SSC CGL Exam  >  SSC CGL Notes  >  Computer Awareness and Proficiency  >  Computer Security

Computer Security | Computer Awareness and Proficiency - SSC CGL PDF Download

Computer Security: An Overview

Computer security, also known as cybersecurity or IT security, is a branch of information technology focused on protecting computers and information from unauthorized access, damage, or theft.

Sources of Cyber Attacks

Computer Security | Computer Awareness and Proficiency - SSC CGLOne of the most significant threats to computer users is virus attacks. A computer virus is a small software program that spreads from one computer to another and disrupts normal operations. The common sources of cyber attacks include:

  • Downloadable Programs: Executable files such as games and screensavers are major sources of viruses. It's crucial to scan any program before downloading it from the Internet.
  • Cracked Software: Illegal software versions often contain viruses and bugs that are hard to detect and remove. Always download software from legitimate sources.
  • Email Attachments: These are common virus carriers. Be cautious with email attachments, especially from unknown senders.
  • Booting from Unknown CDs: If a computer boots from an unknown CD, it can introduce viruses. Remove CDs when not in use to avoid this risk.

Question for Computer Security
Try yourself:
What is one common source of viruses that can infect a computer system?
View Solution

Methods to Provide Protection

There are four primary methods to protect computer systems:

  1. System Access Control: Ensures that unauthorized users cannot access the system by encouraging security awareness among authorized users.
  2. Data Access Control: Monitors who can access data and for what purpose, based on security levels.
  3. System and Security Administration: Implements offline procedures to maintain or break system security.
  4. System Design: Utilizes basic hardware and software security features to protect the system.

Components of Computer Security

Computer security involves several core components:

  1. Confidentiality: Ensures that data is accessed only by authorized persons.
  2. Integrity: Ensures that information is not altered by unauthorized persons in a detectable manner.
  3. Authentication: Verifies users' identities through login names and passwords.
  4. Access Control: Restricts users to resources they are allowed to access.
  5. Non-Repudiation: Prevents senders from denying that they sent a message.
  6. Availability: Ensures that systems function correctly and service is available to authorized users.
  7. Privacy: Protects individuals' rights to use information and permits others to use it under controlled conditions.
  8. Steganography: Hides the existence of messages to aid confidentiality and integrity.
  9. Cryptography: Protects data during transmission and storage through encryption.

Cryptography Terms

  • Plain Text: The original message.
  • Cipher: Transforms plain text bit-by-bit without regard to meaning.
  • Cipher Text: The encrypted message.
  • Encryption: Converts plain text to cipher text.
  • Decryption: Converts cipher text back to plain text.

Malware

Computer Security | Computer Awareness and Proficiency - SSC CGL

Malware is a broad term for malicious software designed to damage systems, gather information, or gain unauthorized access. Types of malware include:

  1. Viruses: Programs that can negatively affect computers by performing destructive actions, replicating, and spreading.

    • Example: The first computer virus was "Creeper" in 1971, and the first boot sector PC virus was "Brain" in 1986.
    • Effects: Viruses can monitor activities, slow performance, destroy data, affect networks, and display error messages, among other issues.
  2. Worms: Standalone programs that replicate and spread via networks.

    • Example: Bagle, I Love You, Morris, Nimda.
    • Payload: Designed to spread on a larger scale than worms.
  3. Trojans: Malicious programs that appear beneficial but facilitate unauthorized access.

    • Example: Beast, Sub7, Zeus, ZeroAccess Rootkit.
  4. Spyware: Programs that spy on user activity and collect information, which can be misused.

    • Example: CoolWeb Search, FinFisher, Zango, Zlob Trojan, Keyloggers.

Symptoms of Malware Attack

Indications of a malware attack include:

  • Odd messages on the screen.
  • Missing files.
  • Slow system performance.
  • Frequent crashes and restarts.
  • Inaccessible drives.
  • Non-functional antivirus software.
  • Unexpected sounds or music.
  • Changes in mouse pointer graphics.
  • Strange emails with odd attachments.
  • Unusual system behavior like opening/closing windows or running programs automatically.

Some Other Threats to Computer Security

Computer Security | Computer Awareness and Proficiency - SSC CGL

There are several other significant threats to computer security:

  1. Spoofing: This technique involves unauthorized access to data by disguising oneself as an authorized user, often over a network. IP spoofing is a method used to gain access to a computer by using a false IP address.
  2. Salami Technique: This method involves diverting small amounts of money from numerous accounts.
  3. Hacking: Unauthorized intrusion into someone else's computer or network, potentially causing a Denial of Service (DoS) attack, which prevents legitimate users from accessing resources. A hacker is the individual performing the hacking.
  4. Cracking: Breaking into computers, often using tools like password crackers, trojans, viruses, and war-dialers. Cyber crackers use computers to harm people or destroy critical systems.
  5. Phishing: Fraudulently attempting to acquire sensitive information like passwords and credit card details by pretending to be a trustworthy entity.
  6. Spam: The abuse of messaging systems to send unsolicited bulk messages, typically through email.
  7. Adware: Software that automatically displays advertisements to generate revenue, sometimes displaying unwanted ads.
  8. Rootkit: Malware designed to gain administrative-level control over a computer system without detection.

