Professional Documents
Culture Documents
EXERCISE
Q1 Select the best answer for the following MCQs
I II III IV V VI VII VIII IX X
C D B C C D D C D B
SHORT QUESTIONS
Q2 Write short answers of the following questions.
I Define Cybercrime
Ans Any crime done by means of computer and information technology by having unlawful
access to others computers is called cybercrime
II What is the importance of computer security?
Ans Computer security refers to protecting computer hardware, software and information
stored on computer from threats
Importance of Computer Security
Computer users exchange information with each other over internet. This can infect
a user’s computer with virus or other types of malicious software
Computer security or safety is important for computer users to protect their computer
from different threats
It is necessary to install security software such as firewall, antivirus and spyware on
computers.
III Differentiate between hacker and cracker
Ans Difference between hacker and cracker
Hacker Cracker
A person who illegally breaks into A person who breaks into computer
others computer systems is known as systems without permission using
hacker hacking tools is known as cracker
Hacker are computer experts who try to Most of the crackers do not have
gain unauthorized access to computer professional computer skill to hack
systems for stealing and corrupting computer systems but they have
information knowledge about using hacking tools
Hackers have in-depth knowledge of Crackers break into computers and
network programming and can create cause serious damage
tools and malicious software. Most of the
hackers break into computers for
financial benefits
For example, a hacker develops software For example, they also break into web
in which a dictionary files is loaded that servers and replace the home page of a
contains all the dictionary words. This website with a page of their own design
method works if the user is having a
simple password that exists in the
dictionary.
IV Describe any five symptoms of malware
Ans The computer does not start or it reboots automatically when it is on
Different types of error messages appear on the screen
Programs do not run in a normal way
Computers run very slow
1
UNIT # 6: COMPUTER SECURITY AND ETHICS
3
UNIT # 6: COMPUTER SECURITY AND ETHICS
EXTENSIVE QUESTIONS
Q3 Write long answers of the following questions.
I Define malware and describe its types
Ans Malware is malicious software. It comprises of a number of harmful software that are
threats to all computer users. Malware is created for attack on privacy, spying,
destruction and financial benefits
Types of Malware
Most common types of malware are
1. Computer Viruses
Computer virus is a program that may disturb the normal working of computer without
the knowledge or permission of the user. It is the most common and well known
computer security threat. Virus attached itself to the files in flash, drives, hard disks and
email attachments. A file containing a virus is called infected file. The virus is activated
when the infected file is executed. Some examples of computer virus include I Love
You, MyDoom, Cascade and FRODO. The virus I Love You is spread as an email
attachment. The MyDoom virus was discovered in 2004. It infected about one million
computers.
2. Worms
A worm is a malware that copied itself repeatedly in memory or on disk until there left
no space. The computer may also stop working in this situation. Worm spreads from
one computer to other through networks without any human action. It typically enters a
computer due to any weakness in the operating system. Some examples of worms are
Code Red, Fizzer and Blaster. The worm Code Red was spread in 2011. It infected
about 360,000 computers in a day. The worm Fizzer records the keystrokes. It allows
the attacker to access the infected computer.
3. Adware
Adware is a type of software that automatically downloads and displays advertisements
on computer without the permission of the user. The advertisements may appear in the
form of banner or pop-up windows. Adware records the interests of the user while using
the internet. It displays the advertisements according to the interests of the user. It may
also download some malicious software on the computer. Some examples of adware
are as Dollar Revenue, Mirar Toolbar and Comet Cursor.
4. Spyware
Spyware is a program that secretly collects information from computer. It may also
collect keystrokes from the keyboard to find the email address, password and credit
card information. The information is sent to the person who designed the spyware. This
information can be used for unauthorized access. The example of spyware is Flame
that was discovered in 2012. It attacks the computers that use Windows operating
system. It can record keystrokes, screenshots and network traffic etc. It can also record
the conversation over skype.
II Explain how malware spreads
Ans The following are different ways malware can spread in computers
1. Infected Flash Drives / CDs
USB flash drivers are the common cause of spreading viruses among computers.
These drives are used to transfer data from one computer to other. A malware can also
be copied from one computer to other when the user copies infected files from flash
drives. It is always a good practice to scan USB before transferring any data from it.
