Class X · Chapter 611 min read
Share:WhatsAppLinkedIn

Chapter 6: Network Security

Class: X | Subject: Information and Computer Technology


Key Concepts

Cyberspace, A man-made world of computers, networks, and interconnected communication technologies., Constantly evolving; has no boundaries, no geographical mass, no gravity., Exists in the form of bits and bytes; it is an information-driven world., Regulated through ethics, safety, and security.

Three Pillars of Cyber Regulation

Pillar Nature Focus
Cyber Ethics Moral choice Appropriate and ethical behaviours related to online environments. Includes plagiarism, bullying, hacking.
Cyber Safety Behavioural code How one operates online. Rules for keeping personal information safe and limited.
Cyber Security Active participation Tasks undertaken to keep systems secure. Includes installing antivirus software and firewalls.

Copyright and License

Copyright:

  • Protects original expression as soon as a "work" is created., Covers: source code, text materials, graphic images/designs, drawings, sound, video files, films., Five exclusive rights of a copyright owner:
    1. Fix or store information in a tangible form
    2. Reproduce the copyrighted material
    3. Sell, rent, lease, or distribute copies to the public
    4. Publicly perform and display the copyrighted material
    5. Prepare derivative works

License:

  • Permission granted by the copyright holder to another to use an original work., Specifies circumstances, extent of use, changes, or distribution., May include time period, geographical area, and renewal provisions., A license does not pass on the copyright.

Software Licensing, A legal agreement between the software producer and the end-user., Ensures recognition of the owner's rights on their creation., Specifies how the application may be used.

Types of Software Licenses

License Type Description
Proprietary Copyright stays with producer; user gets right to use only
GNU GPL Open source license; users can change source code but changed code must also be GPL licensed
EULA End User License Agreement; terms under which end-user may use the software
Workstation Installation on a single computer only; must remove before installing on another
Concurrent Use Install on multiple machines; number of simultaneous users must not exceed licenses purchased
Site License Use on any computer at a specified site; unlimited site licenses allow any number
Perpetual No expiry date; software used indefinitely
Non-perpetual Leased for a specified period (usually annually); must remove if fee not paid
License with Maintenance Includes maintenance or software assurance along with the original license fee

Open Source, Freeware, and Shareware

Type Description
Open Source (OSS) Source code is available; often developed collaboratively. License allows end user to study, change, and distribute for any purpose.
Freeware Copyrighted software available for use, free of charge, for unlimited time. Copyright remains with the producer.
Shareware Copyrighted software shared on a trial basis; user pays if they decide to continue using it.

Cyber Law, A new and fast-growing branch of law., Establishes norms of accepted human behaviour in cyberspace., Three building blocks: Netizens (internet inhabitants), Cyberspace (the machine world), Technology., Covers: e-commerce, online contracts, copyright, trademark, software patenting, e-taxation, e-governance, cyber crimes.

Cookies, Allow a visited website to store its own information about a user on the user's computer., Record user preferences while using a site., The stored information is called a "cookie."

Hackers and Crackers

  • Hackers: People who use programming skills to gain unauthorised access to data in a system.
  • Crackers: Modify or disable features of software; usually intend harm to software, hardware, or end users., Both can also work ethically (ethical hacking) to prevent cyber crime and help law enforcement.

Firewall, A program or hardware device that filters information coming through an internet connection., If incoming information does not pass the rules stored in the firewall, it is blocked.

Cyber Ethics, Guidelines, Do not use rude or offensive language., Do not lie about people or send embarrassing pictures (bullying)., Do not use someone else's password or break into their computer., Do not copy information from the Internet and claim it as yours (plagiarism)., Obey copyright restrictions when downloading material., Do not try to make someone else's computer unusable.

Cyber Ethics Evolution

Phase Period Technology Issues
I 1950s-1960s Stand-alone mainframes Artificial intelligence, database privacy
II 1970s-1980s Minicomputers, PCs, private networks Intellectual property, software piracy, computer crime, data privacy
III 1990s-Present Internet, World Wide Web Free speech, anonymity, legal jurisdiction, virtual communities
IV Present-Future Converged ICT, nanotechnology, genomic research Electronic agents (bots) with decision-making, biochip implants

Cyber Safety

  • Identity Theft: One person takes on the identity of another to make purchases, obtain credit cards, etc.
  • Phishing: Tempting a target to provide personal information for illegal use.
  • Stalking: Repeated harassing or threatening behaviour (following, calling, messages, vandalizing property).
  • Cyber-safety addresses the ability to act in a safe and responsible manner online.

Cyber Safety Guidelines:

  1. Set secure passwords; don't share them; update regularly.
  2. Restrict access to personal information to prevent identity theft.
  3. Be suspicious of unsolicited contact seeking personal/organizational data.
  4. Report suspect data or security breaches immediately.
  5. Limit personal information posted online.
  6. Be wary of strangers and misleading information.
  7. Use privacy and security settings on websites.
  8. Do not click unknown links in emails or texts.
  9. Download only trusted applications from reputable sources.

Cyber Security, Six Classes of Attacks

Attack Type Description
Malware Software with mischievous purpose: viruses, worms, adware, Trojan horses, spyware
Security Breaches Unauthorized access: password cracking, privilege changes, hacking
Denial of Service (DoS) Designed to prevent legitimate access to a system
Web Attacks Breach a website (e.g., SQL injection, cross-site scripting)
Session Hijacking Attacker takes over a user's session
DNS Poisoning Compromises a DNS server to redirect users to unsafe websites

Malware Types

Type Description
Virus Self-replicating program that attaches to executable files. Cannot spread without human action. May corrupt/modify files.
Worm Sub-class of virus that travels without human action. Causes harm to the network (not files).
Adware Software provided for free that contains and renders advertisements.
Trojan Horse Appears useful but has malicious purpose. Often delivers viruses. Named after the Greek Trojan Horse.
Spyware Spies on computer activity. Ranges from cookies to key loggers that record every keystroke.

Cyber Crimes, Categories

  1. General Intrusions: Hacking, spyware, phishing, pharming, viruses, worms, DoS attacks, bots, Trojan horses, zombie machines.
  2. Nuisances (usually non-violent): Spam, changing web page content, redirecting websites.
  3. Personal Identity Theft: Phishing for information, unauthorized purchases, destroying reputation, damaging credit.
  4. Theft of Intellectual Property: Downloading copyrighted music/videos, plagiarism, cheating, software piracy.
  5. Physical or Mental Damage: Cyberbullying, harassment, cyberstalking, sexual exploitation.
  6. Terrorism: Stealing military/industry secrets (espionage), brainwashing/recruiting, building terrorist communication networks.

Network Security DOs and DONTs, Pay close attention to website URLs., Keep OS, browser, antivirus, and other software up to date., Turn off automatic attachment downloads., Save and scan attachments before opening., Ensure antivirus is current before opening unknown attachments.

Social Networking Safety, Limit who can see what you post (change privacy settings)., Restrict your profile to friends or your own college., Limit what you post (no email, physical address, phone number, schedule)., Once something is published online, it cannot be fully retracted., Cached copies may remain available long after deletion.


