Unit 1 PDF
Unit 1 PDF
Cyber Security:
Hacking
Unauthorized access to computer systems
or networks.
Identity Theft
Stealing personal information for fraudulent
purposes.
Cyber Crime
Online Fraud
Deceptive practices conducted over the
internet.
Virus Spreading
Distributing malicious software to harm
systems.
Cyber Bullying
Using digital platforms to harass or
intimidate.
Challenges:
• Criminals can hide identity using fake accounts or VPNs.
• Laws are different in different countries.
• People don’t report small cyber crimes.
• Lack of awareness and poor cybersecurity systems.
Underreporting Security
Many minor
Deficiencies
cybercrimes go Cybercrime is aided
unreported by victims. by poor systems and
awareness.
2. What is Information Security? Security mechanisms used to provide
security. (V.IMP)
Information Security means protecting information from being stolen, changed, or
destroyed.
Identify Threats
Implement
Review and
Security
Update
Measures
Information
Security
Respond to Monitor
Incidents Security
Main Goals:
• Confidentiality – only authorized people can see the data.
• Integrity – data is correct and unaltered.
• Availability – data is available when needed.
Data security principles
Security Mechanisms:
• Firewalls – block unwanted network traffic.
• Antivirus – detect and remove malware.
• Encryption – convert data into secret code.
• User Authentication – passwords, biometrics.
• Access Control – only certain users can access specific data.
Cybersecurity measures
Tools used in
Technology
cybercrimes
Individuals
committing Cybercriminals
cybercrimes
Types:
• Hackers – break into systems.
• Crackers – break passwords or security.
• Phishers – create fake websites to steal info.
• Cyber Terrorists – attack systems to spread fear.
• Spammers – send unwanted emails or ads.
• Scammers – cheat people online for money.
What type of cybercriminal is involved in this incident?
Spammers
Send unwanted emails or ads.
Cyber Terrorists
Scammers Attack systems to spread fear.
Phishers
Create fake websites to steal
information.
Crackers
Break passwords or security
measures.
Hackers
Break into systems to gain
unauthorized access.
Deception
Scammers use deceptive
tactics to gain trust
Information Request
Scammers request personal
or financial information
Exploitation
Scammers exploit the
provided information for
personal gain
1
Infection
Computers are infected
with malware.
4 2
Control
Maintenance
Hacker gains control
Hacker maintains and
over infected
updates the botnet.
computers.
3
Execution
Hacker uses botnet for
malicious activities.
Used for:
• Sending spam
• Launching DDoS attacks
• Spreading malware
Cybercrime activities
Sending spam
Sending unsolicited
messages in bulk.
Launching DDoS
attacks
Spreading Overwhelming a server
malware with malicious traffic.
Distributing malicious
software to infect
systems.
1
2
3
Money
Power Financial gain through
theft and scams.
Demonstrating hacking Revenge
skills and dominance.
Personal vendettas and
grudges.
6. Write short notes on the following (VV.IMP):
(i) Cyber Terrorism:
Using the internet to attack or threaten a country, government, or public to create fear.
Example: hacking into defense websites.
Plan Attack
Cyber
Terrorism
Evaluate Create Fear
Impact
Achieve
Objectives
Initiate Attack
Target
Plan Retaliation Infrastructure
Cyber
Warfare
Strengthen Disrupt
Defenses Operations
Assess
Damage
1
Initial Contact
The stalker makes first
contact.
5 2
Threatening Harassment
Begins
The stalker issues
threats. Unwanted
communication starts.
4 3
Tracking Escalation
The stalker monitors the The harassment
victim's activities. intensifies.
Defacing
Deleting Files
Websites
Identify Brand
Recognize a well-known
brand
Register Domain
Secure domain name
related to brand
Contact Brand
Reach out to brand for sale
Negotiate Price
Discuss selling price with
brand
1
Create Digital
Content
Original creators
produce music, movies,
books, or software.
4 2
Use Stolen Distribute
Content Content
Users consume or Content is shared
distribute the pirated through various
material. platforms.
3
Steal Content
Unauthorized individuals
download or copy the
content.
(vii) Phishing:
Tricking people by sending fake emails or websites to steal passwords or card details.
Example: email that looks like it’s from your bank but is fake.
The Phishing Attack Cycle
1
Send Fake Email
Cybercriminals send
emails that mimic
legitimate sources.
4 2
Deceive Recipient
Exploit Data
Recipients are tricked
Stolen data is used for
into believing the email
malicious purposes.
is genuine.
3
Steal Information
Victims enter personal
details on fake
websites.
(viii) Spoofing:
Pretending to be someone else to gain trust and access information.Example: using fake
email addresses to trick users.
Cycle of Social Engineering
1
Impersonate
Identity
Cybercriminal pretends
to be someone else.
4 2
Exploit
Gain Trust
Information
Build confidence with
Use the data for the target.
malicious purposes.
3
Access
Information
Obtain sensitive data
from the target.
Hacker Ethics
Performs illegal
Black Hat activities.
Breaks rules,
sometimes
Grey Hat harmless.
Improves security.
White Hat