{"id":230403,"date":"2025-10-11T11:17:47","date_gmt":"2025-10-11T05:47:47","guid":{"rendered":"https:\/\/www.oliveboard.in\/blog\/?p=230403"},"modified":"2025-10-11T11:28:23","modified_gmt":"2025-10-11T05:58:23","slug":"network-information-security-threats-for-ssc-cgl-tier-2","status":"publish","type":"post","link":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/","title":{"rendered":"Network &amp; Information Security Threats for SSC CGL Tier 2"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of content<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#What_is_Network_Security\" >What is Network Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#Common_Network_and_Information_Security_Threats\" >Common Network and Information Security Threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#Preventive_Measures\" >Preventive Measures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#Key_Takeaways\" >Key Takeaways:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#FAQs\" >FAQs<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>Network and information security is an important topic in SSC CGL Tier 2 Computer Awareness. It focuses on protecting data, devices, and networks from unauthorized access or damage. Understanding common threats and preventive measures is crucial for exam preparation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-network-security\"><span class=\"ez-toc-section\" id=\"What_is_Network_Security\"><\/span>What is Network Security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Network security involves policies, practices, and tools used to protect data and systems from cyber attacks, theft, or damage. It ensures confidentiality, integrity, and availability of information.<\/p>\n\n\n\n<div class=\"wp-block-buttons alignwide is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.oliveboard.in\/ssc-cgl-previous-year-papers\/?ref=contmk-db\" target=\"_blank\" rel=\"noreferrer noopener\">Download SSC CGL Tier 2 Previous Year papers for Free<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-common-network-and-information-security-threats\"><span class=\"ez-toc-section\" id=\"Common_Network_and_Information_Security_Threats\"><\/span>Common Network and Information Security Threats<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In today\u2019s digital world, protecting data and networks from cyber threats is essential. These threats can compromise system security, steal information, or disrupt network operations. The table below highlights the most common network and information security threats important for <strong>SSC CGL Tier 2 Computer Awareness<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong><strong>Threat Type<\/strong><\/strong><\/td><td><strong><strong>Description<\/strong><\/strong><\/td><td><strong><strong>Impact \/ Function<\/strong><\/strong><\/td><\/tr><tr><td><strong>Hacking<\/strong><\/td><td>Unauthorized access to a computer or network.<\/td><td>Hackers can steal data, install malware, or damage systems.<\/td><\/tr><tr><td><strong>Virus<\/strong><\/td><td>Malicious program that attaches to files and spreads when shared.<\/td><td>Can delete files, slow down systems, or corrupt data.<\/td><\/tr><tr><td><strong>Worm<\/strong><\/td><td>Self-replicating program that spreads automatically across networks.<\/td><td>Consumes network bandwidth and can crash systems.<\/td><\/tr><tr><td><strong>Trojan<\/strong><\/td><td>Malicious software disguised as a legitimate program.<\/td><td>Provides unauthorized access to hackers when executed.<\/td><\/tr><tr><td><strong>Spyware<\/strong><\/td><td>Secretly monitors user activities and sends data to attackers.<\/td><td>Steals personal or confidential information.<\/td><\/tr><tr><td><strong>Phishing<\/strong><\/td><td>Fraudulent attempt to steal sensitive information.<\/td><td>Done via fake emails or websites to capture passwords or financial data.<\/td><\/tr><tr><td><strong>Denial of Service (DoS) Attack<\/strong><\/td><td>Overloads a server or network with excessive requests.<\/td><td>Makes websites or services unavailable to users.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.oliveboard.in\/ssc-cgl-free-pyp-kit\/?ref=contmk-blogs\" target=\"_blank\" rel=\"noreferrer noopener\">Download Complete SSC CGL Tier 2 PYP Kit E-book for free<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-preventive-measures\"><span class=\"ez-toc-section\" id=\"Preventive_Measures\"><\/span>Preventive Measures<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>To protect networks and information, the following measures are commonly used in <a href=\"https:\/\/www.oliveboard.in\/ssc-cgl-notification\/?ref=contmk-blogs\" target=\"_blank\" rel=\"noreferrer noopener\">SSC CGL Exam<\/a> Tier 2 context:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Antivirus and Anti-malware Software:<\/strong> Detects and removes viruses, worms, and Trojans.<\/li>\n\n\n\n<li><strong>Firewalls:<\/strong> Blocks unauthorized access to networks.<\/li>\n\n\n\n<li><strong>Strong Passwords:<\/strong> Using complex passwords and changing them regularly.<\/li>\n\n\n\n<li><strong>Regular Updates:<\/strong> Keep software and systems up-to-date to patch vulnerabilities.