Page 414 - IT 402 v2.0 class 10
P. 414
Government Emergency: It is related to the government itself in case of political instability, critical conditions
at international borders, security reasons, lockdown or curfew and it is declared by the government to handle
the situation.
External Emergency: It is a situation arising due to civil issues such as wars protests strikes and violence. Such
emergencies highly affect the general masses or common public who are in no way related to these events.
. xplain best practices of eb Security.
ns. est practices for eb Security are:
Identity Protection: It refers to safety practices to prevent theft of personal information such as personal
profile bank account details address details family details.
Protect Username and Password: user should never save any personal or confidential information in a
computer that is used in a shared environment, such as internet cafes.
Do not share Personal Information: e careful while filling forms responding to calls that ask your name
O bank details etc.
Secure Online Transactions: se only secure websites for doing online transactions. digital certificate
represented by a golden lock in the web browser s address bar signifies that the website is secure.
Avoid using Insecure Wi-Fi: Never connect your device to any insecure or unknown i-Fi network. onnecting
to an insecure network might lead to leakage of valuable data.
. rite Short Notes on:
i. Spoofing
ii. hishing
Ans. i. S oofing: It is the act of disguising a communication from an unknown source as being from a known, trusted
source. It is used to gain access to the personal information of the targeted person, to spread malware by
infected links or attachments and to bypass network access. Spoofing can be applied to e-mails phone calls
and websites. he common spoofing methods are e-mail and chat spoofing.
Mail S oofing: It is the process by which an attacker uses e-mail messages to trick a recipient. The e-mails
may include links to malicious websites or attachments.
at S oofing: hen a user of a computer mas uerades as another individual while engaging in chat.
ii. Phishing: It is an attack in which communications are done in such a way that it appears to come from an
authentic source. It is usually done through e-mail. he goal is to steal sensitive credentials or confidential
personal information and to install malware on the victim s machine. Some common types of phishing attacks
are mail phishing s phishing and Spear phishing.
lication ased uestions: L if e S k il l s & V al ue s
. ahul wants to prevent other people from accessing his computer without permission. hich security measure
would help her in this situation?
ns. assword rotection.
. nu is working on his computer. Suddenly the computer slows down and some unwanted files appear automatically.
Help him to identify the problem with his computer and suggest him a way to resolve the problem.
Ans. His computer is infected by a virus. It can be resolved by installing antivirus software like McAfee.
412 Touchpad Information Technology-X

