0% found this document useful (0 votes)
21 views3 pages

Cyber Security Unit 1 Docs

This is a brief note on the fundamental concepts of cyber security

Uploaded by

Samuel Joseph
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views3 pages

Cyber Security Unit 1 Docs

This is a brief note on the fundamental concepts of cyber security

Uploaded by

Samuel Joseph
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber security unit 1

Definition:
● Crimes committed using a computer and internet to steal data or information.
● Any financial dishonesty that takes place in a computer environment.
● Any threats to the computer itself, such as theft of hardware or software, sabotage,
and demands for ransom
Two types of attacks are common:
–Techno-crime
–Techno – vandalism

Cybercrime and information security:


Lack of information security gives rise to cybercrime

Challenges for securing data from a business perspective:


● Most organizations do not incorporate the cost of the vast majority of computer
security incidents into their accounting.
● Attaching a quantifiable monetary value to the corporate data is difficult.
● Financial losses may not be detected by the victimized organization in case of Insider
attacks: such as leaking customer data

Who are Cybercriminals?


● Credit card fraud
● Cyberstalking
● Defaming another online
● Gaining unauthorized access to computer systems
● Ignoring copyrights
● Software licensing and trademark protection
● Overriding encryption to make illegal copies
● Software piracy
● Stealing another’s identity to perform criminal acts

Categories of cybercriminals:
Type 1: hungry for recognition
● Hobby hackers
● IT professional(social engineering):
● Politically motivated hackers :
● Terrorist organizations
Type 2: not interested in recognition
● Psychological perverts
● Financially motivated hackers
● State-sponsored hacking

Type 3: The insiders:


● Disgruntled or former employees seeking revenge
● Competing companies using employees

Classification of cybercrimes:
1. Cybercrimes against an individual:
● Email spoofing
● Phishing
● Spamming
● Cyberdefamation
● Cyberstalking
● Computer sabotage
● Pornographic offences
● Password sniffing
2. Cybercrimes against property:
● Credit card frauds
● Intellectual property crimes
● Internet time theft
3. Against organization:
● Unauthorized accessing of computer
● Password sniffing
● DOS attacks
● Virus attack
● Email bombing
● Salami attack
● Logic bomb
● Trojan horse
● Data diddling
● Industrial spying
● Network intrusions
● Piracy
4. Against society:
● Forgery
● Cyberterrorism
● Web jacking
5. Crimes emanating from Usenet newsgroup: Usenet newsgroups are online
discussion forums where users can post messages and read and reply to other
users' posts.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy