0% found this document useful (0 votes)
29 views3 pages

Cyber Security Unit - I

Uploaded by

Vaish Navi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views3 pages

Cyber Security Unit - I

Uploaded by

Vaish Navi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CYBER SECURITY

Unit I: Introduction to Cybercrime: Introduction – Cybercrime: Definition and origins of the


word – Cybercrime and Information security – Who are cybercriminals? - Classification of
Cybercrimes – Cybercrime: The Legal Perspectives.

INTRODUCTION TO CYBERCRIME

 As the name says, "cyber" means computer and "crime" means something unfair and
illegal, which collectively means a crime executed using computer technologies.
 It could be that the computer may be involved in the crime or a target of a big one

 This could harm someone's privacy and finances.


 It comprises a wide range of crimes such as cyber fraud, financial scams, cybersex
trafficking, ad scams, etc.

 Many privacy concerns refer to cyber crime when the privacy is intercepted and
disclosed. The World Economic Forum 2020 Global Risk Report confirmed that
organized cybercrime bodies are joining forces to execute criminal activities online.

 This also affects global GDP and the world economy as financial scams related
activities are more notable and popular in the cyber world.

Cybercrime Types
1. Cyber Fraud
2. Cyberterrorism
3. Ad Fraud
4. Cybersex Trafficking
5. Computer as a Target
6. Computer as a Tool
7. Drug Trafficking

Origins of the word


 One of the most high-profile banking computer crimes happened in 1970. The top
teller at New York's Union Dime Savings Bank's Park Avenue branch stole over $1.5
million from hundreds of accounts.
 A hacker organization known as MOD (Masters of Deception) is accused of stealing
passwords and technical data from Pacific Bell, Nynex, and other telephone providers,
as well as six major credit bureaus and two major colleges. Damage was substantial;
one firm, Southwestern Telephone, alone incurred losses of $370,000.
 In 2006, the Russian Business Network (RBN) was registered as an online site. Most
of its operations were initially legal,

CYBERCRIME AND INFORMATION SECURITY


 Computer crime is an act that describes a large category of offenses, which is also
known as hi-tech crime, e-crime, cybercrime, or electronic crime.
 It is performed by a computer user who has great knowledge about hacking.
 The hacker tries to gain unauthorized access to any particular account, personal
information or steals a company's or individual's private information.
 In some cases, hackers can corrupt the computer or data files that can be very harmful
to you.

The computer as a target


The computer as an instrument of the crime:
The computer as incidental to a crime
Crimes associated with the prevalence of computers

Examples of computer crimes


Child pornography
Cracking:
Copyright violation
Cyber terrorism:
Cybersquatting:
Cyberbully or Cyberstalking:
Creating Malware
Denial of Service attack:
Doxing
Espionage
Fraud
Harvesting:
Human trafficking
Identity theft
Illegal sales
Intellectual property theft
Phishing or vishing
Salami slicing
Scam
Slander
Spamming
Spoofing
Typosquatting
Unauthorized access
Wiretapping

INFORMATION SECURITY
Information security is a set of practices designed to carry private data secure from
unauthorized access and alteration for the duration of storing or transmitting from one
location to another.

Information security is designed and carried out to protect the print, digital, and other private,
sensitive, and private data from unauthorized persons.

It can be used to secure data from being misused, acknowledgment, destruction, alteration,
and disruption.

 Protection − The user needs to be capable of configuring their devices and networks
accurately.
 Detection − The user should detect whether the configuration has been modified or
get a notification if there are some issues in the network traffic.
 Reaction − After detecting the issues, the user should acknowledge them and should
return to a protected position as rapidly as available.

WHO ARE CYBERCRIMINALS?


A threat in cybersecurity is a malicious activity by an individual or organization to corrupt or
steal data, gain access to a network, or disrupts digital life in general. The cyber community
defines the following threats available today:

CLASSIFICATION OF CYBER CRIMES


Classification Of Cyber Crimes Cyber crimes can be classified in to 4 major categories as the
following:
Cyber crime against Individual
(1) (i) Email spoofing
(2) (ii) Spamming
(3) (iii) Cyber Defamation
(4) (iv) Harassment & Cyber stalking :

(2) Cyber crime Against Property


(i) Credit Card Fraud
(ii) Intellectual Property crimes
(iii) Internet time theft

(3) Cyber crime Against Organization


(i) Unauthorized Accessing of Computer:
(ii) Denial Of Service :
(iii) Computer contamination / Virus attack :
(iv) Email Bombing :
(v) Salami Attack :
(vi) Logic Bomb :
(vii) Trojan Horse :
(viii) Data diddling :

(4) Cyber crime Against Society


(i) Forgery :
(ii) Cyber Terrorism :
(iii) Web Jacking :

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy