UPSC  >  Famous Books for UPSC Exam (Summary & Tests)  >  Internet Security Threats - Computer Security & Virus, Computer Awareness

Internet Security Threats - Computer Security & Virus, Computer Awareness Notes | Study Famous Books for UPSC Exam (Summary & Tests) - UPSC

Document Description: Internet Security Threats - Computer Security & Virus, Computer Awareness for UPSC 2022 is part of Computer Security & Virus for Famous Books for UPSC Exam (Summary & Tests) preparation. The notes and questions for Internet Security Threats - Computer Security & Virus, Computer Awareness have been prepared according to the UPSC exam syllabus. Information about Internet Security Threats - Computer Security & Virus, Computer Awareness covers topics like and Internet Security Threats - Computer Security & Virus, Computer Awareness Example, for UPSC 2022 Exam. Find important definitions, questions, notes, meanings, examples, exercises and tests below for Internet Security Threats - Computer Security & Virus, Computer Awareness.

Introduction of Internet Security Threats - Computer Security & Virus, Computer Awareness in English is available as part of our Famous Books for UPSC Exam (Summary & Tests) for UPSC & Internet Security Threats - Computer Security & Virus, Computer Awareness in Hindi for Famous Books for UPSC Exam (Summary & Tests) course. Download more important topics related with Computer Security & Virus, notes, lectures and mock test series for UPSC Exam by signing up for free. UPSC: Internet Security Threats - Computer Security & Virus, Computer Awareness Notes | Study Famous Books for UPSC Exam (Summary & Tests) - UPSC
1 Crore+ students have signed up on EduRev. Have you?

Internet Security Threats

 

Virus : It is a program written to attack the normal operation of a Computer, normally which affects the programs associated with the Operating System or Device Driver. Usually it is transmitted through the executable files. Viruses can run only if the affected program is running. These are the most well-known internet security threat.

Worms: Similar to viruses but much more dangerous. They spread rapidly by accessing your email address book and automatically forwarding themselves to every address it has.

Trojan: It is a program written to make your Computer unprotected so that hackers can reach the data in your computer. Trojans are self-sufficient programs. These programs give unrestricted access of computers to attackers.

Spyware: It is a software that secretly collects user information while on the internet. Spyware can capture information like web browsing habits, email messages, usernames and passwords, and credit card information.

Adware: This program launches the advertisements in the form of pop ups. Usually the add words are based on the internet behavior of the user.

Spam: These are unwanted emails. In other words we can call them as unsolicited promotional mail.

Phishing: This is acquiring the personal and sensitive information of a person through official looking emails. Users of online banking and e-commerce websites are more prone to this attack.

Pharming: More advance method of Phishing in which the attackers create duplicate or similar looking website of other companies, to attract the customers and steal the data.

Cookies: These are program or information secretly stored in a computer especially the internet browser, which allows other users to monitor the internet activities of a person. These programs usually monitor the browsing nature of person so that the companies can create better marketing strategies.

Mail Bomb: An excessively large email (typically many thousands of messages) or one large message sent to a user’s email account. This is done to crash the system and prevent genuine messages from being received.

Scareware: A common trick cyber criminals use to make users think that their computer has become infected with malware to get them to purchase a fake application. Often the fake application that the user is tricked into purchasing is actually a malicious program which can disable real antivirus software and wreak havoc on a user’s machine.

Sniffers: A software program used to monitor the traffic in a network. The hackers may use the sniffed data to access important confidential data.

Rootkit: A program designed to hide objects such as processes, files or Windows registry entries (often including its own). This type of software is not malicious in itself, but is used by hackers to cover their tracks in previously compromised systems. There are types of malware that use rootkits to hide their presence on the system.

The document Internet Security Threats - Computer Security & Virus, Computer Awareness Notes | Study Famous Books for UPSC Exam (Summary & Tests) - UPSC is a part of the UPSC Course Famous Books for UPSC Exam (Summary & Tests).
All you need of UPSC at this link: UPSC
Download as PDF

How to Prepare for UPSC

Read our guide to prepare for UPSC which is created by Toppers & the best Teachers

Download free EduRev App

Track your progress, build streaks, highlight & save important lessons and more!

Related Searches

Sample Paper

,

shortcuts and tricks

,

pdf

,

Viva Questions

,

Extra Questions

,

study material

,

Semester Notes

,

Internet Security Threats - Computer Security & Virus

,

Internet Security Threats - Computer Security & Virus

,

Important questions

,

Computer Awareness Notes | Study Famous Books for UPSC Exam (Summary & Tests) - UPSC

,

video lectures

,

Previous Year Questions with Solutions

,

Exam

,

MCQs

,

Summary

,

past year papers

,

Computer Awareness Notes | Study Famous Books for UPSC Exam (Summary & Tests) - UPSC

,

practice quizzes

,

Internet Security Threats - Computer Security & Virus

,

mock tests for examination

,

ppt

,

Free

,

Computer Awareness Notes | Study Famous Books for UPSC Exam (Summary & Tests) - UPSC

,

Objective type Questions

;