Cyber Security
Cyber Security
Cyber Criminal:
Types:
Cyber Security:
Email Spoofing:
1]Email spoofing is when someone sends an email that looks like it’s from a trusted
source but is actually from a different sender.
2]The goal is often to trick you into believing the email is real.
3]This technique is used for phishing scams, spreading malware, or stealing
personal information.
4]Spoofed emails can appear from companies,friends,or other trusted entities,making
them seem more convincing.
Cyber Defamation:
1]Cyber defamation is when someone spreads false information online that damages
another person's reputation.
2]This can happen through social media,websites,or emails.
3]The goal is often to harm the person's image or credibility.
4]It can cause serious problems,like legal trouble and emotional pain.
Data Diddling:
Computer Sabotage:
Threats:
1]Threats are potential dangers that can harm computer systems or data.
2]They include malware,viruses,Computer Worm,Denial Of Service,man in the middle
attacks.
3]Threats aim to steal or damage the information or the systems.
Forgery:
1]Forgery means when someone creates fake digital documents or data to deceive
others.
2]This can include fake emails,documents,or digital signatures.
3]The goal is often to trick people into believing the forgery is real.
4]It can lead to fraud,unauthorized access,or damage reputation.
Hacking:
Password sniffing:
Active Attack:
Passive Attack:
Hacker:
Botnet:
Cyber Stalker:
1]Cyber stalkers are people who use the internet to repeatedly harass or threaten
others.
2]They might send unwanted messages, monitor online activities, or spread false
information.
3]Their goal is to control or cause fear in their victims.
4]Cyber stalking can involve social media,emails,and other online platforms.
Attack Vector:
1]Attack vector is the way hackers get into a computer system or network.
2]It’s the method they use to exploit weaknesses.
3]Examples include phishing emails,harmful websites.
4]Hackers use these methods to launch their attacks.
5]Understanding attack vectors helps you to protect your systems.
Anonymizer:
Steganalysis:
Keyloggers:
1]Keyloggers are tools that track and record everything you type on a computer or
mobile device.
2]They capture information like passwords and personal details.
3]Keyloggers are often used by hackers to steal sensitive data.
4]Detecting and removing keyloggers is important for protecting your privacy and
security.
Rainbow Table: