0% found this document useful (0 votes)
20 views4 pages

Cyber Security

Uploaded by

sruthi1717
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

Cyber Security

Uploaded by

sruthi1717
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Introduction to Cyber Security

(FCS)

Uttarakhand Open University, Haldwani- 263139


Toll Free Number: 18001804025
Email: info@uou.ac.in
http://uou.ac.in
Index
1.1 INTRODUCTION .......................................................................................................................................... 8

1.1.1 HISTORY OF INTERNET ..................................................................................................................................... 8


1.1.1.1 Internet Addresses ........................................................................................................................... 10
1.1.1.2 DNS .................................................................................................................................................. 12
1.1.1.3 Internet Infrastructure ..................................................................................................................... 13
1.1.1.4 World Wide Web ............................................................................................................................. 14

1.2 INTRODUCTION TO CYBER CRIME ............................................................................................................. 15

1.2.1 CLASSIFICATION OF CYBER CRIMES ................................................................................................................... 16


1.2.2 REASONS FOR COMMISSION OF CYBER CRIMES .................................................................................................. 18

1.3 MALWARE AND ITS TYPE .......................................................................................................................... 19

1.3.1 ADWARE ..................................................................................................................................................... 19


1.3.2 SPYWARE .................................................................................................................................................... 19
1.3.3 BROWSER HIJACKING SOFTWARE...................................................................................................................... 19
1.3.4 VIRUS......................................................................................................................................................... 19
1.3.5 WORMS ..................................................................................................................................................... 20
1.3.6 TROJAN HORSE ............................................................................................................................................ 20
1.3.7 SCAREWARE ................................................................................................................................................ 21

1.4 KINDS OF CYBER CRIME ............................................................................................................................ 21

1.4.1 CYBER STALKING .......................................................................................................................................... 21


1.4.2 CHILD PORNOGRAPHY ................................................................................................................................... 22
1.4.3 FORGERY AND COUNTERFEITING ...................................................................................................................... 22
1.4.4 SOFTWARE PIRACY AND CRIME RELATED TO IPRS ............................................................................................... 22
1.4.5 CYBER TERRORISM ........................................................................................................................................ 22
1.4.6 PHISHING .................................................................................................................................................... 22
1.4.7 COMPUTER VANDALISM ................................................................................................................................ 22
1.4.8 COMPUTER HACKING .................................................................................................................................... 22
1.4.9 CREATING AND DISTRIBUTING VIRUSES OVER INTERNET......................................................................................... 23
1.4.10 SPAMMING ............................................................................................................................................... 23
1.4.11 CROSS SITE SCRIPTING ................................................................................................................................. 23
1.4.12 ONLINE AUCTION FRAUD ............................................................................................................................. 24
1.4.13 CYBER SQUATTING ...................................................................................................................................... 24
1.4.14 LOGIC BOMBS ............................................................................................................................................ 24
1.4.15 WEB JACKING ............................................................................................................................................ 24
1.4.16 INTERNET TIME THEFTS ............................................................................................................................... 24

4
1.4.17 DENIAL OF SERVICE ATTACK.......................................................................................................................... 24
1.4.18 SALAMI ATTACK ......................................................................................................................................... 24
1.4.19 DATA DIDDLING ......................................................................................................................................... 25
1.4.20 EMAIL SPOOFING........................................................................................................................................ 25

2.1 AUTHENTICATION .................................................................................................................................... 26

2.2 ENCRYPTION............................................................................................................................................. 27

2.3 DIGITAL SIGNATURES ............................................................................................................................... 28

2.4 ANTIVIRUS ................................................................................................................................................ 29

2.5 FIREWALL ................................................................................................................................................. 30

2.6 STEGANOGRAPHY .................................................................................................................................... 31

3.1 COMPUTER FORENSICS ............................................................................................................................ 33

3.2 WHY SHOULD WE REPORT CYBER CRIME? ................................................................................................ 36

4.1 INTRODUCTION ........................................................................................................................................ 40

4.2 SOME RECENT CYBER CRIME INCIDENTS .................................................................................................. 40

5.1 INTRODUCTION ........................................................................................................................................ 47

5.2 COUNTER CYBER SECURITY INTIATIVES IN INDIA ...................................................................................... 47

6.1 GENERATING SECURE PASSWORD ............................................................................................................ 52

6.1.1 GUIDELINE FOR SETTING SECURE PASSWORD ...................................................................................................... 52

6.2 USING PASSWORD MANAGER .................................................................................................................. 55

6.2.1 WHAT IS A PASSWORD MANAGER? .................................................................................................................. 56


6.2.2 WHY YOU SHOULD USE IT? ............................................................................................................................. 56
6.2.3 HOW DOES IT WORK? .................................................................................................................................... 56
6.2.4 SOME POPULAR PASSWORD MANAGERS ............................................................................................................ 56

6.3 ENABLING TWO-STEP VERIFICATION ........................................................................................................ 62

6.4 SECURING COMPUTER USING FREE ANTIVIRUS ........................................................................................ 72

7.1 CONFIGURING FIREWALL ON MAC COMPUTER ........................................................................................ 75

7.1.1 TURNING ON AND CONFIGURING THE MAC OS X FIREWALL.................................................................................. 75

7.2 WORKING WITH WINDOWS FIREWALL IN WINDOWS .............................................................................. 78

7.2.1 FIREWALL IN WINDOWS 7 .............................................................................................................................. 78


7.2.2 CONFIGURING WINDOWS FIREWALL ................................................................................................................ 79
7.2.3 HOW TO START & USE THE WINDOWS FIREWALL WITH ADVANCED SECURITY .......................................................... 83

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy