0% found this document useful (0 votes)
11 views11 pages

Computer Security

The document discusses the importance of computer security, outlining methods for protection such as system access control, data access control, and non-repudiation. It details various types of malware, including viruses, worms, and trojans, along with their effects on computer systems. Additionally, it highlights the significance of antivirus software and the need for users to be aware of potential threats to maintain security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views11 pages

Computer Security

The document discusses the importance of computer security, outlining methods for protection such as system access control, data access control, and non-repudiation. It details various types of malware, including viruses, worms, and trojans, along with their effects on computer systems. Additionally, it highlights the significance of antivirus software and the need for users to be aware of potential threats to maintain security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

13

Computer
Security
The computers are being used frequently in our daily life and it has proven importance in each
and every field. We do all types of work which may be simple and some nay be confidential and
secret, so we expect our system to keep them personal and secure, othervise it may get misused
by anybody or may be attacked by viruses.

Computer Security 3. System and Security Administration It


Computer security is also known as cyber performs offline procedures that makes or
security or IT security. Computer security is a breaks secure system.
branch of information technology known as 4. System Design It takes advantage of basic
information security, which is intended to hardware and software security
protect computers. It is the protection of characteristics.
computing systems and the data that they store or For example, using a system architecture that's
2ccess.
able to segment memory, thus isolating
privileged proceses from no privileged
Methods to Provide Protection processes.
There are four primary methods to provide
protection Components of Computer
1. System Access Control It ensures that Security
unauthorized users donot get into the system Computer security is associated with many core
by encouraging authorized users to be areas. Basiccomponents of computer secCurity system
Security conscious. are
For example, by changing their passwords on
1. Confidentiality It ensures that data is not
a regular basis. accessed by any unauthorized person.
2. Data Access Control It monitors who can
2. Integrity It ensures that information is not
access what data, and for what purpose.
altered by any unauthorized person in such a
Your system mnight support mandatory access way that it is not detectable by authorized
controls with these. The sytem determines users.
access rules based on the security levels of the
People, the files, and the other objects in your 3. Authentication It ensures that users are
the persons they claim to be.
system.
134 Computer Awareness
4. Access Control It ensures that users
access only those resources that they are Sources of Attack
allowed to access. The most potent and vulnerable threat of
5. Non-Repudiation It ensures that users is virus attacks.
software program tht
A
computer virus is a
spreads from one Sma compute
originators of messages cannot deny they
are not sender of the message. to another and that interferes with compute
6. Availability It ensures that systems operation. compu
work promptly and service is not denied to It is imperative for every computer user to be awz
authorized users. about the software and programs that can help
7. Privacy It ensures that individual has protect thepersonal computers from attacks.
the right touse the inforamtion and allows The sources of attack can be
another to use that information.
Downloadable Programs
8. Steganography It is an art of hiding the Downloadable files are one of the best possile
existance of message. It aids sources of virus. Any type of execurable file bk:
confidentiality and integrity of the data. games, screen saver are one of the major sources. [F
9. Cryptography Itis the science of writing you want to download programs from the interne
information in a bidden' or secret' form then it is nccessary to scan every program betore
and is an ancient art. It protects the data in downloading them.
transmit and also the data stored on the Cracked Software
disk.
These sofrwares arc anorher source of virus attack
Some terms commonly used in cryptograply Such cracked tormns of illegal files conrain virus and
are
bugs that arc dificult to detect as well as to remove
Plain Text It is theoriginal message that Hence, it is always a preterable opion to downlou
is an input. sofrware trom the appropriate source.
Cipher It is a bit-by-bit or character-by E-mail Attachments
character transformation without regard to These artachments are he most common source
the meaning of the message. viruses. You must handle e-mail atachments wio
Cipher Text lt is the coded message or the CXTreme care, especially if che e-mail comes from
encrypted dara. unknown sender.
Encryption It is the process of converting Internet (Best Possible Source of Viruses
plain text to cipher text, using an Majoriry of all Computer users are unaware 2s whes
encryption algorithm. viruses attack computer sysems. Almost
Decryption It is the reverse of encrypion computer users click or download everything tha
i.e., converting cipher text to plain text. comes their way and hence unknowingly inv1tes t
possibiliry of virus attacks.
Transport Layer Booting from Unknown CD
Security (TLS) Protocol
It is a cryptographic protocol wvhich piovide When the computer system iS not working,
secure http connection, enabling two parti. vou do a
good practict to remove che CD I utomIKa
to communicate with DIVICy ata remove the CD, it tnav start to bo0t
inteqrity from the disc which enhances che possbiliv o
atacks.
Computer Security 135

