9th Computer Notes Chapter 6

Chapter 6 Computer Security and Ethics

Computer Security and Ethics
Computer Security and Ethics

Write short answers to the following questions.

i. Define cybercrime.

Ans: Cybercrime

Cybercrime refers to any crime that is committed by means of computer and Internet technology by having unlawful access to others’ computers.

ii. What is the importance of computer security?

Ans: Computer Security:

Computer security refers to protecting computer hardware, software and information stored on the computer from threats.

Importance of Computer Security:

Computer users often exchange information with each other or communicate over the Internet. This can infect a user’s computer with a virus or other types of malicious software.

Computer security or safety is important for computer users to protect their computers from different threats. It is necessary to install security software such the firewall, antivirus and spyware on computers.

iii. Differentiate between hacker and cracker.

Ans: Hacker:

  • A person who illegally breaks into others’ computer systems is known as a hacker.
  • Hackers are computer experts who try to gain unauthorized access to computer systems for stealing and corrupting information.
  • Most of the hackers break into computers for financial benefits.

Cracker

  • A cracker is a computer user who breaks into computer systems without permission using hacking tools for personal gain or damage and commits cybercrimes.
  • Most of the crackers do not have professional computer skill to hack computer systems but they have knowledge about using hacking tools.
  • Crackers break into computers and cause serious damage. They also break into Web servers and replace the home page of a website with a page of their own design.

iv. Describe any five symptoms of malware.

Ans: Common symptoms of Malware Attacks:

A list of common symptoms of infected computers is given below.

  • Different types of error messages appear on the screen.
  • Unexpected messages appear on the screen.
  • Programs do not run in a normal way.
  • The computer is running very slow.
  • New files or folders are created on the hard disk.
  • Folders are deleted or changed on the hard disk.

v. Differentiate between authentication and authorization.

Authentication:

Authentication means identifying a person based on a method such as Username and Password, Personal Identification Number (PIN), Access Card or Biometrics. It verifies who the person is.

Authorization:

Authorization means to give someone permission to do something. For example, when a user wants to Iogin to his email account, he is asked to enter username and password to verify his identity. This is authentication.

vi. Which authentication methodology provides highly secure identification and verification? Justify your answer.

Ans: Biometrics provides highly secure identification and personal verification technologies.

Biometrics provides more accurate authentication than using a username and password or PIN. Biometrics is associated with an individual. Hence, it cannot be stolen or forgotten.

vii. What is meant by information privacy?

Ans: Information Privacy:

Information privacy refers to an individual’s right to the privacy of personal information. In the modern information age, people are concerned that computers may be taking their privacy.

viii. Give any three drawbacks of software piracy.

Ans: Drawbacks of software piracy:

  1. Making unauthorized copies of software is a federal crime.
  2. if you are downloading pirated software from the internet, it is more likely to be infected with computer viruses which can damage your computer system.
  3. They do not provide after-sales services.

ix. What types of problems may be faced if computer users do not comply with the moral guidelines of computer ethics?

Ans:

  1. Computer users can use the Computer to harm other people.
  2. Computer users can use the Computer to break into others’ computer systems to steal, change or destroy information.
  3. Computer users can read documents and e-mails of other users without their consent.
  4. Computer users can use the Computer to make illegal copies of the copyrighted software and sell it for financial benefit.
  5. Computer users can commit any type of crime with the help of computer technology.
  6. Computer users can not respect the privacy of others.

x.Name any three places where authentication of people is required.

Ans:

  1.  Security Rooms
  2.  Banks
  3.  Airport 

Write long answers to the following questions.

i. Define malware and describe its types.

Ans: Malware:

Malware is malicious software. It comprises many harmful software that are threats to all computer users. Malware is created for attacks on privacy, spying, destruction and financial benefits.

Types of malware:

Most common types of malware are:

  • Computer viruses
  • Spyware
  • Worms
  • Adware

Computer Viruses

A computer virus is a type of malware that spreads by inserting a copy of itself into another program or file.

  • Most of the viruses are attached to executable files.
  • Viruses also spread when infected files are transferred from one computer to another through the network, USB flash drive, CD/DVD or infected e-mail attachments.
  • Some viruses are not very harmful they are simply annoying while others can seriously damage the hardware, software or information stored on the computer.
  • Viruses can slow down the Computer and some can even stop its operation.

Worms:

A worm is a malware that transmits itself over a network to infect other computers.

  • Worms can be harmful like a virus.
  • It spreads automatically in computer networks and replicates itself. It can travel from computer to computer without any human action.
  • It enters a computer through a weakness in the operating system of the computer.
  • Most of the worms cause some harm to the network such as slowing down communication by increasing network traffic.

 Spyware:

Spyware programs are developed to spy on computer users by gathering information about their activities on the computer.

  1. Spyware is developed for the personal benefit of the creator.
  2. It infects computers through the installation of software form the Internet.
  3. It slows down the performance of infected computers.
  4. Most of the spyware is designed to be difficult to remove.

Adware:

Adware is malware that attaches itself to free software on the Internet and infects computers when such software is downloaded.

  1. It pops up advertisements during the execution of the infected program.
  2. Pop-up block option in browsers helps protect computers from adware.
  3. Some adware may also collect user information without their permission.

2. Explain how malware spreads.

Ans: Spreading of Malware:

The following are different ways malware can spread on computers.

Infected Flash Drives/CDs:

Viruses, spyware and other types of malware can infect computers in which anti-malware software is not installed through infected flash drives and CDs.

Pirated Software:

Software piracy refers to making unauthorized copies of copyrighted software and distributing it. Pirated software on CDs is a very common source of spreading malware on computers because these are often infected.

