Somenath - Mandal
Somenath - Mandal
CYBER CRIME
3 Crimes against organization
01
individual
02
property
03
organization
These include unauthorized
accessing of computer, denial Of
service, computer contamination /
virus attack, e-mail bombing, salami
attack, logic bomb, trojan horse and
data diddling.
Crimes against
04
society
ACTIVE ATTACK
An active attack is a type of security breach where an unauthorized party attempts to
alter, disrupt, or manipulate data or communications in a network. Unlike passive
attacks, which focus on eavesdropping and information gathering without interference,
active attacks involve direct interaction with the system or network to achieve
malicious objectives.
Classification of attack vector
Based on Origin
Based on intent
DataText
Text here Text here Text hereText here Text here Theft, Disruption, Espionage, Sabotage
here
CLOUD COMPUTING
Cloud computing is a technology that allows individuals and organizations to access and
store data and applications on remote servers rather than on local computers or on-
premises infrastructure. This model offers a range of services over the internet, providing
flexibility, scalability, and efficiency. Here’s an overview of cloud computing, including its
types, benefits, challenges, and key service models.
Thanks for
Watching
Reporter