Malware: 2. Direct Action Virus It comes into action


when the file containing the virus is executed.
Threats toComputer Security Itinfects files in the folder that are specified in
Computer systems are vulnerable to many threat the AUTOEXEC.BAT file path.
chat can inflict various types of damage resulting e.g., Vienna virus.
in significant losses. A threat is a potential 3. Overwrite Virus It deletes the information
wiolation of security and when threat gets contained in the files that it infects, rendering
executed, it becomes an attack. Those who them partially or totally useless, once they
execute such threats are known as attackers. have been infected.
Malware stands for malicious software. It is a e.g., Way, Trj.Reboot, Trivial.88-D etc.
broad term that refers to a variety of malicious 4. Boot Sector Virus It is also called Master
programs that are used to damage computer Boot Sector Virus or Master Boot Record
system, gather sensitive information, or gain Virus. This type of virus affects the boot
access to private computer systems. sector of a hard disk.
Malware is an unwanted software that any e.g., Poly boot.B, Anti EXE etc.
unauthorized person wants to run on your 5. Macros Virus It infects files that are created
computer. These are known as security threats. It using certain applications or programs that
includes computer viruses, worms, trojan horses, contain macros, like .doc, Xls, .pps etc.
rootkits, spyware, adware etc. e.g., Melissa.A etc.
Some of them are described below 6. File System Virus It is also called Cluster
Virus or Directory Virus. It infects the
Virus directory of your compurer by changing the
path that indicates the location of a file.
Virus stands for vital information resource under e.g., Dir-2 virus etc.
SIege. Computer Viruses or perverse software are 7. Polymorphic Virus It encrypts or encodes
Small programs that can negatively affect the
itself in an encrypted way, every timne it infects
computer. Itobtains control of a PC and directs it a system. This virus then goes on to create a
to perform unusual and often destructive actions. large number of copies.
Viruses are copied itself and attached itself to e.g., Elkern, Tuareg etc.
other programs which further spread the 8. FAT Virus It is used to store all the
intection. The virus can affect or attack any part information about the location of files,
tne computer software such as the boot block, unusable space etc.
files and
operating system, system areas, e.g., Link virus etc.
application program. 9. Multipartite Virus It may spread in multiple
Type of Virus ways such as the operating system installed or
the existance of certain files.
Some comm0n ypes of viruses are eg., Flip etc.
I. Resident Virus It fixes themselves into the 10. Web Scripting Virus Many websites execute
System's memory and get activated whenever
the OS runs and infects all the files that are complex code in order to provide interesting
then opened. It hides in the RAM and stays content. These sites are sometimes created
there even after the malicious code is with purposely infected code.
executed. e.e., Randex, Meve etc. e.g., J.S. Fortnight etc.
136 Computer Awarenes
Nome aomoN iruscs aC tabulated bclou) nWorms
Year Name
A computer worrm is a standalone
1971
1982
Creeper
Elk Cloner
computer program that replicates itselfiin order t,malware
spread to other computcrs.
1938 The Morris Internet Worm
1990 Melissa
Often, it uses a computer network to spread itgels
2000 | Love You relying on security failures on the target
compute
2001 Code Red to access it. Unlike a computer virus, it does ho
2003 SQL Slammer need to attach itself to an existing program.
2003 Blaster
Worms almost always cause atleast some harm n
2004 Sasser
2010 Stuxnet
the network, even if only by consumíng
2011 Trojan
bandwidth, whereas viruses almost always coruDr
2012 Rootkit or modify files on a targeted computer. Worms
2014 Generic PUP are hard to detect because they are invisible files.
2014 Net Worm e.g., Bagle, Ilove you, Morris, Nimda etc.
Effects of Virus
There are many different effects that viruses can
y Trojan
have on your computer, depending on the types
A Trojan, or Trojan Horse, is
of virus. Some viruses can non-self-replicating type of malware which
monitor what you are doing. appears to perform a desirable function but
instead facilitates unauthorized access to the users
slow down your computers performance.
computer system.
download illegal files onto your computer
withour you being able to delete them. The term is derived from the Trojan Horse story
destroy all data on your local disk. in Greek mythology because Trojan Hors
generate IP address randomly and sends rbose nploy a form of 'social engineering" presenting
IP address automatically. themselves as harmless, useful gifts, in order to
affect On Computer networks and the persuade victims to install them on theit
connection to Internet.
computers.
steal confidential information like password, Irojans do not attempt to inject themselves into
account number, credit card informacion by other files like a computer virus. Trojan Horse
random e-mailing. may steal information, or harm their host
increase or decrease memory size. computer systems. Trojans may use drive-b)
downloads or install via online games 0
display different types of error messages.
" decrease partition size. Internet-driven applications in order to each
target computers. Unlike viruses, Trojan horse
alter PC settings. do not replicate themselves.
display arrays of annoying advertising. e.g., Beast, Sub7.Zeus, ZeroAccess Rootkit etc.
extend boot times.
create more than one partition.
cause computer to make strange noises, make
Spyware
Spyware is a program which is installed on 4

music, clicking noises or beeps. owners


Computer system to spy on the system
damage data files. activity and collects all the information which
" make discunreadable. misused afterwards. It tracks the user's behavio
cause damage they were not designed to. and reports back to a central source.
Computer Security 137
are used for either legal or illegal
purpose.
Spywarecan transmit personal information to another
Salami Technique
It diverts small amounts of money from a
personscomputer over the
internet. large number of accounts maintaincd by
Spywarecan harm you in many ways such as the system.
Steal your passwords.
Hacking
, Observe your browsing choices. Hacking is the act of intruding into
"Spawn pop-up windows. someone else's computer or network.
Send your targeted e-mail. Hacking may result in a Denial of Service
. Redirect your web browser to phishing pages. (DOS) attack. It prevents authorised users
. Report your personal information to distant servers. from accessing the resources of the
.Can alter your computer settings (like web browser, home computer. A hacker is someone, who does
page settings or the placement of your desktop icons).
,Can affect the performance of your computer system. hacking process.
g, Cool Web Search, FinFisher, Zango, Zlob Trojan, Cracking
Keyloggers etc. It is the act of breaking into computers. Itis
a popular, growing subject on the internet.
Symptoms of a Malware Attack Cracking tools are widely distributed on
the internet. They include password
There is a list of symptoms of malware attack which
indicates that your system is infected with a computer crackers, trojans, viruses, war-dialers, etc.
malware. Phishing
Some primary symptoms are It is characterised by attempting to
"Odd messages are displaying on the screen. fraudulently acquire sensitive information
Some files are missing. such as passwords, credit cards details, etc
System runs slower. by masquerading as a trustworthy person.
PC crashes and restarts again and again. Phishing messages usually take the form of
Drives are not accessible. fake notifications from banks providers,
Antivirus software will not run or installed. e-pay systems and other organisation. It is a
Unexpected sound or music plays. type of internet fraud that seeks to acquire a
he mouse pointer changes its graphic. attachments user's credentials by deception.
System receives strange e-mails containing odd
or viruses.
Spam
Starts performing functions like opening or closing It is the abuse of messaging systems to send
windows, running programs on its own.
unsolicited bulk messages in the form of
Some Other Threats E-mails. It is a subset of electronic spam
There are some other threats which are described below. involving nearly identical messages sent to
numerous recipients by E-mails.
Spoof i
poofingng is
data without checoncerning
to access the
unauthorised
techniqueto the authorised user. It access Adware
It is any software package which
the resources over the nerwork. Ir is also known as
automatically renders advertisements in
Masquerade . process or techniqueto enter in another order to generate revence for its author. The
term is sometimes used to refer the software
Omg 1s a

lComput
egitimatere user
by accessing its IP address. It pretend to be a that displays unwanted advertisements.
network.
and access to its COmputer via a
138 Computer Awarene
Rootkits It consists of computer programs that attem
Rootkit is a type of malware that is designed to identify threats and eliminate computer
gain administrative level control over other malware.
computer system without being detected. -Some Popular Antivirus
Rootkits can change how the operating system
functions and in some cases, can temper with " Avast AVG

the antivirus program and render it infective. " K7 Kaspersky


Rootkits are also difficult to remove, in some " Trend Micro " Quick Heal
cases, require a complete re-installation of the Symantec " Norton
operating system. " MCAfree

