postUpdated Apr 27, 2026

Cyber Security – Complete Notes for IBPS, SSC, RRB & Govt Exams

Cyber Security is one of the most important and consistently tested chapters in IBPS, SSC CGL, RRB NTPC, LIC AAO, and all government job exams — especially in banking where digital security is a daily operational concern. This post covers everything — components of security, cryptography, all types of malware (viruses, worms, trojans, ransomware, spyware), all types of cyber attacks, complete security solutions (firewall, antivirus, VPN, MFA, encryption, digital signature, biometrics), file access permissions, and Indian cyber laws (IT Act 2000, DPDP Act 2023) — with memory tricks, one-liners, and 10 exam-focused FAQs.

Cyber Security – Complete Notes for IBPS, SSC, RRB & Govt Exams

Jump to section

Introduction: Why Cyber Security is Critical for Banking Exams

India's banking sector processes over 9.41 billion UPI transactions per month (2024). Every one of these transactions is a potential target for cybercriminals. Banks are the most targeted sector for cyber attacks — making Cyber Security knowledge essential not just for passing the exam, but for performing effectively on the job.

In government job exams, Cyber Security is tested across multiple difficulty levels:

  • "VIRUS stands for ___?" → Vital Information Resources Under Siege
  • "Which malware encrypts your files and demands ransom?" → Ransomware
  • "The first computer virus was ___?" → Creeper (1971)
  • "WannaCry is an example of ___?" → Ransomware
  • "Which attack floods a server with requests?" → DDoS (Distributed Denial of Service)
  • "IT Act was enacted in which year?" → 2000
  • "CERT-In stands for ___?" → Computer Emergency Response Team India

This chapter is also where banking awareness meets computer awareness — phishing attacks on banking customers, ATM skimming, UPI fraud, and data breach notifications are everyday banking news items. Mastering Cyber Security makes you a better-prepared exam candidate AND a more effective banking professional.


What is Cyber Security?

Cyber Security (also called Computer Security or IT Security) is the practice of protecting computer systems, networks, programs, and data from unauthorised access, damage, attack, or theft.

Scope of Cyber Security:

  • Protecting hardware (servers, computers, mobile devices) from physical tampering
  • Protecting software (operating systems, applications) from malware and exploits
  • Protecting data (stored data, data in transit) from theft and corruption
  • Protecting networks from intrusion and interception
  • Protecting users from social engineering and fraud

Why Cyber Security matters in banking:

  • Customer financial data is extremely sensitive
  • A single data breach can expose millions of accounts
  • Regulatory requirements (RBI, SEBI, IRDAI) mandate strong security
  • Trust is the foundation of banking — one attack can destroy years of reputation

Components (Goals) of Security

Security is not just about preventing unauthorised access — it has multiple dimensions:

ComponentDescriptionExample
ConfidentialityEnsuring data is accessible only to authorised persons — preventing unauthorised disclosureBank account details visible only to the account holder and authorised staff
IntegrityEnsuring data is not altered without detection — preventing unauthorised modificationEnsuring a ₹1,000 transaction doesn't become ₹10,000 through tampering
AuthenticationVerifying that users are who they claim to beLogin with password, OTP, or biometric
Access ControlEnsuring users can only access the resources they are authorised to useA bank clerk can view accounts but cannot approve loans
Non-RepudiationEnsuring the sender cannot deny having sent a message or transactionDigital signatures on electronic contracts
AvailabilityEnsuring systems are operational and accessible when neededBank's internet banking available 24×7
PrivacyIndividual rights over their own personal informationRight to know what data a bank holds about you
SteganographyThe art of hiding the existence of a message within another mediumHiding a secret message inside an image file

Cryptography - The Science of Secure Communication

Cryptography is the science of writing and reading messages in secret form — converting data into an unreadable format that can only be decoded by authorised parties.

Steganography vs Cryptography:

  • Steganography — hides the existence of a message (the message is there, you just can't see it)
  • Cryptography — hides the content of a message (the message is visible, but unreadable)

Key Cryptography Terms

TermDefinition
Plain TextThe original, readable message before encryption
Cipher TextThe encrypted, scrambled, unreadable message after encryption
EncryptionThe process of converting plain text → cipher text using a mathematical algorithm and key
DecryptionThe process of converting cipher text → plain text (reversing encryption)
CipherThe mathematical algorithm used for encryption and decryption
KeyA piece of data used by the cipher to encrypt/decrypt — like a password for the cipher
CryptanalysisThe science of breaking encryption without the key — "code-breaking"

Types of Encryption

TypeHow It WorksKey UsedSpeedExample
Symmetric EncryptionSame key used for both encryption and decryptionOne shared keyFasterAES (Advanced Encryption Standard), DES, 3DES
Asymmetric EncryptionDifferent keys — a Public Key (shared with everyone, used to encrypt) and a Private Key (kept secret, used to decrypt)Key pairSlowerRSA, ECC — used in HTTPS, digital signatures

How HTTPS Works (Asymmetric + Symmetric):

  1. Website sends its Public Key (in SSL certificate) to your browser
  2. Browser encrypts a random session key using the website's Public Key
  3. Website decrypts it using its Private Key
  4. Both now share a secret session key
  5. All further communication uses Symmetric Encryption (faster) with that session key

Types of Malware - Complete Guide

Malware (Malicious Software) is any software intentionally designed to disrupt, damage, or gain unauthorised access to a computer system.

Computer Virus

VIRUS = Vital Information Resources Under Siege

A computer virus is a self-replicating malicious program that attaches itself to legitimate files or programs and spreads when infected files are executed.

Key Virus Facts:

  • First computer virus: Creeper (1971) — displayed "I'm the Creeper, catch me if you can!" and replicated across ARPANET
  • First PC boot sector virus: Brain (1986) — created in Pakistan by the Alvi brothers
  • Viruses require human action to spread (running an infected file, opening an attachment)
  • They attach to host files — unlike worms which are standalone

Types of Viruses

Virus TypeHow It WorksExample
Resident VirusLodges itself permanently in RAM; infects every file opened during the sessionRandex, CMJ
Direct Action VirusActivates only when the infected file is executed; otherwise dormantVienna virus
Overwrite VirusDeletes and replaces the original file content with malicious code — original file destroyedWay, Trj.Reboot
Boot Sector VirusInfects the Master Boot Record (MBR) of the hard disk; executes every time the computer startsPolyboot.B, AntiEXE
Macro VirusInfects macro-enabled documents (.doc, .xls, .ppt); spreads via email attachmentsMelissa.A (1999), Concept
Polymorphic VirusChanges its own code with each infection to avoid signature-based antivirus detectionElkern, Marburg
Multipartite VirusSpreads through multiple methods (boot sector + file infection) simultaneouslyFlip, Invader
FAT VirusAttacks the File Allocation Table — corrupts pointers to file locations
Web Scripting VirusEmbedded in malicious website code; executes when the page is visitedJS.Fortnight
RansomwareEncrypts victim's files and demands ransom payment (usually cryptocurrency) for the decryption keyWannaCry, LockBit, Petya

Worm

FeatureDetails
DefinitionSelf-replicating malicious program that spreads across networks without requiring human action and without attaching to a host file
Key difference from virusVirus needs human action (opening a file) + attaches to files; Worm spreads automatically + is standalone
How it spreadsExploits network vulnerabilities, email, shared drives — automatically scans for vulnerable systems
DamageConsumes network bandwidth; can install backdoors; may carry additional payloads
ExamplesMorris Worm (1988 — first famous worm), Nimda, Blaster, Sasser, ILOVEYOU
VisibilityCreates invisible files — hard to detect

Trojan Horse

FeatureDetails
DefinitionMalware disguised as legitimate, useful software — tricks users into installing it
Key differenceDoes NOT self-replicate — must be installed by the user (unlike virus and worm)
What it doesOnce installed: creates backdoors, steals data, downloads more malware, gives attacker remote access
Named afterThe Trojan Horse from Greek mythology — appears friendly, is actually an attack
ExamplesZeus (banking trojan — stole banking credentials), Emotet, RAT (Remote Access Trojan)

Spyware

FeatureDetails
DefinitionSoftware that secretly monitors user activity and collects personal information without consent
What it collectsKeystrokes, browsing history, passwords, banking credentials, screenshots, webcam feeds
How it spreadsBundled with free software, malicious websites, email attachments
ExamplesFinFisher (government-grade spyware), Keyloggers, CoolWebSearch

Adware

FeatureDetails
DefinitionSoftware that automatically displays or downloads advertisements — often without user consent
Harm levelGenerally less harmful than other malware but very annoying; may slow system; can redirect browsers
Revenue modelAttacker earns money every time an ad is displayed or clicked
ExamplesMany "free" mobile apps include adware; browser hijackers

Ransomware

FeatureDetails
DefinitionMalware that encrypts the victim's files and demands a ransom payment (usually in cryptocurrency — Bitcoin) to provide the decryption key
SeverityExtremely damaging — organisations have lost billions of dollars
Notable attacksWannaCry (2017) — infected 200,000+ computers in 150 countries in 3 days; targeted hospitals, telecoms, banks
Other examplesPetya/NotPetya, LockBit, REvil, DarkSide (Colonial Pipeline attack)
PreventionRegular backups; up-to-date patches; email security; network segmentation

Rootkit

FeatureDetails
DefinitionMalware that gains administrative (root) access to a system and hides itself from the OS and antivirus tools
Why dangerousExtremely difficult to detect — it modifies the OS itself to hide its presence; gives attacker persistent, hidden control
RemovalOften requires complete OS reinstallation
ExamplesSony BMG rootkit, Necurs, Azazel

Logic Bomb

FeatureDetails
DefinitionMalicious code embedded in legitimate software that activates when specific conditions are met (date, time, event, user action)
Also calledSlag code, time bomb (when triggered by date/time)
ExampleCode that deletes all financial records on January 1st; code triggered when a specific employee's ID is removed from the system (planted by a disgruntled employee)
DetectionVery hard to detect before it activates

Keylogger

FeatureDetails
DefinitionSoftware (or hardware) that records every keystroke typed on the computer — capturing passwords, credit card numbers, messages
TypeCan be software-based or hardware-based (physical device inserted between keyboard and computer)
UseOften installed by spyware/trojans; used in ATM skimming
Legitimate useParental controls, employee monitoring (with consent)

Malware Types - Quick Comparison Table

MalwareReplicates?Needs Host File?Spreads Automatically?Primary Damage
VirusYesYes (attaches)No (needs human action)File corruption, data theft
WormYesNo (standalone)Yes (network)Bandwidth consumption, backdoors
TrojanNoNo (disguised app)NoBackdoor, data theft
RansomwareVariesNoVariesFile encryption, extortion
SpywareNoNoNoSurveillance, data theft
AdwareNoNoNoUnwanted ads
RootkitNoNoNoHidden admin access
Logic BombNoYes (embedded)NoTimed/conditional damage
KeyloggerNoNoNoCredential theft

Types of Cyber Attacks

AttackDescriptionExample
HackingUnauthorised access to computer systems or networks — exploiting vulnerabilitiesBreaking into a bank's server
CrackingBreaking into computers to steal data; using password crackers or exploitsBrute-forcing a password
PhishingFraudulently obtaining sensitive information (passwords, card numbers) by impersonating a trusted entity via fake emails/websitesFake SBI email asking you to update your net banking password
VishingVoice phishing — fraud via phone calls impersonating banks/government"I'm calling from SBI — please share your OTP"
SmishingSMS phishing — fraud via text messages with malicious linksFake message: "Your account blocked — click here"
Spoofing / MasqueradeImpersonating another user, system, or IP address to gain trustIP Spoofing — faking source IP; Email spoofing
Salami TechniqueDiverting tiny amounts from many accounts (e.g., ₹0.50 per transaction) — individually unnoticeable but collectively significantFraudulent rounding of interest calculations
SpamUnsolicited bulk emails — commercial, fraudulent, or maliciousFlood of promotional/scam emails
DDoS (Distributed Denial of Service)Flooding a server/website with millions of fake requests from many compromised computers, making it unavailable to legitimate usersAttacking IRCTC during Tatkal booking
DoS (Denial of Service)Same as DDoS but from a single source — server overwhelmed by requests
Man-in-the-Middle (MitM)Attacker secretly intercepts and potentially alters communication between two parties who believe they're communicating directlyIntercepting unencrypted banking traffic on public Wi-Fi
Zero-Day AttackExploiting a newly discovered, unpatched vulnerability — the vendor has zero days to fix it before it's exploitedExploiting a browser bug before the vendor releases a patch
Supply Chain AttackAttacking software through a trusted third-party vendor — compromising the software supply chainSolarWinds attack (2020) — malware inserted into software updates
Social EngineeringManipulating people psychologically into revealing confidential information or performing security-compromising actionsAttacker calls IT desk pretending to be a senior manager, requests password reset
SQL InjectionInserting malicious SQL code into a web form to manipulate the databaseEntering ' OR '1'='1 in a login form to bypass authentication
Cross-Site Scripting (XSS)Injecting malicious scripts into web pages viewed by other usersStealing session cookies of logged-in users
DeepfakeAI-generated fake video or audio used for fraud or disinformationFake CEO video authorising fraudulent bank transfer
CryptojackingSecretly using a victim's computer to mine cryptocurrency without their knowledgeHidden scripts on websites using your CPU to mine Bitcoin
Ransomware AttackWannaCry (2017) — affected 200,000+ computers in 150 countriesEncrypted NHS hospital records in UK

