Page 69 - Code Craft Computer-7
P. 69

almost identical to an already existing popular trademark name belonging to someone else. These
            domain names are created to make huge money by diverting substantial traffic on Internet to the
            cybersquatters’ site.

            For example,         www.alpha.com - original domain
                                 www.alpha1.com - work of a cybersquatter

            Cyber Extortion

            It is a form of cybercrime that involves an attack (or threat) coupled with a demand for money
            against an enterprise. Cyber extortion is committed through ransomware or Denial-of-Service
            (Dos). The attacker blocks the system resource and encrypts the file. Eventually the victim fails to
            access the data. Only when the ransom is paid to the attacker, the victim receives a decryption
            key.

            Cyberterrorism
            It  is  a  terrorist  act  which  occurs  electronically.  Cyberterrorism  occurs  against  organisations,

            individuals, business houses, and even against government establishments. It is used to cast fear
            and violence which can cause loss of critical infrastructure.
            Acts of cyberterrorism are conducted by manipulating computer systems. These attacks can be
            anonymous and executed from thousands of miles away from the target. Such attacks are difficult
            to track.


            CYBER SECURITY
            The rapid growth in the Information Technology sector has transformed the method of creating,
            storing, and sharing data. It has various advantages, but at the same time it is highly vulnerable to
            threats, such as stealing of confidential information, hacking accounts, unauthorised access, and
            so on. Therefore, it is essential to have sound knowledge of cyber security.

            Cyber security refers to protection of computers from theft of data and damage to their hardware
            and software. Over a period of time, various technologies have been developed to protect the
            integrity of networks, computers, data and programs from virus attacks, unauthorised access, and
            potential damages. Some cyber security technologies and programs are described below.

            Antivirus
            The term antivirus refers to a software which is used to identify, prevent, remove, or deactivate
            the malicious software. Antivirus is also known as anti-malware software          . Protecting a computer
            and its data against the virus attacks has become one of the top priorities of present era. Therefore,
            it  is  recommended  to  install  an  effective  antivirus  software  in  the  computer.  The  benefit  of
            installing antivirus in a computer is that it prevents malicious software from damaging valuable

            information  and  important  files  stored  in  it.  Preventing  and  removing  any  kind  of  malicious
            software ensures proper functioning of a computer system.
            There are various antivirus software available in the
            market. Some popular antivirus software are Quick
            Heal,  Kaspersky,  Norton,  McAfee,  and  AVG

            Antivirus.

                                                                 69
   64   65   66   67   68   69   70   71   72   73   74