Tit-Bits Digital Certificate


Brain was the first PC boot sector virus created Digital certificate is the attachment to an electon:
in 1986. message used for security purposes.
Creeper was the first computer virus created in The common use of a digital certificate is to verit
1971. that a user sending a message is who he or t
Parasitic virus attaches themselves to
claims to be, and to provide the receiver ith t
programs, also known as executables. The
Word parasites is used because a virus attaches means to encode a reply. It provides a means d
to files or boot sectors and replicates itself, thus proving your identity in electronic transaction
continuing to spread. It is designed as hide from The digital certificate contains information abo
antivirus detection.
whom the certificate was issued to, as well as t
Payloads is code in the worm designed to do certifying authority that issued it.
more than spread the worm. Bomb virus has a
delayed payload.
Logic Bomb is malicious program Digital Signature
intentionally inserted into a software system It is an electronic form of a signature that can
and is timed to cause harm at a certain point in
time but is inactive until that point. Unlike used to authenticate the identiry of the sender ofi
viruses, it does not replicate itself. message or the signer of a document, and as
ensure that the original content of the messag "
document that has been sent is unchanged.
Solutions to Computer Digital signarures are casily transportable
Security Threats cannot be imitated by someone else. Also, t
To safe the computer system from unauthorized Signer of a document cannor arer disown i
access and threats, it is necessary to design some claiming thar the signature was forged.
safeguards that handles these threats efficiently.
Some safeguards (or solutions) to protect a Firewall
computer system from accidental access, are A firewall can either be sofrware-based
keeping
described belo hardware-based and is used to help
network secure.
Antivirus Software Its primary objective is to control che incoming
Antivirus software is a application sofrware thar outgoing nerwork traffic by analyzingshould thub
are designed to prevent, search for, detect and it
packets and determining whether predeterait
remove viruses and other malicious software allowed through or not, based on a
like worms, trojans, adware and more. rule set.
Computer Security 139
fircwall builds a bridge berwecn an In modern timcs, user names and passwords are
nternal network that is assumed to be sccure commonly used by pcople during a log in process
trusted. and another network, usually an that controls acccss to protected computer
osternal (inter) nctwork, such as the Internet,
opcrating systems, mobile phones, ATMs etc.
that Is assumed to be secure and trusted.
not
A password is typically somewhere between 4 to 16
4firewall also includes or works with a proxy characters, depending on how the computer system
or that makes network requcsts on behalf of is set up.
workstaton users.
Whena password is entered, che computer system is
There are tuo forms of firewalls careful not to display the characters on the display
Hardware (External) Firewall SCreen, in case others might see it.

it provides protection to a local network. It is


physical device that sits berween the computer Rakhi
nd che Internet. Hardware firewall requires Windows
quite a bit of work to fully configure. To begin, cllck your user name

These may range from a simple router to a


proxv server that directs all traffic to a server
elewhere on the Internet before sending or There are two common modes of password as fllows
Taking data from a computer or a network. 1. Weak Password Easily remember just like
names, birth dates, phone number etc.
Software (Internal) FirewallI
Sofrware firewalls installed directly into the
2. Strong Password Difficult to break and a
combination of alphabets and symbols.
Computer as programs. Once installed, these
irewalls activate themselves and set up with Some basic guidelines on setting a password are
relat1ve ease. " Do choose a password with atleast 8 characters
containing both Alpha and Numeric characters.
There arefourgeneral technigues foraccess control Donot use your computer account name, or the
1. ServiceControl It determines the types reverse of it, as the password.
of Internet services chat can be accessed,
inbound or outbound. " Do not write down your password. Do not store
any password in any system including your own
2. Direction Control It determines the PC.
direction in which particular service Change your password periodically.
Tequests are allowed to flow.
D. User Control It conrols access to a
" Avoid using the same password for multiple
accounts.
service accordingto which user is Always verify a user's identity before resetting a
attempting to access it. password.
. Behaviour Control I controls how
" Do not use persons, places or things that can be
Particular services are used. identified with you.
Password
A
password is a secret word or a string of
Always logout or lock your terminal before
leaving it.
Choose passwords that are easy to remember but
charracters used for user authentication to prove
ty or access approval to gain acces to a
are difficult for an attacker to guess.

