0% found this document useful (0 votes)
4 views

NIS Unit 1-rotated

The document discusses the importance of computer security, outlining the need to protect personal and organizational data from threats such as viruses, malware, and unauthorized access. It highlights key strategies for safeguarding information, including using antivirus software, strong passwords, and regular updates. Additionally, it emphasizes the significance of confidentiality, integrity, and availability in maintaining a secure computing environment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
4 views

NIS Unit 1-rotated

The document discusses the importance of computer security, outlining the need to protect personal and organizational data from threats such as viruses, malware, and unauthorized access. It highlights key strategies for safeguarding information, including using antivirus software, strong passwords, and regular updates. Additionally, it emphasizes the significance of confidentiality, integrity, and availability in maintaining a secure computing environment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 32
Be, & i aon ee deussuty (nts) ZEAL INSTITUTES Network Information ond _werrerewnen Unit sient : Jabroduuchion “bo Corn pusher _ond Infor motion sSeouihy Foundations Of Computer eww Definikon oF Computer fewnrity + - Comp ufex sSecumiti defers to protecting and Searing computers Vand “ther related olata pekavores Softavore Drorcwore ined we Eg Accs paiseuse th information Loss an otha Seuuty Teucts am Internet tras? made aur fives easier ancl hes provided a with Dats of, advantoges bt it hos also put gur Systems decsridiy wat sisk Qeing infected by a virus bung theckedt inl or akon thy damage “40 Syston and much pone: oR Corn pusher uwit, is Dosally the protection of compton Sy tee and _MflorrSabon from horn theft and 410 outhori ed seo} your computer Fuster i . Zeal Education Society I © scanned with OKEN Scanner wr ZEAL -« INSTITUTES wins zealeducation.com SE = AZ Need op Computer feunity 2- Computer Seuwisky is _imr eriant Lecome it | ar arntees Sofe precesing — and Storage Ausins data, heattheore Yand sensitive jufovmatis Cyber ocurily provides the confidedlioli ty : y and ovoilosiility fer_ollh the Campon’ a compen Sgstern Following ore Some " neorons” ache comp Sexy ab Ampertant Jo protect pessonall i maton. 2) A) ED) Jo protect organization rw pert) Jo ‘prevenk fron lata" thr Jo prevent viruses ond mol wore Jo dtop Jun ontroni3 eck aces Jo __protet personal jabormeation:— Gt ie 4, udmost importance for dapeguard?n _ owselve fees Cyber deavih, the IT _(4nloc techo edinity 94 est prime issue to _prote four personal ed ‘othe mation. or Can laetp sour Anpearmebion Seunre “anid ome q Ue follows a) Use an antivirus foftwore b) Apdoke 24 Or. Compuler operating Syste 2) Mse stong aod mart password Zeal Education Society © scanned with OKEN Scanner ZEAL INSTITUTES vyennu.zealeducation.com d) Hace 6 ou sensitive oleta of Acguslos jatervals 2) Lock tour Computer Safety p Avorc “phishing Peele oe 2) Jo protect organization properties *- gt is very” _inpertank to ensure the Cryaniy ations Yalata Le cord € every arg onizatic thas sony gemsitive assets and jaltrmnakon. “do, witiouk computer or F-T Peuity ye ome cannot _quartontee dle deal yy i ars f Agung ation propalics 3) Jo_prevent _ {ror dota theft x Bota theft is the Tat of etealing gensitive ¢ yeeton duc as bank acctunt details cnet coro