Class 10 Exam  >  Class 10 Notes  >  Information & Computer Technology (Class 10) - Notes & Video  >  NCERT Textbook -Network Security, Information & Computer Technology Class 10

NCERT Textbook -Network Security, Information & Computer Technology Class 10 | Information & Computer Technology (Class 10) - Notes & Video PDF Download

Download, print and study this document offline
Please wait while the PDF view is loading
 Page 1


109
Network Security
Chapter 6
Network Security
Learning Objectives 
By the end of this chapter, learner will be able to:
•	 Name	 the	 diff er en t	 kinds	 of	 softw ar e	 licensing	 a v ailable
•	 Diff er en tia t e	 be tw een	 fr ee w ar e	 and	 open	 sour ce	 softw ar e
•	 St a t e	 ho w	 the	 use	 of	 shar e w ar e	 softw ar e	 is	 diff er en t	 fr om	 tha t	 of	 fr ee w ar e	 softw ar e
•	 Diff er en tia t e	 be tw een	 c op yrigh t	 and	 licensing
•	 De fine	 cyber e thics,	 cyber sa f e ty	 and	 cyber security
•	 St a t e	 the	 purpose	 of	 c ookies
•	 T abula t e	 the	 diff er en t	 phases	 of	 cyber	 e thics	 e v olution
•	 Lis t	 pr ec autions	 tha t	 c an	 be	 t ak en	 t o	 ensur e	 cyber	 sa f e ty
•	 Iden tif y	 the	 diff er en t	 kinds	 of	 thr ea ts	 t o	 cyber	 security
•	 St a t e	 e thic al	 beha viour	 t o	 be	 f ollo w ed	 as	 a	 cyber	 citiz en
•	 Iden tif y	 the	 diff er en t	 c a t eg ories	 of	 cyber	 crime
IntroduCtIon
The world created by technology is one of machines - computers, computer systems and 
computer networks. Add to that the human component and one has a world of diverse 
cultures and social practices that is often referred to as cyberspace. 
Cyberspace is a man made world that is constantly evolving. It differs from the static 
physical world as it has no boundaries, no geographical mass, and of course, no gravity. It is 
limitless, constantly changing its shape, attributes and characteristics. It exists in a form of 
bits and bytes; it is an information driven world. Government(s), hardware manufacturers 
and software application providers act as gatekeepers of cyberspace. 
This medium, which is dynamic, infinite and intangible has to be regulated to prevent 
it from exploding. Regulating cyberspace means regulating both man and the machine. 
There is ethics, safety and security involved. 
Ethics represents personal choice. It’s the set of acceptable behaviours in a given culture. 
It’s not just a list of rules but the code of conduct by which a society chooses to live. Safety 
refers to safe practices and security is the additional tasks carried out to ensure safety. 
Page 2


109
Network Security
Chapter 6
Network Security
Learning Objectives 
By the end of this chapter, learner will be able to:
•	 Name	 the	 diff er en t	 kinds	 of	 softw ar e	 licensing	 a v ailable
•	 Diff er en tia t e	 be tw een	 fr ee w ar e	 and	 open	 sour ce	 softw ar e
•	 St a t e	 ho w	 the	 use	 of	 shar e w ar e	 softw ar e	 is	 diff er en t	 fr om	 tha t	 of	 fr ee w ar e	 softw ar e
•	 Diff er en tia t e	 be tw een	 c op yrigh t	 and	 licensing
•	 De fine	 cyber e thics,	 cyber sa f e ty	 and	 cyber security
•	 St a t e	 the	 purpose	 of	 c ookies
•	 T abula t e	 the	 diff er en t	 phases	 of	 cyber	 e thics	 e v olution
•	 Lis t	 pr ec autions	 tha t	 c an	 be	 t ak en	 t o	 ensur e	 cyber	 sa f e ty
•	 Iden tif y	 the	 diff er en t	 kinds	 of	 thr ea ts	 t o	 cyber	 security
•	 St a t e	 e thic al	 beha viour	 t o	 be	 f ollo w ed	 as	 a	 cyber	 citiz en
•	 Iden tif y	 the	 diff er en t	 c a t eg ories	 of	 cyber	 crime
IntroduCtIon
The world created by technology is one of machines - computers, computer systems and 
computer networks. Add to that the human component and one has a world of diverse 
cultures and social practices that is often referred to as cyberspace. 
Cyberspace is a man made world that is constantly evolving. It differs from the static 
physical world as it has no boundaries, no geographical mass, and of course, no gravity. It is 
limitless, constantly changing its shape, attributes and characteristics. It exists in a form of 
bits and bytes; it is an information driven world. Government(s), hardware manufacturers 
and software application providers act as gatekeepers of cyberspace. 
This medium, which is dynamic, infinite and intangible has to be regulated to prevent 
it from exploding. Regulating cyberspace means regulating both man and the machine. 
There is ethics, safety and security involved. 
Ethics represents personal choice. It’s the set of acceptable behaviours in a given culture. 
It’s not just a list of rules but the code of conduct by which a society chooses to live. Safety 
refers to safe practices and security is the additional tasks carried out to ensure safety. 
110
Information and Computer Technology
The first is a moral choice, the second a behavioural code and the third involves active 
participation.
in cyberspace we have 
 ? Cyberethics exploring appropriate and ethical behaviours related to online 
environments and digital media. It includes plagiarism, bullying, and hacking to 
name a few.
 ? Cybersafety defining how one operates on-line. It includes rules guiding how to keep 
personal information safe and limited
 ? Cybersecurity involving tasks undertaken on the computer to keep it secure from 
people who wish to harm it or use data stored on it unlawfully. This includes installing 
virus software and firewalls.
Before we study these in greater detail there are certain fundamental terminology and 
concepts that must be understood.
1. BaSIC terMInoloGy 
1.1 Copyright and license
Copyright is about protecting original expression. Copyright 
arises as soon as a ‘work’ is created. A software copyright 
protects all source code, written text materials, graphic 
images/ designs, drawings, any linked sound, video files 
or films.
A copyright owner has five exclusive rights: 
 ? Fix or store the information in a tangible form.
 ? Reproduce the copyrighted material. 
 ? Sell, rent, lease, or otherwise distribute copies of the copyright work to the public.
 ? Publicly perform and display the copyrighted material.
 ? Prepare derivative works based on the copyrighted material.
l icense is the permission granted by the holder of a copyright to another to use an 
original work. It states under what circumstances and to what extent the original work 
can be used, changed or distributed. It may include a period of time, a geographical area, 
renewal provisions, and other limitations. It does not pass on the copyright. 
Page 3