Tesource, which should be kept secret from


Who are not allowed to get access.
" Avoid using dictionary words, including foreign
language, slong, jargon and proper names.
140 Computer. Awarene,
File Access Permission IPSecurity Protocol
Most current file systems havc mc1hods of This scurit protol suite is used to
assigning permissions ot.C rights topeilik privacy and av hbentication services at the provd
users and gioup of users. layer. IP security allows:authentication, interntg
These systens control th ability of th users to and compression of IP traffic. encryption
view or make changes to the contents ef the file
system. File access permission refer to privileges Some Security Related Terms
that allow a user to read, write or execute a file.
Eavesdropping The attacker
monitors
There are three sp'ific pemissions as foilows transmissions for message content.
1. Read Permissio " Masqueracing The attacker impersonates an
If you have rcad psion of a file, you can
authorised user and thereby gain certain
unauthorised privilege.
see the contents. r case of directory access
means that the user cn read the contents. - Replay The attacker monitors transmission and
retransmits messages as the legitimate user.
2.Write Permission Pretty Good Privacy (PGP) It is a software that
If you have write pcm ssion of a file, you can encrypts your E-mail as well as digitally'signsi
modify or reno e the conierts of a file. In " Hack Bot This isa host exploration tool. simple
case of directory, you cn add ordelete files to vulnerability scanner and banner logger.
the contents of the director. " Patches It is a piece of software designed to fx
problems with a computer program or its
3. Execute Permission supporting data. This includes fixing securily
If you have execute permission of a file, you vulnerabilities and other bugs and improving
can only execute a file. the usability and performance.
In case of directory, you must have execute " Logic Bomb It is a piece of code intentionaly
access to the bin direcLory in order to execute inserted into acomputer's memory that will se
it or cd command. off a malicious function when specie
conditions are met. They are also called sög
code and does not replicate itself.
Intrusion-Detection System Time bomb It is a piece of software, that is use0
This system monitors real-time network traffic to the explode at a particular time.
for malicious activity and sends alarms for
network traffic that meets certain attack " Application Gateway This applies secur
mechanisms to specific applications such
patterns or signatures. Telnel
File Transfer Protocol (FTP) and
Services.
Secure Socket Layer (SSL) act as
Proxy Server A proxy server Can inthe
it is an algorithm that provides application firewall by responding to input packets othe
independent security and privacy over the manner of an application while blocking
addresse
internet. SSL allows both server authentication
packets. It hides the true network enteriy
(mandatory) and client authentication and used to intercept all messages
(optional). and leaving the network.
Check YOur Skills
1. If your computer rebooting itself then it is 9. Hackers often gain entry to a network be
likely that [SBI Clerk 2012] pretending to be at a legitimate computer
(1) It has a virus (1) spoofing (2) forging
(2) It does not have enough memory (4) None of these
(9) IP spoofing
(8) There is no printer 10. The of a threat measures its potential
)There has been a power surge [IBPS Clerk 2011]
(5) It need a CD-ROM impact on a system.
(1) vulnerabilities (2) counter measures
2. Junk E-mail is also called (3) degree of harm (4) susceptibility
[Union Bank of India 2011] (5) None of these
(1) spam (2) spoof 1l. The main reason to encrypt a file is to
(3) sniffer script (4)spool (1) reduce its size
(5) None of these
(2) secure it for transmission
3. Aperson who uses his or her expertise to gain (3) prepare it for backup
access to other people computers to get (4) include it in the start-up sequence
information illegally or do damage is a (5) None of the above
JAllahabad Bank PO 2011] [SBI Clerk 2011]
(1) spammer (2) hacker 12. A digital signature is
(4) All of these (1) scanned signature
(3) instant messenger
(5) None of these (2) signature in binary form
(3) encrypting information
4. Vendor created program modifications are (4) handwritten signature
called [Allahabad Bank PO 2011] (5) None of the above
(1) patches (2) anti-viruses
13. Mechanism to protect network from outside
(3) hales (4) fixes attack is
(5) overlaps (1) firewall (2) anti-virus
5. A ....is anything that can cause harm. (3) digital signature (4) formatting
(1) vulnerability (2) phishing (5) None of these
(3) threat (4) spoof
(5) None of these 14. Afirewall operated by [SBI Clerk 2010]
(1) the pre-purchase phase
O. A....is a smallprogram embeded inside of a (2) isolating intranet from extranet
GIF image.
(1) web bug (2)cookic (3) screening packets to/from the network and
