0% found this document useful (0 votes)
7 views4 pages

Cyber Security

Uploaded by

sohampj6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views4 pages

Cyber Security

Uploaded by

sohampj6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

Cyber Crime:

1]Cybercrime is an illegal activity that uses computers or the internet.


2]It includes actions like hacking,stealing personal or financial information,and
spreading malware.
3]Cybercrime can target individuals,organizations,or governments for financial
gain.

Cyber Criminal:

1]Cybercriminals are individuals or groups of persons who engage in illegal


activities using computers,or the internet.
2]They commit crimes such as hacking,stealing data,spreading malware,or committing
online fraud.
3]These Criminals can target individuals,organizations,or governments for financial
gain or revenge.

Types:

1]Cybercriminals – Hungry for Recognition:


[1]These individuals commit cybercrimes to gain fame,often to prove their skills.
[2]They may hack websites or spread information to show off their abilities,seeking
public attention and recognition from peers.
[3]Example:IT Professionals.

2]Cybercriminals – Interested in Recognition:


[1]These individuals commit cybercrimes to build a reputation within hacker
communities.
[2]They prefer to gain respect or status among peers rather than seeking public
attention.

3]Cybercriminals –The Insiders:


[1]These are employees with authorized access to a company’s systems.
[2]They abuse their access for revenge,or financial benefit.

Cyber Security:

1]Cybersecurity protects computers,networks,and data from unauthorized access or


attacks.
2]It protects systems from viruses,malware,and cyberattacks.
3]Using strong passwords and security tools like firewalls helps in cybersecurity.
4]It ensures private information stays safe and accurate.
5]Cybersecurity is important for everyone to avoid cybercrimes.

Email Spoofing:

1]Email spoofing is when someone sends an email that looks like it’s from a trusted
source but is actually from a different sender.
2]The goal is often to trick you into believing the email is real.
3]This technique is used for phishing scams, spreading malware, or stealing
personal information.
4]Spoofed emails can appear from companies,friends,or other trusted entities,making
them seem more convincing.

Cyber Defamation:

1]Cyber defamation is when someone spreads false information online that damages
another person's reputation.
2]This can happen through social media,websites,or emails.
3]The goal is often to harm the person's image or credibility.
4]It can cause serious problems,like legal trouble and emotional pain.

Data Diddling:

1]Data diddling is when someone illegally changes or manipulates data.


2]This can involve altering,deleting,or spreading false information.
3]The goal is often to deceive or mislead others.
4]It can happen in databases,spreadsheets,or other data systems.

Salami Attack/Salami Technique:

1]Salami attack is when someone makes small,unnoticed changes or thefts repeatedly.


2]These small actions result in a larger impact.
3]The goal is to stay hidden by making each action too small to notice.
4]For example,stealing small amounts of money from many transactions or making
small changes to data.

Computer Sabotage:

1]Computer sabotage is when someone intentionally damages computer systems.


2]This can involve destroying data or causing system failures.
3]The aim is to harm the functionality or performance of the computer system.
4]It can affect individuals,businesses,or organizations,causing significant
problems and loss.

Threats:

1]Threats are potential dangers that can harm computer systems or data.
2]They include malware,viruses,Computer Worm,Denial Of Service,man in the middle
attacks.
3]Threats aim to steal or damage the information or the systems.

Forgery:

1]Forgery means when someone creates fake digital documents or data to deceive
others.
2]This can include fake emails,documents,or digital signatures.
3]The goal is often to trick people into believing the forgery is real.
4]It can lead to fraud,unauthorized access,or damage reputation.

Hacking:

1]Hacking is when someone illegally accesses computer systems or networks without


permission.
2]This can involve stealing data or accessing accounts.
3]Hackers often do this manipulate information for their own benefit.
4]It can lead to serious problems,like stole information or system damage.

Password sniffing:

1]Password sniffing is when someone secretly captures passwords from a network.


2]This often involves using special tools to monitor data as it travels over the
internet.
3]The goal is to steal passwords and gain unauthorized access to accounts or
systems.
4]It can lead to serious problems,like stole information or system damage.
Malicious Programs:

1]Malicious program is a type of software designed to harm or exploit computer


systems.
2]This includes viruses,worms,and spyware.
3]It can steal data,damage files,or disrupt system operations.
4]Malicious programs are often spread through downloads,emails,or websites.

Active Attack:

1]Active attack is when someone tries to directly change or disrupt a computer


system.
2]This can include altering data,injecting malware,or blocking access to services.
3]The goal is to cause immediate harm or gain unauthorized access.
4]For Example,A hacker sending a virus to your computer that destroys your files.

Passive Attack:

1]Passive attack is when someone secretly monitors or collects information from a


system without making changes.
2]The goal is to gather information without being detected.
3]This type of attack is often used to understand user behavior or collect
sensitive data.
4]For Example,someone secretly tracking your internet activity without changing
anything.

Hacker:

1]Hacker is a person who illegally accesses computer systems or networks.


2]They do this to steal data or gain unauthorized access.
3]Hackers use special tools and techniques to find weaknesses in systems.
4]Their actions can lead to security issues and loss of important information.

Botnet:

1]Botnet is a network of infected computers controlled by a hacker.


2]These computers called "bots" are used to perform tasks without their owners
knowing.
3]Botnets can send spam emails,spread malware,or launch attacks on websites.
4]They allow hackers to use many computers at once to cause damage or carry out
attacks.

Cyber Stalker:

1]Cyber stalkers are people who use the internet to repeatedly harass or threaten
others.
2]They might send unwanted messages, monitor online activities, or spread false
information.
3]Their goal is to control or cause fear in their victims.
4]Cyber stalking can involve social media,emails,and other online platforms.

Attack Vector:

1]Attack vector is the way hackers get into a computer system or network.
2]It’s the method they use to exploit weaknesses.
3]Examples include phishing emails,harmful websites.
4]Hackers use these methods to launch their attacks.
5]Understanding attack vectors helps you to protect your systems.
Anonymizer:

1]Anonymizer is a tool that hides your identity and online activities.


2]It makes it harder for websites and others to track who you are.
3]Anonymizers can hide your IP address and encrypt your data.
4]They are used to protect privacy and maintain anonymity while browsing the
internet.

Steganalysis:

1]Steganalysis is used to find hidden information in digital files like images or


audio.
2]It involves looking for signs of secret messages or data that are hidden.
3]The goal is to uncover any hidden content that was added without the user's
knowledge.
4]Steganalysis helps in security by identifying and revealing hidden threats or
unauthorized data.

Keyloggers:

1]Keyloggers are tools that track and record everything you type on a computer or
mobile device.
2]They capture information like passwords and personal details.
3]Keyloggers are often used by hackers to steal sensitive data.
4]Detecting and removing keyloggers is important for protecting your privacy and
security.

Rainbow Table:

1]Rainbow table is a precomputed list of encrypted passwords and their matching


plain text versions.
2]It helps hackers quickly find the original password by looking up encrypted
versions.
3]Rainbow tables are used to crack passwords faster than trying each possible
combination.
4]Using strong,unique passwords and adding extra security measures can help to
protect against rainbow table attacks.

You might also like