DF Unit 2
DF Unit 2
2.1 Introduction
As we are living in the digital era where information is produced and shared across the world
as everything is interconnected through the network. A group of two or more similar things or
people interconnected with each other is called a network as shown in the figure below (Figure
2.1).
Some of the examples of the network in our everyday
life include:
a. Social network
b. Mobile network
c. Network of computers
d. Airlines, railways, banks, hospitals networks
Apart from computers, networks include networking devices like switch, router, modem, etc.
Networking devices are used to connect multiple computers in different settings. For
communication, data in a network is divided into smaller chunks called packets. These packets
are then carried over a network. Devices in a network can be connected either through wired
media like cables or wireless media like air.
In a communication network, each device that is a part of a network and that can receive, create,
store or send data to different network routes is called a node. In the context of data
communication, a node can be a device such as a modem, hub, bridge, switch, router, digital
telephone handset, printer, computer, or server.
The interconnectivity of computing devices in a network allows us to exchange information
simultaneously with many parties through an email, websites, audio/video calls, etc. The
network allows sharing of resources. For example, a printer can be made available to multiple
computers through a network; networked storage can be accessed by multiple computers.
People often connect their devices through hotspots, thus forming a small personal network.
LAN is comparatively secure as only authentic users in the network can access other computers
or shared resources. Users can print documents using a connected printer, and upload/download
documents and software to and from the local server. Such LANs provide short-range
communication with high-speed data transfer rates. These types of networks can be extended
up to 1 km. Data transfer in LAN is quite high and usually varies from 10 Mbps (called
Ethernet) to 1000 Mbps (called Gigabit Ethernet), where Mbps stands for Megabits per second.
Ethernet is a set of rules that decides how computers and other devices connect with each other
through cables in a local area network or LAN.
Fig 2.10: RJ 45
2.4.4 Repeater
A repeater is an analog device used to expand the coverage area of the network by strengthening
a weak signal
Data are carried in the form of signals over the cable. These signals can travel a specified
distance (usually about 100 m). Signals lose their strength beyond this limit and become weak.
In such conditions, original signals need to be regenerated. A repeater is an analog device that
works with signals on the cables to which it is connected. The weakened signal appearing on
the cable is regenerated and put back on the cable by a repeater.
2.4.5 Hub
An Ethernet hub (Figure 2.11) is a networking device used to connect different devices through
wires in a network. Hubs are generally used to connect LAN computers.
A hub has multiple ports or lines. Data arriving on any of the lines are sent out on all
the other ports, without taking into consideration that whether the data is destined for a
particular node or not. The limitation of Hub is that if data from two devices come at the same
time, they will collide.
Figure 2.11: A network hub with 8 port
2.4.5 Switch
A switch is a networking device (Figure 2.12) that plays a central role in a Local Area Network
(LAN). Like a hub, a network switch is used to connect multiple computers or communicating
devices. When data arrives, the switch extracts the destination address from the data packet
and looks it up in a table to see where to send the packet. Thus, it sends signals to only selected
devices instead of sending them to all unlike hub. It can forward multiple packets at the same
time. A switch does not forward the signals which are noisy or corrupted. It drops such signals
and asks the sender to resend them.
Ethernet switches are common in homes/offices to connect multiple devices thus creating
LANs or accessing the Internet.
2.4.6 Router
A router (Figure 2.13) is a network device that can receive the data, analyze it and transmit it
to other networks. A router connects a local area network to the internet. Compared to a hub or
a switch, a router has advanced capabilities as it can analyze the data being carried over a
network, decide/alter how it is packaged, and send it to another network of a different type.
For example, data has been divided into packets of a certain size. Suppose these packets
are to be carried over a different type of network which cannot handle bigger packets. In such
a case, the data is to be repackaged as smaller packets and then sent over the network by a
router.
Figure 2.13: A router
A router can be wired or wireless. A wireless router can provide Wi-Fi access to smartphones
and other devices. Usually, such routers also contain some ports to provide wired Internet
access. These days, home Wi-Fi routers perform the dual task of a router and a modem/ switch.
These routers connect to incoming broadband lines, from ISP (Internet Service Provider), and
convert them to digital data for computing devices to process.
2.4.7 Gateway
As the term “Gateway” suggests, it is a key access point that acts as a “gate or passage”
between an organization’s network and the outside world of the Internet (Figure 2.14). The
gateway serves as the entry and exit point of a network, as all data coming in or going out of a
network must first pass through the gateway in order to use routing paths.
