Class X · Chapter 611 min read
Chapter 6: Network Security
Class: X | Subject: Information and Computer Technology
Key Concepts
Cyberspace, A man-made world of computers, networks, and interconnected communication technologies., Constantly evolving; has no boundaries, no geographical mass, no gravity., Exists in the form of bits and bytes; it is an information-driven world., Regulated through ethics, safety, and security.
Three Pillars of Cyber Regulation
| Pillar | Nature | Focus |
|---|---|---|
| Cyber Ethics | Moral choice | Appropriate and ethical behaviours related to online environments. Includes plagiarism, bullying, hacking. |
| Cyber Safety | Behavioural code | How one operates online. Rules for keeping personal information safe and limited. |
| Cyber Security | Active participation | Tasks undertaken to keep systems secure. Includes installing antivirus software and firewalls. |
Copyright and License
Copyright:
- Protects original expression as soon as a "work" is created., Covers: source code, text materials, graphic images/designs, drawings, sound, video files, films., Five exclusive rights of a copyright owner:
- Fix or store information in a tangible form
- Reproduce the copyrighted material
- Sell, rent, lease, or distribute copies to the public
- Publicly perform and display the copyrighted material
- Prepare derivative works
License:
- Permission granted by the copyright holder to another to use an original work., Specifies circumstances, extent of use, changes, or distribution., May include time period, geographical area, and renewal provisions., A license does not pass on the copyright.
Software Licensing, A legal agreement between the software producer and the end-user., Ensures recognition of the owner's rights on their creation., Specifies how the application may be used.
Types of Software Licenses
| License Type | Description |
|---|---|
| Proprietary | Copyright stays with producer; user gets right to use only |
| GNU GPL | Open source license; users can change source code but changed code must also be GPL licensed |
| EULA | End User License Agreement; terms under which end-user may use the software |
| Workstation | Installation on a single computer only; must remove before installing on another |
| Concurrent Use | Install on multiple machines; number of simultaneous users must not exceed licenses purchased |
| Site License | Use on any computer at a specified site; unlimited site licenses allow any number |
| Perpetual | No expiry date; software used indefinitely |
| Non-perpetual | Leased for a specified period (usually annually); must remove if fee not paid |
| License with Maintenance | Includes maintenance or software assurance along with the original license fee |
Open Source, Freeware, and Shareware
| Type | Description |
|---|---|
| Open Source (OSS) | Source code is available; often developed collaboratively. License allows end user to study, change, and distribute for any purpose. |
| Freeware | Copyrighted software available for use, free of charge, for unlimited time. Copyright remains with the producer. |
| Shareware | Copyrighted software shared on a trial basis; user pays if they decide to continue using it. |
Cyber Law, A new and fast-growing branch of law., Establishes norms of accepted human behaviour in cyberspace., Three building blocks: Netizens (internet inhabitants), Cyberspace (the machine world), Technology., Covers: e-commerce, online contracts, copyright, trademark, software patenting, e-taxation, e-governance, cyber crimes.
Cookies, Allow a visited website to store its own information about a user on the user's computer., Record user preferences while using a site., The stored information is called a "cookie."
Hackers and Crackers
- Hackers: People who use programming skills to gain unauthorised access to data in a system.
- Crackers: Modify or disable features of software; usually intend harm to software, hardware, or end users., Both can also work ethically (ethical hacking) to prevent cyber crime and help law enforcement.
Firewall, A program or hardware device that filters information coming through an internet connection., If incoming information does not pass the rules stored in the firewall, it is blocked.
Cyber Ethics, Guidelines, Do not use rude or offensive language., Do not lie about people or send embarrassing pictures (bullying)., Do not use someone else's password or break into their computer., Do not copy information from the Internet and claim it as yours (plagiarism)., Obey copyright restrictions when downloading material., Do not try to make someone else's computer unusable.
