
To combat phishing, here are some measures that can be taken:
Be cautious of
unsolicited emails: Be
wary of emails that ask you to provide sensitive information or click on a
link. Always verify the legitimacy of the email sender and the email content
before taking any action.
Check the URL: Always verify the URL of
the website before entering any sensitive information. Hackers may use a URL
similar to the legitimate site to fool users.
Use anti-phishing
tools: Many
web browsers, email providers, and antivirus software come with anti-phishing
tools that can help detect and prevent phishing attacks.
Keep software up
to date: Always
keep your software, including your operating system, web browser, and antivirus
software up to date to protect against known vulnerabilities.
Use two-factor
authentication: Two-factor
authentication adds an extra layer of security by requiring a second form of
identification, such as a code sent to your phone, in addition to your password
Educate yourself: Stay informed about the
latest phishing techniques and learn how to identify phishing emails and
websites. Many organizations offer training on how to avoid phishing attacks.
Q.12.Explain measures to avoid social engineering
attacks.
Ans: Social
engineering attacks are a type of cybersecurity threat where the attacker
manipulates people to gain access to sensitive information or networks. Some
measures that can be taken to avoid social engineering attacks are:
Education and
Training: Employees
and individuals must be educated and trained on social engineering tactics, so
they can recognize and avoid them. Regular cybersecurity training sessions can
help raise awareness of these threats and provide practical steps to avoid
them.
Use of strong
passwords: Strong
passwords that are difficult to guess should be used to prevent attackers from
accessing sensitive information or networks. Passwords should be a combination
of upper and lowercase letters, numbers, and special characters.
Multi-factor
authentication: Multi-factor
authentication (MFA) adds an extra layer of security to online accounts by
requiring users to provide more than one form of authentication to access an
account. This can help prevent unauthorized access even if an attacker has
stolen the user's password.
Be cautious of
suspicious emails and messages: Users should be cautious of unsolicited emails or
messages that ask for personal or sensitive information. They should verify the
authenticity of such messages by contacting the sender through a different
communication channel.
Keep software and
systems up to date:
Regular software updates should be performed to ensure that vulnerabilities are
patched and the latest security features are installed.
Restrict access
to sensitive information:
Access to sensitive information should be restricted and granted only to those
who require it for their job responsibilities.
Use of security
software: Anti-virus,
anti-malware, and firewall software can help prevent social engineering attacks
by detecting and blocking malicious activities.
Regular security
assessments: Regular
security assessments can help identify potential vulnerabilities in the system
and prevent social engineering attacks before they occur.
Overall,
a combination of technical solutions and user awareness can help prevent social
engineering attacks and ensure the security of sensitive information and
network
MCQ
1. Hackers are those :
(a) Who have authorised access to data
(b) Who have
unauthorised access to data
(c) Who have special access to data
(d) None of these. Hackers are individuals or groups who use their technical
knowledge and skills to gain unauthorized access to computer systems, networks,
or sensitive information. They may do this for a variety of reasons, such as
personal gain, political activism, or simple mischief
2. The Potential customer wants his
data to be :
(a) Safe (b) Secure
(c) Confidential (d) All of these
private, and protected from unauthorized
access or alteration.
3. Main security concerns are :
(a) Privacy & confidentiality (b)
Data integrity
(c) Authenticity (d) All of the
above
main security concerns in e-commerce
include ensuring the confidentiality, integrity and availability of data,
protecting against unauthorized access and ensuring compliance with legal and
regulatory requirements.
4. Cryptography changes the data in :-
(a) Readable form (b) Unreadable form
(c) Both of these (d) None of these.
Cryptography changes the data in Both
of these ways: encryption and decryption. Encryption is the process of
converting plain text into an unreadable form, while decryption is the process
of converting ciphertext back into its original plain text form. This way, the
data can be protected from unauthorized access and tampering.
5. Cipher text becomes ready after :
(a) Encryption (b) decryption
(c) Digital signature (d) None of these
cipher text is the result of encrypting
a plain text message using a cryptographic algorithm and key. It is unreadable
without the corresponding decryption key.
6. Encryption is the conversion of
original data into a form known as :
(a) Digital signature (b) Firewall
(c) Cipher text (d) None of these
encryption is the process of converting
plaintext, or unencrypted data, into a form that is unreadable to anyone
without the proper decryption key or method. This form is known as ciphertext
and it is used to ensure the confidentiality and integrity of the original
data.
