Cybersecurity Threats: Comprehensive Analysis and Solutions
VerifiedAdded on 2023/01/12
|26
|8270
|85
Report
AI Summary
This report provides a comprehensive overview of cybersecurity threats, which are becoming increasingly important as more business activities move online. It discusses the importance of cybersecurity in protecting computer-based equipment and information from unauthorized access, change, or destruction. The report identifies four main types of cyber-attacks: Denial of Service, Malware, Worms and Trojan horses, Botnets and Phishing. It also explains the different categories of cybercrime, which includes crime against a single person, property crime, and crime against an organization. The report highlights various types of cybercrimes such as email spoofing, cyberstalking, cyberbullying, identity theft, phishing, pharming, and the impact of viruses. The report emphasizes the importance of planning, implementation, and review in cybersecurity to counter cyber-attacks effectively. The report also covers the importance of being aware of the latest threats and the necessity of protecting against scams and data theft.

It is a very important to assure that nobody is trying to steal any type of data or else money
from any of the business activities that are moving online. For securing from these type of
threats it is very important to implement cyber security. Any type of unauthorised access or
any type of destruction that may happen to any of computer related equipment or networks,
cyber security acts in these purpose for protecting these systems. Cyber-attack can be of
different type that include theft as well as any type of unauthorised access to the computers or
to any such other devices. It also includes any type of remote attack which may happen on
various computer systems or else it can be on various websites and even it can be a third
party attack as on cloud devices. On a strike of cyber-attack it cause financial loss, the
recovery cost an even the replacement cost can be very high (Rid and Buchanan 2015). Even
the reputation of the company can go down and can also cause damage to any other
companies those are related to that company.
There are four types of attacks that generally occurs.
Denial of Service: This type of attacks creates damage generally to the computer networks or
else to the applications or to any systems and exhaust all the resources. Once this attack
happens to the systems, the hackers asks for an amount of money that is termed as ransom,
after which the access is given to the user.
Malware, Worms and Trojan horses: This type of attack happens on various websites those
are non-malicious, but after the attack the websites become malicious. This type of harmful
viruses are spread through emails, through various malicious websites or else through instant
message.
Botnets and zombies: In this case in the central controller which creates a robot network into
which a number of computers are connected. This type of computers are called zombies
botnets, these are made for stealing of data and it is also very difficult for detecting.
from any of the business activities that are moving online. For securing from these type of
threats it is very important to implement cyber security. Any type of unauthorised access or
any type of destruction that may happen to any of computer related equipment or networks,
cyber security acts in these purpose for protecting these systems. Cyber-attack can be of
different type that include theft as well as any type of unauthorised access to the computers or
to any such other devices. It also includes any type of remote attack which may happen on
various computer systems or else it can be on various websites and even it can be a third
party attack as on cloud devices. On a strike of cyber-attack it cause financial loss, the
recovery cost an even the replacement cost can be very high (Rid and Buchanan 2015). Even
the reputation of the company can go down and can also cause damage to any other
companies those are related to that company.
There are four types of attacks that generally occurs.
Denial of Service: This type of attacks creates damage generally to the computer networks or
else to the applications or to any systems and exhaust all the resources. Once this attack
happens to the systems, the hackers asks for an amount of money that is termed as ransom,
after which the access is given to the user.
Malware, Worms and Trojan horses: This type of attack happens on various websites those
are non-malicious, but after the attack the websites become malicious. This type of harmful
viruses are spread through emails, through various malicious websites or else through instant
message.
Botnets and zombies: In this case in the central controller which creates a robot network into
which a number of computers are connected. This type of computers are called zombies
botnets, these are made for stealing of data and it is also very difficult for detecting.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Scareware: These are the fake warning of security. This attacks are highly profitable for the
cyber criminals as because many of the users think these warnings to be real and thus follow
certain steps that are instructed regarding this threats.
This is an important factor for various companies in protecting themselves from any type of
scam threats, thief of data or else any type of other vulnerabilities. Planning is the only
solution from preventing this type of practises. In this planning it may include to know which
the information assets that are very critical and then to study that what will be exposed due to
this type of risks. The legal requirements and the compliance requirements are to be detected.
Implementing is another important factor that is to be noticed, such as what type of security
controls that is to be taken specifically for specific IT systems and all other outsource staffs
should know their responsibilities. After that also if any type of attack happens further, what
are the steps that is to be followed to protect their business from the attack.
Finally reviewing is an important factor that is always to be done. It is very important to test
the effectiveness of of the controls. Right after completion of monitoring any required actions
should be done regarding the problems monitored. Knowledge regarding the latest threats
should be kept into account. Thus by following all the above three process it will be easier to
counter any type of cyber-attacks.
In todays world computer is a part of human’s life. It is almost impossible to remove
computer from the life of people. The high rising technology made life much easier and helps
in connecting remotely through interconnected networks. There are certains ways through
which people are connected among themselves such as via smart devices etc. In these various
type of gadgets various important informations are stored, even they are used for booking
tickets, banking online, play games or can be used for shopping online. It also helps in
connecting of friends through Social Medias. Today’s network system made the
cyber criminals as because many of the users think these warnings to be real and thus follow
certain steps that are instructed regarding this threats.
This is an important factor for various companies in protecting themselves from any type of
scam threats, thief of data or else any type of other vulnerabilities. Planning is the only
solution from preventing this type of practises. In this planning it may include to know which
the information assets that are very critical and then to study that what will be exposed due to
this type of risks. The legal requirements and the compliance requirements are to be detected.
Implementing is another important factor that is to be noticed, such as what type of security
controls that is to be taken specifically for specific IT systems and all other outsource staffs
should know their responsibilities. After that also if any type of attack happens further, what
are the steps that is to be followed to protect their business from the attack.
Finally reviewing is an important factor that is always to be done. It is very important to test
the effectiveness of of the controls. Right after completion of monitoring any required actions
should be done regarding the problems monitored. Knowledge regarding the latest threats
should be kept into account. Thus by following all the above three process it will be easier to
counter any type of cyber-attacks.
In todays world computer is a part of human’s life. It is almost impossible to remove
computer from the life of people. The high rising technology made life much easier and helps
in connecting remotely through interconnected networks. There are certains ways through
which people are connected among themselves such as via smart devices etc. In these various
type of gadgets various important informations are stored, even they are used for booking
tickets, banking online, play games or can be used for shopping online. It also helps in
connecting of friends through Social Medias. Today’s network system made the

communication more simpler and thus various type of opportunities are provided depending
upon this. Numerous number of challenges and even threats are there regarding to these
usage of networks. These type of threats are known as cybercrime.
Any type of illegal activity that is done through the internet is termed as cybercrime. In this
case it includes identity theft which may cause steal of email id’s and the passwords as well,
after that the particular account may be used as fake and thus may use for any type of
criminal activities. Then there are various other type of threats available through the internet
which include any type of internet fraud, may order various goods on fake name and they can
also extract contacts. Even they can imitate currency, objects and documents of unknown
people for various bad intentions and may also harass the person.
Generally cybercrimes are divided into three different categories:
Crime can be done on a single person
Property crime
An organisation or a society may also get affected by any crime
1. Crime done on a single person: In this case of offence a single or a particular person
gets affected. This type of crimes are committed in the following forms:
a. Email spoofing: Spoofing is meant by misleading. In this case of crime a message is
received by the receiver and the receiver gets to believe on that message. In actual
which is not true. This is a fake message message. When the user opens the particular
link that is attached with that message, the following system gets affected by virus.
b. Cyber Stalking: In this case harassment is done on the victim by the attacker through
various means of communications, including emails, blogs etc. It can be a known
upon this. Numerous number of challenges and even threats are there regarding to these
usage of networks. These type of threats are known as cybercrime.