Cyber Ethics Evolution
| Phase | Period | Technology | Issues |
|---|---|---|---|
| I | 1950s-1960s | Stand-alone mainframes | Artificial intelligence, database privacy |
| II | 1970s-1980s | Minicomputers, PCs, private networks | Intellectual property, software piracy, computer crime, data privacy |
| III | 1990s-Present | Internet, World Wide Web | Free speech, anonymity, legal jurisdiction, virtual communities |
| IV | Present-Future | Converged ICT, nanotechnology, genomic research | Electronic agents (bots) with decision-making, biochip implants |
Cyber Safety
- Identity Theft: One person takes on the identity of another to make purchases, obtain credit cards, etc.
- Phishing: Tempting a target to provide personal information for illegal use.
- Stalking: Repeated harassing or threatening behaviour (following, calling, messages, vandalizing property).
- Cyber-safety addresses the ability to act in a safe and responsible manner online.
Cyber Safety Guidelines:
- Set secure passwords; don't share them; update regularly.
- Restrict access to personal information to prevent identity theft.
- Be suspicious of unsolicited contact seeking personal/organizational data.
- Report suspect data or security breaches immediately.
- Limit personal information posted online.
- Be wary of strangers and misleading information.
- Use privacy and security settings on websites.
- Do not click unknown links in emails or texts.
- Download only trusted applications from reputable sources.
Cyber Security, Six Classes of Attacks
| Attack Type | Description |
|---|---|
| Malware | Software with mischievous purpose: viruses, worms, adware, Trojan horses, spyware |
| Security Breaches | Unauthorized access: password cracking, privilege changes, hacking |
| Denial of Service (DoS) | Designed to prevent legitimate access to a system |
| Web Attacks | Breach a website (e.g., SQL injection, cross-site scripting) |
| Session Hijacking | Attacker takes over a user's session |
| DNS Poisoning | Compromises a DNS server to redirect users to unsafe websites |
Malware Types
| Type | Description |
|---|---|
| Virus | Self-replicating program that attaches to executable files. Cannot spread without human action. May corrupt/modify files. |
| Worm | Sub-class of virus that travels without human action. Causes harm to the network (not files). |
| Adware | Software provided for free that contains and renders advertisements. |
| Trojan Horse | Appears useful but has malicious purpose. Often delivers viruses. Named after the Greek Trojan Horse. |
| Spyware | Spies on computer activity. Ranges from cookies to key loggers that record every keystroke. |
Cyber Crimes, Categories
- General Intrusions: Hacking, spyware, phishing, pharming, viruses, worms, DoS attacks, bots, Trojan horses, zombie machines.
- Nuisances (usually non-violent): Spam, changing web page content, redirecting websites.
- Personal Identity Theft: Phishing for information, unauthorized purchases, destroying reputation, damaging credit.
- Theft of Intellectual Property: Downloading copyrighted music/videos, plagiarism, cheating, software piracy.
- Physical or Mental Damage: Cyberbullying, harassment, cyberstalking, sexual exploitation.
- Terrorism: Stealing military/industry secrets (espionage), brainwashing/recruiting, building terrorist communication networks.
Network Security DOs and DONTs, Pay close attention to website URLs., Keep OS, browser, antivirus, and other software up to date., Turn off automatic attachment downloads., Save and scan attachments before opening., Ensure antivirus is current before opening unknown attachments.
Social Networking Safety, Limit who can see what you post (change privacy settings)., Restrict your profile to friends or your own college., Limit what you post (no email, physical address, phone number, schedule)., Once something is published online, it cannot be fully retracted., Cached copies may remain available long after deletion.