109
Network Security
Chapter 6
Network Security
Learning Objectives 
By the end of this chapter, learner will be able to:
•	 Name	 the	 diff er en t	 kinds	 of	 softw ar e	 licensing	 a v ailable
•	 Diff er en tia t e	 be tw een	 fr ee w ar e	 and	 open	 sour ce	 softw ar e
•	 St a t e	 ho w	 the	 use	 of	 shar e w ar e	 softw ar e	 is	 diff er en t	 fr om	 tha t	 of	 fr ee w ar e	 softw ar e
•	 Diff er en tia t e	 be tw een	 c op yrigh t	 and	 licensing
•	 De fine	 cyber e thics,	 cyber sa f e ty	 and	 cyber security
•	 St a t e	 the	 purpose	 of	 c ookies
•	 T abula t e	 the	 diff er en t	 phases	 of	 cyber	 e thics	 e v olution
•	 Lis t	 pr ec autions	 tha t	 c an	 be	 t ak en	 t o	 ensur e	 cyber	 sa f e ty
•	 Iden tif y	 the	 diff er en t	 kinds	 of	 thr ea ts	 t o	 cyber	 security
•	 St a t e	 e thic al	 beha viour	 t o	 be	 f ollo w ed	 as	 a	 cyber	 citiz en
•	 Iden tif y	 the	 diff er en t	 c a t eg ories	 of	 cyber	 crime
IntroduCtIon
The world created by technology is one of machines - computers, computer systems and 
computer networks. Add to that the human component and one has a world of diverse 
cultures and social practices that is often referred to as cyberspace. 
Cyberspace is a man made world that is constantly evolving. It differs from the static 
physical world as it has no boundaries, no geographical mass, and of course, no gravity. It is 
limitless, constantly changing its shape, attributes and characteristics. It exists in a form of 
bits and bytes; it is an information driven world. Government(s), hardware manufacturers 
and software application providers act as gatekeepers of cyberspace. 
This medium, which is dynamic, infinite and intangible has to be regulated to prevent 
it from exploding. Regulating cyberspace means regulating both man and the machine. 
There is ethics, safety and security involved. 
Ethics represents personal choice. It’s the set of acceptable behaviours in a given culture. 
It’s not just a list of rules but the code of conduct by which a society chooses to live. Safety 
refers to safe practices and security is the additional tasks carried out to ensure safety. 
110
Information and Computer Technology
The first is a moral choice, the second a behavioural code and the third involves active 
participation.
in cyberspace we have 
 ? Cyberethics exploring appropriate and ethical behaviours related to online 
environments and digital media. It includes plagiarism, bullying, and hacking to 
name a few.
 ? Cybersafety defining how one operates on-line. It includes rules guiding how to keep 
personal information safe and limited
 ? Cybersecurity involving tasks undertaken on the computer to keep it secure from 
people who wish to harm it or use data stored on it unlawfully. This includes installing 
virus software and firewalls.
Before we study these in greater detail there are certain fundamental terminology and 
concepts that must be understood.
1. BaSIC terMInoloGy 
1.1 Copyright and license
Copyright is about protecting original expression. Copyright 
arises as soon as a ‘work’ is created. A software copyright 
protects all source code, written text materials, graphic 
images/ designs, drawings, any linked sound, video files 
or films.
A copyright owner has five exclusive rights: 
 ? Fix or store the information in a tangible form.
 ? Reproduce the copyrighted material. 
 ? Sell, rent, lease, or otherwise distribute copies of the copyright work to the public.
 ? Publicly perform and display the copyrighted material.
 ? Prepare derivative works based on the copyrighted material.
l icense is the permission granted by the holder of a copyright to another to use an 
original work. It states under what circumstances and to what extent the original work 
can be used, changed or distributed. It may include a period of time, a geographical area, 
renewal provisions, and other limitations. It does not pass on the copyright. 
111
Network Security
1.2 Software licensing
A software license is a legal agreement about an 
application. It is between the software producer and 
the end-user and is an important part of the legally 
binding contract between them (or rights owner) 
and the end-user. This is to ensure recognition of the 
rights of the owner on his creation. It specifies how 
the application may be used and defines the rights of 
both the producer and the user. 
1.3 open Source, freeware and Shareware 
o pen-source software (OSS) is computer software with its source code made available. It is 
very often developed in a public, collaborative manner. A license for open sources software 
allows the end user to study, change and distribute the software for any purpose. 
Some copyrighted software is made available for use, free of charge for an unlimited time. 
These are called freeware. The copyright still remains with the producer / owner for any 
future development. 
s hareware are copyrighted software that can be shared for a limited on a trial basis with 
the understanding that if the user decides to use it, he will pay for it. 
1.4 t ypes of software licenses
 ? Proprietary license where the copyright stays with the producer and the user is 
granted the right to use the software
 ? gnu g eneral Public l icenses, which are agreements under which “open source” 
software is usually licensed. It allows end users to change the source code, but the 
changed code too, must also be made available under a GNU GPL license.
 ? e nd u ser l icense a greement (EULA) indicates the terms under which the end-
user may use the software.
 ? Workstation licenses are licenses that permit the installation of an application on 
a single computer. Before installing it on a different machine the software must be 
removed from the first machine
 ? Concurrent use licenses permit the installation of the software onto multiple 
machines as long as the number of computers using the software at the same time 
does not exceed the number of licenses purchased.
Page 4