Besides routing data packets, gateways also maintain information about the host
network's internal connection paths and the identified paths of other remote networks. If a node
from one network wants to communicate with a node of a foreign network, it will pass the data
packet to the gateway, which then routes it to the destination using the best possible route.
For simple Internet connectivity at home, the gateway is usually the Internet Service Provider
that provides access to the entire Internet. Generally, a router is configured to work as gateway
device in computer networks. But a gateway can be implemented completely in software,
hardware, or a combination of both. Because a network gateway is placed at the edge of a
network, he firewall is usually integrated with it.
2.5 NETWORKING TOPOLOGIES
We have already discussed that a number of computing devices are connected together to form
a Local Area Network (LAN), and interconnections among millions of LANs forms the
Internet. The arrangement of computers and other peripherals in a network is called its
topology. Common network topologies are Mesh, Ring, Bus, Star, and Tree.
Types of
Network
Topology
1. It is possible to transmit data from one node to many other nodes at the same time.
2. The failure of one node does not cause the entire network to fail as there are alternate
paths for data transmission.
3. It can handle heavy traffic, as there are dedicated paths between any two network nodes.
4. Point-to-point contact between every pair of nodes, makes it easy to identify faults.
1. The arrangement wherein every network node is connected to every other node of the
network, many connections serve no major purpose. This leads to redundancy of many
network connections.
2. A lot of cabling is required. Thus, the costs incurred in setup and maintenance are high.
3. Owing to its complexity, the administration of a mesh network is difficult.
1. The data being transmitted between two nodes passes through all the intermediate
nodes.
2. A central server is not required for the management of this topology.
3. The traffic is unidirectional
4. The data transmission is high-speed.
5. In comparison to a bus, a ring is better at handling load.
6. The adding or removing of network nodes is easy, as the process requires changing only
two connections.
7. The configuration makes it easy to identify faults in network nodes.
8. In this topology, each node has the opportunity to transmit data. Thus, it is a very
organized network topology.
9. It is less costly than a star topology.
Disadvantages of Ring Topology
1. The failure of a single node in the network can cause the entire network to fail.
2. The movement or changes made to network nodes affect the entire network’s
performance.
3. Data sent from one node to another has to pass through all the intermediate nodes.
4. Transmission of data is slower as compared to star topology.
5. The transmission speed drops with an increase in the number of nodes.
6. There is heavy dependency on the wire connecting the network nodes in the ring.
1. The cable length is limited. This limits the number of network nodes that can be
connected.
2. This network topology can perform well only for a limited number of nodes.
3. When the number of devices connected to the bus increases, the efficiency decreases.
4. It is suitable for networks with low traffic. High traffic increases load on the bus, and
the network efficiency drops.
5. It is heavily dependent on the central bus.
6. A fault in the bus leads to network failure.
7. It is not easy to isolate faults in the network nodes.
8. Each device on the network “sees” all the data being transmitted, thus posing a security
risk.
The central node can be either a broadcasting device means data will be transmitted to all the
nodes in the network, or a unicast device means the node can identify the destination and
forward data to that node only.
1. Network operation depends on the functioning of the central hub. Hence, central
hub failure leads to failure of the entire network.
2. Also, the number of nodes that can be added, depends on the capacity of the central
hub.
3. The setup cost is quite high.
1. The tree topology is useful in cases where a star or bus cannot be implemented
individually.
2. It is most-suited in networking multiple departments of a university or corporation,
where each unit (star segment) functions separately, and is also connected with the main
node (root node).
3. The advantages of centralization that are achieved in a star topology are inherited by the
individual star segments in a tree network.
4. Each star segment gets a dedicated link from the central bus. Thus, failing of one
segment does not affect the rest of the network.
5. The network can be expanded by the addition of secondary nodes. Thus, scalability is
achieved.
Disadvantages of Tree Topology
1. As multiple segments are connected to a central bus, the network depends heavily on
the bus. Its failure affects the entire network.
2. Maintenance is not easy and costs are high.
3. Configuration is difficult in comparison to that in other topologies.
4. Though it is scalable, the number of nodes that can be added depends on the capacity
of the central bus and on the cable type.
192:168:0:178
With more and more devices getting connected to the Internet, it was realized that the 32-bit
IP address will not be sufficient as it offers just under 4.3 billion unique addresses. Thus, a 128
bits IP address, called IP version 6 (IPV6 in short) was proposed. An IPv6 address is
represented by eight groups of hexadecimal (base-16) numbers separated by colons. A sample
IPV6 address looks like:
•HTTP – The Hypertext Transfer Protocol is a set of rules which is used to retrieve linked web
pages across the web. The more secure and advanced version is HTTPS.Many people confuse
the web with the Internet. The Internet as we know is a huge global network of interconnected
computers, which may or may not have any file or webpage to share with the world. The web
on the other hand is the interlinking of the collection of Webpages on these computers which
are accessible over the Internet. WWW today gives users access to a vast collection of
information created and shared by people across the world. It is today the most popular
information retrieval system
A DNS server maintains a database of domain names and their corresponding IP addresses. To
understand how the domain name resolution works, we have to understand how and where the
DNS servers are kept. The DNS servers are placed in hierarchical order. At the top level, there
are 13 servers called root servers. Then below the root servers, there are other DNS servers at
different levels. A DNS server may contain the IP address corresponding to a domain or it will
contain the IP address of other DNS servers, where this domain entry can be searched.
Summary
•A computer network is an interconnection among two or more computers or computing
devices.
•A computer network allows computers to share data and resources with each other.
•Networking devices are used to connect multiple computers in different settings. In a
communication network, each device that is a part of a network and that can receive, create,
store or send data to different network routes is called a node.
•Based on the geographical area covered and data transfer rate, computer networks are broadly
categorized into LAN (Local Area Network), MAN (Metropolitan Area Network), and WAN
(Wide Area Network).
•LAN is a network that connects a variety of nodes placed at a limited distance ranging from a
single room, a floor, an office, or a campus having one or more buildings on the same premises.
•Ethernet is a set of rules that decides how computers and other devices connect with each other
through cables in a LAN.
•Metropolitan Area Network (MAN) is an extended form of LAN which covers a larger
geographical area like a city or a town.
•Cable TV networks or cable-based broadband internet services are examples of MAN.
•Wide Area Network (WAN) connects computers and other LANs and MANs, which are
spread across different geographical locations of a country or in different countries or
continents.
•The Internet is the largest WAN that connects billions of computers, smartphones, and
millions of LANs from different continents.
•Modem stands for ‘Modulator Demodulator’, which is a device used for conversion between
electric signals and digital bits.
•Ethernet card, also known as Network Interface Card (NIC card in short) is a network adaptor
used to set up a wired network.
•Each NIC has a MAC address, which helps in uniquely identifying the computer on the
network.
•A repeater is an analog device that regenerates the signals on the cables to which it is
connected.
•A switch is a networking device used to connect multiple computers or communicating
devices.
•A router is a network device that can receive the data, analyze it and transmit it to other
networks Gateway serves as the entry and exit point of a network, as all data coming in or
going out of a network must first pass through the gateway in order to use routing paths.
•The arrangement of computers and other peripherals in a network is called its topology.
•Common network topologies are Mesh, Ring, Bus, Star, and Tree.
•In mesh topology each communicating device is connected with every other device in the
network.
•In a ring topology, each node is connected to two other devices, one each on either side.
•In a bus topology, a single backbone wire called bus is shared among the nodes, which makes
it cheaper and easy to maintain.
•In star topology, each communicating device is connected to a central networking device like
a hub or a switch.
•In tree or hybrid topology, there are multiple branches and each branch can have one or more
basic topologies like star, ring, and bus.
•The MAC address, also known as the physical or hardware address, is a unique permanent
value associated with a network adapter called a NIC. It is used to physically identify a machine
on the network.
•IP address, also known as Internet Protocol address, is a unique address that can be used to
uniquely identify each node in a network.
•Unlike MAC address, IP address can change if a node is removed from one network and
connected to another network.
•The Internet is the global network of computing devices.
•The Worldwide Web (WWW) or web, in short, is an ocean of information, stored in the form
of trillions of interlinked web pages and web resources.
•Sir Tim Berners-Lee —a British computer scientist invented the revolutionary World Wide
Web in 1990.
•HTML (Hypertext Markup Language) is a language that is used to design standardized Web
Pages so that the Web contents can be read and understood from any computer.
•URI (Uniform Resource Identifier) or URL (Uniform Resource Locator) is a unique address
or path for each resource located on the web.
•HTTP – The Hypertext Transfer Protocol is a set of rules which is used to retrieve linked web
pages across the web. The more secure and advanced version is HTTPS.