Important Definitions
| Term | Definition |
|---|---|
| Cyberspace | Man-made world of computers and networks; information-driven, constantly evolving |
| Cyber Ethics | Code of responsible behaviour on the Internet |
| Cyber Safety | Ability to act safely and responsibly online to protect personal information |
| Cyber Security | Tasks undertaken to keep computer systems secure from threats |
| Copyright | Legal protection of original expression (source code, text, images, etc.) |
| License | Permission to use copyrighted work under specified conditions |
| Open Source | Software with available source code; can be studied, changed, and distributed |
| Freeware | Free copyrighted software; copyright remains with the owner |
| Shareware | Trial software; user pays to continue using it |
| Firewall | Program or device that filters incoming information based on rules |
| Hacker | Person who gains unauthorized access to systems using programming skills |
| Cracker | Person who modifies or disables software features, usually with harmful intent |
| Cookie | Information stored by a website on the user's computer about preferences |
| Malware | General term for hostile or intrusive software (viruses, worms, Trojans, etc.) |
| Virus | Self-replicating program attached to executables; needs human action to spread |
| Worm | Self-propagating malware that travels without human action |
| Trojan Horse | Appears useful but has hidden malicious purpose |
| Spyware | Software that monitors computer activity |
| Phishing | Tempting targets to reveal personal information for illegal use |
| Identity Theft | Using another person's identity for unauthorized purposes |
| DoS Attack | Attack designed to prevent legitimate access to a system |
| DNS Poisoning | Compromising a DNS server to redirect users |
| Cyber Law | Branch of law that establishes norms for behaviour in cyberspace |
| Plagiarism | Copying information and claiming it as your own |
| EULA | End User License Agreement |
| GNU GPL | Open source license requiring modified code to also be open source |
Key Points
- Cyberspace is regulated through three pillars: ethics (moral choice), safety (behavioural code), and security (active participation).
- Copyright arises as soon as a work is created and gives the owner five exclusive rights.
- A license permits use of copyrighted material but does not transfer the copyright.
- Open source software allows studying, changing, and distributing the code; freeware is free to use but source code may not be available; shareware is trial-based.
- Cyber law covers e-commerce, contracts, copyright, crimes, and governance in cyberspace.
- Cookies store user preferences on the user's computer for visited websites.
- Hackers gain unauthorized access; crackers modify/disable software features.
- A firewall filters incoming network traffic based on predefined rules.
- The six classes of attacks: malware, security breaches, DoS, web attacks, session hijacking, DNS poisoning.
- A virus needs human action to spread; a worm can spread on its own.
- Trojan horses appear useful but carry malicious payloads.
- Phishing uses fake websites and emails to steal personal information.
- Use strong passwords, keep software updated, and verify authenticity of unsolicited contacts.
- Once something is published online, it cannot be fully retracted.
Practice Questions
Multiple Choice (selected):
- Not an external threat?, (a) Ignorance (it is an internal problem)
- Repeated harassment is?, (c) Stalking
- Genomic research concern?, (d) Biochip implants
- A class of computer threat?, (b) DoS attacks
- A license allows use of copyrighted material?, (a) True
- Filters information through internet connection?, (b) Firewall
- Website stores information on user's computer?, (c) Cookies
- Stealing ideas/creations of others?, (d) All of the above (plagiarism, piracy, IPR)
- Ethical behaviours online?, (a) Cyber ethics
Short Answer:
- Differentiate between workstation license and site license.
- Write about "cracking" a software.
- Explain categories of cyber crime.
- Define: Spyware, Malware, Virus, Worms.
- Explain ethical hacking.
- Why should cyber security be taken care of?
- Discuss points to keep in mind while working on computers.
- What is a Denial of Service attack?
- Difference between Shareware and Freeware.
- List the types of software licenses.
- What are open source softwares? How are they different from proprietary?
Categorize as Ethical / Safety / Security:
- Do not share password, Safety, Do not use foul language, Ethics, Report security breaches, Safety, Install firewalls and antivirus, Security, Do not plagiarise, Ethics, Be wary of strangers, Safety, Manage computer settings for known data only, Security, Do not download copyrighted materials, Ethics, Download only trusted applications, Security
True/False:
- Hacking is always illegal?, False (ethical hacking exists)
- A license allows use of copyrighted material?, True
- Software can only be licensed for a specific period?, False (perpetual licenses exist)
- A firewall is a virtual wall protecting data?, True
- Cyber law oversees only crimes committed by computers?, False
- Crackers use physical tools to break in?, False
Prefer watching over reading?
Subscribe for free.