0% found this document useful (0 votes)
8 views17 pages

Unit 1 PDF

The document provides an overview of Cyber Crime, including definitions, types, prevention methods, and challenges. It discusses Information Security and its goals, as well as various types of cybercriminals and their motivations. Additionally, it covers specific cybercrime concepts such as Cyber Terrorism, Cyber Warfare, and Social Engineering, along with examples and security measures.

Uploaded by

agrawaltanay21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views17 pages

Unit 1 PDF

The document provides an overview of Cyber Crime, including definitions, types, prevention methods, and challenges. It discusses Information Security and its goals, as well as various types of cybercriminals and their motivations. Additionally, it covers specific cybercrime concepts such as Cyber Terrorism, Cyber Warfare, and Social Engineering, along with examples and security measures.

Uploaded by

agrawaltanay21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Here are the detailed but simple explanations for all the important questions from Unit 1 of

Cyber Security:

ὑ Unit 1 – Introduction to Cyber Crime


1. What is cyber crime? Prevention & Challenges of cyber crime. (V.IMP)
Cyber crime means any illegal activity done using computers or the internet.Examples:
hacking, identity theft, online fraud, spreading viruses, cyber bullying.

Understanding Cyber Crime

Hacking
Unauthorized access to computer systems
or networks.

Identity Theft
Stealing personal information for fraudulent
purposes.
Cyber Crime

Online Fraud
Deceptive practices conducted over the
internet.

Virus Spreading
Distributing malicious software to harm
systems.

Cyber Bullying
Using digital platforms to harass or
intimidate.

Prevention of cyber crime:


• Use strong and unique passwords.
• Install antivirus software and keep it updated.
• Don’t click on unknown links or attachments.
• Enable two-factor authentication.
• Regularly update software and apps.
Cybersecurity tips

Strong Antivirus Avoid Two-Factor Software


Passwords Software Suspicious Authentication Updates
Create passwords Install and update
Links Enable extra layer Keep software and
that are hard to antivirus Do not click of security. apps updated.
guess. protection. unknown links.

Challenges:
• Criminals can hide identity using fake accounts or VPNs.
• Laws are different in different countries.
• People don’t report small cyber crimes.
• Lack of awareness and poor cybersecurity systems.

Reasons for cybercrime

Identity Hiding Varying Laws


Criminals use fake Cyber laws differ
accounts and VPNs to significantly across
mask their identities. international borders.

Underreporting Security
Many minor
Deficiencies
cybercrimes go Cybercrime is aided
unreported by victims. by poor systems and
awareness.
2. What is Information Security? Security mechanisms used to provide
security. (V.IMP)
Information Security means protecting information from being stolen, changed, or
destroyed.

The Cycle of Information Security

Identify Threats

Implement
Review and
Security
Update
Measures

Information
Security

Respond to Monitor
Incidents Security

Main Goals:
• Confidentiality – only authorized people can see the data.
• Integrity – data is correct and unaltered.
• Availability – data is available when needed.
Data security principles

Confidentiality Integrity Availability


Limiting data access Ensuring data Guaranteeing data
to authorized accuracy and access when it's
personnel. preventing required.
modification.

Security Mechanisms:
• Firewalls – block unwanted network traffic.
• Antivirus – detect and remove malware.
• Encryption – convert data into secret code.
• User Authentication – passwords, biometrics.
• Access Control – only certain users can access specific data.

Cybersecurity measures

Firewalls Antivirus Encryption User Access Control


Block unwanted Detect and remove Convert data into Authentication Only certain users
network traffic, malware, ensuring secret code, Passwords, can access specific
preventing system health. protecting biometrics, verifying data.
intrusions. confidentiality. user identity
securely.
3. Who are cybercriminals? Types of cybercriminals.
Cybercriminals are people who commit crimes using computers or networks.

Cybercrime and Cybercriminals

Tools used in
Technology
cybercrimes

Illegal activities using


Cybercrimes
technology

Individuals
committing Cybercriminals
cybercrimes

Types:
• Hackers – break into systems.
• Crackers – break passwords or security.
• Phishers – create fake websites to steal info.
• Cyber Terrorists – attack systems to spread fear.
• Spammers – send unwanted emails or ads.
• Scammers – cheat people online for money.
What type of cybercriminal is involved in this incident?

Spammers
Send unwanted emails or ads.

Cyber Terrorists
Scammers Attack systems to spread fear.

Cheat people online for money.

Phishers
Create fake websites to steal
information.

Crackers
Break passwords or security
measures.

Hackers
Break into systems to gain
unauthorized access.

4. Explain the term “Social Engineering” in Cyber Crime.


Social Engineering means tricking people into giving personal or sensitive info (like
passwords).
Example Techniques:
• Fake phone calls pretending to be bank staff.
• Emails asking to reset your password.
• Messages saying “You won a prize” and asking for card details.
Cyber Scam Funnel

Deception
Scammers use deceptive
tactics to gain trust

Information Request
Scammers request personal
or financial information

Exploitation
Scammers exploit the
provided information for
personal gain

It is based on human error, not technical problems.


