Professional Documents
Culture Documents
1. Cyber Safety
Cyber safety is the safe and responsible use of Internet and keeping information safe and
secure. It's also being responsible with that information and being respectful to other people
online.
2. Computer Virus
A computer virus is an agent(some form of executable code) that can replicate and spread from
one computer to another. It can spread because its host has sent(willingly or unwillingly) it to
someone over a network or internet, or through a physical medium such as floppy disk, CD,
DVD or USB drive. Some viruses are harmful as they are programmed to harm your computer
by damaging or deleting files and programs.
3. Computer Worm
A computer worm is a computer program which self-replicates itself in order to spread to
other computers. It uses the network to send copies of itself to other nodes. Unlike a virus, it
doesn't need to attach itself to an existing program.
4. Trojan Horse
Trojan Horse is a malicious program that looks legitimate but it can take control of the
computer. It's designed to damage, disrupt, steal or do any harm to your data or computer but
it acts like a useful or normal application.
5. Spam
It's the abuse of messaging systems to send unsolicited message(s) to large number of
recipients for any purpose. Most common type of spamming is email spam. It can be used for
phishing, commercial use, advertising and more negative things like proselytizing.
6. Protection using Firewall
Security hardware & software that prevent unauthorized users from gaining access to a
computer or network is known as firewall. It provides protection against outside cyber
attackers and malicious software.
7. Use of Cookies
Cookies are messages that a web server transmits to a Web browser so that the web server
can keep track of the user's activity on a specific website. A small piece of information stored
on user's computer by the web browser while browsing a website. It's main purpose is to
identify users and possibly prepare customized web pages for them. It also used to remember
some information of user such as data entered into form fields, payment card numbers, items
added in a cart.
Cookies are stored on user's disk so even if server crashes they are still available.
There's a possible security threat to a user.
8. Cyber Law
Cyber laws cumulates a wide variety of political and legal issues related to the internet,
networks, hardware, software and other communications technology, including scam or
treachery, copyrighting issues, online insults/harassments, data protection, etc.
Cyber Law
9. IT Act
The Act provides a legal framework for electronic governance by giving recognition to
electronic records and digital signatures. It also defines cyber crimes and prescribes penalties
for them. The Act directed the formation of a Controller of Certifying Authorities to regulate
the issuance of digital signatures. It also established a Cyber Appellate Tribunal to resolve
disputes rising from this new law. The Act also amended various sections of the Indian Penal
Code, 1860, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891, and the
Reserve Bank of India Act, 1934 to make them compliant with new technologies.