Chapter 2
Chapter 2
Chapter 2
Priyank Bhojak
Assistant professor
IT Department
BVM Engineering College
Cyber: The cyber has some interesting Synonyms:
fake, replicated, pretend, virtual, computer generated.
Cyber means combining forms relating to Information
Technology, the internet and Virtual reality.
5. Avoid Spyware/Adware
6. Protect Passwords
5
COMPARE TRADITIONAL CRIME AND CYBER CRIME
5. Victims come to know about their Victims come to know about their
losses immediately losses long after the actual commission of crimes
after the actual commission of
crimes
6
Organization and user’s assets include connected computing devices,
personnel, infrastructure, applications, services, telecommunications
systems, and the totality of transmitted and/or stored information in the
cyber environment.
Availability
Integrity, which may include authenticity and non-repudiation
Confidentiality
Security - Elements
Viruses
Worms
Trojan horses
Rootkits
Botnets
Spam
Spyware secretly monitors your computer and internet use. Some of the
worst examples of spyware include keyloggers who record keystrokes or
screenshots, sending them to remote attackers who hope to glean user
IDs, passwords, credit card numbers, and other sensitive information.
Adware (short for advertising-supported software) is a type of
malware that automatically delivers advertisements.
Common examples of adware include pop-up ads on websites and
advertisements that are displayed by software
Deleting data
Blocking data
Modifying data
Copying data
Disrupting the performance of computers or computer networks
Botnets
A botnet is a collection of internet-connected devices, which
guarantee that users will get the decryption key or unlock tool
required to regain access to the infected system or hostaged files.
Ransomware Infection and Behavior
tools that the everyday tech user needs, right up there with things
like anti-virus software and scanning filters.
A number of holes have been exploited with severe consequences before
was to pay the fine in bitcoin to the hackers, at least until the
block was discovered.
Microsoft had already issued a patch only a matter of weeks ago for the
particular hole that led to WannaCry, but many users had either not installed it
or did not have automatic updates activated on their systems.
That’s why it’s very important to keep all of your software and
information that triggers a crash. In both instances, the DoS attack deprives
legitimate users (i.e. employees, members, or account holders) of the service or
resource they expected.
significant information or other assets, they can cost the victim a great
deal of time and money to handle.
There are two general methods of DoS attacks: flooding services or
crashing services. Flood attacks occur when the system receives too
much traffic for the server to buffer, causing them to slow down and
eventually stop
DDoS (Distributed Denial-of-
Service) Attacks
A DDoS attack means Distributed DoS attack, DoS
attacks from multiple computer for the same victim is
Distributed DoS attack.
A large numbers of zombie systems are synchronized to
attack a particular system. The zombies are infected by
the attackers and it is also victims in the DDoS attack.
The zombie systems are called “Secondary Victims”
and the main target is called “Primary Victim”.
Malware carries the DDoS attack mechanisms.
Botnet is the popular medium to lunch DDoS
attack
Basic Fundamental
IP Address