details, poss toorok clotumenks Stored on Computers PAvers or other devitea. The most common ReMsor for dela freaches are os [ows = 1) Weak and Stolen credentials 2) Mobiuious snridery 3) Application vulnerabilities 4) Human @rrok fo, te prevenk data theft you Diewe to engure Ahot your device 9 feamreol__hy endpoint fecwity Qock down spur ay teen idlentfy witical © olata and use authentication Zeal Education Society 3 © scanned with OKEN Scanner wor zealeducation oe, =, J 2) = / Jo prevent virurer ond Malware %- ; A_computer visuws oi _molwore Con cCorrmpt ar delete sour gensiive Olota_, dornage Ayu Irosd_digk ang _it Sproods foo one Conaputer do another wind emoil program anol otters . fo, one “can _ protect omputer fiom viruses wiry following tips :- @) Keep your oftwsrore. updated b) Use. professional ontivirws SQ] toh e v0 © Lye leone passwords 8 DB) Bort chide! "eurpivaws emod Gnly ©) Back up your ‘computer data f) Browse | nly Funted and Seared Aw ebsites « 5) Jo _dftep un custhOrrged access: ~ Compuicr seurnity helps to prevent & detect snauthorized axcer of ajoud Compal & K hadeers get accep 4 your Computer die gain _cortrol over ofl the sensitive jnfev mation Now-a- Yorkus ore Sort enowgh to gain acces of V our crucial dota witty ae ack novwled ment. This can Seriously impact dnrusineasey Sh Grrlersions Go ih is important to Ske aaneuudlrorig ec Occerd to gtr Campater syste: Zeal Education Society oa © scanned with OKEN Scanner ZEAL INSTITUTES vwarw-zealeducation.com he u Dosics s- e compere nly aL computer cuctem thot neccls bo be protected are AG @_Harndwore _3- Physical port of a Compuls ike Pustem Fnemnory_gndk “dick daiv Q firmwore “s- Perrnenent of hwores “pot ore_etched into a hradwoie device pike non. vobclile memory and is most jovisible to Abe ACA QB) Soft wore 3- dhe propromering dhrot off exs chernicer , Uke ing ~Pyster wad procersor internet browser “fo whe ser. CIA Troid $- Comp uler Secrrity is pooinby conceaned suit followi? CrAtroid. Confidentiality Co) dt_in ensuring Alot ) 4)! Viruses r- A Computer _nyidus is a Maraliccoy progam —_aehida is hooded sto _the Mapes Conn poucter avitrout Ale ued» Knowledge + $F Atplrate steelf and degeds Ale ile auch programs on _wasers PC The “timate. a vu vw 10 ensure that e vichms _compiter, avt ll neva Le able 40 operoke properly OX even Phases of a Virus! Ihe wy cle 9 a computes LAS, Con Le? olivided jetto _L phrases Deamaeant phase Propogation plese Trigger Se ution plose- Zeal Education Society q © scanned with OKEN Scanner Jauuers N3MO YIM pauuers {) AL RRM, 2S aoe ae A Amant phose _3— 7 The virus is ide jn dermank ple 4t bos accerssesecl the torxqel clewice but ~ dows not__talee ony acti a Note s- ot alt iruses ave oloimant phase Propoqation phase t- Qn thy phrase, the vin torts angly An Asplicoting abs Mf . the virus places a cop of ot ca oHy D au afi Shaplithen certain ystev) oreos or the disk. Cah Ange ded program will contain a chon of” aheclf qolvch will enter 2b own Propo} atin® phase as avelll. Triggering phase *~ ~ the Fouggering phase gtorty when Ahe » ~ dormant vid in? activated. dt will psaporum dhe acon sat a Supposed Ja acconspuisl _ Ws plrose con Le caused by VOAIeud destewn ewentts Dike Ahe aes oy Hmes the aparuad hes Clouek @r after a Set be intaral hos elapted. Zeal Education Society 10 Jauuers N3MO YIM pauuers {) 4 ZEAL INSTITUTES yy Exeurtion Phare 2- dn cis phose she poyload _suil| Le Released that af it will