Cybersecurity PDF
Cybersecurity PDF
Contents
• Introduction
• Categories of Cyber Crime
• Principles of Computer Security
• Types of Cyber Crime
• Types of Cyber Attack by Percentage
• Cyber Threat Evolution
• Advantages of Cyber Security
• Safety Tips to Cyber Crime
Introduction
• The Internet in India is growing rapidly. There are two sides to a coin. Internet also
has it’s own disadvantages is cyber crime-illegal activity committed on the Internet.
• Crime committed using a computer and the internet to steal a person’s identity or
illegal imports or malicious programs. Cyber crime is an activity done using
computers and the internet.
• Cyber security refers to the technologies and processes designed to protect computers,
networks and data from unauthorized access and attacks delivered via the internet by
cyber criminals. Though, cyber security is important for the network, data and
application security.
• The objective of cyber security is to establish rules and measure to use against attacks
over the internet.
Categories of Cyber Crime
• A common online phishing scam starts with an email message that appears to
come from a trusted source(legitimate site) but actually directs recipients to
provide information to a fraudulent web site.
Denial of Service
• This is an act by the criminals who floods the Bandwidth of the victims network.
• In the DoS attack, a hacker uses a single internet connection to either exploit a
software vulnerability or flood a target with fake request-usually in an attempt to
exhaust server resources.
• On the other hand, DDoS attacks are launched from multiple connected devices
that are distributed across the internet.
• Hackers use malware for any number of reasons such as, extracting personal
information or passwords, stealing money, or preventing owners from accessing
their device.
• Viruses are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network. They
usually affect the data on a computer and mobile device either by altering or
deleting it.
• Worms unlike viruses do not need the host to attach themselves. They merely
make functional copies of themselves and do this repeatedly till they eat up all the
available space on the computer’s memory.
• Trojans can infect you in places where you might not expect it, such as emails,
downloads and more. It's always better to be safe than sorry when it comes to
avoiding this type of malware.
Spyware
• Spyware is a type of malware that hackers use to spy on you in order to gain
access to your personal information, banking details, or online activity. We should
protect ourselves by an anti-spyware tool.
Adware
• Adware is a type of malware that bombards you with endless ads and pop-up
windows that could potentially be dangerous for your device. The best way to
remove adware is to use an adware removal tool.
Ransomware
• Ransomware is as scary as it sounds. Hackers use this technique to lock you out of
your devices and demand a ransom in return for access. Ransomware puts you in a
sticky situation, so it's best to know how to avoid it.
• Additionally, malware that steals credit card data directly can also be installed on
these devices. Successful implementation of skimmers cause in ATM machine to
collect card numbers and personal identification number codes that are later
replicated to carry out fraudulent transaction.
Types of Cyber Attack by Percentage
(Source-FBI)
• Internet Security process all the incoming and outgoing data on our computer.
• The application of cyber security used in our PC needs update every week.
• The security developers will update their database every week once. Hence the
new virus also detected.
Safety Tips to Cyber Crime