Security Solutions - Complete Guide

Antivirus Software

FeatureDetails
PurposeDetects, quarantines, and removes malware (viruses, worms, trojans, spyware)
How it worksSignature-based detection (known malware patterns), heuristic analysis (suspicious behaviour), sandboxing
Popular productsKaspersky, Norton, Quick Heal (India), McAfee, Avast, Windows Defender (built-in), Bitdefender
LimitationSignature-based detection cannot catch zero-day malware (new, unknown threats)

Firewall

FeatureDetails
PurposeMonitors and filters incoming and outgoing network traffic based on predefined security rules
How it worksActs as a barrier between trusted internal network and untrusted external network (internet); blocks unauthorised traffic
TypesSoftware firewall (installed on a computer — Windows Firewall); Hardware firewall (physical device protecting entire network)
Cannot stopThreats that come from inside the network; social engineering attacks

Password Security

AspectGuidelines
Strong passwordMix of uppercase + lowercase letters + numbers + special symbols (@#$%); minimum 12 characters
Weak passwordNames, dates of birth, common words, simple sequences (123456, password)
Good practicesUse different passwords for different accounts; change regularly; use password manager
Two-FactorAlways enable 2FA/MFA for sensitive accounts

Digital Certificate

FeatureDetails
DefinitionAn electronic document that verifies the identity of an entity (person, server, organisation) and contains their public key
Issued byCA (Certificate Authority) — trusted third parties (DigiCert, VeriSign, Let's Encrypt)
Used inHTTPS (the padlock in your browser); code signing; email authentication
ContainsOwner's name, public key, expiry date, CA signature
ExampleWhen you visit https://www.sbi.co.in, your browser verifies SBI's digital certificate before establishing a secure connection

Digital Signature

FeatureDetails
DefinitionAn electronic equivalent of a handwritten signature — authenticates the sender and ensures the content has not been altered
How it worksSender creates a hash of the message → encrypts the hash with their Private Key → attaches to message; Receiver decrypts with sender's Public Key → verifies hash matches
PropertiesAuthentication (proves sender identity), Integrity (detects tampering), Non-repudiation (sender cannot deny sending)
Legal statusLegally valid in India under the IT Act 2000
Used inE-filing of income tax, MCA filings, legal contracts, banking authorisations

VPN (Virtual Private Network)

FeatureDetails
DefinitionCreates an encrypted tunnel between your device and a VPN server — all traffic passes through this tunnel, hidden from ISPs, hackers, and surveillance
BenefitsEncrypts internet traffic; hides real IP address; bypasses geo-restrictions; secure public Wi-Fi usage
Used byRemote workers accessing corporate networks; privacy-conscious users; journalists in restricted countries
ExamplesNordVPN, ExpressVPN, Cisco AnyConnect (enterprise)

MFA / 2FA (Multi-Factor Authentication)

FeatureDetails
DefinitionRequires users to prove identity using two or more different factors before access is granted
Three authentication factorsSomething you know (password, PIN); Something you have (OTP, hardware token, mobile phone); Something you are (fingerprint, face recognition, iris scan)
Why it mattersEven if your password is stolen, an attacker cannot access your account without the second factor
ExamplesNet banking (password + OTP); Google (password + authenticator app); ATM (card + PIN)

Biometric Authentication

FeatureDetails
DefinitionAuthentication using unique biological characteristics
TypesFingerprint, Face recognition (Apple Face ID, Windows Hello), Iris scan, Voice recognition, Palm vein scan
AdvantagesCannot be forgotten; cannot be easily stolen/replicated; convenient
Used inSmartphone unlock, Aadhaar authentication (UIDAI), airport immigration, banking KYC

CAPTCHA

FeatureDetails
Full FormCompletely Automated Public Turing test to tell Computers and Humans Apart
PurposeDistinguishes human users from automated bots
How it worksPresents a challenge that is easy for humans but hard for computers (distorted text, image recognition, click challenges)
TypesText-based, image-based, reCAPTCHA (Google), invisible CAPTCHA (background analysis)
Used inWebsite registrations, form submissions, preventing automated attacks

End-to-End Encryption (E2EE)

FeatureDetails
DefinitionData is encrypted on the sender's device and can only be decrypted by the intended recipient's device — no one in between (including the service provider) can read it
ExamplesWhatsApp, Signal, iMessage — even WhatsApp servers cannot read your messages
ImportanceMaximum privacy; government/ISP cannot intercept content

Zero Trust Security

FeatureDetails
Principle"Never trust, always verify" — no user, device, or system is automatically trusted, even inside the corporate network
Traditional model"Trust but verify" — users inside the network perimeter are trusted by default
Zero Trust modelEvery access request must be authenticated, authorised, and continuously validated regardless of location
Why neededCloud computing, remote work, and mobile devices have dissolved the traditional network perimeter

File Access Permissions

In operating systems, files and folders have three basic permission types that control what users can do with them:

PermissionWhat It Allows
Read (r)Can view/open the file content; cannot modify
Write (w)Can modify or delete the file content
Execute (x)Can run the file as a program/script

Permissions can be set for three categories of users:

  • Owner — the user who created the file
  • Group — users belonging to the file's group
  • Others — all other users

Other Security Terms

TermMeaning
EavesdroppingMonitoring/intercepting network transmissions to capture content — passive attack
Proxy ServerAn intermediary server that hides the client's real network address; can filter content and improve security
Application GatewayA firewall that applies security policies to specific applications (FTP, HTTP, Telnet) at the application layer
Ethical HackingAuthorised penetration testing to find and fix vulnerabilities — attackers are paid to find weaknesses before real attackers do
CEHCertified Ethical Hacker — globally recognised certification for ethical hackers
CERT-InComputer Emergency Response Team India — government body that handles cybersecurity incidents in India; under MeitY
Bug BountyPrograms where organisations reward individuals for responsibly discovering and reporting security vulnerabilities
Penetration Testing (Pen Test)Authorised simulated cyber attack on a system to evaluate its security
Software PiracyIllegal copying, distribution, or use of copyrighted software without authorisation
HoneypotA decoy computer system set up to detect, deflect, or study hacking attempts
Dark WebPart of the internet not indexed by search engines; accessible only via special browsers (Tor); used for illegal activities
Phishing KitA ready-made package of tools used to create convincing phishing websites
Shoulder SurfingPhysically looking over someone's shoulder to capture passwords or PINs
Dumpster DivingSearching through trash to find discarded documents containing sensitive information

Cyber Laws in India

LawYearKey Provisions
IT Act (Information Technology Act)2000 (amended 2008)India's primary law governing cyberspace; covers cybercrime, digital signatures, electronic contracts, data protection; Section 66 (hacking), Section 67 (publishing obscene material), Section 43 (unauthorised access)
DPDP Act (Digital Personal Data Protection Act)2023India's first comprehensive data protection law; governs how personal digital data must be collected, stored, processed, and protected; establishes the Data Protection Board of India
IT (Amendment) Act2008Extended IT Act 2000; added provisions for cybercrime, data protection, Section 66A (later struck down by Supreme Court), new categories of cybercrime
IT Rules2021Regulates social media intermediaries (like Twitter, Facebook); requires grievance officers; traceability of messages; content removal timelines