<\/li>\n\n\n\n<li><strong>Email and Web Security:<\/strong> Avoid clicking unknown links or downloading attachments from untrusted sources.<\/li>\n\n\n\n<li><strong>Encryption:<\/strong> Protects data by converting it into unreadable formats for unauthorized users.<\/li>\n\n\n\n<li><strong>Backup Data:<\/strong> Regular backups prevent loss in case of attacks.<\/li>\n\n\n\n<li><strong>Network Monitoring:<\/strong> Constant monitoring helps detect unusual activity early.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.oliveboard.in\/ssc-typing-test\/?ref=contmk-db\" target=\"_blank\" rel=\"noreferrer noopener\">Attempt SSC CGL Typing Test for free<\/a><\/div>\n<\/div>\n\n\n\n<p>Also check out: <a href=\"https:\/\/www.oliveboard.in\/blog\/ssc-cgl-typing-test-error\/\"><strong>SSC CGL Typing Test Errors<\/strong><\/a> to minimize your errors in Data Entry Speed Test.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-key-takeaways\"><span class=\"ez-toc-section\" id=\"Key_Takeaways\"><\/span>Key Takeaways:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Below are the key takeaways:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hacking, viruses, worms, and Trojans are frequently asked threats.<\/li>\n\n\n\n<li>Phishing and DoS attacks are also important.<\/li>\n\n\n\n<li>Knowing preventive measures is essential for answering scenario-based questions.<\/li>\n\n\n\n<li>Firewalls, antivirus, encryption, and backups are primary defense mechanisms.<\/li>\n\n\n\n<li>Awareness of current cyber security practices is useful for SSC CGL Computer Awareness.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.oliveboard.in\/blog\/ssc-cgl-computer-awareness\/?ref=conmk-blog\" target=\"_blank\" rel=\"noreferrer noopener\">Read full blog on computer awareness for sSC CGL Tier 2 <\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-faqs\"><span class=\"ez-toc-section\" id=\"FAQs\"><\/span>FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1760161404956\"><strong class=\"schema-faq-question\"><strong>Q1. What is network security?<\/strong><\/strong> <p class=\"schema-faq-answer\">Ans. Network security refers to the protection of computer networks from unauthorized access, misuse, or attacks. It ensures data confidentiality, integrity, and availability.<br\/><\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1760161411601\"><strong class=\"schema-faq-question\"><strong>Q2. What is the main goal of information security?<\/strong><\/strong> <p class=\"schema-faq-answer\">Ans. The goal of information security is to protect information from unauthorized access, modification, or destruction while maintaining its confidentiality, integrity, and availability.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1760161417985\"><strong class=\"schema-faq-question\"><strong>Q3. What are common types of cyber threats?<\/strong><\/strong> <p class=\"schema-faq-answer\">Ans. Common cyber threats include hacking, viruses, worms, Trojans, spyware, phishing, and DoS (Denial of Service) attacks.<br\/><br\/><\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1760161425516\"><strong class=\"schema-faq-question\"><strong>Q4. What is the difference between a virus and a worm?<\/strong><\/strong> <p class=\"schema-faq-answer\">Ans. A <strong>virus<\/strong> attaches to files and spreads when shared, while a <strong>worm<\/strong> spreads automatically across networks without any user action.<br\/><\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1760161429781\"><strong class=\"schema-faq-question\"><strong>Q5. What is phishing?<\/strong><\/strong> <p class=\"schema-faq-answer\">Ans. Phishing is a fraudulent attempt to steal sensitive information such as passwords or bank details through fake emails or websites.<\/p> <\/div> <\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n<ul class=\"wp-block-latest-posts__list is-grid columns-3 wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.oliveboard.in\/blog\/ssc-cgl-tier-1-pyps\/\">SSC CGL 2025 Tier 1 Question Papers, Shift-Wise PYPs, Download PDFs<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.oliveboard.in\/blog\/ssc-cgl-quiz\/\">SSC CGL Quiz 2026, Solve Now &amp; Download PDF Online<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.oliveboard.in\/blog\/ssc-cgl-study-material-formulas-area-perimeter\/\">Formulas of Area and Perimeter for SSC CGL Exam 2026<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.oliveboard.in\/blog\/physics-mcqs-for-ssc-exams\/\">Practice Physics MCQs for SSC Exams 2026, Download PDF<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.oliveboard.in\/blog\/idioms-and-phrases-asked-in-ssc-cgl\/\">Idioms and Phrases asked in SSC CGL? Solve for Practice<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.oliveboard.in\/blog\/lcm-hcf-questions-for-ssc-exams-in-hindi\/\">SSC \u092a\u0930\u0940\u0915\u094d\u0937\u093e\u0913\u0902 \u0915\u0947 \u0932\u093f\u090f LCM \u0914\u0930 HCF \u092a\u094d\u0930\u0936\u094d\u0928 \u2013 \u0905\u092d\u0940 \u092a\u094d\u0930\u092f\u093e\u0938 \u0915\u0930\u0947\u0902 (\u0939\u093f\u0902\u0926\u0940 \u092e\u0947\u0902)<\/a><\/li>\n<\/ul>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Network and information security is an important topic in SSC CGL Tier 2 Computer Awareness. It focuses on protecting data,<\/p>\n","protected":false},"author":65,"featured_media":230451,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-230403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network &amp; Information Security Threats for SSC CGL Tier 2<\/title>\n<meta name=\"description\" content=\"Learn key concepts of network and information security for SSC CGL Tier 2. Know common threats, preventive measures, and important FAQs for exam prep.