7. Keys are used for :
(a) Encoding (b) Decoding
(c) Both of these (d) None of these
Encryption and decryption of data.
8. Public key is made available to the
:
(a) Recipients (b) Sender
(c) Everyone who is
involved (d) None of these
in the communication
9. Private key is used to :
(a) Encrypt the data (b) Decrypt the data
(c) Both of these (d) None of these.
The private key is used to decrypt the
data that was encrypted with the corresponding public key. It is kept secret
and used by the intended recipient of the message to decrypt the ciphertext and
read the original message.
10. Firewalls are :
(a) Hardware (b) Software
(c) Both of these (d) None of these
Firewalls are Both of these, as they
are used to protect a network from unauthorized access, and also to control and
monitor the incoming and outgoing network traffic.
11. Firewalls protect the network by :
(a) Granting authorised access (b)
Shield the network
(c) Filtering packets (d) All of the above
firewalls protect the network by
controlling access to the network, inspecting network traffic, and blocking
malicious or unwanted traffic from entering the network.
12. Digital signatures :
(a) Change after
every message
(b) Do not change for ten messages
(c) Always remain the same
(d) None of these.
Digital signatures do not change after
every message. They are used to verify the authenticity of a message and ensure
that it has not been tampered with. The digital signature is created using a
private key and can be verified using a corresponding public key.
13. Which of the following are the essential
elements of e-security ?
(a) Authenticity (b) Data Integrity
(c) Non-repudiation (d) All of these.
All of the following are essential
elements of e-security: encryption, digital signatures, firewalls, access
control, and biometric authentication.
Q.1. What is E-Security?
a) The protection of electronic systems
from unauthorized access
b) The prevention of cyber attacks on
electronic systems
c) The use of digital signatures for
electronic transactions
d) The management of electronic devices
and networks
Q.2. Which of the following is a common E-Security
measure?
a) Social media monitoring
b) Physical security guards
c) Encryption
d) Manual backup of data
Q.3. What does access control in E-Security mean?
a) Limiting access to electronic
systems, data, and networks to authorized users only
b) Monitoring incoming and outgoing
network traffic to prevent unauthorized access
c) Detecting and removing viruses and
other malware from electronic devices
d) Using sensors and software to detect
unauthorized access attempts
Q.4. What are the benefits of E-Security?
a) Reduced risk of financial loss and
reputational damage
b) Increased user confidence in
electronic systems
c) Protection of electronic systems
from theft, damage, and disruption
d) All of the above
Q.5. What is a potential risk of E-Security
measures?
a) Cybercriminals constantly developing
new methods to bypass E-Security measures
b) E-Security measures being too
expensive to implement and maintain
c) E-Security measures creating
barriers to user access and usability
d) All of the above
Q.6. What is the purpose of encryption in
E-Security?
a) To prevent unauthorized access to
electronic systems
b) To monitor incoming and outgoing
network traffic
c) To convert sensitive information
into an unreadable format
d) To detect and remove viruses and
other malware
Q.7. Which stakeholders are involved in the
implementation of E-Security measures?
a) Users, technology providers, and
regulatory bodies
b) Physical security guards, financial
institutions, and social media platforms
c) Data backup providers, marketing
agencies, and insurance companies
d) None of the above
Q. 8. Which of the following is NOT a threat to
E-Security?
a) Hacking
b) Viruses and malware
c) Physical theft of electronic devices
d) Smart cards
Q.9. What is the importance of regularly updating
and testing E-Security policies and procedures?
a) To keep up with the evolving threats
and vulnerabilities of electronic transactions
b) To increase user confidence in
electronic systems
c) To reduce the cost of implementing
E-Security measures
d) To limit access to electronic
systems, data, and networks to authorized users only.
Q10. Which of the following is NOT an area of
internet security?
A) Network Security
B) Data Security
C) Mobile Security
D)
Physical Security
Q.11. Which of the following is NOT a common
security threat?
A) Malware
B) Insider Threats
C)
Physical Attacks
D) Phishing
Q.12. What is a man-in-the-middle attack?
