Chapter-1 (Computer Security)



Question: What is the Computer Security?

Answer: Computer Security is the process of preventing and detecting unauthorized use of your computer. It involves the process of safeguarding against intruders from using your computer resources for malicious intents or for their own gains (or even gaining access to them accidentally).

Question: What are threats of a Computer System?

Answer: A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of a natural disaster such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.

Question: What are viruses and its types?

Answer: Computer Viruses are malicious software programs that damage computer program entering into the computer without the permission of the users, and also run against the wishes of the users. They are replicated by themselves. Viruses are so dangerous and malicious that they can be automatically copied and pasted from memory to memory over and over; the transmitting power is too much quick from network to network that can simply hang smoothly running computer, sometimes damage the important programs of the computer. Viruses are very dangerous program can go on their activities automatically and can do a great loss of the users.
It is quite impossible to give the proper information about the types of viruses. The types of viruses are changing day by day. Therefore on the basis of their origin, hiding, damaging types, operating system etc their types as follows:

Boot Sector Virus: Boot sector virus infects the boot sector on floppy disks, hard disks and other bootable media like DVD or CD. The examples of boot sector viruses are – Form, Michelangelo, and Stoned.

Macro Virus: A macro virus is an original individual amongst the types of computer virus, and contaminates the macros inside a pattern. As soon as you release a spreadsheet or word processing text, the macro virus gets into typical pattern. The examples of Macro viruses are – Relax, Babbles, and Melissa.

Companion Viruses: Companion viruses are as same as direct action types or resident types. They are companion viruses as because sometimes they get into the method and accompany the other existing files. The example of accompany viruses are – Asimov.1539, Terax.1069.


File Infector Virus: This sort of virus contaminates programs or executable records (records with .EXE or .COM extension). Whilst one of these programs is run, straight or circuitously, the virus is turned on; creating the harmful belongings it is automatic to bear out. The greater part of accessible viruses fit in to this class, along with can be classified depending on the proceedings that they take out.

Question: What is Antivirus Software, Explain With Example?

Answer:

Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Antivirus software was originally developed to detect and remove computer viruses, hence the name.
Probably the three best known, full-scale antivirus software packages for purchase are from Kaspersky, McAfee, and Norton. AVG and Panda are two examples of free antivirus software.

Question: What is computer Firewall and Explain its use?

Answer: A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.

Question: How are Firewalls Used?


Answer: Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Question: What is cyber crime and computer ethics?

Answer: Computer ethics is a set of moral principles that regulate the use of computers.
Cyber crime is criminal activity done using computers and the internet. It is considered to be one of the fastest growing areas in crime.

Question: Who are Hackers and Crackers?

Answer:

Hackers: A person who uses computers to gain unauthorized access to data.

A cracker (also known as a black hat hacker) is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties. The general view is that, while hackers build things, crackers break things.

Question: What are Cyber law and its importance?

Answer: Cyber means the use of Internet technologies and computers it includes computers, networks, software, data storage devices, Internet, websites, emails, ATM machines etc. To protect the cyber crime over Internet, this law is passed to protect the Internet cyber crime. This law is approved by the government. Cyber law Includes:

1.      Cyber crimes
2.      Electronic and Digital Signatures
3.      Intellectual Property
4.      Data protection and privacy

Importance of Cyber Law:

1)      Companies now be able to carry out electronic commerce using the legal infrastructure provided by the Act
2)      Act allows Government to issue notification on the web thus heralding e-governance
3)      Protect Computer fraud and Unauthorized access.
4)      Consumers are now increasingly using credit cards for shopping.
5)      Most people are using email, cell phones and SMS messages for communication as well as Deal with Internet Banking Transactions.

Question: What is backup and restore?

Answer: Backup and Restore (formerly Windows Backup and Restore Center) is a component of Microsoft Windows introduced in Windows Vista and included in later versions that allows users to create backups and restore from backups. It is a replacement of NTBackup, which was included in previous Windows versions.