0% found this document useful (0 votes)
35 views8 pages

Cyber Security (Module 2)

The document discusses various cybersecurity threats and techniques, including phishing, port scanning, and online stalking. It emphasizes the importance of maintaining system access and protecting sensitive information from unauthorized access. Additionally, it outlines methods for identifying vulnerabilities and securing networks against potential attacks.

Uploaded by

anittadevadas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views8 pages

Cyber Security (Module 2)

The document discusses various cybersecurity threats and techniques, including phishing, port scanning, and online stalking. It emphasizes the importance of maintaining system access and protecting sensitive information from unauthorized access. Additionally, it outlines methods for identifying vulnerabilities and securing networks against potential attacks.

Uploaded by

anittadevadas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Medde-3

Cybar tanay
inin aJs plam n )

Haw mminals pn a fecs 7

ac Peopla who Comm

b r e y nh am pres
orms Vdnaríibs
eX
Vmse
nduee roj oms

DNS Ma Sawd
Sen Semd

Su h

nemel

Ppphn pp
Sand
D
Cvis Sero
Sav

me heds 4
Cnmin d s woe m

hair
Hs of
Vnnercb

en orqamizaim
ndiidael
am

aHal>

penesva
a c h v e am d

he twm)

achve atuc

mal ahm
Jan
atLS
7 mt
Do s i v e ha pk

Ketonnms9anCa
e Connstenn
O

wh
h a ome i n
ofn
plore,

T 9 m ebud

n
tomaabon ah
SHeybh otpinti
preatou phaobe
Poopin

Scannir Seminii heiad in fm ak m


Soua emnnaen

Tools wsed du r achva ataclS Co penSawtaSotm are

e Eumt
Aphon d
isens to al m wm

hetworu intertaca

pem-Souwe s ofoare )

MC aodre paus
PoB Pmed ecas

CLe m flich, Vom owo


Prool CeRP)
A dres leuda en
netore ho| h a r b r ad cosb
A2 pacab y
en

»
C©Pan-S a
Ye a s Tep) je mil P
4 nd e DP spasa

a
nahdo Cloca )
map

n di d P CpemSow
ma-swremant ool
badm pin
bvndwid H
n swn valnarw ha .
/Bg
Partmn
datla ai wband Dnsrecrds
Zon, x a t Conhgmhm
the dofa s o r a iv em
d tuol to detemi
DNStecar
DNS SaTN

Dhar toolS Dsni F, hbs mart, hindsMg, feir, ragrenk


rg tacebot map, pig, 4ttping t
Lh'sL, er
n chn
therd
comn i h tund Semhuizi

whle
e s t e p b exomi indallig
abw
He tarat
othe
inmm
ahum

objech va

Port scamning
to w h h
ntertae
m e Com paler
an
Port

o
d e n i Ce
Can Conne

Pno ools T P , vDP


6S3
C2-23 fr
Range o Hhgh addrs cal nlahnm)
binam

sdens open/elose porb and seni

o to le23)
well nwn poxk

Yesarad pors.

Prvate park
dmemic an d/er

Lcam p
Dasur ph
Pornmber

TCP Por serva MUX

CTCPMUX

CHo

FTP Deta
2
Sple Mo
sMTPC
2S ho tot )
n ster
H TT

fof
PoPS

SaL Sa a
8
S a t Sava

CeGf

s DHCP an4
9
DHCP Sevar

wnd ers and rdaled


NetworUSCamnin4
PCLd drases n d
a d h r h e Com pwhar hw ptoms
mah

2shn wealuned
S can wnderstun d e
Vu)nerab t
n ha áshm

he System Acces )
Mantaining
AHace CGainig

CYau
Hhe Passwee
)

2) Eplit
a
p vikge
ppfcahs
amds
mali cio com m
Kun he
3)
hhe
l
hde
4)
aceces s
S)Delete
he

edhnsqma to intlenca

Y pafom
to o btin ha in ommahin
daceive

8oma ncthm ond/oY


teluphm
municahn
wwes
eleem
angheer phnna)
eaad
C againsd
osomemir
hat is
Hem to
nteme to e e
Y)
Tho 6eeme prachus.

