Class 11-12

Class 11 Computer Science

BSEB 100-Day Study Plan
Notes, MCQs, and Solutions

Explore Class 11

Class 12 Computer Science

Advanced Topics & Practical Guide
Board Exam Preparation

Explore Class 12

Day 31: Cybersecurity Basics – Threats, Firewalls, and Encryption | Class 11

Learn Cybersecurity Basics in Day 31 of Class 11 Computer Science. Understand threats, firewalls, encryption, and their role in protecting networks.

Day 31 – Chapter 4: Cybersecurity Basics

Class 11 Computer Science

Introduction to Cybersecurity (साइबर सुरक्षा का परिचय)

Cybersecurity refers to the practice of protecting systems, networks, and data from cyber threats. It ensures the confidentiality, integrity, and availability of information.
साइबर सुरक्षा सिस्टम, नेटवर्क और डेटा को साइबर खतरों से बचाने की प्रथा है। यह जानकारी की गोपनीयता, अखंडता और उपलब्धता सुनिश्चित करता है।

Key Components of Cybersecurity (साइबर सुरक्षा के प्रमुख घटक)

  • Confidentiality (गोपनीयता): Ensuring that only authorized users can access data.
  • Integrity (अखंडता): Protecting data from being altered by unauthorized users.
  • Availability (उपलब्धता): Ensuring that data and systems are available when needed.

Common Cyber Threats (आम साइबर खतरे)

  • Malware (मैलवेयर): Malicious software like viruses, worms, and Trojans designed to damage systems.
  • Phishing (फिशिंग): Deceptive attempts to steal sensitive information by pretending to be a trustworthy entity.
  • Ransomware (रैनसमवेयर): A type of malware that locks systems until a ransom is paid.
  • Hacking (हैकिंग): Unauthorized access to systems to steal or manipulate data.
  • Denial of Service (DoS) Attack (डिनायल ऑफ सर्विस अटैक): Overloading a network to disrupt its operations.

Cybersecurity Tools and Measures (साइबर सुरक्षा उपकरण और उपाय)

1. Firewalls (फायरवॉल)

Firewalls act as a barrier between trusted and untrusted networks, monitoring and controlling incoming and outgoing traffic.
फायरवॉल विश्वसनीय और अविश्वसनीय नेटवर्क के बीच एक अवरोधक के रूप में कार्य करते हैं, आने-जाने वाले ट्रैफिक की निगरानी और नियंत्रण करते हैं।

2. Encryption (एन्क्रिप्शन)

Encryption is the process of converting data into a coded format to protect it from unauthorized access.
एन्क्रिप्शन डेटा को कोडित प्रारूप में बदलने की प्रक्रिया है ताकि इसे अनधिकृत पहुंच से बचाया जा सके।

3. Antivirus Software (एंटीवायरस सॉफ़्टवेयर)

Antivirus software detects and removes malware from systems.
एंटीवायरस सॉफ़्टवेयर सिस्टम से मैलवेयर का पता लगाता है और उसे हटाता है।

4. Multi-Factor Authentication (MFA) (मल्टी-फैक्टर प्रमाणीकरण)

MFA requires users to provide multiple forms of verification to access systems.
मल्टी-फैक्टर प्रमाणीकरण उपयोगकर्ताओं को सिस्टम तक पहुंचने के लिए कई प्रकार के सत्यापन प्रदान करने की आवश्यकता होती है।

Best Practices for Cybersecurity (साइबर सुरक्षा के लिए सर्वोत्तम अभ्यास)

  • Use strong and unique passwords.
    मजबूत और अद्वितीय पासवर्ड का उपयोग करें।
  • Enable two-factor authentication wherever possible.
    जहां भी संभव हो, टू-फैक्टर प्रमाणीकरण सक्षम करें।
  • Update software and systems regularly.
    सॉफ़्टवेयर और सिस्टम को नियमित रूप से अपडेट करें।
  • Be cautious of suspicious emails and links.
    संदिग्ध ईमेल और लिंक से सावधान रहें।
  • Backup important data frequently.
    महत्वपूर्ण डेटा का बार-बार बैकअप लें।

Practice Questions (अभ्यास प्रश्न)

Multiple Choice Questions (MCQs)

  1. What is the main purpose of cybersecurity?
    (a) Protect systems from threats | (b) Speed up the network | (c) Enhance data storage | (d) None
  2. What does a firewall do?
    (a) Detect malware | (b) Encrypt data | (c) Monitor network traffic | (d) Backup data
  3. Which of the following is an example of malware?
    (a) Virus | (b) Phishing | (c) Firewall | (d) Encryption
  4. What is phishing?
    (a) A type of hacking | (b) Deceptive attempts to steal sensitive information | (c) Encrypting data | (d) None
  5. What does MFA stand for?
    (a) Multi-Factor Authentication | (b) Malware-Free Access | (c) Multi-File Authorization | (d) None
  6. Which tool converts data into a coded format?
    (a) Firewall | (b) Encryption | (c) Antivirus | (d) None
  7. Which attack overloads a network to disrupt its operations?
    (a) Ransomware | (b) DoS Attack | (c) Phishing | (d) Virus
  8. Which software protects against malware?
    (a) Antivirus | (b) Encryption | (c) Firewall | (d) None
  9. What is ransomware?
    (a) A type of phishing | (b) Malware that locks systems for ransom | (c) Unauthorized access | (d) None
  10. What is the role of encryption in cybersecurity?
    (a) Backup data | (b) Monitor traffic | (c) Protect data from unauthorized access | (d) None

Answers to MCQs:

1: (a), 2: (c), 3: (a), 4: (b), 5: (a), 6: (b), 7: (b), 8: (a), 9: (b), 10: (c)

Short Answer Questions (लघु उत्तरीय प्रश्न)

  1. What is cybersecurity?
    Answer: Cybersecurity protects systems, networks, and data from cyber threats.
  2. What is the role of a firewall?
    Answer: A firewall monitors and controls network traffic.
  3. Define phishing.
    Answer: Phishing is a deceptive attempt to steal sensitive information.
  4. What is encryption?
    Answer: Encryption converts data into a coded format to protect it from unauthorized access.
  5. List two best practices for cybersecurity.
    Answer: Use strong passwords and enable two-factor authentication.

Long Answer Questions (दीर्घ उत्तरीय प्रश्न)

  1. Explain the different types of cyber threats and their impact on systems.
  2. Discuss the role of firewalls and encryption in ensuring cybersecurity.
  3. What are the best practices for maintaining cybersecurity in daily life?

Post a Comment