Any type of illegal activity that is done through the internet is termed as cybercrime. In this
case it includes identity theft which may cause steal of email id’s and the passwords as well,
after that the particular account may be used as fake and thus may use for any type of
criminal activities. Then there are various other type of threats available through the internet
which include any type of internet fraud, may order various goods on fake name and they can
also extract contacts. Even they can imitate currency, objects and documents of unknown
people for various bad intentions and may also harass the person.
Generally cybercrimes are divided into three different categories:
Crime can be done on a single person
Property crime
An organisation or a society may also get affected by any crime
1. Crime done on a single person: In this case of offence a single or a particular person
gets affected. This type of crimes are committed in the following forms:
a. Email spoofing: Spoofing is meant by misleading. In this case of crime a message is
received by the receiver and the receiver gets to believe on that message. In actual
which is not true. This is a fake message message. When the user opens the particular
link that is attached with that message, the following system gets affected by virus.
b. Cyber Stalking: In this case harassment is done on the victim by the attacker through
various means of communications, including emails, blogs etc. It can be a known
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

person of the victim or it can be an unknown person aswell. There are various acts
the attacker performs in cyber stalking:
i. By posting various type of false information about the victim in the internet.
ii. Online activities of a particular person is monitored.
iii. Many types of virus are send in the victim’s system to damage his/her system.
iv. Giving different threats to victims or to the victim’s family.
v. Many type of cheap magazines are subscribed and even the attackers order different
items to humiliate the victims, and even they send these items to their home or into
their workplace.
Fact that is to be known: In case cyber trafficking, there happens various type of
crimes such as selling of drugs, various type of weapons and it can also be selling of
human beings. Various type of encrypted messages are delivered between the
attackers to perform their work and any type of such criminal activities. There are
certain criminals who builds various websites to perform such type of criminal
activities.
c. Cyber Bullying: Harassment or else harming through IT intentionally is known by the
term. This crime includes various type of spreading of rumours or even any type of
remarks those are insulting through emails or through any type of social media. This
acts arte done generally upon nationality, race, religion and gender as well.
i. Know more: Defamation is termed as a type of communication which is
intended to harm or to damage reputation of a particular person, or the
business, or else product, nation, government and religion as well.
2. Cybercrime that is done against property: Someone’s property stealing is a very
common practise in real life. In the world of internet also there are certain people who
intends to steal something valuable or to rob something. In general bank details of
the attacker performs in cyber stalking:
i. By posting various type of false information about the victim in the internet.
ii. Online activities of a particular person is monitored.
iii. Many types of virus are send in the victim’s system to damage his/her system.
iv. Giving different threats to victims or to the victim’s family.
v. Many type of cheap magazines are subscribed and even the attackers order different
items to humiliate the victims, and even they send these items to their home or into
their workplace.
Fact that is to be known: In case cyber trafficking, there happens various type of
crimes such as selling of drugs, various type of weapons and it can also be selling of
human beings. Various type of encrypted messages are delivered between the
attackers to perform their work and any type of such criminal activities. There are
certain criminals who builds various websites to perform such type of criminal
activities.
c. Cyber Bullying: Harassment or else harming through IT intentionally is known by the
term. This crime includes various type of spreading of rumours or even any type of
remarks those are insulting through emails or through any type of social media. This
acts arte done generally upon nationality, race, religion and gender as well.
i. Know more: Defamation is termed as a type of communication which is
intended to harm or to damage reputation of a particular person, or the
business, or else product, nation, government and religion as well.
2. Cybercrime that is done against property: Someone’s property stealing is a very
common practise in real life. In the world of internet also there are certain people who
intends to steal something valuable or to rob something. In general bank details of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

various person are stolen thus illegally they withdraws money through internet. Even
this results in illegal practise of using other people’s credit cards or damage any
system by various harmful software.
a. Identity theft: In this case it is defined as if someone’s information is stolen or
being misused. All of those people who usually uses the internet for different bank
services, shops online and even transact cashes through online. In the informations
that are stolen, it includes the account number of a person, maybe the name of that
person, debit card or any type of such card’s number and even it can be the date of
birth of any people. After the informations are stolen, this information’s are used
for various UN lawful tasks such as illegally withdraw of money or any type of
such illegal works. This types of hacking are generally done by hacking the
network of the victim or by imposing a harmful software into the victims system.
i. Fact that is to be known: One type of program known as key logger which
is generally used for checking the keystroke and any type of other personal
information of the user.
b. In this type of attacks many types of military websites or any other government
websites get effected. Phishing: In this act any type of fraud email are send to the
user and make the user to believe on that email that it is from any trusted
organisation or from any trusted person. In the process the user is instructed to
visit a particular website where from it is instructed to give the user’s personal
details or update them. After this the attackers use this details for performing any
type of crimes.
i. Fact that is to be known: Vishing is a type of criminal practise which is
done in the telephone system by using social social influence. This type of
acts are done generally with the help of VoIP, and used to access on the
this results in illegal practise of using other people’s credit cards or damage any
system by various harmful software.
a. Identity theft: In this case it is defined as if someone’s information is stolen or
being misused. All of those people who usually uses the internet for different bank
services, shops online and even transact cashes through online. In the informations
that are stolen, it includes the account number of a person, maybe the name of that
person, debit card or any type of such card’s number and even it can be the date of
birth of any people. After the informations are stolen, this information’s are used
for various UN lawful tasks such as illegally withdraw of money or any type of
such illegal works. This types of hacking are generally done by hacking the
network of the victim or by imposing a harmful software into the victims system.
i. Fact that is to be known: One type of program known as key logger which
is generally used for checking the keystroke and any type of other personal
information of the user.
b. In this type of attacks many types of military websites or any other government
websites get effected. Phishing: In this act any type of fraud email are send to the
user and make the user to believe on that email that it is from any trusted
organisation or from any trusted person. In the process the user is instructed to
visit a particular website where from it is instructed to give the user’s personal
details or update them. After this the attackers use this details for performing any
type of crimes.
i. Fact that is to be known: Vishing is a type of criminal practise which is
done in the telephone system by using social social influence. This type of
acts are done generally with the help of VoIP, and used to access on the

personal information of various people that includes accessing of debit
card details etc. This act is termed as a combination of phishing and voice.
c. Pharming: In this case a small code is installed in the victims system that redirect
the system to various malicious websites without any type of notification to the
victim. Thus this leads to get various type of personal information of the victim,
such as passwords, etc.
i. Let’s know more: In this case the victim is manipulated to perform various
unlawful tasks. This is termed as Social Engineering.
3. Organisations under cybercrimes: This type of attacks are highly planned and this acts
may cause huge amount of effect into the computer networks. Huge number of
civilians gets effected due this type of tasks.
a. Transmitting Virus: Computer virus is defined as a type of computer program or
else a number of computer programs that creates effect on a normal functioning
computer. This type of viruses generally effects or destroys the data. A type of
virus which is known as biological virus that enters to any of the computer system
without giving any type of notice to the user. Virus is illustrated as “Vital
Information Resources Under Seize”. Due to the spread of virus it affects the
processing speed of the computer system, hamper the programs, effect on data,
etc. The programs present in virus a self-replicating that expands automatically
and spread throughout the infected network and infects the data of the system,
files present in the system and all other types of effect. Making of the program of
the virus and implementing it into the network is a type of cybercrime. All of t6he
virus are to be executed. That when any virus is present in a computer system, it
will not affect the system until and unless the program is opened in the system.
card details etc. This act is termed as a combination of phishing and voice.
c. Pharming: In this case a small code is installed in the victims system that redirect
the system to various malicious websites without any type of notification to the
victim. Thus this leads to get various type of personal information of the victim,
such as passwords, etc.
i. Let’s know more: In this case the victim is manipulated to perform various
unlawful tasks. This is termed as Social Engineering.
