UPSC Exam  >  UPSC Questions  >  Read the information given below carefully an... Start Learning for Free
Read the information given below carefully and answer the following question.
The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.
Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.
Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.
Q. According to this passage, how the virus gets into the computers?
  • a)
    By saving data and clicking on the desktop
  • b)
    By opening a document file in the search history
  • c)
    By texting online and receiving files on social media platforms
  • d)
    Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.
Correct answer is option 'D'. Can you explain this answer?
Verified Answer
Read the information given below carefully and answer the following qu...
Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.
View all questions of this test
Most Upvoted Answer
Read the information given below carefully and answer the following qu...
Correct Answer is D...
For example...We cannot clap with single hand...
In the same way... It works...
Your system can be easily hacked if you are not aware of it and because of your silly mistakes...
For Example---->If you install any unsecured app then it asks you for permission...
If you give them permission to get contact and location...then They can easily track your data...

In the same way...If you go to the links in email or by going to attachments which carried viruses...You gonna hacked...
Free Test
Community Answer
Read the information given below carefully and answer the following qu...
Understanding How Viruses Infect Computers
The passage outlines the various methods through which viruses can infiltrate computers, emphasizing the significance of cyber security in protecting sensitive information. Among the options provided, the correct answer is option 'D', which states:
- Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.
Detailed Explanation:
The passage highlights three primary methods through which viruses can enter a computer system:
  • Email Attachments: Many viruses are disguised as attachments in emails. When users open these attachments without verifying their safety, they inadvertently allow malicious software to execute on their devices.
  • Malicious Links: Clicking on links that appear to lead to legitimate sites can redirect users to harmful websites. These sites may contain malware or other harmful programs designed to infect the user's system.
  • Unintentional Downloads: Sometimes, users may unknowingly download harmful programs while browsing the internet or while trying to install software. These downloads can contain viruses that compromise the security of the computer.


Conclusion:
By recognizing these methods of infection, individuals can take proactive measures to safeguard their computers. This includes being cautious when opening emails, verifying links before clicking, and only downloading software from trusted sources. The importance of cyber security cannot be overstated, as it plays a critical role in protecting personal and sensitive data from unauthorized access and cyber threats.
Explore Courses for UPSC exam

Similar UPSC Doubts

Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to the author, what is the main reasons behind cyber threats?

Top Courses for UPSC

Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to this passage, how the virus gets into the computers?a)By saving data and clicking on the desktopb)By opening a document file in the search historyc)By texting online and receiving files on social media platformsd)Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.Correct answer is option 'D'. Can you explain this answer?
Question Description
Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to this passage, how the virus gets into the computers?a)By saving data and clicking on the desktopb)By opening a document file in the search historyc)By texting online and receiving files on social media platformsd)Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.Correct answer is option 'D'. Can you explain this answer? for UPSC 2024 is part of UPSC preparation. The Question and answers have been prepared according to the UPSC exam syllabus. Information about Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to this passage, how the virus gets into the computers?a)By saving data and clicking on the desktopb)By opening a document file in the search historyc)By texting online and receiving files on social media platformsd)Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.Correct answer is option 'D'. Can you explain this answer? covers all topics & solutions for UPSC 2024 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to this passage, how the virus gets into the computers?a)By saving data and clicking on the desktopb)By opening a document file in the search historyc)By texting online and receiving files on social media platformsd)Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.Correct answer is option 'D'. Can you explain this answer?.
Solutions for Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to this passage, how the virus gets into the computers?a)By saving data and clicking on the desktopb)By opening a document file in the search historyc)By texting online and receiving files on social media platformsd)Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.Correct answer is option 'D'. Can you explain this answer? in English & in Hindi are available as part of our courses for UPSC. Download more important topics, notes, lectures and mock test series for UPSC Exam by signing up for free.
Here you can find the meaning of Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to this passage, how the virus gets into the computers?a)By saving data and clicking on the desktopb)By opening a document file in the search historyc)By texting online and receiving files on social media platformsd)Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.Correct answer is option 'D'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to this passage, how the virus gets into the computers?a)By saving data and clicking on the desktopb)By opening a document file in the search historyc)By texting online and receiving files on social media platformsd)Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.Correct answer is option 'D'. Can you explain this answer?, a detailed solution for Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to this passage, how the virus gets into the computers?a)By saving data and clicking on the desktopb)By opening a document file in the search historyc)By texting online and receiving files on social media platformsd)Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.Correct answer is option 'D'. Can you explain this answer? has been provided alongside types of Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to this passage, how the virus gets into the computers?a)By saving data and clicking on the desktopb)By opening a document file in the search historyc)By texting online and receiving files on social media platformsd)Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.Correct answer is option 'D'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice Read the information given below carefully and answer the following question.The internet has become the integral part of today’s generation. Internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetarytransactions, to destroy or to change data and the like. System attackers usually use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen. As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cybercrimes. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money.Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately. In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks.Social networking sites have become the mostpopular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q.According to this passage, how the virus gets into the computers?a)By saving data and clicking on the desktopb)By opening a document file in the search historyc)By texting online and receiving files on social media platformsd)Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program.Correct answer is option 'D'. Can you explain this answer? tests, examples and also practice UPSC tests.
Explore Courses for UPSC exam

Top Courses for UPSC

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev