Page 65 - CA 165 ver 1.0 Class 9
P. 65

l    Fill the relevant details in the form and send it to CERT-In through:

                      Email: incident@cert-in.org.in
                      Or Fax: +91-11-24368546

                      Or Post:  Indian  Computer  Emergency  Response  Team  (CERT-In),  Ministry  of  Electronics  and
                      Information Technology, Government of India, Electronics Niketan, 6 CGO Complex, Lodhi Road,
                      New Delhi 110003, India.

                 Vulnerability Reporting to CERT-In
                 You can report incidents such as bug in a system (which bypass security measures such as Firewall Bypass)
                 at www.cert-in.org.in.

                 l    Click on the ‘Vulnerability Reporting’ link.

                 l    Double click on the ‘Reporting of a vulnerability’
                      link  &  download  the  vulnerability  reporting
                      form.

                 l    Fill the relevant details in the form and send it to
                      CERT-In through:
                      E-Mail: vulnerability@cert-in.org.in

                      Or Fax: +91-11-24368546
                      Or Post:  Indian  Computer  Emergency  Response  Team  (CERT-In),  Ministry  of  Electronics  and
                      Information Technology, Government of India, Electronics Niketan, 6 CGO Complex, Lodhi Road,
                      New Delhi 110003, India.


                   MALWARE
                 Malware refers to infectious programs that hampers the functioning of a computer system. It is unwanted
                 software which is designed to damage a computer system. Some common types of malware are virus,
                 worms, trojan horse, spyware, etc.

                                                                   Virus

                                                                   A  computer  virus  is  a  type  of  unwanted  computer
                                                                   program which is developed by miscreants with an
                                                                   intention to infect the files of a computer, to corrupt a
                                                                   database or to hamper the functioning of a computer
                                                                   system.
                                    YOUR PC                        In a computer system, virus does not evolve by itself, it
                                                                   is uploaded or injected in a network or into a storage
                                                                   media. It is communicable i.e. it is transmitted from
                                                                   one computer to another computer or to a network
                                                                   by some medium of transmission like CDs, pen drive,
                                                                   external  hard  disk,  softwares,  internet  connection,
                                                                   bluetooth, etc. When infected, many viruses replicate
                                                                   by themselves.


                                                                                                 Cyber Safety    63
   60   61   62   63   64   65   66   67   68   69   70