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network &amp; Information Security Threats for SSC CGL Tier 2\" \/>\n<meta property=\"og:description\" content=\"Network and information security is an important topic in SSC CGL Tier 2 Computer Awareness. It focuses on protecting data, devices, and networks from\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Oliveboard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Oliveboard\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-11T05:47:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-11T05:58:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2025\/10\/Networking-Security.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Mahima Khurana\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Oliveboard\" \/>\n<meta name=\"twitter:site\" content=\"@Oliveboard\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mahima Khurana\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/\"},\"author\":{\"name\":\"Mahima Khurana\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/#\/schema\/person\/2f25f4d24adbf225bc11e6a0a4bcad8b\"},\"headline\":\"Network &amp; Information Security Threats for SSC CGL Tier 2\",\"datePublished\":\"2025-10-11T05:47:47+00:00\",\"dateModified\":\"2025-10-11T05:58:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/\"},\"wordCount\":605,\"publisher\":{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2025\/10\/Networking-Security.webp\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/\",\"url\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/\",\"name\":\"Network & Information Security Threats for SSC CGL Tier 2\",\"isPartOf\":{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2025\/10\/Networking-Security.webp\",\"datePublished\":\"2025-10-11T05:47:47+00:00\",\"dateModified\":\"2025-10-11T05:58:23+00:00\",\"description\":\"Learn key concepts of network and information security for SSC CGL Tier 2. Know common threats, preventive measures, and important FAQs for exam prep.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161404956\"},{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161411601\"},{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161417985\"},{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161425516\"},{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161429781\"}],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#primaryimage\",\"url\":\"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2025\/10\/Networking-Security.webp\",\"contentUrl\":\"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2025\/10\/Networking-Security.webp\",\"width\":730,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.oliveboard.in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles\",\"item\":\"https:\/\/www.oliveboard.in\/blog\/category\/articles\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network & Information Security for SSC CGL Tier 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/#website\",\"url\":\"https:\/\/www.oliveboard.in\/blog\/\",\"name\":\"Oliveboard\",\"description\":\"Free Govt. Exam Alerts &amp; Resources\",\"publisher\":{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oliveboard.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/#organization\",\"name\":\"Oliveboard\",\"url\":\"https:\/\/www.oliveboard.in\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2021\/11\/logo.png\",\"contentUrl\":\"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2021\/11\/logo.png\",\"width\":150,\"height\":40,\"caption\":\"Oliveboard\"},\"image\":{\"@id\":\"https:\/\/www.oliveboard.in\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Oliveboard\",\"https:\/\/x.com\/Oliveboard\",\"https:\/\/www.instagram.com\/oliveboard.in\/\",\"https:\/\/www.youtube.com\/channel\/UCRvrHAyNdOMI_JBkE2pjZtw?sub_confirmation=1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/#\/schema\/person\/2f25f4d24adbf225bc11e6a0a4bcad8b\",\"name\":\"Mahima Khurana\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/922450c81513b569654b520958cbf86230a614fd2f7f05d6b46674fe4bce8c99?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/922450c81513b569654b520958cbf86230a614fd2f7f05d6b46674fe4bce8c99?s=96&d=mm&r=g\",\"caption\":\"Mahima Khurana\"},\"description\":\"I\u2019m Mahima Khurana, a writer with a strong passion for creating meaningful, learner-focused content especially in the field of competitive exam preparation. From authoring books and developing thousands of practice questions to crafting articles and study material, I specialize in transforming complex exam-related topics into clear, engaging, and accessible content. I have first hand experience of 5+ months in SSC Exams. Writing, for me, is not just a skill but a way to support and guide aspirants through their preparation journey one well-written explanation at a time.