Q7. Write a note on information security.
Ans. Information security plays an important role in the growth of e-commerce. It can be defined as a set of rules and regulations that users follow online to ensure that the information they provide is not misused in any way. In other words, information security implies protection of information from illegal access or modification.
Q6. What are the main reasons that restrict users from performing financial transaction online?
Ans. It has been found that mainly two reasons restrict users from performing financial transactions online:
- Reluctance to provide sensitive information, such as credit card details or bank account details because of security concerns.
- The desire of users to check the goods before purchasing them.
Q5. What do you understand by SSL?
Ans. The Secure Socket Layer (SSL) is a protocol which ensures that sensitive information can be transmitted safely online. It establishes an encrypted link between a Web server and a browser to ensure the security of the information that is exchanged between the two. Today, millions of websites use SSL to provide protection to their users.
Q4. Why do you need to install antivirus software in your computer?
Ans. As you know, viruses can damage your computer or access sensitive information on it. To avoid such a situation, you must install anti-virus software on your computer. Without an anti-virus, your computer will remain susceptible to virus attacks.
Q3. What do you understand by quarantining a virus?
Ans. Quarantine means keeping the virus in some isolated place on your computer under strict vigilance so that it cannot do further harm to your computer. If you think the program may be a virus, you can send the quarantined virus to the antivirus vendor, where researchers examine it, determine its signature, name and catalog it and release its antidote. Read More …
Q2. How does antivirus software work?
Ans. Antivirus software installed in your computer works by finding out whether the virus that has attacked your computer is already known or unknown. If it is a known virus (one that has already been detected and has an antidote written for it), the software looks for the virus’s signature, a unique string of bytes similar to a fingerprint that identifies the virus, and removes it from your computer. Most scanning software is able to detect not only an initial virus but also several of its variants because the signature code usually remains intact.
In the case of new viruses for which no solution has been created, the virus scanning software employs heuristics that look for unusual virus-like activity on your computer. If the program finds any suspected activity, it quarantines the questionable program and broadcasts a warning to you about what the program may be trying to do (such as modifying your Windows Registry).
Q1. How does phishing take place?
Ans. Phishing refers to a technique of obtaining personal information, such as login name, password, and credit card details of another person without his/her knowledge or consent. Phishing normally takes place through e-mail or instant messaging. In phishing, an imposter sends you an e-mail or uses a website that looks genuine to trick people into giving important information about them.
For example, the imposter may send an e-mail (which appears genuine to you), pretending to be a representative of your company. In the e-mail, he may ask you to update your information online by clicking a specified link. As you click the link, you may be redirected to a fraudulent website where you are asked to enter important information about yourself, which can later be used for cyber-crime and fraud.