Cyber Crime & Cyber Security
Contents
2.Categorize of Cyber Crime
3.Types of Cyber Attacks
4.Security
5.Personal Measures
What is Cyber Crime..??
Criminal acts using Computers and networks as tools or targets.
Cyber crime can be directed towards persons, companies, or government authorities.
Categorize of Cyber Crime
We can categorize Cyber crime in two ways:
The Computer as a Target :- using a computer to attack other computers. e.g. Hacking, virus/Worm attacks.
The computer as a weapon :- using a computer to commit real world crimes. e.g. Cyber Terrorism, Credit card frauds, etc.
Types of Cyber Attacks
HACKING
DENIAL OF SERVICE ATTACK
COMPUTER VANDALISM
CYBER TERRORISM
SOFTWARE PIRACY
Hacking
Motive behind the crime : Adventure, Revenge, Greed, Desire to access forbidden information, Publicity.
Government websites are the hot targets of the hackers due to the press coverage it receives.
Denial Of Service Attack
This is an act that ceases the functioning of a service or program by sending malicious datagrams that can even cause the network connections to fail.
For example: The criminal fills victim’s e-mail box with spam mail depriving him of the services he is entitled to access or provide.
For example: The criminal fills victim’s e-mail box with spam mail depriving him of the services he is entitled to access or provide.
Computer Vandalism
People who make malicious software are called Malware writers.
Types of Malware's are Viruses,Worms,Trojan Horse.
Cyber Terrorism
Targeted attacks on military installations, power plants, air traffic control, banks, telecommunication networks.
Cyber terrorism is an attractive option for modern terrorists for several reasons:
1) Cheaper and more anonymous than traditional terrorist methods.
2) Variety and number of targets are enormous.
3) Crime can be conducted remotely.
4) Has the potential to affect directly a larger number of people.
Software Piracy
Theft of software through the illegal copying of genuine programs
Or
The counterfeiting and distribution of products intended to pass for the original.
Security
Desktop/Laptop Security
Password protected screen savers.
Secure physical set-up that is not open to the public or unmonitored.
Require network logins if you are on a network.
Standardize the desktop so as to limit what an end-user can and cannot do.
Server Security
The server should be kept in a locked and restricted area.Administrative passwords and equivalencies should be given to a minimal number of people.
Administrative passwords should be changed regularly.
Users should only be given access to file systems that they will actually need to use.
Use of virus detection software that is regularly updated.
Network Security
Use of Firewalls
Firewalls are a system or combination of systems that supports an access control policy between two networks.
A firewall can limit the types of transactions that enter a system, as well as the types of transactions that leave a system.
Use of powerful Encryption Techniques
Provides secured transactions over the internet. Ex: Public Key Cryptography
Check security settings.
Use a powerful antivirus software
and update it regularly.
Back-up your computer data on disks or CD`s often.
Keep your operating system up to date with critical security updates .
Continued…
While using Internet
Log-out and login on your accounts each day.
Disable unused accounts.
Change passwords of your accounts at least every 30 days.
Never give your full name or address to strangers on Internet.
Avoid sending any photograph online particularly to strangers.
Don't open emails or attachments from unknown sources.
Never send your credit card number to any site that is not secure.
Don't open emails or attachments from unknown sources.
Never send your credit card number to any site that is not secure.
0 Comments:
Post a Comment