•Each computer server hosting a website or web resource is given a name against its IP address.
These names are called the Domain names or hostnames.
•Conversion of the domain name of each web server to its corresponding IP address is called
domain name resolution. It is done through a server called DNS server.
Exercise
1. Expand the following: a) ARPANET b) MAC c) ISP d) URI
2.What do you understand by the term network?
3.Mention any two main advantages of using a network of computing devices.
4.Differentiate between LAN and WAN.
5.Write down the names of a few commonly used networking devices.
6.Two universities in different States want to transfer information. Which type of network do
they need to use for this?
7. Define the term topology. What are the popular network topologies?
8.How is tree topology different from bus topology?
9.Identify the type of topology from the following:
a) Each node is connected with the help of a single cable.
b) Each node is connected with central switching through independent cables.
10. What do you mean by a modem? Why is it used?
11.Explain the following devices:
a) Switch b) Repeater c) Router d) Gateway e) NIC
12. Draw a network layout of star topology and bus topology connecting five computers.
13. What is the significance of MAC address?
14. How is an IP address different from a MAC address? Discuss briefly.
15. What is DNS? What is a DNS server?
3.SECURITY ASPECTS
3.2 Malware
Malware is a short term used for Malicious software. It is any software developed with the
intention to damage hardware devices, steal data, or cause any other trouble to the user. Various
types of malware have been created from time to time, and large-scale damages have been
inflicted. Many of these malware programs have been identified and countermeasures have
been initiated. However, different types of malware keep on coming on a regular basis which
compromises the security of computer systems and causes intangible damages. Besides, each
year, malware incurs financial damages worth billions of dollars worldwide. Viruses, Worms,
Ransomware, Trojans, and Spyware are some of the kinds of malware.
3.2.1 Virus
The term computer virus was coined by Fred Cohen in 1985 and has been borrowed from
biological science with almost similar meaning and behavior, the only difference is that the
victim is a computer system and a virus is malicious software. A virus is a piece of software
code created to perform malicious activities and hamper resources of a computer system like
CPU time, memory, personal files, or sensitive information. Mimicking the behavior of a
biological virus, the computer virus spreads in contact with another system, i.e. a computer
virus infects other computer systems that it comes into contact with by copying or inserting its
code into the computer programs or software (executable files). A virus remains dormant on a
system and is activated as soon as the infected file is opened (executed) by a user.
Viruses behave differently, depending upon the reason or motivation behind their creation.
Some of the most common intentions or motives behind viruses include stealing passwords or
data, corrupting files, spamming the user’s email contacts, and even taking control of the user’s
machine. Some well-known viruses include Crypto Locker, ILOVEYOU, My Doom, Sasser
and Net sky, Slammer, Stuxnet, etc.
3.2.2 Worms
The Worm is also malware that incurs unexpected or damaging behavior on an infected
computer system. The major difference between a worm and a virus is that, unlike a virus, a
worm does not need a host program or software to insert its code into. Worms are standalone
programs that are capable of working on their own. Also, a virus needs human triggering for
replication (i.e. when a user opens/executes the infected file), while a worm replicates on its
own and can spread to other computers through the network. Some prominent examples of
worms include Storm Worm, Sobig, MSBlast, Code Red, Nimda, Morris Worm, etc.
3.2.3 Ransomware
It is a type of malware that targets user data. It either blocks the user from accessing their own
data or threatens to publish the personal data online and demands ransom payment against the
same. Some ransomware simply blocks access to the data while others encrypt data making it
very difficult to access. In May 2017, ransomware WannaCry infected almost 200,000
computers across 150 countries. It worked by encrypting data and demanding ransom payments
in the Bitcoin cryptocurrency. It literally made its victims “cry” hence the name.
3.2.4 Trojan
Since the ancient Greeks could not infiltrate the city of Troy using traditional warfare methods,
they gifted the king of Troy with a big wooden horse with hidden soldiers inside and eventually
defeated them. Borrowing the concept, a Trojan is a malware, that looks like legitimate
software and once it tricks a user into installing it, it acts pretty much like a virus or worm.
However, a Trojan does not self-replicate or infect other files, it spreads through user
interaction such as opening an email attachment or downloading and executing a file from the
Internet. Some Trojans create backdoors to give malicious users access to the system.
