Unit 4 Web Application and Security
Session 8 : Internet Security
Important Question Answers
1. What is Internet security?
Answer: Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security.
2. What is the objective of Internet security?
Answer: The objective of Internet security is to establish rules and measures to use against attacks over the Internet.
3. Why do you have to think about Internet security?
Answer: Because the Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.
4. Write one pros and cons of Internet security?
Answer: Pros:- The Internet provides valuable information and entertainment.
Cons:- The Internet may leave your computer un-secure due to many online threats.
5. Give three examples of Online threats.
Answer: Phishing, Email spoofing, Chat spoofing, Malware, Online Fraud, Identity Theft
6. How can you reduce the risks of the Internet?
Answer: The risk of the Internet can be reduced by using best practices, such as Antivirus Software, Antispyware, Software, Firewall, Strong Passwords, etc.
7. What are the best practices for Internet Security or Security?
Answer: The best practices for security or Internet security are:-
- (a) Use a strong password
- (b) Generate a strong password through a website
- (c) Use encryption software.
- (d) Keeping your username and password private,
- (e) Read private policy before registering with websites,
- (f) Do not share personal information,
- (g) Do secure transactions (h) Use antivirus and antispyware software
- (i) Do not immediately respond to emails from unknown users
- (j) NEVER open the attachment from an unknown source.
- (k) Clear browser cookies frequently,
- (l) Keep the operating system and software applications up to date
- (m) Use/install firewalls,
- (n) Never install software from unknown sources
- (o) Remove unwanted or unknown software applications.
8. Write general guidelines for managing strong passwords.
Answer: General guidelines for managing strong passwords are:-
- Keep the length of the password at least 12-14 characters if permitted.
- Avoid keeping passwords based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, etc.
- Including numbers, and symbols in passwords if allowed.
- Use capital and lower-case letters.
- Avoid using the same password for multiple sites or purposes.
- Avoid using something that the public or workmates know you strongly like or dislike.
- Use random password generators if possible.
- Example of a strong password: u1vX:,4Hd{]$
9. Which website helps you to create a strong password?
Answer: www.strongpasswordgenerator.com
10. What is encryption software?
Answer: Encryption software is used to protect your data from unauthorized users. It is available within the operating systems or You can use a 3rd party software.
11. Why saving username and password on the shared computer is dangerous?
Answer: It may be used by another user using the same computer.
12. What precautions you must have to take while registering with websites.
Answer: You must read the Privacy Statement or policy.
The privacy statement or policy will include information about how the website uses personal data.
13. How do you understand whether the website is secured or not?
Answer: The website is secured and safe for online transactions, it is indicated through a digital certificate represented as a golden lock in the web browser’s address bar.
14. What is Malware?
Answer: Computer programs intentionally designed to perform unwanted or harmful functions on computers are called Malware or Malicious software. Example – Virus, Spyware, Adware, etc.
15. How Malware can harm you?
Answer: Malware track browsing behavior or transmit personal data from your computer; programs such as keyloggers could be installed on your computer track and transmit every key that is pressed on a keyboard (keystrokes) to unauthorized users.
16. How can you protect your computer from Malware?
Answer: By using antivirus and antispyware software and following best practices of using computers.
Antivirus and Antispyware programs also offer real-time protection by monitoring your computer for any changes by malware software.
Keep your Antivirus and Antispyware software always up to date, this can help in protecting your computer from recent threats.
17. Why should you not open an attachment file received from an unknown person?
Answer: These attachments may contain scripts or viruses.