3. Organisations under cybercrimes: This type of attacks are highly planned and this acts
may cause huge amount of effect into the computer networks. Huge number of
civilians gets effected due this type of tasks.
a. Transmitting Virus: Computer virus is defined as a type of computer program or
else a number of computer programs that creates effect on a normal functioning
computer. This type of viruses generally effects or destroys the data. A type of
virus which is known as biological virus that enters to any of the computer system
without giving any type of notice to the user. Virus is illustrated as “Vital
Information Resources Under Seize”. Due to the spread of virus it affects the
processing speed of the computer system, hamper the programs, effect on data,
etc. The programs present in virus a self-replicating that expands automatically
and spread throughout the infected network and infects the data of the system,
files present in the system and all other types of effect. Making of the program of
the virus and implementing it into the network is a type of cybercrime. All of t6he
virus are to be executed. That when any virus is present in a computer system, it
will not affect the system until and unless the program is opened in the system.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

i. Fact that is to be known: The most expensive virus in the present world is
called MyDoom. This virus have already caused a damage of around $38.5
billion.
Types of Virus:
There are various viruses which are classified into the following:
1. Boot Sector Virus: These are the types of virus which cause damage into the boot
sector of floppy discs or to the hard discs. There are small sections into which a hard
drive is divided. Of which boot sector is the first section. It consists of the record
known as master boot which results in reading of the operating system. While the
system is booted the boot sector virus activates and it destroys the data present in the
hard disks. The example of this type of virus are disk killer virus and the stone virus,
etc.
2. Program file virus: This is the program that infect the files that is to be executed,
specifically the files that have the extensions of .sys, .exe, .drv, .com etc. This are
viruses that loads into the memory and thus gets executed. This type of virus replicate
themselves and infect the files present in the system and cause them into permanent
damage. There are certain examples such as Cascade, etc.
3. Multipartite Virus: This is the virus which is a combination of Boot Sector virus and
Program File virus that are easily spread into multiple ways. This type of virus enters
the system and thus infects all the media present into the system. After causing
damage there this virus creates damage into the boot sector and starts to spread. The
after that goes to infect the hard drive and many more, which results in infection of
the executable files. Some examples are Tequila, Invader etc.
called MyDoom. This virus have already caused a damage of around $38.5
billion.
Types of Virus:
There are various viruses which are classified into the following:
1. Boot Sector Virus: These are the types of virus which cause damage into the boot
sector of floppy discs or to the hard discs. There are small sections into which a hard
drive is divided. Of which boot sector is the first section. It consists of the record
known as master boot which results in reading of the operating system. While the
system is booted the boot sector virus activates and it destroys the data present in the
hard disks. The example of this type of virus are disk killer virus and the stone virus,
etc.
2. Program file virus: This is the program that infect the files that is to be executed,
specifically the files that have the extensions of .sys, .exe, .drv, .com etc. This are
viruses that loads into the memory and thus gets executed. This type of virus replicate
themselves and infect the files present in the system and cause them into permanent
damage. There are certain examples such as Cascade, etc.
3. Multipartite Virus: This is the virus which is a combination of Boot Sector virus and
Program File virus that are easily spread into multiple ways. This type of virus enters
the system and thus infects all the media present into the system. After causing
damage there this virus creates damage into the boot sector and starts to spread. The
after that goes to infect the hard drive and many more, which results in infection of
the executable files. Some examples are Tequila, Invader etc.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

More to know: In the list of crime ware application there are the bots, whih performs
a numerous number of tasks automatically and thus works for the cyber criminals.
4. Polymorphic virus: According to the name this type of virus can be of different forms
when they infect each and every times a different file. It also changes the virus’s
binary pattern so that detection is avoided. Some examples are Marburg, Elkern, etc.
5. Network virus: This are the viruses that spreads via LAN and also in the internet.
This are the types of virus that spreads while sharing of any type of file through the
network. After the completion of one attack of the virus it keeps o following the
network and thus find its new target. It keeps on affecting one after another virus. One
of the big example of this type of virus is called Nimba and there is another one called
SQl Slammer.