access
wnanhemzud

hve
infomahm
/
qainsengî tAmah o

wadnaubla
provtding
omaona

t ou
ss to hat inb m a h m .
acco
Classi Scahns

a n m am - bovs ad Sout angine aing

employ a valM
m rerson ohr m or

Ama
onesa (f e s m emplogee a
ros
ogm zahn
o d engineers a l a adra of h e f c k hak * >*
o
isans h onwm s
Peopla ore
oically halpfa), o

wher Hha Compatoy


to be los
eme whD p peons

Yoom 1S ocadrad pretan din o e eu emp)yaa or ValY

wer He
on
ram

posin a n impor taunt r

attacl a psetends ho be n mprdant

eEO Or high-len manoger % naa s imma

aSeisBana goan accesS ptan

wll not asu


ow-lew emp) nyea shlms

Amama whs appears obe a poshm

amthen

us in a hird p r

Calling technical pport

shaldar Sarhn

tedhniane of 9hennn ommauhun ud


nsumema pagsuords bywodhiag Dve a pevsans shaldar wh1

he she las inks Hre ystem

d wwwps ter dnvi


pical Norh m en can tem

vesh P infomahn

alo rafared t duuwmpstai


binnin shig /gerbing/go baga gaan i)
em o dasen be he a b v e h a b h .
ScaN am n other

tems ael
ih Uk-
ingSppi D)
Compe bosa Soui enineeing

L e E-madls

phshing
rasea persune 3msi hde homah
to

Scammin Passwods

m e atahmen h

mal aow de to c
vrcth m s s t e n

S, woms, VInus
wmm o me a

Pap- p windaws

Cybersl ki
a t or rocess f o Ilo wig preStenltniy

oYSo matti n
ina p pe ah Somebe d

Deinihum
amd
infom ah m
bean dlehined he se ot
+has
pohalar *e dntone
Commwnicah'ms
technouy,

ofindividuals o howass
b n n dividna ogonp
o niZahm
m oh e indivdua r o p of ndividuas,

His
behaniv helus Ale accuSahn S aniam
of threa, LD he FEdonage
to d Y

nsmissíun

eampment, Solici tohn


omihos Br
se xmad purposay

in m ahin SY h mmat Purpose


an d gahenna
Cber s)in
alehronic
Lntayw oHhar
the use of
retas

deuius to shalk ans Hher pas


Cmm wn Cahons

1) Online StulKes

PPIine s tulkers
22)

On line stalkers
he v Chm
wth
thter hm
Stnt he
Onm ternet
he
help of
with h a
direct

4 c h a t ooms)
CEmo

hird pard hanns


ne of o

St1Ker can ma Va
he vichm

OPine stal h e s

whngendind mehels

whne of Hhe vichm


wathing n e deuy
Ha

abrn
e
uiehm wnn
9her
inomahn
tarnat
Jntemnk h a
awse nat HL
Vichm is not
he hdim

perpemue
an attre dL ogaunst
o
lbea ueo

m ybars l Kina
Cas eYeportad

Kers one men


of Sybersal
Majom
are
Vichms
of
majom
ace a j b Y S FalKavs
wo men
Somaia)
o Stlking war l 7

worlUS în ha
followina we
ha Vichm
n a m ar peYSmad in om ahn ahm

n Amu, m i m b a c l o n d Cont detns

2) Estblishq aCon nechun wih h a vchm to hranran huras

E mai).
wih a vicRms thre h
-

3) Estblishing con tat


ir a

love atevs , threakaning , sexua e p l i u b , e

of w o r s
4) Repaakad E-mils oslng b r Vanew cnds
/
hrum ha Vichm.
Hhreatem

shore
S) ne Salor Vichm$ porcm marin un
Pos a
website b a oPPensive langn

foY daxadsorvis Yalah'on ships


ve
talephma
6 As king
Cellehoma
e sexmad neges t he vichm.
Hhrruyh
4) Sen ding Poxnoha phic an

mel.

You might also like