Page 532 - ComputerScience_Class_11
P. 532

•  Worms:  A  worm  is  a malicious,  self-replicating  program that spreads throughout  a network without  human
                 assistance. These worms consume large amounts of memory and bandwidth and thus affect the servers, networks
                 and the individual systems that they are often overloaded and stop responding.

              •   Trojan Horse: The Trojan horse is malware that disguises itself as a legitimate program. It is mainly sent as an
                 attachment in an email or as a free-to-download file. Once downloaded, it performs malicious tasks such as gaining
                 backdoor access to corporate systems, spying on users’ online activity or stealing sensitive data.
              •   Spyware: Spyware as the name itself suggests that this malware secretly records information about a user’s key
                 logging activities. Spyware could capture credit card/debit card details, email IDs and passwords which help cyber
                 criminals  withdraw money from  unknown  accounts  or access sensitive information  which  they may use  with
                 malicious intent.

              •  Adware: It is an unwanted program that is installed without the user’s permission, but generally does not have any
                 criminal intentions. The main objective of adware is to advertise any product/service. But it slows down the system
                 considerably.



                   13.3 SPAM
              Spams are unsolicited mails sent mainly with the idea of online business schemes or commercial advertisements,
              which are sent in bulk to many recipients at once. They contain many fraudulent schemes which appear to be lucrative
              choices for the users but which on opening may encounter malware such as worms, Trojan Horse, spyware, etc. This
              would obviously be a threat to our computer systems as well as our user accounts held online. So, it is very essential
              for the user to be aware of such spam emails.

              Methods to separate spam emails from important ones are as follows:
              •  Using good Anti-Spam and Anti-Virus Software: This is the best way to get rid of spam. It not only marks those
                 spam emails but also protects the user’s account from various malware, which poses a threat to the computer
                 system.
              •   Always be sure about the sender and be careful while accessing his or her email: If we do not recognise any
                 email id or have some doubts regarding the sender of the email, then we should restrict ourselves from opening
                 it, as there might be a chance of spam. There are also some ways to recognise a spam email which are as follows:
                ♦ ♦Sometimes the email id does not match the name of the company or person who has sent it. For example,
                   suppose the sender is abc@gmail.com but the name displayed is “Gift from flipkart”.
                ♦ ♦ There might be spelling mistakes in the email ID. For example, abc@shopcues.in, here the domain name should
                   have been shopclues.in.

              •  Being ignorant about the tempting subjects: Always check the subject carefully before opening it. Sometimes,
                 the subject might sound very interesting such as “You have won 100000 dollars” or the sender might send some
                 information on some items that were never ordered. These are definitely the signs of being spam.

              •   Being alert about bank transactions: Request for updating any personal information in a bank or anything of that
                 sort. They might also ask the user to update credit card details or might give a threat of locking the credit card, etc.
                 Such spam mail should always be handled carefully as they are directly linked to the bank account.

              Also, we should be careful before sharing our email IDs with unknown people.


                   13.4 PHISHING
              Phishing refers to cybercrimes where spam email messages are sent to different people to get personal information
              like usernames, passwords, card details, etc. In this case, the sender pretends to be a genuine official/company whose
              mails look authentic enough to trick recipients into giving their sensitive personal information.






                  530  Touchpad Computer Science (Ver. 3.0)-XI
   527   528   529   530   531   532   533   534   535   536   537