Page 68 - CA_165_V2.0_C9_Flipbook
P. 68

Vulnerability Reporting to CERT-In


                  You can report incidents such as bug in a system (which bypass security measures such as Firewall Bypass)
                  at www.cert-in.org.in.
                  l    Click on the Vulnerability Reporting link.

                  l    Double-click on the Vulnerability Reporting
                       Form  link  and  download  the  vulnerability
                       reporting form.

                  l    Fill the relevant details in the form and send
                       it to CERT-In through:
                       E-Mail: vulnerability@cert-in.org.in

                       Or Fax: +91-11-24368546
                       Or Post:  Indian  Computer  Emergency  Response  Team  (CERT-In),  Ministry  of  Electronics  and
                       Information Technology, Government of India, Electronics Niketan, 6 CGO Complex, Lodhi Road,
                       New Delhi 110003, India.

                    MALWARE

                  Malware refers to infectious programs that hampers the functioning of a computer system. It is unwanted
                  software which is designed to damage a computer system. Some common types of malware are virus,
                  worms, trojan horse, spyware, etc.

                                                             Virus

                                                             A computer virus is a type of unwanted computer program
                                                             which is developed by miscreants with an intention to infect
                                                             the files of a computer, to corrupt a database or to hamper
                                                             the functioning of a computer system.

                                  YOUR PC                    In a computer system, virus does not evolve by itself, it is
                                                             uploaded or injected in a network or into a storage media.
                                                             It is communicable, i.e. it is transmitted from one computer
                                                             to another computer or to a network by some medium of
                                                             transmission like CDs, pen drive, external hard disk, software,
                                                             Internet  connection,  bluetooth,  etc.  When  infected,  many
                                                             viruses replicate by themselves.
                  There are different types of viruses that infect specific components or specific functioning of a computer
                  system. They can range in severity. Some may cause mild damages while others can severely damage
                  hardware, software or files. Examples of some common viruses are iBryte, OneInstaller, Koobface, CiaDoor,
                  BrO_AcT, Byte Bandit, Brain, Small.TP, Stealth_C, etc.

                  Boot Sector Virus

                  Booting is the process of loading operating system in the primary memory from the boot sector. Boot
                  sector is the core area of hard disk storage where the most important program like OS are stored.




                   66    Touchpad Computer Applications (Ver. 2.0)-IX
   63   64   65   66   67   68   69   70   71   72   73