Ch.8 Cyber security class 9th computer 19/8/22

                Chapter 8 cyber security
Cyber security:- the meaning of the term cyber security as involved in recent year. Before the problem of data security become widely published in the media, most people idea of cyber security focus on the physical computer. Traditionally computer facilities have been physically protected for three reason.
• To prevent thef of or damage to the hardware.
• To prevent theft of our damage of the information.
• To prevent description of service.
cyber security is security apply to computer devices such as computers and smartphones as well as computer network such as private and public networks including the wall internet. In includes physical security to prevent half of equipment and information security to protect the data on that equipment. It is sometimes referred to as cyber security or IT security.
Type of cyber security:-cyber security can be divided into the following types:-
Network security:-it is the practice of security computer network from introduce, whether tracked attack s for opportunities malware.
Application security:- it process on keeping software and device free of threads. A compromise application good provide access to the data, it is designed to protect in the first place.
Information security:- it protects from unauthorised access to avoid identity left and two protect privacy. Major techniques used to cover these are – identification, authentication, and authorised of user and cyber photography.
Operational security:- it include and process and decision for handling and protecting data assist, that determined how and where data maybe is stored or share, all fall under this.
*Disaster recovery planning:-this is a process that include performing risk assessment, establishing properties developing recovery strategies in case of a disaster.
*End user education:- it addressed that most unpredictable cyber security factor people. Anyone can accidentally introduce a virus to and otherwise secure system by failing to follow good security practices.
*Expolist:- the term expolist generally repair to small program design to take advantage of software fireworks, that had been discovered, either remotely or locally. The odd from the exploit program experimently used in frozen horse and computer wireless .
*Indirect attacks:-  and indirect attacked is a attack launch by a third party of computer. By using someone else's computer to launch in attack, it become for more difficult to track down the actual attackers.

*What is online identity - online identity or internet identity (IID)is a social social identity that and internet user established in social media and website.
Identity theft :- identity have is someone stills your personal information and you users it it without your permission. This result in the lost of personal data, including username, password, banking information, credit card number, Aadhar id aur unic Identity number (UID), which is than user without your permission to commit fraud and other crimes.

How identity theft happens
The most common way identity thieves get hold of your data.
Data Breaches:- data bridge happens when someone gains access to original data without authorised.
Unsecure browsing :- if we share any information on an unsecure website or a website that been compromise by hackers, we could be putting our sensitive information directly in the hands of the thieves. Usually we can browse the internet.

Dark web market places:- 
the dark web is offered the place where your personal information in up after its been stolen hackers may not majorly will stealing your information to user it for themselves but will instant less to see it to other.

Malware activity:- malware is a malicious software that design to break all shots of navoc.fraudsters may use Malviya to still your data or spy on your computer activity without you knowing.

Mail theft:- identity thieves search through the mail to find documents that hold personal information. Bank and credit card statement and other document used send or receive through the male can be interrupted and used to gain users data.

Fishing and stamp attacks:-  some frodar use email and text messaging and other from of electronic communication to still your sensitive and formation. The message often look like it's coming from reputable source and asks victim to give up one or more type of information.

Wi-Fi hacking:-  it be use our computer or phones on a public network like air code, departmental Store or coffee shop Wi-Fi hackers may able to hack on our connection.

Mobile phone theft:-  smartphone a teaser of information for identity Thieves, especially if your app allow you to login automatically without any password or a fingerprint. Makes your phone lag with secure passcode, biometric screening is set up properly and your passwords are not restored in plane text anywhere on your phone.

Card skimming:-  somethings used to skimming device that can be place easily over the card reader on ATM or a fuel pump. Without looking out of the ordinary when somebody swipe a Debit or credit card at a compromise machine, the schema reads the information from the cards magnetic strip and store it or transmits it.

Safely browsing the internet:- some practices that ensure are safer web browser experience are given below:-
*Always look for the https keyword in the beginning of the websites at the address (URL).
*Use a secure web browser. Most web browser such as Microsoft edge, Google Chrome or Mozilla Firefox have security setting.
*Always install security certificate for website that use use frequently.
*Most website is store cookies in your computer. A cookies of file that is store information about the website that you access the browser. Remember to delete cookies from your computer regularly.
*Most web browsers store all list of all website and web pages you access in the form of "history". Delete your browsing history periodically.
*Never say password on your computer Intex file or elsewhere.
*Do not click on link that you are not sure about.
*Always turn automatic updates setting on in your browser to have latest security patches install.
*Install and use a good internet security software.
*Do not use public or share Wi-Fi connection.
*Do not install software from website that are not trustworthy aur have a history of releasing Malviya.
*Use different passwords for different web services and change them periodically. Use password that use a combination of letters number and symbols.
*Use password generator or on time password (OTP's) instant of the autofill feature for entering passwords.
*Use virtual keyboard or entire information on financial website.
*Do not open attachment that come in email from Unidentified or spacious source.
*Never respond to message or web pages asking you to enter your personal or sensitive information to let you access the website.

Data privacy:- data privacy is also known as information privacy. It deals right of an individual to keep his personal information is scared from other and this close only the sensitive one. It is un technical and illegal to use such information without the consent of the concerned person. Online data can be easily occuessed and compromise. It is prone to cyber attack malware and hacking pose biggest threats to online data.
In order to prevent any breach of data, follow the given guidelines:-
•Disable the cookies in your web browser to  safeguard leakage of information.
•Always have a strong password and never see your it with anyone.
•Immediately report if you feel that the data is being breached.
•never share your login credentials with anyone.
•never keep sensitive information on protected in your system, rather delete it, it is no more needed.