109
Network Security
Chapter 6
Network Security
Learning Objectives 
By the end of this chapter, learner will be able to:
•	 Name	 the	 diff er en t	 kinds	 of	 softw ar e	 licensing	 a v ailable
•	 Diff er en tia t e	 be tw een	 fr ee w ar e	 and	 open	 sour ce	 softw ar e
•	 St a t e	 ho w	 the	 use	 of	 shar e w ar e	 softw ar e	 is	 diff er en t	 fr om	 tha t	 of	 fr ee w ar e	 softw ar e
•	 Diff er en tia t e	 be tw een	 c op yrigh t	 and	 licensing
•	 De fine	 cyber e thics,	 cyber sa f e ty	 and	 cyber security
•	 St a t e	 the	 purpose	 of	 c ookies
•	 T abula t e	 the	 diff er en t	 phases	 of	 cyber	 e thics	 e v olution
•	 Lis t	 pr ec autions	 tha t	 c an	 be	 t ak en	 t o	 ensur e	 cyber	 sa f e ty
•	 Iden tif y	 the	 diff er en t	 kinds	 of	 thr ea ts	 t o	 cyber	 security
•	 St a t e	 e thic al	 beha viour	 t o	 be	 f ollo w ed	 as	 a	 cyber	 citiz en
•	 Iden tif y	 the	 diff er en t	 c a t eg ories	 of	 cyber	 crime
IntroduCtIon
The world created by technology is one of machines - computers, computer systems and 
computer networks. Add to that the human component and one has a world of diverse 
cultures and social practices that is often referred to as cyberspace. 
Cyberspace is a man made world that is constantly evolving. It differs from the static 
physical world as it has no boundaries, no geographical mass, and of course, no gravity. It is 
limitless, constantly changing its shape, attributes and characteristics. It exists in a form of 
bits and bytes; it is an information driven world. Government(s), hardware manufacturers 
and software application providers act as gatekeepers of cyberspace. 
This medium, which is dynamic, infinite and intangible has to be regulated to prevent 
it from exploding. Regulating cyberspace means regulating both man and the machine. 
There is ethics, safety and security involved. 
Ethics represents personal choice. It’s the set of acceptable behaviours in a given culture. 
It’s not just a list of rules but the code of conduct by which a society chooses to live. Safety 
refers to safe practices and security is the additional tasks carried out to ensure safety. 
110
Information and Computer Technology
The first is a moral choice, the second a behavioural code and the third involves active 
participation.
in cyberspace we have 
 ? Cyberethics exploring appropriate and ethical behaviours related to online 
environments and digital media. It includes plagiarism, bullying, and hacking to 
name a few.
 ? Cybersafety defining how one operates on-line. It includes rules guiding how to keep 
personal information safe and limited
 ? Cybersecurity involving tasks undertaken on the computer to keep it secure from 
people who wish to harm it or use data stored on it unlawfully. This includes installing 
virus software and firewalls.
Before we study these in greater detail there are certain fundamental terminology and 
concepts that must be understood.
1. BaSIC terMInoloGy 
1.1 Copyright and license
Copyright is about protecting original expression. Copyright 
arises as soon as a ‘work’ is created. A software copyright 
protects all source code, written text materials, graphic 
images/ designs, drawings, any linked sound, video files 
or films.
A copyright owner has five exclusive rights: 
 ? Fix or store the information in a tangible form.
 ? Reproduce the copyrighted material. 
 ? Sell, rent, lease, or otherwise distribute copies of the copyright work to the public.
 ? Publicly perform and display the copyrighted material.
 ? Prepare derivative works based on the copyrighted material.
l icense is the permission granted by the holder of a copyright to another to use an 
original work. It states under what circumstances and to what extent the original work 
can be used, changed or distributed. It may include a period of time, a geographical area, 
renewal provisions, and other limitations. It does not pass on the copyright. 
111
Network Security
1.2 Software licensing
A software license is a legal agreement about an 
application. It is between the software producer and 
the end-user and is an important part of the legally 
binding contract between them (or rights owner) 
and the end-user. This is to ensure recognition of the 
rights of the owner on his creation. It specifies how 
the application may be used and defines the rights of 
both the producer and the user. 
1.3 open Source, freeware and Shareware 
o pen-source software (OSS) is computer software with its source code made available. It is 
very often developed in a public, collaborative manner. A license for open sources software 
allows the end user to study, change and distribute the software for any purpose. 
Some copyrighted software is made available for use, free of charge for an unlimited time. 
These are called freeware. The copyright still remains with the producer / owner for any 
future development. 
s hareware are copyrighted software that can be shared for a limited on a trial basis with 
the understanding that if the user decides to use it, he will pay for it. 
1.4 t ypes of software licenses
 ? Proprietary license where the copyright stays with the producer and the user is 
granted the right to use the software
 ? gnu g eneral Public l icenses, which are agreements under which “open source” 
software is usually licensed. It allows end users to change the source code, but the 
changed code too, must also be made available under a GNU GPL license.
 ? e nd u ser l icense a greement (EULA) indicates the terms under which the end-
user may use the software.
 ? Workstation licenses are licenses that permit the installation of an application on 
a single computer. Before installing it on a different machine the software must be 
removed from the first machine
 ? Concurrent use licenses permit the installation of the software onto multiple 
machines as long as the number of computers using the software at the same time 
does not exceed the number of licenses purchased.
112
Information and Computer Technology
 ? site licenses permit the use of software on any computer at a specified site. Unlimited 
site licenses allow the installation of the software on any number of computers as 
long as those computers are located at the specified site.
 ? Perpetual licenses come without an expiry date and allow the software to be used 
indefinitely
 ? n on-perpetual licenses “lease” the software for use for a specified period of time, 
usually annually or sometimes bi-annually. Users are required to remove the 
software from their computer if they cease paying the license fee.
 ? l icense with Maintenance offer “maintenance” or “software assurance” along with 
the original license fee.
1.5 Cyber law
Cyber law is a new branch of law and is growing very fast. It establishes norms of accepted 
human behaviour in cyberspace. There are three basic building blocks of cyber law.
 ? Netizens who are the inhabitants of the internet and 
use it as an extension of their physical world
 ? Cyberspace which is a ‘man made machine world’ 
reshaping itself periodically. 
 ? Technology
Cyber law includes all the cases, written rules and government laws that affect persons 
and institutions who 
 ? control the entry to cyberspace, 
 ? provide access to cyberspace, 
 ? create the hardware and software which unable people to
  ? access cyberspace or 
  ? Use devices to go ‘online’ and enter cyberspace.
Laws governing ecommerce, online contracts, copyright, trademark, business software 
patenting, eTaxation, eGovernance and cyber crimes all fall within the meaning and scope 
of cyber law.
1.6 Cookies 
Cookies allow a visited website to store its own information about a user on the user’s 
computer. 
Page 5