5. Write a short note on Botnets. Discuss fuel of cyber crime. (V.IMP)
Botnet = A group of infected computers controlled by a hacker without the owner’s
knowledge. These computers are called "bots" or "zombies."
Botnet Lifecycle

1
Infection
Computers are infected
with malware.

4 2
Control
Maintenance
Hacker gains control
Hacker maintains and
over infected
updates the botnet.
computers.

3
Execution
Hacker uses botnet for
malicious activities.

Used for:
• Sending spam
• Launching DDoS attacks
• Spreading malware
Cybercrime activities

Sending spam
Sending unsolicited
messages in bulk.
Launching DDoS
attacks
Spreading Overwhelming a server
malware with malicious traffic.

Distributing malicious
software to infect
systems.

Fuel of cyber crime means what motivates cyber criminals:


• Money – stealing bank info or doing scams
• Power – showing off hacking skills
• Revenge – personal grudges
• Politics – cyber attacks on other countries

Top Motivations for Cyber Crime

1
2
3

Money
Power Financial gain through
theft and scams.
Demonstrating hacking Revenge
skills and dominance.
Personal vendettas and
grudges.
6. Write short notes on the following (VV.IMP):
(i) Cyber Terrorism:
Using the internet to attack or threaten a country, government, or public to create fear.
Example: hacking into defense websites.

Cycle of Cyber Terrorism

Plan Attack

Refine Strategy Execute Attack

Cyber
Terrorism
Evaluate Create Fear
Impact

Achieve
Objectives

(ii) Cyber Warfare:


Online war between countries using cyber attacks.Example: one country attacking
another’s power grid or military system through hacking.
Cycle of Cyber Warfare

Initiate Attack

Target
Plan Retaliation Infrastructure

Cyber
Warfare
Strengthen Disrupt
Defenses Operations

Assess
Damage

(iii) Cyber Stalking:


Using the internet to follow, harass, or threaten someone repeatedly.Example: sending
unwanted emails, tracking on social media.
Cycle of Cyber Stalking

1
Initial Contact
The stalker makes first
contact.

5 2
Threatening Harassment
Begins
The stalker issues
threats. Unwanted
communication starts.

4 3
Tracking Escalation
The stalker monitors the The harassment
victim's activities. intensifies.

(iv) Cyber Vandalism:


Damaging or destroying someone else’s data or website for fun or revenge.Example:
defacing websites, deleting files.
Understanding Cyber Vandalism

Damaging Data Destroying Data

Defacing
Deleting Files
Websites

(v) Cyber Squatting:


Buying domain names of famous brands and then trying to sell them at a high price.
Example: registering “amazonoffers.in” and trying to sell it to Amazon.

Domain Squatting Process

Identify Brand
Recognize a well-known
brand

Register Domain
Secure domain name
related to brand

Contact Brand
Reach out to brand for sale

Negotiate Price
Discuss selling price with
brand

(vi) IPR Crime (Intellectual Property Rights Crime):


Stealing someone’s creative work like music, movies, books, or software.Example:
downloading pirated movies or cracked software.

Cycle of Digital Piracy

1
Create Digital
Content
Original creators
produce music, movies,
books, or software.

4 2
Use Stolen Distribute
Content Content
Users consume or Content is shared
distribute the pirated through various
material. platforms.

3
Steal Content
Unauthorized individuals
download or copy the
content.

(vii) Phishing:
Tricking people by sending fake emails or websites to steal passwords or card details.
Example: email that looks like it’s from your bank but is fake.
The Phishing Attack Cycle

1
Send Fake Email
Cybercriminals send
emails that mimic
legitimate sources.

4 2
Deceive Recipient
Exploit Data
Recipients are tricked
Stolen data is used for
into believing the email
malicious purposes.
is genuine.

3
Steal Information
Victims enter personal
details on fake
websites.

(viii) Spoofing:
Pretending to be someone else to gain trust and access information.Example: using fake
email addresses to trick users.
Cycle of Social Engineering

1
Impersonate
Identity
Cybercriminal pretends
to be someone else.

4 2
Exploit
Gain Trust
Information
Build confidence with
Use the data for the target.
malicious purposes.

3
Access
Information
Obtain sensitive data
from the target.

(ix) Hacking & Types of Hackers:


Hacking means breaking into a computer or network without permission.

Choose the appropriate response to hacking


incidents.

Ethical Hackers Malicious Hackers


Protect systems with Exploit systems without
permission permission
Types of Hackers:
• White Hat – good hackers who help improve security.
• Black Hat – bad hackers who do illegal activities.
• Grey Hat – in between; they may break rules but don’t always harm.

Understanding hacker motivations


across the ethical spectrum.

Hacker Ethics

Performs illegal
Black Hat activities.

Breaks rules,
sometimes
Grey Hat harmless.

Improves security.
White Hat

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy