Page 134 - DCAP516_COMPUTER_SECURITY
P. 134
Computer Security Avinash Bhagat, Lovely Professional University
Notes Unit 11: Threats in Network
CONTENTS
Objectives
Introduction
11.1 Types of Network Threats
11.2 Reasons for the Vulnerability of Computers
11.3 Summary
11.4 Keywords
11.5 Review Questions
11.6 Further Readings
Objectives
After studying this unit, you will be able to:
Understand what are various types of Network Threats
Know about various types of computer viruses
Discuss about Trojan Horses and their types
Explain the reasons for the vulnerability of computers
Introduction
Today, information technology has created major changes in almost everyone’s life. Each new
advance has offered amazing new capabilities and created unforeseen consequences in our lives.
With neural networks and nano-computing promising to turn every atom in a glass of water
into a computer capable of performing a billion operations per second – the computers, today,
have come a long way. Computers, despite being such high technology devices, are extremely
vulnerable. In fact, it may be easier to steal financial secrets from a computer or a network of
computers (Internet) than to actually steal a physical substance in the real world.
In this IT age when everything from microwave ovens and refrigerators to oil refineries and
nuclear power plants are being run on computers, cyber crime has assumed fatal implications.
Cyber crime is an evil having its origin in the growing dependence on computers in modern
life. What is ‘cyber crime’ and how is it different from conventional crime? Let us understand
this. A simple definition of cyber crime is “unlawful acts wherein the computer is either a tool or a
target or both.” Cyber crime involves criminal activities that are traditional in nature, such as
theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code.
The abuse of computers has also given birth to a gamut of new age crimes that are addressed by
the Information Technology Act, 2000. Defining cyber crimes, as “acts that are punishable by the
Information Technology Act” would be unsuitable as the Indian Penal Code also covers many
cyber crimes, such as e-mail spoofing and cyber defamation, sending threatening e-mails, etc.
Following are the major forms of cyber crimes, or in other words, following are the different
forms of potential threats to a computer system:
128 LOVELY PROFESSIONAL UNIVERSITY