Important Definitions

Term Definition
Cyberspace Man-made world of computers and networks; information-driven, constantly evolving
Cyber Ethics Code of responsible behaviour on the Internet
Cyber Safety Ability to act safely and responsibly online to protect personal information
Cyber Security Tasks undertaken to keep computer systems secure from threats
Copyright Legal protection of original expression (source code, text, images, etc.)
License Permission to use copyrighted work under specified conditions
Open Source Software with available source code; can be studied, changed, and distributed
Freeware Free copyrighted software; copyright remains with the owner
Shareware Trial software; user pays to continue using it
Firewall Program or device that filters incoming information based on rules
Hacker Person who gains unauthorized access to systems using programming skills
Cracker Person who modifies or disables software features, usually with harmful intent
Cookie Information stored by a website on the user's computer about preferences
Malware General term for hostile or intrusive software (viruses, worms, Trojans, etc.)
Virus Self-replicating program attached to executables; needs human action to spread
Worm Self-propagating malware that travels without human action
Trojan Horse Appears useful but has hidden malicious purpose
Spyware Software that monitors computer activity
Phishing Tempting targets to reveal personal information for illegal use
Identity Theft Using another person's identity for unauthorized purposes
DoS Attack Attack designed to prevent legitimate access to a system
DNS Poisoning Compromising a DNS server to redirect users
Cyber Law Branch of law that establishes norms for behaviour in cyberspace
Plagiarism Copying information and claiming it as your own
EULA End User License Agreement
GNU GPL Open source license requiring modified code to also be open source

Key Points

  1. Cyberspace is regulated through three pillars: ethics (moral choice), safety (behavioural code), and security (active participation).
  2. Copyright arises as soon as a work is created and gives the owner five exclusive rights.
  3. A license permits use of copyrighted material but does not transfer the copyright.
  4. Open source software allows studying, changing, and distributing the code; freeware is free to use but source code may not be available; shareware is trial-based.
  5. Cyber law covers e-commerce, contracts, copyright, crimes, and governance in cyberspace.
  6. Cookies store user preferences on the user's computer for visited websites.
  7. Hackers gain unauthorized access; crackers modify/disable software features.
  8. A firewall filters incoming network traffic based on predefined rules.
  9. The six classes of attacks: malware, security breaches, DoS, web attacks, session hijacking, DNS poisoning.
  10. A virus needs human action to spread; a worm can spread on its own.
  11. Trojan horses appear useful but carry malicious payloads.
  12. Phishing uses fake websites and emails to steal personal information.
  13. Use strong passwords, keep software updated, and verify authenticity of unsolicited contacts.
  14. Once something is published online, it cannot be fully retracted.

Practice Questions

Multiple Choice (selected):

  1. Not an external threat?, (a) Ignorance (it is an internal problem)
  2. Repeated harassment is?, (c) Stalking
  3. Genomic research concern?, (d) Biochip implants
  4. A class of computer threat?, (b) DoS attacks
  5. A license allows use of copyrighted material?, (a) True
  6. Filters information through internet connection?, (b) Firewall
  7. Website stores information on user's computer?, (c) Cookies
  8. Stealing ideas/creations of others?, (d) All of the above (plagiarism, piracy, IPR)
  9. Ethical behaviours online?, (a) Cyber ethics

Short Answer:

  1. Differentiate between workstation license and site license.
  2. Write about "cracking" a software.
  3. Explain categories of cyber crime.
  4. Define: Spyware, Malware, Virus, Worms.
  5. Explain ethical hacking.
  6. Why should cyber security be taken care of?
  7. Discuss points to keep in mind while working on computers.
  8. What is a Denial of Service attack?
  9. Difference between Shareware and Freeware.
  10. List the types of software licenses.
  11. What are open source softwares? How are they different from proprietary?

Categorize as Ethical / Safety / Security:

  • Do not share password, Safety, Do not use foul language, Ethics, Report security breaches, Safety, Install firewalls and antivirus, Security, Do not plagiarise, Ethics, Be wary of strangers, Safety, Manage computer settings for known data only, Security, Do not download copyrighted materials, Ethics, Download only trusted applications, Security

True/False:

  1. Hacking is always illegal?, False (ethical hacking exists)
  2. A license allows use of copyrighted material?, True
  3. Software can only be licensed for a specific period?, False (perpetual licenses exist)
  4. A firewall is a virtual wall protecting data?, True
  5. Cyber law oversees only crimes committed by computers?, False
  6. Crackers use physical tools to break in?, False

Test Your Knowledge

Take a quick quiz on this chapter

Start Quiz →

Prefer watching over reading?

Subscribe for free.

Subscribe on YouTube