\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161404956\",\"position\":1,\"url\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161404956\",\"name\":\"Q1. What is network security?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Ans. Network security refers to the protection of computer networks from unauthorized access, misuse, or attacks. It ensures data confidentiality, integrity, and availability.<br\/>\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161411601\",\"position\":2,\"url\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161411601\",\"name\":\"Q2. What is the main goal of information security?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Ans. The goal of information security is to protect information from unauthorized access, modification, or destruction while maintaining its confidentiality, integrity, and availability.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161417985\",\"position\":3,\"url\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161417985\",\"name\":\"Q3. What are common types of cyber threats?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Ans. Common cyber threats include hacking, viruses, worms, Trojans, spyware, phishing, and DoS (Denial of Service) attacks.<br\/><br\/>\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161425516\",\"position\":4,\"url\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161425516\",\"name\":\"Q4. What is the difference between a virus and a worm?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Ans. A <strong>virus<\/strong> attaches to files and spreads when shared, while a <strong>worm<\/strong> spreads automatically across networks without any user action.<br\/>\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161429781\",\"position\":5,\"url\":\"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161429781\",\"name\":\"Q5. What is phishing?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Ans. Phishing is a fraudulent attempt to steal sensitive information such as passwords or bank details through fake emails or websites.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Network & Information Security Threats for SSC CGL Tier 2","description":"Learn key concepts of network and information security for SSC CGL Tier 2. Know common threats, preventive measures, and important FAQs for exam prep.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/","og_locale":"en_US","og_type":"article","og_title":"Network &amp; Information Security Threats for SSC CGL Tier 2","og_description":"Network and information security is an important topic in SSC CGL Tier 2 Computer Awareness. It focuses on protecting data, devices, and networks from","og_url":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/","og_site_name":"Oliveboard","article_publisher":"https:\/\/www.facebook.com\/Oliveboard","article_published_time":"2025-10-11T05:47:47+00:00","article_modified_time":"2025-10-11T05:58:23+00:00","og_image":[{"width":730,"height":480,"url":"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2025\/10\/Networking-Security.webp","type":"image\/webp"}],"author":"Mahima Khurana","twitter_card":"summary_large_image","twitter_creator":"@Oliveboard","twitter_site":"@Oliveboard","twitter_misc":{"Written by":"Mahima Khurana","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#article","isPartOf":{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/"},"author":{"name":"Mahima Khurana","@id":"https:\/\/www.oliveboard.in\/blog\/#\/schema\/person\/2f25f4d24adbf225bc11e6a0a4bcad8b"},"headline":"Network &amp; Information Security Threats for SSC CGL Tier 2","datePublished":"2025-10-11T05:47:47+00:00","dateModified":"2025-10-11T05:58:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/"},"wordCount":605,"publisher":{"@id":"https:\/\/www.oliveboard.in\/blog\/#organization"},"image":{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2025\/10\/Networking-Security.webp","articleSection":["Articles"],"inLanguage":"en-US"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/","url":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/","name":"Network & Information Security Threats for SSC CGL Tier 2","isPartOf":{"@id":"https:\/\/www.oliveboard.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#primaryimage"},"image":{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2025\/10\/Networking-Security.webp","datePublished":"2025-10-11T05:47:47+00:00","dateModified":"2025-10-11T05:58:23+00:00","description":"Learn key concepts of network and information security for SSC CGL Tier 2. Know common threats, preventive measures, and important FAQs for exam prep.","breadcrumb":{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161404956"},{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161411601"},{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161417985"},{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161425516"},{"@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161429781"}],"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#primaryimage","url":"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2025\/10\/Networking-Security.webp","contentUrl":"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2025\/10\/Networking-Security.webp","width":730,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.oliveboard.