Key IT Act Sections:

SectionOffencePunishment
Section 43Unauthorised access to computer systemsCompensation up to ₹1 crore
Section 65Tampering with computer source codeUp to 3 years imprisonment + fine
Section 66Computer-related offences (hacking)Up to 3 years imprisonment + ₹5 lakh fine
Section 66CIdentity theftUp to 3 years + ₹1 lakh fine
Section 66DCheating by impersonation onlineUp to 3 years + ₹1 lakh fine
Section 67Publishing obscene material onlineUp to 5 years + ₹10 lakh fine
Section 70Unauthorised access to protected systemsUp to 10 years imprisonment

Memory Tricks

🔑 First Virus and First PC Virus:

First virus: Creeper (1971) — "Creeper Came first in '71" First PC boot sector virus: Brain (1986) — "Brain was Boot sector in '86"

🔑 Virus vs Worm vs Trojan:

VirusVirus Victs files (attaches + needs human action) WormWorm Wriggles through network (self-spreading, no host) TrojanTrojan is Trickery (disguised, does NOT replicate)

🔑 Security Components — "CIA + NPA":

Confidentiality | Integrity | Availability (the CIA Triad — core of security) Plus: Non-repudiation | Privacy | Authentication

🔑 Types of Attacks — "HPSS DM":

Hacking | Phishing | Spoofing | Salami | DDoS | Man-in-the-Middle

🔑 Authentication Factors — "KHA":

Something you Know (password) Something you Have (OTP, token) Something you Are (biometric)

🔑 CAPTCHA Full Form:

Completely Automated Public Turing test to tell Computers and Humans Apart Remember: "CAPTCHA = Computer vs Human Automated Test"

🔑 WannaCry = 2017 = 150 countries = 200,000 computers:

"WannaCry made the world wanna cry in 2017"

🔑 IT Act 2000 + DPDP 2023:

IT Act 2000 = India's first cyber law DPDP 2023 = India's first data protection law "2000 for Cyber; 2023 for Data"


One-Liner Recap (Quick Revision)

  1. Cyber Security is the practice of protecting computer systems, networks, programs, and data from unauthorised access, damage, attack, or theft — a critical concern for the banking sector.
  2. The CIA Triad — Confidentiality (only authorised access), Integrity (data not altered without detection), and Availability (systems operational when needed) — forms the core of security.
  3. Cryptography is the science of secure communication — Encryption converts plain text to cipher text; Decryption reverses it; Symmetric encryption uses one key; Asymmetric uses a key pair.
  4. VIRUS stands for Vital Information Resources Under Siege — viruses are self-replicating malware that attach to host files and spread through human action (opening infected files).
  5. The world's first computer virus was Creeper (1971), and the first PC boot sector virus was Brain (1986) — created in Pakistan.
  6. A Worm self-replicates and spreads across networks automatically without human action and without needing a host file — unlike viruses that require human action to spread.
  7. A Trojan Horse appears to be legitimate useful software but contains malicious code — it does NOT self-replicate and must be installed by the user.
  8. Ransomware encrypts the victim's files and demands ransom payment (usually cryptocurrency) for the decryption key — WannaCry (2017) infected 200,000+ computers in 150 countries.
  9. Phishing is a cyber attack that fraudulently obtains passwords and sensitive information by impersonating a trusted entity through fake emails or websites.
  10. A DDoS (Distributed Denial of Service) attack floods a server with millions of requests from many compromised computers simultaneously, making it unavailable to legitimate users.
  11. A Firewall filters incoming and outgoing network traffic based on security rules — it acts as a barrier between trusted internal networks and untrusted external networks.
  12. Multi-Factor Authentication (MFA) requires two or more different factors (something you know + something you have + something you are) to verify identity before granting access.
  13. A Digital Signature authenticates the sender, ensures message integrity, and provides non-repudiation — it is legally valid in India under the IT Act 2000.
  14. Zero Trust Security operates on the principle "Never trust, always verify" — no user or device is automatically trusted, even within the corporate network perimeter.
  15. The IT Act 2000 (amended 2008) is India's primary cyber law; the Digital Personal Data Protection (DPDP) Act 2023 is India's first comprehensive data protection law.

