Page 134 - DCAP516_COMPUTER_SECURITY
P. 134

Computer Security                                               Avinash Bhagat, Lovely Professional University




                    Notes                             Unit 11: Threats in Network


                                     CONTENTS
                                     Objectives
                                     Introduction

                                     11.1 Types of Network Threats
                                     11.2 Reasons for the Vulnerability of Computers
                                     11.3 Summary

                                     11.4 Keywords
                                     11.5 Review Questions
                                     11.6 Further Readings

                                   Objectives

                                   After studying this unit, you will be able to:

                                       Understand what are various types of Network Threats
                                       Know about various types of  computer viruses
                                       Discuss about Trojan Horses and their types

                                       Explain the reasons for the vulnerability of computers
                                   Introduction


                                   Today, information technology has created major changes in almost everyone’s life. Each new
                                   advance has offered amazing new capabilities and created unforeseen consequences in our lives.
                                   With neural networks and nano-computing promising to turn every atom in a glass of water
                                   into a computer capable of performing a billion operations per second – the computers, today,
                                   have come a long way. Computers, despite being such high technology devices, are extremely
                                   vulnerable. In fact, it may be easier to steal financial secrets from a computer or a network of
                                   computers (Internet) than to actually steal a physical substance in the real world.
                                   In this IT age when everything from microwave ovens and refrigerators to oil refineries and
                                   nuclear power plants are being run on computers, cyber crime has assumed fatal implications.
                                   Cyber crime is an evil having its origin in the growing dependence on computers in modern
                                   life. What is ‘cyber crime’ and how is it different from conventional crime? Let us understand
                                   this. A simple definition of cyber crime is “unlawful acts wherein the computer is either a tool or a
                                   target or both.” Cyber crime involves criminal activities that are traditional in nature, such as
                                   theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code.
                                   The abuse of computers has also given birth to a gamut of new age crimes that are addressed by
                                   the Information Technology Act, 2000. Defining cyber crimes, as “acts that are punishable by the
                                   Information Technology Act” would be unsuitable as the Indian Penal Code also covers many
                                   cyber crimes, such as e-mail spoofing and cyber defamation, sending threatening e-mails, etc.
                                   Following are the major forms of cyber crimes, or in other words, following are the different
                                   forms of potential threats to a computer system:







          128                               LOVELY PROFESSIONAL UNIVERSITY
   129   130   131   132   133   134   135   136   137   138   139