0% found this document useful (0 votes)
6 views2 pages

Computer Maintenance: Cyber Crime

The document outlines two types of computer maintenance: preventive and corrective measures. It provides instructions on how to install and uninstall software, as well as a list of five types of cyber crimes, including hacking, brute force attacks, data interception, DDoS attacks, and malware. Additionally, it briefly mentions the roles of white hat and black hat hackers.

Uploaded by

wahabub1975
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views2 pages

Computer Maintenance: Cyber Crime

The document outlines two types of computer maintenance: preventive and corrective measures. It provides instructions on how to install and uninstall software, as well as a list of five types of cyber crimes, including hacking, brute force attacks, data interception, DDoS attacks, and malware. Additionally, it briefly mentions the roles of white hat and black hat hackers.

Uploaded by

wahabub1975
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

wahabub1975@gmail.

com

CHAPTER 2

Computer Maintenance
There are two types of Computer Maintenance:

●​ Preventive Measures: It means taking precautions before the problem


arises.
●​ Corrective Measures: It means taking steps for recovering the system
after it's affected.

How to Install Software


●​ Checking whether the hardware is compatible with the desired software.
●​ To check if there is anything important in “Read Me” files.
●​ To check if any program is opened while setuping the software on your pc.
●​ Check if any antivirus is disabled and if it is asking for administrator
permission.

How to Uninstall Software


●​ First open the Control Panel and double click “Add or Remove” or
“Uninstall a Program”.
●​ Then search the program and uninstall it.

Cyber Crime
A list of 5 types of cyber crimes.

●​ Hacking: Normally if anyone accesses any desired site or computer network


without the permission of the owner and takes all controls of it, then
it's called hacking.

There are 2 types of hackers: White Hat Hackers are the ones considered formal
hackers who abide by laws. They mainly check the security of a site or network.

But Black Hat Hackers are the opposite of them and cause many frauds, scams and
hack others' devices in order to get their desired goals. They are more likely
known as Crackers.

●​ Brute Force Attack: Just as a thief in real life uses different keys to
enter a locked room and try to unlock it, digital criminals use others.
To illegally access peo-ples accounts such as bank, social media, and
email accounts, and in many cases even digital devices. And try to make
assumptions about them one by one. Sometimes, they are successful, and if
successful, they steal various personal information of the person. This
is called Brute force attack.

It is a method in which an attacker systematically tries all possible


combinations of passwords or encryption keys to gain unauthorized access to a
system. It relies on trial and error, using automated tools to find each option
correctly and keep trying until it succeeds. This can be effective if there are
no security measures such as strong passwords or other measures to prevent
this.

●​ Data Interception: When we communicate to someone through the internet,


someone between the receiver and sender can intercept it. This crime is
called data interception.

End-to-end encryption, commonly used in software or apps, ensures that data


(such as messages, images, videos, voice call records, and documents) cannot be
intercepted or stolen by third parties. Encryption is the process of encoding
information to prevent unauthorized individuals from reading or understanding
it. As a result, the data becomes unreadable to anyone without proper
authoriza-tion. Confidential information transmitted over public networks is
typically encrypted with a unique code to safeguard its privacy and security.

●​ DDOS Attack: Distributed Denial of Service or DDoS Attack is an attack


formation where many devices are redirected to one desired target and
weaken its server and ultimately crashes it.

In a DDOS attack, multiple computers or devices flood a website or online


service with traffic, slowing it down or causing it to crash. The attack aims
to impersonate the system so genuine users cannot access or use it.

●​ Malware:

Company Name, Location — Job Title


MONTH 20XX - MONTH 20XX

●​ Lorem ipsum dolor sit amet, consectetur adipiscing elit.


●​ Aenean ac interdum nisi. Sed in consequat mi.
●​ Sed pulvinar lacinia felis eu finibus.

EDUCATION

School Name, Location — Degree


MONTH 20XX - MONTH 20XX, LOCATION

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh
euismod tincidunt ut laoreet dolore.

AWARDS
Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Aenean ac interdum nisi.

You might also like