Page 414 - IT 402 v2.0 class 10
P. 414

   Government Emergency: It is related to the government itself in case of political instability, critical conditions
                at international borders, security reasons, lockdown or curfew and it is declared by the government to handle
                the situation.
                 External Emergency: It is a situation arising due to civil issues such as wars  protests  strikes  and violence. Such
                emergencies highly affect the general masses or common public who are in no way related to these events.
             .   xplain best practices of  eb Security.
          ns.   est practices for  eb Security are:

                 Identity Protection: It refers to safety practices to prevent theft of personal information such as personal
                profile  bank account details  address details  family details.
                 Protect Username and Password:   user should never save any personal or confidential information in a
                computer that is used in a shared environment, such as internet cafes.
                 Do not share Personal Information:  e careful while filling forms  responding to calls that ask your name
                 O   bank details  etc.
                 Secure Online Transactions:   se  only  secure  websites  for  doing  online  transactions.     digital  certificate
                represented by a golden lock in the web browser s address bar signifies that the website is secure.
                 Avoid using Insecure Wi-Fi: Never connect your device to any insecure or unknown  i-Fi network.  onnecting
                to an insecure network might lead to leakage of valuable data.
            .  rite Short Notes on:
              i.  Spoofing
              ii.  hishing

         Ans.  i.  S oofing: It is the act of disguising a communication from an unknown source as being from a known, trusted
                source. It is used to gain access to the personal information of the targeted person, to spread malware by
                infected links or attachments  and to bypass network access. Spoofing can be applied to e-mails  phone calls
                and websites.  he common spoofing methods are e-mail and chat spoofing.
                  Mail S oofing: It is the process by which an attacker uses e-mail messages to trick a recipient. The e-mails
                may include links to malicious websites or attachments.
                  at S oofing:  hen a user of a computer mas uerades as another individual while engaging in chat.

              ii.  Phishing: It is an attack in which communications are done in such a way that it appears to come from an
                authentic source. It is usually done through e-mail.  he goal is to steal sensitive credentials or confidential
                personal information  and to install malware on the victim s machine. Some common types of phishing attacks
                are  mail phishing      s phishing  and Spear phishing.


               lication  ased  uestions:                                                         L if e   S k il l s   &   V al ue s
             .   ahul wants to prevent other people from accessing his computer without permission.  hich security measure
              would help her in this situation?
          ns.   assword  rotection.

             .   nu  is working on his computer. Suddenly  the computer slows down and some unwanted files appear automatically.
              Help him to identify the problem with his computer and suggest him a way to resolve the problem.

         Ans.  His computer is infected by a virus. It can be resolved by installing antivirus software like McAfee.











         412       Touchpad Information Technology-X
   409   410   411   412   413   414   415   416   417   418   419