Password:- a password is string of character, which court include letter, number, or special symbol. Password are used authenticate the users access to any device or program. We can protect sensitive and private information using password.

The use of password insure that the data is protected from unauthorised access. It is recommended to use password which are easy to memorize get strong. Password are used for many purpose, sum of them are:-
>Login into online account, such as banking, email id, social networking and soon.
>Accessing application, database or network.
>Using ATM Card to withdrawal money or shop online.
How to create a strong password
√do not use person information.
✓instant, used special character.
✓create longer password.
✓use of password generator.
✓change password on a regular basis.
✓modify easy to remember phrases.
✓don't write them down.
✓use different password on different accounts.
✓do not type password or device or network.
                           Cyber crime
The term cyber crime can be defined as criminal activity directly released to the use of computer, specially illegal trespass into the computer system or database of another, manipulation or theft office Store or online data, or sabotaging of equipment and data. In general, cyber crime referred to any crime that involve a computer or network.
                 Categories of cyber crime
Information disclosure.
• Hacking
• Email spoofing
• SMS spoofing
• Carding
• Intellectual property crime
• Cyber squatting
• Cyber vandalism
• Social engineering
• Phishing
• Cyber extortion
• Spreading rumours online
• Cyber bulling
• Spam
• Cyber terrorism
• Harassment Via emails
• Distribution of pirated software
Prevention of cyber crime
Reporting a cyber crime
If any cyber crime happened one must first report it to present, School authorities and then two police.
To report a cyber crime:-
• The local police can approach for filling complaints just as the cyber crimes cell especially designed with the jurisdiction to register complain.
• In addition, provisions have now been movement for filling of efir in most of state.
• Also, the ministry of home affairs is also launching a web site for registering crime against women and children online, including cyber crime
( cybercrime.gov.in )
Cyber law:- cyber law also called it low is the low regarding information technology including computers and internet. It is related to legal information and supervisors the digital circulation of information software, information security and e-commerce.
The information technology act 2000, or also known as the Indian cyber act or the internet lock crime to force in India.
The objective of information technology law in India as follows:-
• To provide recognition for all e transactions.
• To give legal recognition to digital signature as a valid signature or accept agreement online.
• To give legal recognition to keeping accounting book in electronic form by bankers as well as other organisation.
• Protection of online privacy and stopping cyber crime.
          Confidently of information
In simple term confidently means something that is secret and is not supposed to be disclose or unintended people are entities. Confidently ensures that sensitive information is accused only by authorised person and kept away from those not authorised to process them.
                     Cyber stalking 
Cyber stalking is a crime in which the attacker rashes of victim using electronic communication such as:- emails,or instant messaging or message posted website or a discussion group.
Cyber stalking is the online version and is often and extension offline stalking. The aim is to anyone, and emotionally another  information person.
Cyber stalker mein obtain personal information about diabetes (Example home address phone number) from the internet and utilise this information to meet their victims in persons.
                            Malware
Marvel is a made up of 2 words malicious and software. A malware refer to any program that is copy to your computer without your knowledge and in intended to cause harm to functioning of the computer system.
 Type of malbear
Computer virus
Computer virus is a Malabar that is spread or republicats by copying itself. It is designed to spread from one computer to another and to interface with normal computer operations. A computer virus is different than a biological virus. When a virus get into your computer it attached itself to an exciting program or file.
When infected program is executed or the infected file is accessed, program and file in the system.
Kinds of virus.
Computer virus can be classified as :-
• Boot sector virus
• Program virus
• Marco virus
• Multi partite virus
• Polymorphic virus
Trojans:-
The term chosen is drive from the I sent Greek story of the wooden horse that was used to help Greek troops invade the city of Tory by Stealth.
A trojan ,trojan horse, is a program that hides its true intention. It is destructive program distinguish as a game, useful application or utility. Trojans are usually distributed as email attachment with temporary name the prom people of open them.
Best,Dark comet and zeus are some example of Trojans.

Worms:-
You warm is mole that automatically send itself to other computer over the network, without any human instruction or assistance. Warm is spread from one computer to another through program that access the network resources such as a web browser.
Morris,mydoom and i love you awesome example of computer warm.

Spyware:-
A spyware is a program that secretly gather’s personal information and send it without the users knowledge from a computer when it is online. It usually gets install in a computer system as a part of a useful software.
Gator,Zango or coolweb search are the example of spyware.

Adware:-
An adware is a program that usually display unwanted pop up at what is meant or install unnecessary application on your computer system that can reduce your computers productivity and efficiency.
Deskad,Bonzibuddy and weatherbag are some example of adware.

Source of malware:-
Computer Marg usually spread in one of the following ways:-
Removable media:-
Removable media, such a CD’s DVDs and pen drives are one of the most common source of malware. Cds and DVDs containing printed and illegal software usually install malware

Software downloaded from the internet:-
There are a long number of side that promise to delivered free copies of useful and popular software. But, most of software are malware or contain malware in them.

Email attachments:-
Emails are another common source for spreading malviyar. Attachment in email or link to website often contain malware.

Tools to counter malware:-
To prevent malware from infecting your computer, you can use certain software and employe prevent measures. The two most common tools of counter malware:-
Antivirus software.............. Done
Firewall:-
If all is a software device or computer, which is used to prevent unauthorised access to private network, by user connected to the internet. It examines each coming as well as outgoing message and blocks.
Most operating system including window provided and inbuilt firewall that can be activated to control network transmission.
.

Comments