oftaxt harmin: Ale files deleting Hien, chasing the 4 ofts te and 90 Yon. q fome times at con be bormlers Loo ond oul Pep up a humownuy Mesage on Pcreen. T V¥ Type of Viruses 2- _tollowing are the ab ferent types of Computer si AUCs Boot cto, Vitus i- ft is a type 9 ides that. infeds the boot eects Yd feppy otis er Ahe “master _poot record CmBry ay taba disks. The boot decter compris att files avlidh arc Acguiied 40 Gtort operating sy ter pte She vinus ester Novdw sites the exiching proyem 6 copies itself 40 _anotlrer. peat 9 de _disle Direct Adion VAus.- wher a yi attaches atgelf abaedty to a exe Or _1.Com file, and enters {he olevire while i6 _oxeustion called a dite achon yiaua- if it gets uatolted in the memory , ik Leceps i} sols Didden, JL is oloo Knowh Gx Non-Resident Viv Craiaty ral Eel Jeuueds N3¥O YUM pauuess a) Resident Jinus Avi (hose itself jn the mem the Comp ol Aud “then infec ofr les and PX 5 prsmoms awhen” bs MuGinating PIDY5 ann no Shis Lec Ouse at hrord to be eorileing, Virus Con * cosily iafect other file in_tiddes in meme aad Removed from Lystook TT 3= A viru Awhidn -can Sh als type of oy Anke mot fet auido xe cutalte % 0.0 already snlected 2 Wis. ; Huts attack yaur System fompater iy AY@t are al axis 4 cyber “Hrs eat @_| Overuorike Wana Jig one ofthe most brosnrful iruses It CON Conplef, Aewmove tue” existing Prepon and Acplace if wit, mallictouS code overntiriting it. Gradually it COM comple, place hosts proesammiag Goole awit. Jrorenfad code g ©_| Polymorphic Virus: — JF &preads throush pars and jrfeteot quebsites Pele endl vids are file infechsis whi axe _comrplen 7 Zeal Education Society Hough to ” detect They sreobe 9 M2. Jauuers N3MO YIM pauuers {) ee ZEAL INSTITUTES ‘winw.zeateducation.com modified ce morphed version ents Hin pxo Pum and infect the systecs ond _xetain ‘the exviginal code - File Injector virus s- As the pame _fuggests Eile Safector ids wt__first da single file and Hie foter. eos itcol{ jo! pttier. execuitalte file and programs. The main _gewre _o Has % Pinus one Gannes and werd processed @l ofpace Fille, -Viaus'- Jt ~ a “rar Lupe EB virus which fille in the emph) ¢paces ofa file wilh ayirwsea. Jt iv Knasn Covily vias 9t fll neithen affect Abe size of thi file ne» cain da defected exsily @_|- Macro virus t- A ward wiikey in Som 5 jaacwo onguoge Os wed in the elt avare p: am and “infects Uae computer i . wOrd —_pyrncersor file Bay opernech Mainky” T ounce of Buda VANS. is vin em Zeal Education Society Jauueds NZNO YIM pauuers ) Following ore Some Steps that ca, take if vias hos infected Our oe, fy roy” i ‘Disconnect fom internet SEA an, Beoding with visurses 2— 3 arog a ae ii) __Relooot foun Computer snd ofe moi Wi) Delete any temporary filer Wes Gg on vy) Aelete quarantine the viaws 4 vi) Reboot A4Sur _¢ amputter. vil) Change “ all our posswords. vill) Alpdette ay aur Y foftore protien and Oper ong fy tem AWOrOS 4 ~ A Coen pusten 4HOuUN is a software progam ilaivigas Copy it fom one. omputer to anoth Ss anita ot frucnon Zaterachions - Jhe potential Kg Seabee 4) toe Lap a Arord _oligle fpace —Leecoue om can replicate -eeok volume oe at_a great peed rr 4auUeDS N3MO YUM pauuers a) wy ZEAL INSTITUTES Trojan Horse 2- A Trojan horse @ 4 molwore thot quisleads apes of ito tad dntent by disquising _iteelf "os a stondord pooparo he term is “derived from Ale oncent greele__ story. of deceptive toi ao horse that ed to “the fall op cihy “troy. Lawjans ore generally