109
Network Security
Chapter 6
Network Security
Learning Objectives 
By the end of this chapter, learner will be able to:
•	 Name	 the	 diff er en t	 kinds	 of	 softw ar e	 licensing	 a v ailable
•	 Diff er en tia t e	 be tw een	 fr ee w ar e	 and	 open	 sour ce	 softw ar e
•	 St a t e	 ho w	 the	 use	 of	 shar e w ar e	 softw ar e	 is	 diff er en t	 fr om	 tha t	 of	 fr ee w ar e	 softw ar e
•	 Diff er en tia t e	 be tw een	 c op yrigh t	 and	 licensing
•	 De fine	 cyber e thics,	 cyber sa f e ty	 and	 cyber security
•	 St a t e	 the	 purpose	 of	 c ookies
•	 T abula t e	 the	 diff er en t	 phases	 of	 cyber	 e thics	 e v olution
•	 Lis t	 pr ec autions	 tha t	 c an	 be	 t ak en	 t o	 ensur e	 cyber	 sa f e ty
•	 Iden tif y	 the	 diff er en t	 kinds	 of	 thr ea ts	 t o	 cyber	 security
•	 St a t e	 e thic al	 beha viour	 t o	 be	 f ollo w ed	 as	 a	 cyber	 citiz en
•	 Iden tif y	 the	 diff er en t	 c a t eg ories	 of	 cyber	 crime
IntroduCtIon
The world created by technology is one of machines - computers, computer systems and 
computer networks. Add to that the human component and one has a world of diverse 
cultures and social practices that is often referred to as cyberspace. 
Cyberspace is a man made world that is constantly evolving. It differs from the static 
physical world as it has no boundaries, no geographical mass, and of course, no gravity. It is 
limitless, constantly changing its shape, attributes and characteristics. It exists in a form of 
bits and bytes; it is an information driven world. Government(s), hardware manufacturers 
and software application providers act as gatekeepers of cyberspace. 
This medium, which is dynamic, infinite and intangible has to be regulated to prevent 
it from exploding. Regulating cyberspace means regulating both man and the machine. 
There is ethics, safety and security involved. 
Ethics represents personal choice. It’s the set of acceptable behaviours in a given culture. 
It’s not just a list of rules but the code of conduct by which a society chooses to live. Safety 
refers to safe practices and security is the additional tasks carried out to ensure safety. 
110
Information and Computer Technology
The first is a moral choice, the second a behavioural code and the third involves active 
participation.
in cyberspace we have 
 ? Cyberethics exploring appropriate and ethical behaviours related to online 
environments and digital media. It includes plagiarism, bullying, and hacking to 
name a few.
 ? Cybersafety defining how one operates on-line. It includes rules guiding how to keep 
personal information safe and limited
 ? Cybersecurity involving tasks undertaken on the computer to keep it secure from 
people who wish to harm it or use data stored on it unlawfully. This includes installing 
virus software and firewalls.
Before we study these in greater detail there are certain fundamental terminology and 
concepts that must be understood.
1. BaSIC terMInoloGy 
1.1 Copyright and license
Copyright is about protecting original expression. Copyright 
arises as soon as a ‘work’ is created. A software copyright 
protects all source code, written text materials, graphic 
images/ designs, drawings, any linked sound, video files 
or films.
A copyright owner has five exclusive rights: 
 ? Fix or store the information in a tangible form.
 ? Reproduce the copyrighted material. 
 ? Sell, rent, lease, or otherwise distribute copies of the copyright work to the public.
 ? Publicly perform and display the copyrighted material.
 ? Prepare derivative works based on the copyrighted material.
l icense is the permission granted by the holder of a copyright to another to use an 
original work. It states under what circumstances and to what extent the original work 
can be used, changed or distributed. It may include a period of time, a geographical area, 
renewal provisions, and other limitations. It does not pass on the copyright. 
111
Network Security
1.2 Software licensing
A software license is a legal agreement about an 
application. It is between the software producer and 
the end-user and is an important part of the legally 
binding contract between them (or rights owner) 
and the end-user. This is to ensure recognition of the 
rights of the owner on his creation. It specifies how 
the application may be used and defines the rights of 
both the producer and the user. 
1.3 open Source, freeware and Shareware 
o pen-source software (OSS) is computer software with its source code made available. It is 
very often developed in a public, collaborative manner. A license for open sources software 
allows the end user to study, change and distribute the software for any purpose. 