3.2.5 Spyware
It is a type of malware that spies on a person or an organization by gathering information about
them, without the knowledge of the user. It records and sends the collected information to an
external entity without the consent or knowledge of the user. Spyware usually tracks internet
usage data and sells them to advertisers. They can also be used to track and capture credit card
or bank account information, login, and password information, or the user’s personal identity.
3.2.6 Adware
Adware is malware that is created to generate revenue for its developer. Adware displays
online advertisements using pop-ups, web pages, or installation screens. Once the adware has
infected a substantial number of computer systems, it generates revenue either by displaying
advertisements or using a “pay per click” mechanism to charge its clients against the number
of clicks on their displayed ads. Adware is usually annoying, but harmless. However, it often
paves way for other malware by displaying unsafe links as advertisements.
b.Sandbox detection
In this method, a new application or file is executed in a virtual environment (sandbox) and its
behavioral fingerprint is observed for possible malware. Depending on its behavior, the
antivirus engine determines if it is a potential threat or not and proceeds accordingly. Although
this method is a little slow, it is very safe as the new unknown application is not given access
to the actual resources of the system.
d.Heuristics
Often, a malware infection follows a certain pattern. Here, the source code of a suspected
program is compared to viruses that are already known and are in the heuristic database. If the
majority of the source code matches with any code in the heuristic database, the code is flagged
as a possible threat.
e.Real-time protection
Some malware remains dormant or gets activated after some time. Such malware needs to be
checked on a real-time basis. In this technique, the anti-malware software keeps running in the
background and observes the behavior of an application or file for any suspicious activity while
it is being executed i.e. when it resides in the active (main) memory of the computer system.
3.4 SPAM
Spam is a broad term and applies to various digital platforms like messaging, forums, chatting,
emailing, advertisement, etc. However, the widely recognized form is email spam. Depending
on their requirements, organizations or individuals buy or create a mailing list (list of email
addresses) and repeatedly send advertisement links and invitation emails to a large number of
users.
This creates unnecessary junk in the inbox of the receiver’s email and often tricks a
user into buying something or downloading paid software or malware. Nowadays, email
services like Gmail, Hotmail, etc. have an automatic spam detection algorithm that filters
emails and makes things easier for the end users. A user can also mark an undetected
unsolicited email as “spam”, thereby ensuring that such type of email is not delivered into the
inbox as a normal email in the future.
An HTTP stands for Hypertext Transfer Protocol. The HTTP protocol provides communication
between different communication systems. When the user makes an HTTP request on the
browser, then the web server sends the requested data to the user in the form of web pages. In
short, we can say that the HTTP protocol allows us to transfer the data from the server to the
client.
The full form of HTTPS is Hypertext Transfer Protocol Secure. The HTTP protocol does not
provide the security of the data, while HTTP ensures the security of the data.
Therefore, we can say that HTTPS is a secure version of the HTTP protocol. This
protocol allows transferring the data in an encrypted form. The use of HTTPS protocol is
mainly required where we need to enter the bank account details.
The HTTPS protocol is mainly used where we require to enter the login credentials.
In modern browsers such as chrome, both protocols, i.e., HTTP and HTTPS, are marked
differently. To provide encryption, HTTPS uses an encryption protocol known as Transport
Layer Security, and officially, it is referred to as a Secure Sockets Layer (SSL). This protocol
uses a mechanism known as asymmetric public key infrastructure, and it uses two different
keys which are given below:
o Private key: This key is available on the web server, which is managed by the owner of
a website.
Both the HTTP (Hyper Text Transfer Protocol) and its variant HTTPS (Hyper Text Transfer
Protocol Secure) are a set of rules (protocol) that govern how data can be transmitted over the
WWW (World Wide Web).
In other words, they provide rules for the client web browser and servers to communicate.
HTTP sends information over the network as it is. It does not scramble the data to be
transmitted, leaving it vulnerable to attacks from hackers.
Hence, HTTP is sufficient for websites with public information sharing like news portals,
blogs, etc. However, when it comes to dealing with personal information, banking credentials,
and passwords, we need to communicate data more securely over the network using HTTPS.
HTTPS encrypts the data before transmission. At the receiver end, it decrypts to recover the
original data. The HTTPS-based websites require SSL Digital Certificate. The major difference
between HTTP and HTTPS is the SSL certificate. The HTTPS protocol is an extended version
of the HTTP protocol with an additional feature of security.
This additional feature of security is very important for those websites which transmit sensitive
data such as credit card information.