Pepread de ome. i con 4. goutad ~ enginetring Jntauders 3- They we often Agjeed to as backers ond ole yuost brows factors contrib tag do vabnarabiliby o, Jrouwuily Vv Jhey hove Vismense _lenowledge and an ia th“ undesanding of tedanoloyy fo secus'ly, Jrtrudis dread Wi privacy. * ereagtitn and aim to steal Abe confidential -infocnnat Insiders g- An insider treat is a ole Rig le “paot riginates from __witlain rm torgeted |_ organig atipn. Jt Aypicalty invelves a Cungent oA foconck. employee eva. _fnviney ” Zeal 1 Education Society i x ZEA iris 7 rmzoateducatone®, ZA Y sosiote wsho bas ace to Sensitive 4auueds N3XO YIM pauuers a) information or privileged accounts _nsiltain Ale networl Fy tan bxganigehon, and who WUSUsey — Abiis “ accey. VY” Traditional conti nacayures tend to fours on extern) reds and are nok “allways capatee g, den fy ing an interne treat emonosing “fam “Snlide 4h S2ga.nis ation - LG. Types of Attacks — - Active and Passive otlode ¢- Active attacks one a Lupe of cyber Securily attack in which an attacker” oitlenro alter, alestry 0 isuipt the normal > eperatron ga Systems a perwork Ackive attacks _jnvalue attacker talerng lack akon against Loag Systm A nelwotlke and can be ote _danpeXous than Passive otftacks. which “ervelves cinaply nabni tering or Rawetolfopping ou_a cysfer or nelwodrte. Zeal Education Society le JauueDs N3MO YIM pauuers sO) ZEAL INSTITUTES ‘yriw/zealeducation.com A Passive ottoe attempt, to Learn oA wralce aise Of Pg ro sypteon out does __ not affe Systeeo PesOunAre. Passive ‘odlacles in the natwe of avs ing On ot monitoring tranamissiod he gen of the _eppanent iy! 40 __ obtain information M that “is Leing Doasmitted Possive attacks _¢nvelve passively pnitering i _calleching lod witout olring © tingiog at! ; 2 xssuples of passive alla iadude evesd ppicg ond "sniffing Canolysing olata packets 20 obtain censihve information ). Genial of derwite (des) $- it occurs when Degihtmate uers ore uinotte to access information systems devices A otha network moan ue to acho of molideurs ~eyjber Alacat acto, deruices eked acy include e@ moult mwobsites , online accounts (eg bonleing) Orv other Cavices Lot xely ov appected Comput 4 nek worl. He eee A_D0S _conditi0n ay accomplished (coding Abe torgeted hest 6x network awit S tropic suri Abe torget Connot Jr epond "oh sionply crashes “ prevectiny Zeal Education Society n Jauuers N3MO YIM pauuers {) Zee ZEA wove sik —— Dos _attade” doth time a Ques to legihionole xwers. cay couse cost on -srgonis nol _money awtile C Ste, Aeseurc and gervites 2 ore Sar [==] Aitade froma “ciagle install ™ additional Softwole Ar 6 Fong enous threat, + Conbol Abe ealine Systern daduding ony present \ appleahtn r_hiw V dewey ¢ dlutolow or _deboot a Computer 2 Aktade otic, ros fs. an_a_pededoor & _tropoloan bas additonal rmbol capabilities file hey stole Logging Screevsboot caphuxe file infection ever’ tofal Ysteoy dertauction ele. Suda pororiter ss a Combination alifferent prvow © geuuity thea whidy works, fee its “own ond “sloes'at AePuine Lo be contalled ot olf Most backdoors are autoormatic Moliciou, pa Ahak nut be gomelrow installed Lemepat Sore pasoriles do: ins) gi Aner Remote fost - Progammets gometime Left fucla batkedoor ix Aber oft wore, Mognatc & thowlte clooting purpose Hatlecrs offen “Yiscover _ aese _uendowunstel {ecto and wie atrem 40 fneake alo System. 