A) Flooding a network or server with
traffic
B)
Intercepting communication between two parties and stealing or altering
information
C) Stealing or guessing passwords to
gain access to a system
D) Manipulating people into divulging
sensitive information
Q.13. Which of the following is NOT a type of
spyware?
a. Adware
b. Tracking cookies
c. Remote Access Trojans (RATs)
d. Firewall
Q.14. What is the purpose of risk assessment in
managing security breaches?
a. To identify potential
vulnerabilities and threats to the system
b. To develop security policies and
procedures
c. To encrypt sensitive data in transit
and at rest
d. To regularly test the system for
vulnerabilities and weaknesses
Q.15. Which of the following is a concern of
e-security?
a. Privacy
b. System performance
c. Software updates
d. Data analysis
Q.16. What is network security concerned with?
a)
Securing data in databases
b) Securing mobile devices
c) Securing the network infrastructure
d) Securing cloud-based services
Q.17. What is cloud security concerned with?
a) Securing data and applications
stored in cloud-based services
b) Securing mobile devices
c) Securing the network infrastructure
d) Securing data stored in databases
Q.18. What is the aim of a phishing attack?
a) To gain unauthorized access to
computer systems or networks
b) To overwhelm a website or network
with traffic
c) To trick users into revealing
sensitive information
d) To intercept communication between
two parties
Q.19. What is ransomware?
a) Malicious software that encrypts
files on a computer or network, making them inaccessible to users
b) A type of social engineering attack
c) Gaining unauthorized access to
computer systems or networks
d) Flooding a network or server with
traffic, making it unavailable to users
Q.20. What are physical risks in the context of
internet security?
a) Risks to the physical infrastructure
of a network or device
b) Risks from malicious software
c) Risks from social engineering
attacks
d) Risks from insider threats
Q.21. What are the technical risks associated with
e-cheques?
a) Legal risks
b) Cybersecurity risks
c) Reversal risks
d) None of the above
Q.22. Which type of malware is a self-replicating
program that spreads through a network or the internet without any human
intervention?
a) Virus
b) Worm
c) Trojan
d) Spyware
Q.23. What is spyware?
a. A type of antivirus software
b. A type of malware designed to
collect sensitive information from a user's computer or device without their
knowledge or consent.
c. A type of firewall
d. A type of adware
Q.24. Which of the following is NOT a common type
of spyware?
a. Key loggers
b. Adware
c. Tracking cookies
d. Anti-virus software
Q.25. What is the purpose of an incident response
plan in managing security breaches?
a. To notify customers, law
enforcement, and other stakeholders.
b. To identify potential vulnerabilities
and threats to the system.
c. To outline the steps to be taken in
the event of a security breach.
d. To encrypt sensitive data in transit
and at rest.
Q.26. Which of the following is a technique used
to prevent unauthorized access to a system?
a) Encryption
b) Intrusion detection and prevention
systems
c) Two-factor authentication
d) Firewalls
Q.27. Which of the following encryption techniques
uses two different keys for encryption and decryption?
a) Symmetric Key Encryption
b) Asymmetric Key Encryption
c) Hash Functions
d) Digital signatures
Q.28. Which of the following is not a challenge or
concern associated with encryption?
a) Proper key management
b) Performance issues
c) Backdoors
d) Increased speed of data transmission
Q.29. What is the purpose of a firewall?
a. To cache frequently accessed web
pages and files
b. To act as a barrier between the
client and the internet
c. To distribute incoming requests
across multiple servers
d. To hide the identity of the client
by masking their IP address
Q.30. What are the potential drawbacks of using a
firewall?
a. False sense of security
b. Configuration simplicity
c. Improved network performance
d. Low cost
Q.31. What are the benefits of using a proxy
server?
a. Caching
b. Filtering
c. Anonymity
d. All of the above
Q.32. What is the function of a proxy server?
a. It verifies the authenticity of
digital documents.
b. It distributes traffic across
multiple servers.
c. It encrypts data and hides IP
addresses to protect privacy.
d. It creates a digital fingerprint of
a document or message.
Q.33. What is the purpose of digital signatures?
a. To provide a way to ensure that the
content of a message or document has not been tampered with.
b. To filter out unwanted content.
c. To distribute traffic across multiple
servers.
d. To cache frequently accessed pages
and files.