If users download pirated music, movies, programs, etc. for free, their computers may be infected because pirated downloads often contain viruses, spyware or other malicious programs.

Network and Internet:

Computers connected to the network get infected with malware when information is exchanged with other computers. Computers are also infected while using the Internet when users download something or browse infected Web sites.

The computer may get, infected with a virus or other malware if the user downloads software such as games, updates, demos and other programs from unreliable sources and installs it on the computer.

E-mail Attachments:

Opening e-mail attachments from a stranger or from an unknown address can infect a computer with malware. Even downloading and opening e-mails from a friend or family member can be dangerous. They may pass the user a virus or Other malware without knowing about it.

iii. Explain how to protect computer systems from virus attacks.

Ans: Protecting Computer from Malware/Virus Attacks:

We must install the following software to safeguard computers against viruses, worms, adware and spyware.

  • Antivirus software
  • Anti-spyware software

Antivirus Software:

Antivirus software is a computer program that detects and removes viruses and other types of malware.

  • Computer users should install it on their computer and update it regularly.
  • Most antivirus programs have an auto-update feature. This feature automatically updates the antivirus program through the Internet so that it can detect and remove new versions of viruses as well.
  • Whenever a user connects a flash drive or any other type of storage device to the computer, he must run it through antivirus software to ensure that it does not contain viruses.

Anti-Spyware software

Anti-spyware is a computer program that detects Spyware infections on the computer and removes them. It helps to protect computers against security threats caused by spyware and other types of malware.

  • A computer user should install an anti-spyware program on their computer and update it regularly to protect against new threats.
  • The anti-spyware program runs in the background and continuously scans for spyware threats.
  • A user can also start the anti-spyware program manually to scan the computer for spyware and remove it.

iv. What are the common methodologies used for authentication?

Ans: Authentication Methodologies:

The following are common methodologies used for authentication purposes.

  • Username and password
  • Personal Identification Number
  • Access card
  • Biometrics

Username and Password

A username is a name that identifies a person on a computer system. It is generally used with a password. Together, they are called login information.

The username and password allow access to computer systems, email accounts, bank accounts, and other services. The username is public, but the password is secret. If someone else knows your password, they could misuse it.

Personal Identification Number (PIN)

A PIN is a secret numeric password. It is used to confirm a user’s identity on a computer system. When entered, the computer checks the PIN against its database. If it matches, the user is allowed to use the computer.

PINs are mostly used with debit and credit cards in stores and ATMs.

Access Cards

Access cards look like credit cards but do not need a username, password, or PIN. They are used to open security gates in offices and other places. They also open barriers in parking areas and hotel rooms.

Biometrics

Biometrics uses physical traits to confirm someone’s identity, such as facial features, hand shape, retina, voice, and fingerprints.

It provides secure ways to verify identity for financial transactions and data privacy. Biometric is more accurate than usernames, passwords, or PINs. It cannot be borrowed, stolen, or forgotten, and forging it is nearly impossible.

v. Define computer ethics and write some important moral guidelines for the ethical use of computer technology.

Ans: Computer Ethics:

Computer ethics means acceptable behaviour for using computer technology. It is a code of behaviour for moral and social issues while using computers, especially the Internet.

Computer users should be honest, respect the rights of others online, and obey laws that apply to online behaviour.

We should not use bad language while chatting and on social networks.

We should not pretend to be someone else and fool others. Users should not download copyrighted material like music and movies. People should not do anything on the Internet that is morally wrong or illegal.

Ethical Use of Computer:

The following are some important moral, guidelines for ethical use of computer technology.

  1. A Computer should not be Used to harm other people.
  2. Computer users should, not break into others’ computer systems to steal and destroy information.
  3. Computer users should not read other users’ documents and e-mails without their consent.
  4. People should not make illegal copies of copyrighted software and sell it for financial benefit.
  5. Computer users who have special computer knowledge and ability should not create malicious software (such as computer viruses) and spread it to other computers.

 Select the best answer for the following MCQs.

i. What is a person who illegally breaks into others’ computer systems called?

A. Computer engineer 

B. System programmer

C. Hacker  

D. Cracker

ii. What is a person who uses special tools for breaking into computer systems called?

A. Computer engineer 

B. System programmer

C. Hacker 

D. Cracker

iii. Which malware spreads automatically in computer networks and replicates itself?

A. Virus 

B. Worm  

C. Adware 

D. Spyware

iv. Which of the following malware displays advertisement on the screen?

A. Virus 

B. Worm  

C. Adware                            

D. Trojan.

v. Which of the following authentication methods is used for opening security gates?

A. Username and password

B. Personal Identification Number

C. Access card                                               

D. Biometrics

vi. Which of the following authentication methods is most reliable?

A. Username and password 

B. Personal Identification Number

C. Access card 

D. Biometrics

vii. Which of the following authentication methods is based on features of individuals such as face, fingerprint and voice?

A. Username and password 

B. Personal Identification Number

C Access card                                      

D. Biometrics

viii. What is making illegal Copies of copyrighted software for use on other comp or sale called?

A. Information Privacy

B. Intellectual rights

C. Software piracy 

D. information ownership

ix. Which Of the following malware gathers information about user activities on the computer?

A. Virus 

B. Worm

C. Adware

D. Spyware

x. Which of the following authentication methodologies is used to withdraw cash from an ATM?

A. Username and password

B. Personal Identification Number

C. Access card 

D. Biometrics

Download 9th Computer Chapter 6 Notes in pdf

9th Class Computer Notes