Kips IT Class 10 Chapter 22 Solutions Internet Security Part-B

TextbookKips Information Technology Class 10
Subject Code402
PartB
UnitUnit-4 Web Applications and Security
Chapter22 Internet Security
Other Chapters SolutionsKips IT Class 10 Solutions

A. Fill in the Blanks.

1. The History of all websites you have visited is stored in the browser.

2. Phishing is an act of sending an e-mail to a user; misleading him to believe that it is from a trusted person or organisation.

3. You should install and regularly update the Antivirus software in your computer to prevent all kinds of malware.

4. A Firewall is a software that can help in preventing unauthorised access to your computer by blocking unsolicited communications.

5. Scheduling routine Backups can protect you from unexpected events.


B. Write T for True and F for False.

1. You should never clear out the data stored in the web browsers. – FALSE

2. Encryption is important for data security. – TRUE

3. Regular and periodic updation of software is recommended to make it secure. – TRUE

4. You must always use a pirated software because you can save a lot of money. – FALSE

5. One of the most common ways through which viruses spread is email. – TRUE


C. Answer the following questions.

What is the purpose of internet security?

With the rapid growth of the internet and its applications in diverse fields, security risks have also increased. People tend to put their personal information, like name and address, passwords for the email accounts, banking, or even credit card details over the internet. This information can be easily intercepted by some people with bad intentions (crackers). They may misuse this information for their own benefit. Virus like the Ransomware virus attacks have made people realise how vulnerable their information is and has increased the need for Internet Security.

What is phishing?

It is an act of sending an e-mail to a user; misleading him to believe that it is from a trusted person or organisation. The user is asked to visit a website in which he is supposed to update or validate his personal details, such as user name, password, credit card details, etc. In this way the operators of the fake website steal the person’s identity and commit crimes in his name. This could damage the person’s reputation and cause him heavy financial losses.

What is the difference between email spoofing and chat spoofing?

E-mail Spoofing
Email spoofing is one of the most common security threats these days. This process involves sending emails to the targeted recipients to make them believe that these emails originate from trusted resources. The purpose of spoofing is to gain access to the recipient’s personal information. It can be usernames, passwords, banking details, etc. Nowadays, most email servers provide security features to prevent this type of activity.

Chat Spoofing
Chat spoofing is quite similar to email spoofing. The only difference between the two is that in chat spoofing, the spoofing happens when the target is engaged in a chat process. The target perceives that he or she is chatting with someone known, but in fact, it is a cyber attack. The purpose of chat spoofing, also, is to gain access to some important personal information.

List a few security practices to be followed while using the internet.

Use a Firewall: Some programs might try to access your computer remotely without your permission. To prevent such a situation, you should install a firewall on your computer. A firewall is a software that can help in preventing unauthorised access to your computer by blocking unsolicited communications.

Do not Open Attachments from Unknown Sources: One of the most common ways through which viruses spread is email. So, always ignore unsolicited e-mails. Avoid opening attachments, links, and forms in e-mails that come from people you do not know, or which seem “phishy”. Also, avoid untrustworthy downloads.

Restrict the Number of users on the Computer: Although this may not be possible in places where computers are shared, but having some control over the usage will greatly reduce the risk of infection. So, the number of users should be restricted especially when the users are allowed to bring and use their own portable storage devices.

Do not use Pirated Software: Though using a pirated and unlicenced software may seem financially attractive, yet the possibility of picking up a virus infection from such sources is very high. Always use software from well-known companies that can be downloaded from their official site.

Back up Your Data Regularly: Very often viruses and other malware try to destroy your data. To avoid an unfortunate eventuality of your computer being infected by a virus, it is important to have a backup of all of your important data. Scheduling routine backups can protect you from such unexpected events.

Use Data Encryption: Even though you may have a backup of your data, you would not want your data/information to leak and go into the wrong hands. Make sure that your data is encrypted by using an encryption software to protect it from unauthorised access.

Never Leave Your Computer Unattended: While this may be okay to do at home, leaving your computer on and unattended and open while at the workplace, is asking for trouble. You may never know who accesses it while your are busy elsewhere.

Keep Passwords Safe: You register at various websites for accessing their content during which you have to enter a username and password. It is suggested that one should change their password frequently. If you do not change your password frequently then your password might get hacked and you may face severe monetary losses. You should therefore, take special care to protect your passwords.