6. Macro Virus: In this type of virus there are various types of softwares present, such as
PowerPoint, Word. Suppose if a file is already infected, if anyone opens the file, the
virus instantly gets into main memory and gradually destroys the data that are stored
into the hard disk. There are a number of sequence of actions in present in the
program of the virus which if activated will severely affect the system. Some
examples of this type of virus are Bablas etc.
7. Cyber Vandalism: In the aim of performing various harmful tasks this is created with
various malicious programs into it. In the aim of doing any harm to the computer it in
inserted into the system that cause is erasing of all the data in the system and it may
also cause in stealing of the information from the system.
8. Hacking: It is the act which cause to an entry to the network that is illegal. Hackers
build up various programs and implement the programs into the system. There are
some different type of hackers who just does this type of crime just as for enjoyment
a numerous number of tasks automatically and thus works for the cyber criminals.
4. Polymorphic virus: According to the name this type of virus can be of different forms
when they infect each and every times a different file. It also changes the virus’s
binary pattern so that detection is avoided. Some examples are Marburg, Elkern, etc.
5. Network virus: This are the viruses that spreads via LAN and also in the internet.
This are the types of virus that spreads while sharing of any type of file through the
network. After the completion of one attack of the virus it keeps o following the
network and thus find its new target. It keeps on affecting one after another virus. One
of the big example of this type of virus is called Nimba and there is another one called
SQl Slammer.
6. Macro Virus: In this type of virus there are various types of softwares present, such as
PowerPoint, Word. Suppose if a file is already infected, if anyone opens the file, the
virus instantly gets into main memory and gradually destroys the data that are stored
into the hard disk. There are a number of sequence of actions in present in the
program of the virus which if activated will severely affect the system. Some
examples of this type of virus are Bablas etc.
7. Cyber Vandalism: In the aim of performing various harmful tasks this is created with
various malicious programs into it. In the aim of doing any harm to the computer it in
inserted into the system that cause is erasing of all the data in the system and it may
also cause in stealing of the information from the system.
8. Hacking: It is the act which cause to an entry to the network that is illegal. Hackers
build up various programs and implement the programs into the system. There are
some different type of hackers who just does this type of crime just as for enjoyment

while others may have some type of serious intentions and cause various types of
serious damage as strealing of informations, transfer of money, etc.
9. Child Pornography: The computer network is used for the reason of distributing
various contents that may cause effect into mind of under aged children. There are
certain people present who are attracted to the children pornography and thus this lead
in happening of this type of harmful acts.
10. Cyber Squating: In this case anyone who have a goodwill, the advantage of this is
taken and thus use this goodwill to perform any unlawful act.
11. Forgery: This is a type of crime that defines if anyone have made any false copy of a
specific document, which includes Adhere card, Pan Card etc. Various types of
scanner is used to perform this type of tasks.
12. Cyber Extortion: This is an act which is specified as, if an attack is done on a victim,
after which a pay has been asked by the attackers to stop any of such further attack. It
is generally done in the way of blocking a particular system or any Ransomeware.
This attacks are performed by spreading of emails.
13. Cyber Terrorism: In this case terrorism act is done in the internet by using computers
that results to cause panic. It is done as the motive to cause a big effect over the
government or to do any social act such as any type of religious activities or national
activities.
Fact that is to be known: There is a term called Cyber espionage which is meant for
having secrets of any particular person, may be a competitor or as such (Danks and
Danks 2016). This creates exploitation that is illegal in the network.
serious damage as strealing of informations, transfer of money, etc.
9. Child Pornography: The computer network is used for the reason of distributing
various contents that may cause effect into mind of under aged children. There are
certain people present who are attracted to the children pornography and thus this lead
in happening of this type of harmful acts.
10. Cyber Squating: In this case anyone who have a goodwill, the advantage of this is
taken and thus use this goodwill to perform any unlawful act.
