Download CBSE Class 7 Computer Science Computer Security Notes in PDF format. All Revision notes for Class 7 Computer Science have been designed as per the latest syllabus and updated chapters given in your textbook for Computer Science in Class 7. Our teachers have designed these concept notes for the benefit of Class 7 students. You should use these chapter wise notes for revision on daily basis. These study notes can also be used for learning each chapter and its important and difficult topics or revision just before your exams to help you get better scores in upcoming examinations, You can also use Printable notes for Class 7 Computer Science for faster revision of difficult topics and get higher rank. After reading these notes also refer to MCQ questions for Class 7 Computer Science given on studiestoday
Revision Notes for Class 7 Computer Science Computer Security
Class 7 Computer Science students should refer to the following concepts and notes for Computer Security in Class 7. These exam notes for Class 7 Computer Science will be very useful for upcoming class tests and examinations and help you to score good marks
Computer Security Notes Class 7 Computer Science
4. And then there's cold, hard cash. Viruses can trick you into buying fake software, steal your personal information and use it to get to your money, or be sold on the digital equivalent of the black market. Powerful viruses are valuable -- and potentially lucrative -- too
Virus History
Traditional computer viruses were first widely seen in the late 1980s,
Some Virus the Melissa virus in March 1999 was spectacular in its attack. Melissa spread in Microsoft
Word documents sent via e-mail.
The ILOVEYOU virus, which appeared on May 4, 2000, was even simpler. It contained a piece of code as an attachment. People who double-clicked on the attachment launched the code. It then sent copies of itself to everyone in the victim's address book and started corrupting files on the victim's machine.
Worms: A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
Worms use up computer processing time and network bandwidth when they replicate, and often carry payloads that do considerable damage.
Some example of worms: A worm called Code Red made huge headlines in 2001.
The Slammer worm (which caused mayhem in January 2003) exploited a hole in Microsoft's SQL server.
A worm called Storm, which showed up in 2007, immediately started making a name for itself. Storm used social engineering techniques to trick users into loading the worm on their computers.
Trojan Horse: A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Some Trojan are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create
a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
How to protect your system
• Keep The Operating System Updated
• Use a Firewall
• Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software.
• Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You cannot get a virus by simply being online or by reading e-mail.
• Anti-Virus Software: vast, Avira, McAfee, Nortan and many more
Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Hardware and Software Firewalls:
Firewalls can be either hardware or software but the ideal firewall configuration will consist of both. Hardware firewalls can be purchased as a stand-alone product but are also typically found in broadband routers, and should be considered an important part of your system and network set-up. Most hardware firewalls will have a minimum of four network ports to connect other computers, but for larger networks, business networking firewall solutions are available.
Common Firewall Techniques:
There are several types of firewall techniques that will prevent potentially harmful information from getting through:
1. Packet Filter
Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
2. Application Gateway
Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
3. Circuit-level Gateway
Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
4. Proxy Server
Intercepts all messages entering and leaving the network. The server effectively hides the true network addresses.
In practice, many firewalls use two or more of these techniques in concert. A firewall is considered a first line of defense in protecting private information.
CyberCrime
Cybercrime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cybercrime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cybercrimes when the illegal activities are committed through the use of a computer and the Internet.
Please click the link below to download pdf file for CBSE Class 7 Computer Science Computer Security Notes
CBSE Class 7 Computer Science Computer Security Notes
We hope you liked the above notes for topic Computer Security which has been designed as per the latest syllabus for Class 7 Computer Science released by CBSE. Students of Class 7 should download and practice the above notes for Class 7 Computer Science regularly. All revision notes have been designed for Computer Science by referring to the most important topics which the students should learn to get better marks in examinations. Our team of expert teachers have referred to the NCERT book for Class 7 Computer Science to design the Computer Science Class 7 notes. After reading the notes which have been developed as per the latest books also refer to the NCERT solutions for Class 7 Computer Science provided by our teachers. We have also provided a lot of MCQ questions for Class 7 Computer Science in the notes so that you can learn the concepts and also solve questions relating to the topics. We have also provided a lot of Worksheets for Class 7 Computer Science which you can use to further make yourself stronger in Computer Science.
You can download notes for Class 7 Computer Science Computer Security for latest academic session from StudiesToday.com
Yes, the notes issued for Class 7 Computer Science Computer Security have been made available here for latest CBSE session
There is no charge for the notes for CBSE Class 7 Computer Science Computer Security, you can download everything free of charge
www.studiestoday.com is the best website from which you can download latest notes for Computer Security Computer Science Class 7
Come to StudiesToday.com to get best quality topic wise notes for Class 7 Computer Science Computer Security