SSC CGL Preparation – Day 16

Table of Contents

Computer Basics: Network and Information Security Threats


πŸ”· What is Network and Information Security?

  • Network Security: Protects the infrastructure and data in a network from unauthorized access, misuse, or theft.
  • Information Security: Ensures the confidentiality, integrity, and availability of data.

πŸ”· Common Network and Information Security Threats


πŸ”Ή 1. Malware

  • Short for Malicious Software.
  • Types:
    • Virus – Attaches to programs/files and spreads.
    • Worm – Replicates and spreads over networks without user action.
    • Trojan Horse – Appears legitimate but contains harmful code.
    • Ransomware – Locks/encrypts data and demands payment to unlock.
    • Spyware – Secretly collects user data.
    • Adware – Displays unwanted ads, often tracks user behavior.

πŸ”Ή 2. Phishing

  • Fraudulent emails/websites that mimic legitimate ones to steal:
    • Usernames
    • Passwords
    • Bank details
  • Often contains urgent messages or fake links.

πŸ”Ή 3. Denial of Service (DoS) Attack

  • Overloads a server/network, making it unavailable.
  • DDoS (Distributed DoS): Attack from multiple sources at once.

πŸ”Ή 4. Man-in-the-Middle (MitM) Attack

  • Hacker intercepts communication between two systems.
  • Can read or alter the transmitted data.

πŸ”Ή 5. SQL Injection

  • Hacker enters malicious SQL code in web forms to access or manipulate databases.

πŸ”Ή 6. Brute Force Attack

  • Automated attempt to guess passwords using multiple combinations.

πŸ”Ή 7. Zero-Day Exploit

  • Targets vulnerabilities unknown to the software vendor.
  • Extremely dangerous as there’s no patch available.

πŸ”Ή 8. Social Engineering

  • Manipulating people to reveal confidential information (e.g., through impersonation).

πŸ”Ή 9. Keylogger

  • Records every keystroke on the keyboard.
  • Used to steal passwords, personal info.

πŸ”Ή 10. Spoofing

  • Disguising as a trusted source to trick users.
    • Email spoofing
    • IP spoofing
    • Website spoofing

πŸ”· Effects of Security Threats

ImpactDescription
πŸ”“ Data BreachConfidential data gets leaked
πŸ’° Financial LossUnauthorized transactions, ransom payments
⚠️ Identity TheftAttacker uses stolen personal info
πŸ›‘ Service DisruptionWebsites or networks become unavailable
πŸ’Ό Reputation DamageOrganization loses trust

πŸ”· Basic Prevention Methods (Covered in Day 17)

  • Using firewalls and antivirus.
  • Strong passwords and two-factor authentication.
  • Avoiding suspicious links/emails.
  • Regular software updates and backups.

πŸ”· Important Terms to Remember

TermMeaning
VirusNeeds a host file to spread
WormSpreads independently over networks
TrojanDisguised as legitimate software
RansomwareEncrypts data, demands payment
SpywareSecretly monitors user activity
PhishingTricks users into revealing private info
DDoSDistributed attack causing system failure
Brute ForceGuessing password combinations
SQL InjectionHacking databases using code injections
KeyloggerRecords keystrokes
Zero-Day AttackExploits unknown vulnerabilities

πŸ”· For SSC CGL – Focus Points

βœ… Difference between malware types
βœ… Meaning of phishing, spoofing, ransomware
βœ… Understanding DoS/DDoS and social engineering
βœ… Recognize basic security terminology

Leave a Reply

Your email address will not be published. Required fields are marked *