The HTTPS protocol is secured due to the SSL protocol. The SSL protocol encrypts the data
which the client transmits to the server. If someone tries to steal the information which is being
communicated between the client and the server, then he/she would not be able to understand
due to the encryption. This is the main difference between the HTTP and HTTPS that the HTTP
does not contain SSL, whereas the HTTPS contains SSL that provides secure communication
between the client and the server.
HTTP HTTPS
The full form of HTTP is the Hypertext The full form of HTTPS is Hypertext
Transfer Protocol Transfer Protocol Secure.
It is written in the address bar as http://.
It is written in the address bar as https://.
The HTTP transmits the data over port The HTTPS transmits the data over port
number 80. number 443.
It is unsecured as the plain text is sent, which
It is secure as it sends the encrypted data
can be accessible by the hackers. which hackers cannot understand.
It is mainly used for those websites that It is a secure protocol, so it is used for those
provide information like blog writing. websites that require to transmit the bank
account details or credit card numbers.
It is an application layer protocol. It is a transport layer protocol.
It does not use SSL. It uses SSL that provides the encryption of
the data.
Google does not give the preference to the Google gives preferences to the HTTPS as
HTTP websites. HTTPS websites are secure websites.
The page loading speed is fast. The page loading speed is slow as compared
to HTTP because of the additional feature
that it supports, i.e., security.
3.6 Firewall
A computer firewall is a network security system designed to protect a trusted private network
from unauthorized access or traffic originating from an untrusted outside network (e.g., the
Internet or different sections of the same network) to which it is connected (Figure 3.2). A
firewall can be implemented in software, hardware, or both. As discussed earlier, a malware-
like worm has the capability to move across networks and infect other computers. The firewall
acts as the first barrier against malware.
If a hacker uses their knowledge to find and help in fixing the security flaws in the system, it’s
termed a White Hat hacker. These are the hackers with good intentions. They are actually
security experts. Organizations hire ethical or white hat hackers to check and fix their systems
for potential security threats and loopholes. Technically, white hats work against black hats.
Summary
• Threats include all the ways in which one can exploit any vulnerability or weakness in
a network or communication system in order to cause harm or damage one’s reputation.
• Prevention generally comes before protection and is meant to avert the threat before it
occurs.
• Malware is a short term used for Malicious software. It is any software developed with
the intention to damage hardware devices, steal data, or cause any other trouble to the
user.
• A virus is a piece of software code created to perform malicious activities and hamper
resources of a computer system like CPU time, memory, personal files, or sensitive
information.
• The Worm is also malware that incurs unexpected or damaging behavior on an infected
computer system.
• It is a type of malware that targets user data. It either blocks the user from accessing
their own data or threatens to publish the personal data online and demands ransom
payment against the same.
• Trojan is a malware, that looks like legitimate software and once it tricks a user into
installing it, it acts pretty much like a virus or worm.
• It is a type of malware that spies on a person or an organization by gathering information
about them, without the knowledge of the user. It records and sends the collected
information to an external entity without the consent or knowledge of the user.
• A key logger can either be malware or hardware. The main purpose of this malware is
to record the keys pressed by a user on the keyboard.
• Spam is a broad term and applies to various digital platforms like messaging, forums,
chatting, emailing, advertisement, etc.
• An HTTP stands for Hypertext Transfer Protocol. The HTTP protocol provides
communication between different communication systems.
• The full form of HTTPS is Hypertext Transfer Protocol Secure. The HTTP protocol
does not provide the security of the data, while HTTP ensures the security of the data.
Review Questions
1. Why is a computer considered to be safe if it is not connected to a network or Internet?
2. What is a computer virus? Name some computer viruses that were popular in recent years.
3. How is a computer worm different from a virus?
4. How is Ransomware used to extract money from users?
5. How did a Trojan get its name?
6. How does adware generate revenue for its creator?
7. Briefly explain two threats that may arise due to a key logger installed on a computer.
8. How is a Virtual Keyboard safer than an On-Screen Keyboard?
9. List and briefly explain different modes of malware distribution.
10. List some common signs of malware infection.
11. List some preventive measures against malware infection.
12. Write a short note on different methods of malware identification used by antivirus
software.
13. What are the risks associated with HTTP? How can we resolve these risks by using HTTPS?
14. List one advantage and disadvantage of using Cookies.
15. Write a short note on White, Black, and Grey Hat Hackers.