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Articles","item":"https:\/\/www.oliveboard.in\/blog\/category\/articles\/"},{"@type":"ListItem","position":3,"name":"Network & Information Security for SSC CGL Tier 2"}]},{"@type":"WebSite","@id":"https:\/\/www.oliveboard.in\/blog\/#website","url":"https:\/\/www.oliveboard.in\/blog\/","name":"Oliveboard","description":"Free Govt. Exam Alerts &amp; Resources","publisher":{"@id":"https:\/\/www.oliveboard.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oliveboard.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.oliveboard.in\/blog\/#organization","name":"Oliveboard","url":"https:\/\/www.oliveboard.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.oliveboard.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2021\/11\/logo.png","contentUrl":"https:\/\/www.oliveboard.in\/blog\/wp-content\/uploads\/2021\/11\/logo.png","width":150,"height":40,"caption":"Oliveboard"},"image":{"@id":"https:\/\/www.oliveboard.in\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Oliveboard","https:\/\/x.com\/Oliveboard","https:\/\/www.instagram.com\/oliveboard.in\/","https:\/\/www.youtube.com\/channel\/UCRvrHAyNdOMI_JBkE2pjZtw?sub_confirmation=1"]},{"@type":"Person","@id":"https:\/\/www.oliveboard.in\/blog\/#\/schema\/person\/2f25f4d24adbf225bc11e6a0a4bcad8b","name":"Mahima Khurana","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.oliveboard.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/922450c81513b569654b520958cbf86230a614fd2f7f05d6b46674fe4bce8c99?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/922450c81513b569654b520958cbf86230a614fd2f7f05d6b46674fe4bce8c99?s=96&d=mm&r=g","caption":"Mahima Khurana"},"description":"I\u2019m Mahima Khurana, a writer with a strong passion for creating meaningful, learner-focused content especially in the field of competitive exam preparation. From authoring books and developing thousands of practice questions to crafting articles and study material, I specialize in transforming complex exam-related topics into clear, engaging, and accessible content. I have first hand experience of 5+ months in SSC Exams. Writing, for me, is not just a skill but a way to support and guide aspirants through their preparation journey one well-written explanation at a time."},{"@type":"Question","@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161404956","position":1,"url":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161404956","name":"Q1. What is network security?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Ans. Network security refers to the protection of computer networks from unauthorized access, misuse, or attacks. It ensures data confidentiality, integrity, and availability.<br\/>","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161411601","position":2,"url":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161411601","name":"Q2. What is the main goal of information security?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Ans. The goal of information security is to protect information from unauthorized access, modification, or destruction while maintaining its confidentiality, integrity, and availability.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161417985","position":3,"url":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161417985","name":"Q3. What are common types of cyber threats?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Ans. Common cyber threats include hacking, viruses, worms, Trojans, spyware, phishing, and DoS (Denial of Service) attacks.<br\/><br\/>","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161425516","position":4,"url":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161425516","name":"Q4. What is the difference between a virus and a worm?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Ans. A <strong>virus<\/strong> attaches to files and spreads when shared, while a <strong>worm<\/strong> spreads automatically across networks without any user action.<br\/>","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161429781","position":5,"url":"https:\/\/www.oliveboard.in\/blog\/network-information-security-threats-for-ssc-cgl-tier-2\/#faq-question-1760161429781","name":"Q5. What is phishing?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Ans. Phishing is a fraudulent attempt to steal sensitive information such as passwords or bank details through fake emails or websites.","inLanguage":"en-US"},"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/posts\/230403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/comments?post=230403"}],"version-history":[{"count":2,"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/posts\/230403\/revisions"}],"predecessor-version":[{"id":230456,"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/posts\/230403\/revisions\/230456"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/media\/230451"}],"wp:attachment":[{"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/media?parent=230403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/categories?post=230403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oliveboard.in\/blog\/wp-json\/wp\/v2\/tags?post=230403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}