provide controllable filtering of network
(3) spyware application (4) spam traffic
(5) None of these above (4) All of the above
T A hacker contacts your phone or E-mails and (5) None of the above
attempts to acquire your password is called 15. Which one of the following is a cryptographic
(1) spoofing (2) phishing
(3) spamming (4) buging protocol used to secure http connection?
(1) Stream Control Transmission Protocol
(5) None of these
(SCTP) [RBI PO 2009]
8. The phrase.... describes viruses, worms,
Tojan horse attack applets and attack scripts. (2) Transport Layer Security (TLS)
(1) malware (2) spam (3) Explicit Congestion Notification (ECN)
(4)virus (4) Resource Reservation Protocol (RRP)
(9) phishing (5) None of the above
(5) None of these
142 Computer Awar enesS
16. are attempts by individuals to obtain 24. Which one of the following is a key function.
confidential information from you by falsifying firewall?
[SBI PO 20101
their identity. [UBPS PO 2011] (1) Monitoring (2) Delet:ing
(1) Phishing triks (2) Computer viruses (3) Copying (4) Moving
(3) Spyware scams (4) Viruses (5) None of these
(5) Phishing scams 25. Viruses, trojan horses and worms are
17. .. isa form of virus explicitly designed to hide (IBPS Clerk 20121
itself from detection by anti-virus software. (1) able to harm computer system
(1) Stealth virus (2) Polymorphic virus (2) unable to detect if present on computer
(3) Parasitic virus (4) Macro virus (3) user-friendly applications
(5) None of these (4) harmless applications resident on computer
18. All of the following are examples of (5) None of the above
real-security and privacy risks except 26. Computer vius is [IBPS Clerk 2011
[SBI PO 2011] (1) a hardware
(1) hackers (2) spam (2) windows tool
(3) viruses (4) identify theft (3) a computer program
(5) None of these (4) a system software
19. The first PC virus was developed in (5) None of the above
(1) 1980 (2) 1984 27. The first computer virus is
(3) 1986 (4)1988 (1) creeper (2) PARAM
(5) 1987 (3) the famous (4) HARLIE
(5) None of these
20. Which of the following is a criminal activity 28. A time bomb occurs during a particular
attempting to acquire sensitive information
such as passwords, credit cards, debits by (1) data or time (2) logic and data
(3) only time (4)All of the above
masquerading as a trustworthy person or (5) None of these
business in an electronic communication?
[IBPS Clerk 2010] 29. First boot sector virus is
(1) Spoofing (2) Phishing (1) computed (2) mind
(3) Stalking (4) Hacking (3) brain (4) Elk Cloner
(5) None of these (5) None of these
21. Which of the following inputs a computer's 30. Which virus spreads in application software?
memory, but unlike a virus, it does not (1) Macro virus
replicate itself ? [SBI PO 2011] (2) Boot virus
(1) Trojan horse (2) Logic bomb (3) File virus
(3)Cracker (4) Firewall (4) Anti-virus
(5) None of these (5) None of the above
whichis
22. Abuse messaging systems to send unsolicited is 31. Some viruses have a delayed payload,
sometimes called a
(1) phishing (2) spam
(3) malware (4)firewall (1) time (2) anti-virus
(5) adware (8) bomb (4) All of these
(5) None of these
23. ... are often delivered to PC through an
32. An anti-virus is a
E-mail attachment and are often designed to
do harm. (1) program code
(2) computer
(1) Viruses (2) Spam (8) company name
(3) Portals (4) Email messages
(5) None of these (4) application software
(5) None of the above
Computer Security 143
33, Trend Micro' is a 36. What is an E-main attachment?
(1) virus program (1) A roceipt sent by the recipient
(2) anti-virus software another
(2) A separate document from
(S) just a program program Bent along with E-mail
(4) All of these
message
(5) None of the above (3) A malicious parasite that feeds off your
messages and destroys the contents
34. It is a self-replicating program that infects
computer and spreads by inserting copies of (4) A list of Cc : or Bcc : recipients
itself into other executable code or documents. (5) A friend to whom E-mail is sent regularly
(1) Keylogger 37. Passwords enables users to
(2) Worm (1) get into the system quickly
(3) Virus (2) make efficient use of time
(4) Cracker (3) retain confidentiality of files
(5) None of the above (4) simplify file structure
virus, it is a self-replicating program. It (5) None of the above
35. Like
also propagates through computer network. 38. A program designed to destroy data on your
(1) Spyware computer which can travel to infect other
(2) Worm Computers, is called a
(9) Cracker (1) disease (2) tarpedo
(4)phishing scam (9) hurricave (4) virus
(5) None of these (5) None of these

Analyse Yourself
4. (1) 5. (1) 6. (3) 7. (2) 8. (1) 9. (3) 10. (3)
1. (1) 2. (1) 3. (2)
14. (3) 15. (2) 16. (1) 17. (3) 18. (3) 19. (3) 20. (2)
11. (2) 12. (3) 13. (1) 30. (1)
24. (1) 25. (1) 26. (3) 27. (1) 28. (3) 29. (3)
21. (2) 22. (2) 23. (2)
33. (2) 34. (2) 35. (4) 36. (2) 37. (3) 38. (4)
31. (3) 32. (4)

You might also like