Question for Computer Security
Try yourself:
What is a common symptom of a malware attack on a computer system?
View Solution

Solutions to Computer Security Threats

There are several safeguards to protect a computer system from unauthorized access:

  1. Anti-virus Software: Designed to prevent, detect, and remove viruses and other malicious software like worms, trojans, and adware. Popular antivirus programs include Avast, AVG, K7, Kaspersky, Trend Micro, Quick Heal, Symantec, Norton, and McAfee.
  2. Digital Certificate: An attachment to an electronic message used to verify the sender's identity and enable the receiver to encode a reply.
  3. Digital Signature: An electronic form of a signature that authenticates the sender's identity and ensures the integrity of the message or document.
  4. Firewall: Software or hardware-based systems that control incoming and outgoing network traffic based on predetermined security rules, often working with a proxy server.
  5. Password: A secret word or string of characters used for user authentication. Passwords can be weak (easily remembered) or strong (difficult to break, combining alphabets and symbols).
  6. File Access Permission: Assigning permissions or access rights to specific users or groups, controlling their ability to view, modify, or execute files. Permissions include read, write, and execute.

  1. Eavesdropping: Unauthorized real-time interception of private communications, such as phone calls or instant messages.
  2. Masquerading: An attacker impersonates an authorized user to gain unauthorized privileges.
  3. Patches: Software designed to fix issues, including security vulnerabilities and bugs, improving usability and performance. Vendor-created program modifications are also called patches.
  4. Logic Bomb: Malicious code inserted into a computer's memory, triggered by specific conditions. Also known as slag code, it does not replicate itself.
  5. Application Gateway: Security mechanisms applied to specific applications like File Transfer Protocol (FTP) and Telnet services.
  6. Proxy Server: Acts as a firewall by responding to input packets like an application while blocking others, hiding true network addresses, and intercepting messages entering and leaving the network.

Tit-Bits

Key Pointers:

  • The right to use software under specific rules is granted through a Software License.
  • Software Piracy involves copying data or software without the owner's permission.
The document Computer Security | Computer Awareness and Proficiency - SSC CGL is a part of the SSC CGL Course Computer Awareness and Proficiency.
All you need of SSC CGL at this link: SSC CGL
48 videos|22 docs|33 tests

Top Courses for SSC CGL

FAQs on Computer Security - Computer Awareness and Proficiency - SSC CGL

1. What are some common sources of cyber attacks that individuals and organizations need to be aware of in terms of computer security?
Ans. Some common sources of cyber attacks include phishing emails, malicious websites, unsecured networks, and social engineering tactics.
2. How can individuals and organizations protect their computer systems from cyber attacks according to the article?
Ans. Methods to provide protection against cyber attacks include regularly updating software, using strong passwords, implementing firewalls, and running antivirus programs.
3. What is malware and how does it pose a threat to computer security?
Ans. Malware is malicious software designed to harm a computer system or steal information. It can infect computers through email attachments, downloads, or compromised websites, posing a significant threat to computer security.
4. What are some other threats to computer security that individuals and organizations should be aware of?
Ans. Other threats to computer security include ransomware attacks, data breaches, insider threats, and distributed denial-of-service (DDoS) attacks.
5. What are some solutions that can help mitigate computer security threats according to the article?
Ans. Solutions to computer security threats include conducting regular security audits, educating users about safe computing practices, implementing multi-factor authentication, and establishing incident response plans.
48 videos|22 docs|33 tests
Download as PDF
Explore Courses for SSC CGL exam

Top Courses for SSC CGL

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

mock tests for examination

,

practice quizzes

,

Previous Year Questions with Solutions

,

video lectures

,

Sample Paper

,

Semester Notes

,

Summary

,

study material

,

shortcuts and tricks

,

Computer Security | Computer Awareness and Proficiency - SSC CGL

,

Objective type Questions

,

MCQs

,

Extra Questions

,

Free

,

Viva Questions

,

Computer Security | Computer Awareness and Proficiency - SSC CGL

,

pdf

,

Computer Security | Computer Awareness and Proficiency - SSC CGL

,

Exam

,

past year papers

,

Important questions

,

ppt

;