11. Forgery: This is a type of crime that defines if anyone have made any false copy of a
specific document, which includes Adhere card, Pan Card etc. Various types of
scanner is used to perform this type of tasks.
12. Cyber Extortion: This is an act which is specified as, if an attack is done on a victim,
after which a pay has been asked by the attackers to stop any of such further attack. It
is generally done in the way of blocking a particular system or any Ransomeware.
This attacks are performed by spreading of emails.
13. Cyber Terrorism: In this case terrorism act is done in the internet by using computers
that results to cause panic. It is done as the motive to cause a big effect over the
government or to do any social act such as any type of religious activities or national
activities.
Fact that is to be known: There is a term called Cyber espionage which is meant for
having secrets of any particular person, may be a competitor or as such (Danks and
Danks 2016). This creates exploitation that is illegal in the network.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Cyber Security:
It is the term that defines as collection of various type of technologies or processes which
have been structured in the means of protection of networks, data etc. from the attackers
(Bada, Sasse and Nurse 2019). This includes the following:
1. Antivirus: It is a type of program of computer. It is made for the aim of identification
of viruses and the way to prevent them and thus remove them. There are a number of
tasks that is done in the computer:
a. It scans the whole system and finds for any type of virus that is known to the
antivirus.
b. It also looks for any type of unwanted acts in the computer system and works on
that act.
c. Scan all the mails that are received in the system as because this emails may
contain files of virus into it.
d. There are few lists of computer virus which are used nowadays:
i. Quick Heal, Symantec Antivirus etc.
e. Antivirus Software features:
i. Scanning of the full system: This types of scan helps to scan the whole
system (Buczak and Guven 2015). These are usually done when the antivirus
have been installed in the system or at the time when the antivirus software
have been updated.
ii. Custom Scan: It is used for the users to scan the system as per the
requirements of the user.
It is the term that defines as collection of various type of technologies or processes which
have been structured in the means of protection of networks, data etc. from the attackers
(Bada, Sasse and Nurse 2019). This includes the following:
1. Antivirus: It is a type of program of computer. It is made for the aim of identification
of viruses and the way to prevent them and thus remove them. There are a number of
tasks that is done in the computer:
a. It scans the whole system and finds for any type of virus that is known to the
antivirus.
b. It also looks for any type of unwanted acts in the computer system and works on
that act.
c. Scan all the mails that are received in the system as because this emails may
contain files of virus into it.
d. There are few lists of computer virus which are used nowadays:
i. Quick Heal, Symantec Antivirus etc.
e. Antivirus Software features:
i. Scanning of the full system: This types of scan helps to scan the whole
system (Buczak and Guven 2015). These are usually done when the antivirus
have been installed in the system or at the time when the antivirus software
have been updated.
ii. Custom Scan: It is used for the users to scan the system as per the
requirements of the user.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

iii. Virus Definitions: The antivirus software’s which are installed into the
systems identifies the virus just by the definition of the virus. So a periodic
update is necessary for knowing of the new virus available.
iv. Actions that should be taken by an antivirus: Mainly there are three type of
action which is generally taken by the antivirus software. Those are as
follows:
1. Repair: In this case the virus which is identified is usually removed
from the system.
2. Delete: In this procedure the file into which the virus is found, the
whole file gets to be deleted along with the virus present into the file.
3. Quarantine: Whenever there is a doubt on a file, that the file may have
been affected by virus. The file is kept separated from all the other files
thus helps in stopping the spread of the virus.
2. Firewalls: This is a type of security-system present in a computer system that helps in
preventing of any unauthorised access. It can be used in both hardware and in
software. It is applied in the gateway of certain networks after which it helps in
protecting the network by controlling incoming traffic and outgoing traffic.
3. Encryption Software: At the time of data transmission in the network the privacy of
the data may be removed. Encryption is the technique that helps in protection of the
data. In this technique the data is transferred into a form of data type that is not easily
recognisable. The data that is encrypted can be termed as Cipher Text. In case of
reading of the data, the encrypted data is to be decrypted. This is the process
decryption.GnuPg is the software which can be used for encryption.
