Cyber Security & Cryptography Unit-1
Cyber Security & Cryptography Unit-1
1.5 Cyberstalking
20XX
1.6 Cybercafe and Cybercrimes
1.7 Botnets
1. 3. 5.
Cybercrime Cybercrime Crimes
against against emanating
individual organization from Usenet
newsgroup
2. Cybercrime 4. Cybercrime
against against
property Society
Classifications of Cybercrime
2. Offline stalkers The cyberstalker may start the attack offline, following
the victim's routine. They then gather information
about the victim online through message boards,
personal websites, and people finding services.
1.6 Cybercafe and Cybercrimes
5. 6. 7. 8. Fly
Ultramobil Smartphone Carputer Fusion
e PC Pentop
computer
1.10 Security Challenges Posed by Mobile Devices
1. Malware:
- Designed to disrupt, damage, or gain unauthorized
access to computer systems.
- Self-replicating, spreads rapidly through infected
hosts.
2. Virus:
- Requires user interaction to infect devices, often
through malicious email attachments.
3. Worm:
- Can enter devices without user interaction through
vulnerable network applications.
1.12 Network and Computer Attacks
4. Botnet:
- Network of infected computers controlled by
attackers for malicious purposes like spamming.
5. DoS (Denial of Service):
- Renders network or host unusable for legitimate
users through various attack methods.
6. DDoS (Distributed DoS):
- Multiple compromised systems attack a single
system to cause a DoS.
1.12 Network and Computer Attacks
7. Packet sniffer:
- Passive receiver recording every packet passing by,
used for sensitive data interception.
8. IP Spoofing:
- Injecting packets into the Internet with false source
addresses to masquerade as someone else.
9. Man-in-the-Middle Attack:
- Monitoring, capturing, and controlling
communication between two parties.
10. Compromised-Key Attack:
- Attacker obtains a secret key to gain access to
1.12 Network and Computer Attacks
11. Phishing:
- Fraudulent emails from reputable companies to
trick users into revealing personal information.
12. DNS spoofing:
- Introducing corrupt DNS data into the cache to
return incorrect IP addresses.
13. Rootkit:
- Stealthy packages granting hackers complete
access and control over a system.
Cybercrime is a significant
challenge in the digital world,
with various threats like
malware, phishing, and data
breaches. Prioritizing cybersecurity,
staying informed, and
Summar
implementing strong measures
are essential for safeguarding
y
our systems and creating a safer
digital environment.