0% found this document useful (0 votes)
8 views3 pages

Cyber Security L3

Uploaded by

Nancy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

Cyber Security L3

Uploaded by

Nancy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

What is Cyberstalking?

Cyberstalking is a crime committed when someone uses the internet and


other technologies to harass or stalk another person online. Even though
cyberstalking is a broad term for online harassment, it can include
defamation, false accusations, teasing, and even extreme threats. Often
these connections will not end even though the receiver requests the person
to stop. The content addressed at the target is frequently improper and, at
times, disturbing, leaving the individual beginning to feel fear.

Types of Cyberstalking
The three most common types of cyber stalking are as follows:

Email stalking: This type of stalking involves the sender sending hateful,
obscene, or threatening emails to the recipient. Sometimes the attacker may
also include viruses and spam in the email.

Internet stalking: This type of stalking occurs when an individual spreads


rumors or tracks victims on the internet. The goal of spreading rumors is to
slander the victim.
Computer stalking: This type of stalking occurs when an individual hacks
into a victim’s computer and takes control of it. This requires advanced
computer skills; however, one can find guidelines on the web.

Some of the common examples of cyberstalking are:

 Making rude, offensive, or suggestive online comments


 Joining the same groups and forums to follow the target online
 Sending the target threatening, controlling, or lewd messages or emails
 Making a fake social media profile to follow the victim
 Gaining access to the victim’s online accounts
 Posting or disseminating real or fictitious photos of the victim
 Attempting to obtain explicit photographs of the victim
 Tracking the victim’s online movements using tracking devices
 Mailing explicit photos of themselves to the victim on a regular basis, etc.
What is an attack vector?
An attack vector is a path or means by which an attacker or hacker can gain
access to a computer or network server in order to deliver a payload or
malicious outcome. Attack vectors enable hackers to exploit system
vulnerabilities, including the human element.

Common cyber attack vectors include viruses and malware, email


attachments, webpages, pop-up windows, instant messages (IMs), chatrooms
and deception. Except for deception, all of these methods involve
programming or, in a few cases, hardware. Deception is when a human
operator is fooled into removing or weakening system defenses.

To some extent, firewalls and antivirus software can block attack vectors. But
no protection method is totally attack-proof. A defense method can quickly
become obsolete, as hackers are constantly updating attack vectors and
seeking new ones in their quest to gain unauthorized access to computers
and servers.

The most common malicious payloads are viruses, which can function as their
own attack vectors, Trojan horses, worms and spyware. Third-party vendors
and service providers can also be considered attack vectors, as they are a risk
to an organization if they have access to its sensitive data.

You might also like