4. Biometrics: This one of the method which give allowance to an individual for any
kind of authorisation. In this process a particular person is recognised by any of
systems identifies the virus just by the definition of the virus. So a periodic
update is necessary for knowing of the new virus available.
iv. Actions that should be taken by an antivirus: Mainly there are three type of
action which is generally taken by the antivirus software. Those are as
follows:
1. Repair: In this case the virus which is identified is usually removed
from the system.
2. Delete: In this procedure the file into which the virus is found, the
whole file gets to be deleted along with the virus present into the file.
3. Quarantine: Whenever there is a doubt on a file, that the file may have
been affected by virus. The file is kept separated from all the other files
thus helps in stopping the spread of the virus.
2. Firewalls: This is a type of security-system present in a computer system that helps in
preventing of any unauthorised access. It can be used in both hardware and in
software. It is applied in the gateway of certain networks after which it helps in
protecting the network by controlling incoming traffic and outgoing traffic.
3. Encryption Software: At the time of data transmission in the network the privacy of
the data may be removed. Encryption is the technique that helps in protection of the
data. In this technique the data is transferred into a form of data type that is not easily
recognisable. The data that is encrypted can be termed as Cipher Text. In case of
reading of the data, the encrypted data is to be decrypted. This is the process
decryption.GnuPg is the software which can be used for encryption.
4. Biometrics: This one of the method which give allowance to an individual for any
kind of authorisation. In this process a particular person is recognised by any of

his/her individual characteristics. It can be implemented to a system, thus for
accessing the system biometrics of that individual is required.
5. Passwords: It is a type of process which include a sequence of numbers, symbols and
even alphabets that is unique for a specific password and can be used as a secure
access to any particular system. In case of protection strong sequence of password
should be set for better security.
6. Backups: It is a process of safety features of data that is to be applied. Keeping
backup of any data, or making a duplicate copy of data which will help in restoring of
the data if at any case the original data is lost.
More to know: Click jacking: it is a technique which is malicious for the user. In this
case the user is made to click onto something that will lead to some malicious acts
which may lead to any type of insecurities (Wu et al. 2016).
7. Cookies: A web server generally sends a text message to the web browser: The data is
stored in text file. The file is termed as cookie. This can be used to customize various
web pages. Not every time accessing the same website, the data is not to be filled
every time with the help of this cookies. This are a generally safe can be deleted any
time required. In any case if any unauthorised person reads this files, it may cause
harmful effects. Hackers uses cookies for getting the access into various sites and thus
can gather various information of the user. The practise of deleting the cookies is to
be done periodically to keep all the information available in the sites safe.
It is a technique to protect data. The data can include information of someone or something
that is stored. Network, servers are the different gateways to get into the data.
accessing the system biometrics of that individual is required.
5. Passwords: It is a type of process which include a sequence of numbers, symbols and
even alphabets that is unique for a specific password and can be used as a secure
access to any particular system. In case of protection strong sequence of password
should be set for better security.
6. Backups: It is a process of safety features of data that is to be applied. Keeping
backup of any data, or making a duplicate copy of data which will help in restoring of
the data if at any case the original data is lost.
More to know: Click jacking: it is a technique which is malicious for the user. In this
case the user is made to click onto something that will lead to some malicious acts
which may lead to any type of insecurities (Wu et al. 2016).
7. Cookies: A web server generally sends a text message to the web browser: The data is
stored in text file. The file is termed as cookie. This can be used to customize various
web pages. Not every time accessing the same website, the data is not to be filled
every time with the help of this cookies. This are a generally safe can be deleted any
time required. In any case if any unauthorised person reads this files, it may cause
harmful effects. Hackers uses cookies for getting the access into various sites and thus
can gather various information of the user. The practise of deleting the cookies is to
be done periodically to keep all the information available in the sites safe.
It is a technique to protect data. The data can include information of someone or something
that is stored. Network, servers are the different gateways to get into the data.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 26
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.