Some copyrighted software is made available for use, free of charge for an unlimited time. 
These are called freeware. The copyright still remains with the producer / owner for any 
future development. 
s hareware are copyrighted software that can be shared for a limited on a trial basis with 
the understanding that if the user decides to use it, he will pay for it. 
1.4 t ypes of software licenses
 ? Proprietary license where the copyright stays with the producer and the user is 
granted the right to use the software
 ? gnu g eneral Public l icenses, which are agreements under which “open source” 
software is usually licensed. It allows end users to change the source code, but the 
changed code too, must also be made available under a GNU GPL license.
 ? e nd u ser l icense a greement (EULA) indicates the terms under which the end-
user may use the software.
 ? Workstation licenses are licenses that permit the installation of an application on 
a single computer. Before installing it on a different machine the software must be 
removed from the first machine
 ? Concurrent use licenses permit the installation of the software onto multiple 
machines as long as the number of computers using the software at the same time 
does not exceed the number of licenses purchased.
112
Information and Computer Technology
 ? site licenses permit the use of software on any computer at a specified site. Unlimited 
site licenses allow the installation of the software on any number of computers as 
long as those computers are located at the specified site.
 ? Perpetual licenses come without an expiry date and allow the software to be used 
indefinitely
 ? n on-perpetual licenses “lease” the software for use for a specified period of time, 
usually annually or sometimes bi-annually. Users are required to remove the 
software from their computer if they cease paying the license fee.
 ? l icense with Maintenance offer “maintenance” or “software assurance” along with 
the original license fee.
1.5 Cyber law
Cyber law is a new branch of law and is growing very fast. It establishes norms of accepted 
human behaviour in cyberspace. There are three basic building blocks of cyber law.
 ? Netizens who are the inhabitants of the internet and 
use it as an extension of their physical world
 ? Cyberspace which is a ‘man made machine world’ 
reshaping itself periodically. 
 ? Technology
Cyber law includes all the cases, written rules and government laws that affect persons 
and institutions who 
 ? control the entry to cyberspace, 
 ? provide access to cyberspace, 
 ? create the hardware and software which unable people to
  ? access cyberspace or 
  ? Use devices to go ‘online’ and enter cyberspace.
Laws governing ecommerce, online contracts, copyright, trademark, business software 
patenting, eTaxation, eGovernance and cyber crimes all fall within the meaning and scope 
of cyber law.
1.6 Cookies 
Cookies allow a visited website to store its own information about a user on the user’s 
computer. 
113
Network Security
When a user uses a computer to visit a website, the website stores some basic information 
about the visit on the hard disk of the computer. It records the user’s preferences while 
using the site. This stored information is called a ‘cookie’ .
1.7 Hackers and Crackers
Hackers are people with computer programming skills who use their knowledge to gain 
unauthorized access to data in a system or computer. 
Crackers modify or disable features of a software 
application. They usually mean to harm the software, 
the hardware using this software or the end user of the 
software. 
Both hackers and crackers can also work on the ethical side when they use their skills to 
prevent cyber crime and help the law keepers.
1.8 firewall 
A firewall is a program or hardware device that 
filters the information coming through an internet 
connection to a network or computer system. If 
incoming information does not pass the rules 
stored in the firewall, it is not allowed through.
1.9 Cyber ethics
The explosion of social networking and the common practice of sharing and posting of 
information online have changed the way people communicate. Users must understand 
their responsibilities for conducting themselves online. An important component of that 
is Cyber Ethics. Cyber Ethics refers to the code of responsible behaviour on the Internet. 
Basic Cyber ethics must be followed to be good cyber citizens. 
Cyberethics began in some form in the 1940s. It examines the impact of not only the 
internet or computing machines but also private computer networks and interconnected 
communication technologies. 
Read More
6 videos|20 docs|6 tests