1. for Hrwe atlas powerfrll Counter peas ure products. antivirus anvicl avili _¢pywore ~Gaitping $ A_sniffing atlock in _systes haclaiqg is @ fos 4 denial of Serie atlock (pos) \ yslucla Oy pennied aut Ly sniffigg O& _copteaing patlets cea en rete eey ete terndas them aepeotedly to vidio mochine 62 aeplaying Hien —Lbacle do the sender with modifrconons . aifens are oftevn psed 19 Sysheur raclcia aso fool for ovalysing Ano}fic paticrns if a geanarig _arhere_performin more intrusive and __damoging “atlades would pot Le desirable. Fiq - Saiggeg Jauuers N3MO YIM pauuers {) rrr Zeal Education Society ay souuers Na¥O YIM pauUers a) Sa ea sag UTES 9N___ contenct of inloromntion — seusrity especially netwerk” yeturit, a Spona attack o> a gitvahion in V which a "pon ev _pwyary dace oipelly Adentifies Oy anathen by gobifuinig | olata Uegikionate advowtode | rp Speching « — cpoofing _3— \ d = — Attacker ah Frod Aap for Soto cae t gre vk Latin | > TPT cferver See toils NF Jorwne & sendy data tS yiciay Eig Spesfiog j—y Zeal Education Society ZEAL INSTITUTES won zealeducation.com Jauuers N3MO YIM pauuers {) Replay _:- A deploy otlak in a Aype of network atlagk in ‘whvdr on ollacker —_ceptury oo valid vretwork transmission anc shen relransmit it Later. She main dojecive in 20 Jule the guste _irtlo accepting dhe rdbonsmission g data a» @ Deg ihn one. Addlithonally Atploy Gitackes ore Lazardous Lecouse ths cLiallenging” do detect origin Communication — T T Tsnig — T t T at J ye — = User Rs OW . TE Co Attacker Zeal Education Society Jauuers N3MO YIM pauuers {) ZEAL INSTITUTES were zealeducaiion com Man =n the - Middle Attack § A maa -in - the - nxoldlle allo CMT) 45 2 type Lpber atladle in _swbida de _attlackeer afe cr © intercept Qud Sos PAewsO Ges Bw partes acho beleive Ahoy One Coprauini cong, olirectly wit _eada otha” The attack 4 a 1ype of eoves depp ing in TWA alae jahvcepy ond tien © control dhe _evliie wy VeAAGL ON. orginal Camouaniaich ® tel a oN Cc pa sen, NC SSP. web Appl Mon- in- rvidele Figi- Mon- in-the- aridelle attack Zeal Education Society 24 49UUe>S NANO YIM pauuers a) y - ZEAL INSTITUTES wa. zeateducation.com top |e Hacking 3- Ter/ EP hijacking iy aohen an authorised deh gaivs aces too genuine anlo q onnection another _aer. $k is clone _an of rd Lo be pars the _parsswold guthreaticabion gr asita nes molly due slot 4 gession. a web Serva i oo Attack eS wels serner Go sends S¥N- ACE @ —— —_ maelg CAVA = Te enancilesle VouR User enc SYN £29 Fig’: ep) =P Houking Au attacker pronihors the data Jranamisivron over _ a network ond discovers ZP's of _2 clewices rot policipate jn Lhe ‘connection adhere _hackex__plscovers EP Of one Wer he can pst down oly sur by pos attack ad and then Acuume communication Au sped "9 0 zP 4 Aisconnectedl buyer. Zeal Education Society ae ZEAL INSTITUTES www zealeducation.com Envyption — Attocles ~ A A CRPAaES otladle in _@ _yretbrod sued Ly deat Aosget. Lic polutions Like cipherterct seta lees a These attades aim “to achieve He plain text fam ciphertett ox decwde Abe env, pled a. Hace oot ottempt to by par decor » a tic Sy stern by cliscoveriay wealdncs and Ue in Ou plogra tee cryptog voplic prpfecole™ encryption olgorjHanss 64 ee management _pflrategy Plain Entry iption —— Cipher text Cipha, Be cryphod Pp Plaine tok pet v Fig se Enoyphad & Secryption BY IAy f v YOON Od algoriHanns im Cripps opts Zeal Education Society 26 @ scanned with OKEN Scanner ZEAL INSTITUTES wan zealeducation.com Operotin: fy st fae de= fe curly opens fo providing pxotection