4
UNIT # 6: COMPUTER SECURITY AND ETHICS
2. Pirated Software
The illegal copy of software is known as pirated software. A variety of pirated software
is available on CD/DVD and the internet. Pirated software may contain malicious
programs. These malicious program can spread if the user installs pirated software. It
is always a good practice to buy original software instead of using pirated software.
3. Network and Internet
The networks and internet are also a common cause of spreading virus. The malicious
software on any computer of the network may spread quickly to all computers
connected to that network. Many insecure websites also infect computer with malicious
programs. It is a good practice to open only reliable websites.
4. Email Attachments
Email attachment is a common cause of spreading malicious software. Email
attachment is a file that is sent along with an email. An email may contain an infected
file attachment. Malicious software can spread if the user opens and download an email
attachment. It may hard the computer when it is activated. It is a good practice not to
open suspicious emails to avoid infected attachments.
III Explain how to protect computer systems from virus attacks
Ans Following are some ways to protect computer systems from virus attacks
1. Install a Firewall
A firewall is a software program or piece of hardware that blocks hackers from entering
and using your computer. Hackers search the internet the way some telemarketers
automatically dial random phone numbers. They send out pings (calls) to thousands of
computers and wait for responses. Firewalls prevent your computer from responding to
these random calls. A firewall blocks communication to and from sources, you do not
permit. This is especially important if you have a high speed internet connection like
DSL
2. Use Antivirus Software
Antivirus software protects your computer from viruses that can destroy your data slow
down or crash your computer or allow spammers to send email through your account.
Antivirus protection scans your computer and your incoming email for viruses and then
deletes them. You must keep your antivirus software updated to cope with the latest
‘bugs’ circulating the internet. Some examples of antivirus software are
Norton Antivirus, McAfee, AVG, Kaspersky, BitDefender, NOD32
3. Use Anti-Spyware Software
Spyware is a software installed without your knowledge that can monitor your online
activities and collect personal information you surf the Web. Some kinds of spyware,
called key loggers, record everything you key in – including your passwords and
financial information. Signs that your computer may be infected with spyware included
a sudden flurry (burst) of pop-up ads, being taken to Websites you do not want to go
to, and generally slowed performance. Some examples are: Spysweeper, Spybot
Search & Destroy, Spyware Doctor, Ad-Aware, Spyware Blaster
4. Use Great Caution When Opening Attachments
Configure your antivirus software to automatically scan all email and instant message
attachments. Make sure your email program does not automatically open attachments
or automatically render graphics, and ensure that the preview pane is turned off. Never
open unsolicited emails or attachments that you are not expecting, even from people
you know.
5
UNIT # 6: COMPUTER SECURITY AND ETHICS
Signature Recognition
A signature recognition system identifies the shape of handwritten signature. It also
measures the pressure and motion used to write the signature. It uses special pen and
tablet.
Eye Scan
An Iris recognition system scans the patterns in iris or retina of an eye. It authenticates
the user by verifying the unique pattern in the eyes of the user. It is very expensive and
is used by large organizations and financial institutes.
V Define computer ethics and write some important guidelines for ethical use of
computer technology.
Ans Computer Ethics
Computer ethics are the moral rules and guidelines that determine the proper use of
computer system. The computer should be used according to the ethics in order to
avoid any problem in the security.
Moral Guidelines for Ethical Use of Computer
Some moral guidelines for ethical use of computers are as follows
Computer should not be used to harm others
Computer should not be used to steal anything such as credit card numbers
Computer should not be used to develop and spread viruses or worms etc.
The user should not use any other’s computer resources without permission
The copy righted software should not be copied illegally
The personal email messages of other people should not be read
An attempt to access the account of other people of organization is illegal
The rumors or false information should not be spread over the internet
The hacking of a computer or network is not good
The software and hardware must be used with responsibility for positive purpose
away their privacy. The Data Protection Act protects the rights of the individuals against misuse
of personal information by organizations.
Internet and Privacy: People who use internet are worried that it may be eroding their privacy.
Internet users post their personal information such as full name, date of birth, place of residence,
phone numbers, pictures, videos etc. on the Wen and it stays there Internet users enter personal
information in websites to sign up or register for services without realizing that this may lead to
invasions of privacy. This information can be accessed by hackers and used for harmful purpose.
This poses a serious threat to privacy as unauthorized people can access personal information
of individuals. Therefore, people are concerned about assault of computer and internet
technology into people’s privacy.