Preparing for competitive exams requires consistent revision. Platforms like JobsMe simplify preparation through:

Stay updated, revise regularly, and attempt quizzes for better accuracy in UPSC, SSC CGL, IBPS PO/Clerk, SBI, RBI Grade B, RRB NTPC, Defence, and State PSC exams.

Free quiz • No signup required

Put this topic into practice with Current Affairs MCQ Quiz – 26 & 27 April 2026 | SSC Banking UPSC Railways Defence. It is the quickest way to reinforce what you just learned.

Frequently Asked Questions

What is the difference between a Virus, Worm, and Trojan Horse?
Virus — attaches itself to a legitimate host file; requires human action (executing the infected file) to spread; self-replicates by infecting other files. Worm — a standalone program that self-replicates and spreads automatically through network vulnerabilities without any human action; does not need a host file. Trojan Horse — disguised as legitimate software; tricks users into voluntarily installing it; does NOT self-replicate — it stays where installed and creates backdoors, steals data, or downloads other malware. Memory: Virus=attaches, Worm=self-spreads, Trojan=disguised.
What is Ransomware and what was the WannaCry attack?
Ransomware is malware that encrypts the victim's files using strong encryption and demands a ransom payment (typically in Bitcoin or other cryptocurrency) in exchange for the decryption key. Without the key, victims cannot access their own files. WannaCry was a ransomware attack in May 2017 that exploited a Windows vulnerability (EternalBlue, developed by the NSA and leaked). It infected 200,000+ computers in 150 countries in just 3 days, affecting hospitals, telecoms, banks, and government agencies. It demanded $300 in Bitcoin per computer. UK's NHS was severely disrupted, with hospitals cancelling surgeries.
What is Phishing and what are its variants (Vishing, Smishing)?
Phishing is a cyber attack where criminals impersonate trusted entities (banks, government, tech companies) through fake emails to trick victims into revealing sensitive information (passwords, OTPs, card numbers) or clicking malicious links. Vishing (Voice Phishing) — the same fraud conducted via phone calls ("Hello, I'm calling from SBI..."); Smishing (SMS Phishing) — conducted via text messages containing malicious links; Spear Phishing — targeted phishing aimed at a specific individual or organisation using personalised information; Whaling — spear phishing targeting senior executives ("whales").
What is the difference between DoS and DDoS attacks?
DoS (Denial of Service) attack comes from a single source — one computer floods a server with so many requests that it becomes overwhelmed and unavailable to legitimate users. DDoS (Distributed Denial of Service) uses many compromised computers (botnet) simultaneously to flood the target — hundreds of thousands of systems attacking at once, making it extremely difficult to block since the traffic comes from many different IPs worldwide. DDoS attacks are much more powerful and harder to defend against. They are used against banks, governments, and major websites.
What is a Digital Signature and how is it different from a Digital Certificate?
Digital Signature — An electronic equivalent of a handwritten signature; created using the sender's Private Key; verifies the sender's identity, ensures message integrity (not tampered), and provides non-repudiation (sender cannot deny signing). Digital Certificate — An electronic document issued by a Certificate Authority (CA) that verifies the identity of an entity (person, server) and contains their Public Key. Relationship: A Digital Certificate proves who you are (like a passport); a Digital Signature proves you signed something (like a signature on a document). Both work together in secure communications like HTTPS and email security.
What is the difference between Encryption and Decryption?
Encryption is the process of converting readable plain text into an unreadable, scrambled format (cipher text) using a mathematical algorithm and a key — protecting data during storage or transmission. Only someone with the correct key can read it. Decryption is the reverse — converting cipher text back into readable plain text using the key. In Symmetric encryption, the same key encrypts and decrypts (AES, DES). In Asymmetric encryption, a Public Key encrypts and the corresponding Private Key decrypts (RSA) — the foundation of HTTPS and digital signatures.
vetri

About the author

vetri