fysieny to’ computer _yysterm ~ resources guctr_asy CPU, _wacmony clisk softcore program and mat iSpertordt, ie alata) enatiors _¢hored in the U systern. Followieg are Sqme___0S veceusity sapdortes Mok “yp preventing otlades. om 0 punting Syste ; Hot fix _3- A hotfin _is code. — Serehines eh a _potch Cthat forces bug an Abe product. Hsers a the _producl naight Le notified hey emoil or obtain infor nation about new Drothines _ ot a Softrwmre__verdorrs awebsite ond download de Aastfirces Mary woish 40 opphy shat software and epuahing addros gecunily duet. Poke :- Patches are stom (0s) updotes Abot vulneralilihes avithin a _prograny _ 6% pw Poltwore vendors moy choose 40 Aclease os well wepdates Lo fix 2 mance as 0 provide enhanced Seanrity feclurer. Zeal Education Society at @ scanned with OKEN Scanner Service Pole s- A anes pou ciel Aspdate often combining prcdouss Related sxpclotes Atrot _rielps alee, windows wre Acliable. dewice Pats can inckude geusihy ond p. nance, improvements and _ gapport _fet New types of _ oroluare ae Make Sure fou jnstald Ale Qntest _rerice pole to help leeep windows wy - do - date. © Juntos mation !— Ht Need ond Iwpertonce 4 Jnfermation ie Beuision Mabeiog se 4 fodow 't fost - paced would, Clkcisiong wat be rode © quit and Acc to urate H iALomaly te avs ac anely oe 0s dp individuals ergonigalion aralee 9 med decision tad con positively impact _ 2S Lives oud Srusinorers 2) Leaning ond education +- Inkormation ae “needed Deorning and edstcabion. Phictenty and professional meed acces to Relevand avd arcrriote Arafst enadton 4o_keep mp awit Latest treros ddeos & Hrepries. in hespective feidde Zeal Education Society © scanned with OKEN Scanner 4) Smnevatiog and Creativity s- By showing eae on _Lotest trends Aesearda in a _ fei jadividuals and Orgauisotians an_frad new wows fo Love probles % create voluc fr _uutomers Communication +- Iujermation 4 needed eve communication. Access Lo information Coa 6) Verkp indivictuals 0 _undestand _pftrers perspective Oye communicate Ure. efpedtively Persanal Grouwtlr_:- Gnolividuals can dlevelery new skills Qrareoh on _ tren jalaats , Can feorn about other culture, anol expand thin héerzou. gafedy ond Seuwy ae Snfecrnation, in Needed far £ Low emmforcement OGencier governor t Lrnoiies _prganizati ows Lusineses neeck acces £0 _ ingexmahion ‘to identify potevtial fbrealy and paewenk theron Hee - Economic Newelopment + Dusinessed need access 2) _to i mabey. on markeel Irentls consumer _ Qrlroriouwr ond — faterst technologies lo shag | Competitive ancl grow a ae 7 a 3) | Health ond well nos 3 - Frdivicduols neck 7 accurate and sebiable inferorotion Za rake 7 inferred —_alecisioas about itacA freoGih & well hein Zeal Education Society a © scanned with OKEN Scanner ZEA INSTITUTES! wwewzealeducation.com 4) | fouot and Cublural Sevelopment 2- Qndividuols and organisations need ace to infermalion om ol, erent dus bistocies froditiews to build undestendiag 2 promote souol cohesion. ue ¥__| duformation __Llossifrcation - ; Goool anfer oration classification ads as a uydahen 40 feeep yon Ausinenes alata Caganised accessible Neel ssefull 4t_ wea (orAplee and hefty task to ~heasife aunfermeatliong ia righ volume, yoortet, ond aclewance. g Most of dhe Orgawisatrory aWH46 [low iag fteps Sto | oles: Alings Coser. v | Anclyrne and undwlend x mation assed and assign Level of fens tivity one foam to__2ods ‘The fest shep_g anfermotion

You might also like