Page 72 - Plus_V2.2_C8_Flipbook
P. 72
network and decides, on the basis of a set of predefined rules whether
Factopedia to pass or not. Firewall establishes a barrier between a trusted, secure
internal network and another network (for example, the Internet) that
is not assumed to be secure and trusted.
Let’s CatCh uP
State whether these statements are true or false.
1. Encrypted data can be understood easily. ________
Most of the malware 2. Computer safety refers to the protection of computer-
programs are based resources against unauthorised use. ________
distributed over 3. Antivirus is used to eradicate virus from the computer
the Internet, often system. ________
bundled with other 4. Authentication is the process of verifying a user’s
software. identity before granting him or her access to
a computer system. ________
Let’s BaCk-uP
Computer safety refers to the protection of computer-
The first known
ransomware, the based resources against unauthorised use or physical
"AIDS Trojan" was damage.
launched in 1989. Authentication is the process of verifying a user’s identity
before granting him or her access to a computer system.
Password protection, face recognition, voice recognition are
some important techniques for computer safety.
Malware is designed to damage or do unwanted actions on
a computer system.
30th November is A set of programs that identify and remove malware are
known as “Computer known as antivirus software.
Security Day’’.
A firewall is a type of security program or hardware that
prevents unauthorised access to a computer network.
The first computer
worm named Morris
worm was developed
in November 9, 1988.
70 Premium Edition-VIII