Q.34Which of the following is NOT a benefit of
using digital signatures?
a. Authenticity
b. Non-repudiation
c. Security
d. Faster access
Q.35. Which of the following is a measurable
feature that can be used for biometric identification?
a. Browser history
b. Email address
c. Fingerprints
d. Credit score
Q.36. What is phishing?
A) A type of fishing activity
B) An attempt to obtain sensitive
information fraudulently
C) A type of authentication process
D) A software to detect phishing
websites
Q.37. What is the first and
most important measure to combat phishing?
A) Education and Awareness
B) Use of Anti-phishing Software
C) Multi-Factor Authentication
D) Email Filters
Q.38. What is Multi-factor Authentication?
A) A type of password
B) An extra layer of security to the
authentication process
C) A type of phishing scam
D) A type of software
Q.39. Which of the following is not a good
password selection policy?
a) Using at least 12 characters for the
password.
b) Including a mix of upper and lower
case letters, numbers, and symbols in the password.
c) Using commonly used passwords like
"12345" or "qwerty".
d) Using unique passwords for each
account.
Q.40. Which of the following is not a method of
data backup?
a) Cloud-based backup.
b) Physical backup.
c) Disk cleaning.
d) Tape backup.
Q.41. Which of the following is not a benefit of
using Uninterrupted Power Supply (UPS) systems?
a) Protection against power surges and
outages.
b) Data protection.
c) Increased productivity.
d) Lower electricity bills.
Q.42. What is the purpose of web security?
a) To protect websites, web
applications, and web services from cyber threats.
b) To encrypt data transmitted between
the client and server.
c) To store sensitive data on the
server.
d) To manage vulnerabilities in web
applications.
Q.43. Which of the following is not a key area of
web security?
a) Authentication and access control.
b) Secure communications.
c) Data backup and recovery.
d) Incident response and recovery.
True or False
1. Hackers generally have unauthorised
access to the computer systems. True
hackers are unauthorized users who gain
access to computer systems and networks with the intent to steal, destroy, or
disrupt sensitive information. They use various techniques such as exploiting
vulnerabilities in software, guessing passwords, or using social engineering
tactics to gain access.
2. Firewall is dependent on other
Hardware and Software system. False
Firewalls can be either hardware-based
or software-based and can be independent from other systems, but they can also
be integrated with other hardware and software for added security.Firewalls can
be either hardware-based or software-based and can be independent from other
systems, but they can also be integrated with other hardware and software for
added security.
3. Web Filtering is policies are used
by universities, colleges and schools etc. True
to block access to certain types of
websites, such as those that contain inappropriate or offensive content, or
those that may be harmful to the network. These policies can also be used by
companies to block access to sites that may be distracting or not related to
work, in order to increase productivity.
4. Public key is used to encrypt or
decrypt the message. False
while private key is used to sign or
verify the digital signature.
5. Cipher text is the text into
encrypted form. True
Cipher text is the text that has been
transformed into a coded or unreadable form through the use of encryption techniques.
It is the result of the encryption process and can only be decrypted and read
by someone who has the proper decryption key or method.
1. Hardware failure is a physical security risk in internet
security. True
2. Ransomware
is a type of social engineering attack. False
3. Power
outages cannot cause security risks in internet security. False
4. Adware
can collect user information and transmit it to third-party advertisers. (True/False)
5. Encryption
is the process of verifying the identity of users and entities accessing
systems or data. (True/False)
6. Incident
response plan outlines the steps to be taken in the event of a security breach.
(True/False)
7. Data
security measures include access controls, encryption, and backup and recovery
procedures.
