സൈബർ സെക്യൂരിറ്റിയുമായി ബന്ധപ്പെട്ട പ്രധാന ത്രെറ്റുകൾ, കമ്പ്യൂട്ടർ വൈറസ്, മാൽവെയർ, ട്രോജൻ ഹോഴ്സ് എന്നിവയുമായി ബന്ധപ്പെട്ട ചോദ്യങ്ങളാണ് ഇന്നത്തെ പാഠത്തിൽ ഉൾപ്പെടുത്തിയിരിക്കുന്നത്.
- Unauthorized copying, reproduction, use or manufacture of product is called
Software Piracy
- Small program that monitors and retrieve the username or password of network users during their login
Password Sniffer
- Practice of using the internet to harass or threaten someone is called
Cyber Stalking (e-stalking or Cyber Bullying)
- How to avoid Cyber Stalking
Do not disclose any personal information, avoid sending photographs to strangers and chat friends, proper disconnection of internet after its use
- Hacking of websites by password cracking and alteration of contents for fulfilling political objectives or for money is called
Web Jacking
- Unauthorized changing of data before or during their input to a computer is called
Data Diddling
- Procurement of identifying information without permission and using it fraudulently to obtain goods and services is called
Identity Theft
- Unauthorized access to information system is called
Hacking
- One who does hacking is called
Hacker
- Hacking comes under which section of IT Act 2000
Section 66
- Hackers who hacking system for good reason
White hat hackers or Ethical hackers
- Hackers who hacking system for malicious reasons
Blackhat hackers
- Hackers who hacking system sometimes for good reason and sometimes for malicious reasons
Gray hat hackers
- Unauthorized use of internet hours paid for by another person is known as
Theft of internet hours
- A computer connects to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used for malicious tasks is called
Zombie
- Intellectual property rights refer to
Property rights through patents, copyrights and trademarks
- Intellectual property right violations include
Trademark violations, computer source code theft, patent violation and software piracy
- Theme of World Intellectual property day 2017
Innovation-Improving Lives
- Position of India in Intellectual property index 2017
43
- An attack meant to shut down a machine or network, making it inaccessible to its intended users
Denial of Service
- In cyber law, DOS stands for
Denial of Service
- Examples of Denial of service
Flood a network thereby preventing legitimate network traffic, disrupt connections between two machines, preventing an individual from accessing a service
- The person who defined the term Computer Virus
Fred Cohen
- A computer program that can damage the operations of a computer system
Virus
- The term VIRUS stands for
Vital Information Resource Under Siege (Virtual InformationResources Under Seize)
- First computer virus
Creeper (As per PSC)
- First computer virus for MS DOS
Brain
- First computer virus affected on ARPANET (ancient form of internet)
Creeper
- Creeper was developed by
Bob Thomas
- First microcomputer virus
Elk Cloner
- First virus affected personal computer
Apple
- First mobile phone virus
Cabir
- Virus program writing programmers
Vickser
- Examples for computer viruses
TEXAS, Blaster, Nimda, I Love you, Guppy, Melissa, Slammer
- Recently happened cyber attack across 150 countries in the world
Wanna Cry
- Wanna Cry spread through
- First country in which Wanna Cry attack reported for the first time
Panama (1989)
- Wanna Cry is an example of
Ransomware
- Program that makes the user unable to access the system and demanding some form of payments to unlock
Ransomware
- Operating system being attacked by Wanna Cry
Windows
- Ransomware that affected different countries including India recently
Petya
- Examples of Ransomware
Golden Eye, Cryptolocker, Locky, Crysis, ZCrypt, Powerware, Hydra Crypt, Cerber, Cryptowall
- Ad click malware that affected Google play applications recently
Judy, Skinner, False Guide
- Computer software which is used to prevent, delete and detect the presence of Virus in Computer
Antivirus
- Examples of antivirus programs
Avast, Avira, AVG, Kaspersky, Norton, McAfee
- Subclass of computer virus that can replicate itself through network connections to any machine without human intervention
Worm
- Malware which appears to be useful applications but allows the hacker to take control of the system
Trojan Horse
- Facts about Trojan horse
They are not viruses, it does not replicate itself
- Trojans which are activated at a certain time are called
Time bombs
- Peace of code inserted into a software that will execute its malicious function when the specified conditions are met
Logic Bomb
- Program that automatically renders advertisements in order to generate revenue for its author
Adware
- Software that can record every keystroke we make using keyboard
Keyloggers
(To be Continued…)