Top Courses for Class 10

FAQs on NCERT Textbook -Network Security, Information & Computer Technology Class 10 - Information & Computer Technology (Class 10) - Notes & Video

1. What is network security?
Ans. Network security refers to the practice of protecting computer networks and data from unauthorized access, misuse, or any other malicious activities. It involves implementing various measures and protocols to ensure the confidentiality, integrity, and availability of network resources.
2. What are the common threats to network security?
Ans. There are several common threats to network security, including: 1. Malware: Malicious software such as viruses, worms, and Trojans that can infect network devices and compromise data. 2. Phishing: A technique used by attackers to trick users into revealing sensitive information through fake websites or emails. 3. Denial of Service (DoS) attacks: Overloading a network or system with excessive traffic to make it unavailable to legitimate users. 4. Password attacks: Attempting to gain unauthorized access to a network by guessing or cracking passwords. 5. Insider threats: Malicious activities performed by individuals within an organization who have authorized access to the network.
3. How can network security be improved?
Ans. Network security can be improved by implementing the following measures: 1. Firewalls: Install and configure firewalls to monitor and filter network traffic, blocking unauthorized access. 2. Encryption: Use encryption techniques to secure sensitive data during transmission and storage. 3. Strong passwords: Enforce the use of complex passwords and regular password updates to prevent unauthorized access. 4. Regular updates: Keep network devices and software up to date with the latest security patches to address known vulnerabilities. 5. Employee training: Educate employees about the importance of network security, safe browsing practices, and how to identify and report potential threats.
4. What is the role of antivirus software in network security?
Ans. Antivirus software plays a crucial role in network security by detecting, preventing, and removing malware from network devices. It scans files and programs for known patterns or signatures of malicious code and alerts the user if any threat is found. Antivirus software also provides real-time protection by monitoring incoming and outgoing network traffic for suspicious activities.
5. What is the significance of backups in network security?
Ans. Backups are essential for network security as they provide a means to recover data in the event of a security breach, accidental deletion, hardware failure, or natural disasters. Regularly backing up critical data ensures that it can be restored quickly and effectively in case of any unforeseen circumstances. It acts as an additional layer of protection against data loss and minimizes the impact of security incidents.
6 videos|20 docs|6 tests
Download as PDF
Explore Courses for Class 10 exam

Top Courses for Class 10

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

Summary

,

Exam

,

practice quizzes

,

Important questions

,

shortcuts and tricks

,

Previous Year Questions with Solutions

,

Information & Computer Technology Class 10 | Information & Computer Technology (Class 10) - Notes & Video

,

study material

,

ppt

,

NCERT Textbook -Network Security

,

past year papers

,

Information & Computer Technology Class 10 | Information & Computer Technology (Class 10) - Notes & Video

,

mock tests for examination

,

Viva Questions

,

NCERT Textbook -Network Security

,

MCQs

,

Objective type Questions

,

pdf

,

NCERT Textbook -Network Security

,

Sample Paper

,

video lectures

,

Extra Questions

,

Free

,

Information & Computer Technology Class 10 | Information & Computer Technology (Class 10) - Notes & Video

,

Semester Notes

;