(True/False)
8. Mobile
security measures include code reviews and penetration testing. (True/False)
9. Phishing
is a type of social engineering attack. (True/False)
10. Denial
of Service (DoS) attacks involve gaining unauthorized access to computer
systems or networks. (True/False)
11. Power
outages can cause data loss, corruption, or other security risks. (True/False)
12. E-cheques
are not vulnerable to cyberattacks such as hacking and phishing. (False)
13. Antivirus
software can detect and remove malware from the system and prevent further
infections. (True)
14. Spyware
is designed to collect sensitive information from a user's computer or device
without their knowledge or consent. (True/False)
15. Antivirus
software can detect and remove spyware from the system and prevent further
infections. (True/False)
16. Regularly
testing the system for vulnerabilities and weaknesses is not necessary to
effectively manage security breaches. (True/False)
17. Effective
e-security requires a comprehensive and proactive approach that considers the
specific needs and concerns of an organization or system. (True/False)
18. Developing
and implementing security policies and procedures is not necessary to manage
and prevent security breaches. (True/False)
19. Encryption
is the process of converting ciphertext into plaintext. (False)
20. Symmetric
encryption uses the same key for both encryption and decryption. (True)
21. The
length and complexity of a key do not affect the level of security provided by
encryption. (False)
22. Encryption
is a fool-proof method of securing sensitive information. (False)
23. A
firewall can prevent unauthorized access to a network and help protect against
malware and other security threats. (True/False)
24. Firewalls
can only block unauthorized access attempts from hackers and malware. (True/False)
25. Proxy
servers can be used for filtering out unwanted content, such as malware,
advertisements, and adult content, from the requests sent by clients. (True/False)
26. Proxy
servers can introduce additional complexity and may require additional
resources to maintain and manage. (True/False)
27. Proxy
servers can reduce bandwidth usage by caching frequently accessed content. True/False
28. Biometric
security refers to the use of physical or behavioral characteristics of
individuals to authenticate their identity for access control, authorization,
or other security purposes. True/False
29.Digital
signatures are used to encrypt the content of a document or message.
True/False
30. The
recipient of a document or message can verify the authenticity of the sender
using the sender's public key. True/False
31. Digital
signatures are only used in the finance industry. True/False
32. Anti-phishing
software and browser extensions can detect and block known phishing sites and
alert the user when they encounter a suspicious link or email. (True/False)
33. Users
should avoid sharing personal information, such as login credentials or social
security numbers, through unsolicited emails or phone calls. (True/False)
34. Individuals
and organizations are not subject to legal obligations related to e-security. (True/False)
35. Good
password selection policies include using at least 12 characters for the
password. (True/False
36.
Data backup is done only through physical backups. (True/False)
37. UPS
systems protect electronic equipment from damage caused by power fluctuations
and surges.
(True/False)
38. Vulnerability
management involves identifying and mitigating vulnerabilities in web applications
and websites.
(True/False)
40. Effective
web security requires a combination of technology, policies, and practices.
(True/False)
A. One Word or one line questions
Q. 1. What is
Electronic Security ?
Ans. E-Security is use of adequate
methods/precautions to protect user’s data and systems.
Electronic security refers to the use
of technology to protect physical and digital assets from unauthorized access,
use, disclosure, disruption, modification, or destruction. This includes
various measures such as firewalls, encryption, intrusion detection and
prevention systems, access controls, and other security technologies.
Q. 2. What is Physical risk ?
Ans. Physical risk refers to the
physical danger caused to equipments like floods, theft and
fire etc.
Physical risk refers to the potential
for damage or loss to physical assets, such as data centers, computer
equipment, and other hardware and infrastructure, due to natural disasters,
theft, vandalism, or other physical hazards. This type of risk can have a
significant impact on the availability and integrity of electronic systems and
data.
Q. 3. What is
Technical risk ?
Ans. Technical risk includes
unauthorised access, frauds and virus attacks etc.
Technical risk refers to the potential
problems or failures that can occur with the technology used in electronic
security systems, such as hardware or software malfunctions, system
vulnerabilities, or lack of proper maintenance or updates. These risks can lead
to system downtime, data loss, or unauthorized access to sensitive information.
Q. 4. What is
Encryption ?
Ans. Encryption is the process of
encoding the data, different algorithms are available to
encrypt the message.
Encryption is the process of converting
plain text into a coded form, called ciphertext, to protect the data from
unauthorized access or to ensure its confidentiality. The process of converting
ciphertext back to plain text is called decryption. Encryption uses
mathematical algorithms and keys to scramble the data, making it unreadable to
anyone without the decryption key.
Q. 5. What are the
types of Encryption ?
Ans. Types are Public Key Encryption
and Private Encryption.
There are several types of encryption,
including symmetric-key encryption, asymmetric-key encryption, and hash functions.
Symmetric-key encryption uses the same key for both encryption and decryption,
while asymmetric-key encryption uses a public key for encryption and a private
key for decryption. Hash functions are used to create a unique, fixed-size
string of characters, called a hash or digest, from a variable-size input, such
as a message or file.
Q. 6. What do you
mean by Firewalls ?
Ans. Firewalls are hardware and
software tools to control the access to network and
computers attached to it.
A firewall is a system that controls
access to a computer or network by blocking or allowing incoming and outgoing
network traffic based on a set of security rules. Firewalls are used to protect
against unauthorized access and to prevent malicious attacks, such as viruses
or hackers. They can be hardware-based or software-based and are commonly used
in both corporate and home networks to protect against security threats.
Q. 7. What is web
filtering?
Ans. Web filtering is a kind of
software which excludes the availability of web pages that are
some what technical or not related to
the business in general.
Web filtering is the process of
blocking or restricting access to certain websites or types of content on the
internet. It is often used to protect users from harmful or inappropriate
content, to enforce organizational policies, or to comply with legal or
regulatory requirements. Web filtering can be implemented through software,
hardware, or a combination of both, and can be based on various criteria such
as keywords, URL, IP address, or content type.
Q. 8. What is cipher
text ?
Ans. Cipher text is the encrypted text
which is into unreadable form.
Cipher text is the encoded or encrypted
version of plain text, which can only be deciphered or decrypted using a
specific algorithm or key. It is used for secure communication and data
protection.
Q. 9. What is PIN?
Ans. Personal Identification Number.
PIN stands for Personal Identification
Number. It is a unique code, usually made up of numbers, that is used to verify
the identity of a person trying to access a particular account or system. It is
commonly used to secure ATM transactions, credit card transactions, and other
types of electronic transactions where personal identification is required.
Q. 10. What is hand
pattern recognition ?
Ans. Hand pattern recognition means
that every hand contains some unique characteristics
of an individual, which are easily
recognisable.
Hand pattern recognition is a method of
biometric identification that involves analyzing the unique characteristics of
an individual's hand, such as the shape, size, and features of the hand and
fingers, to identify and verify their identity. This technology is often used
for security and access control applications, as it can be used to authenticate
users and grant them access to restricted areas or resources based on their
hand patterns.
Q. 11. What is SSL ?
Ans. SSL means Secure Socket Layer, it
makes authentication of digital signatures.
SSL stands for Secure Sockets Layer, a
protocol for establishing secure links between networked computers. It is now
largely replaced by its successor, TLS (Transport Layer Security). SSL uses a
combination of public key and symmetric key encryption to secure data
transmissions and to authenticate the identity of the website or the device
that the user is communicating with. It is commonly used to secure online
transactions such as online shopping and online banking.
B. Fill in the blanks
1. Encryption technology ensures that
only authorized users can read encrypted message.
known as ciphertext. This helps to
protect the confidential information from unauthorized access or tampering.
There are different types of encryption methods, such as symmetric encryption,
asymmetric encryption, and more. Firewalls, web filtering, and other security
measures are also used to protect against unauthorized access and potential
threats to electronic security.
2. Firewall works like a
door lock so that only authorized users can enter in the
organisations network.
Firewalls are security systems that act
as a barrier between a private internal network and the internet, controlling
access to the network and protecting it from unauthorized access or attacks.
They can be configured to allow or deny traffic based on various criteria, such
as IP address, port number, or protocol. They can also include additional
security features such as intrusion detection and prevention.
3. Digital signatures
provide the method by which information cannot be repudiated.
Digital signatures, which use
public-key cryptography, provide a way to verify the identity of the sender of
a message and to ensure that the message has not been tampered with in transit.
This helps to prevent the sender from denying having sent the message, also
known as "non-repudiation.
4. Access Control
means giving permission or denying the permission for a particular
thing.
to a particular user or group of users.
It is a method of regulating who can access specific resources or information
within a computer system or network. This can include physical access to a
building, or logical access to specific files or programs. Access control is an
important aspect of computer security as it helps to prevent unauthorized
access and protect sensitive information.
5 Cryptography is the
solution through which only the authorised persons can view the data.
Cryptography is the practice of secure
communication techniques to protect information from unauthorized access,
alteration, or destruction. It involves the use of mathematical algorithms to
convert plain text into a code, or ciphertext, that can only be deciphered by
those with the appropriate key or knowledge.
6. Finger Print Recognition, Iris
recognition, Voice recognition are method of Biometric
authentication.
Biometric authentication methods, such
as Finger Print Recognition, Iris recognition, and Voice recognition, use
unique physical characteristics of an individual to verify their identity.