01-05 Pds Cyber Crime Its Types 3rd Gde
01-05 Pds Cyber Crime Its Types 3rd Gde
01-05 Pds Cyber Crime Its Types 3rd Gde
CYBER CRIME
AND
TYPES OF
CYBERCRIME
PERIOD-01
Cyber crime
Cybercrime is a crime that
involves a computer and a
network. The computer may have
been used in the commissioning
of a crime, or it may be the
target. Cybercrime may harm
someone's security and financial
health
Cybercrime can be defined as
“The illegal usage of any
communication device to commit
or facilitate in committing any
illegal act”.
In short – crime done on net
DATA SCALES IN UNIT
Abn Unit Value Size (in bytes)
B BIT 0 or 1 1/8 of a byte
B BYTES 8 bits 1 byte
KB KILOBYTES 1,000 bytes 1,000 bytes
MB MEGABYTE 1,000² bytes 1,000,000 bytes
GB GIGABYTE 1,000³ bytes 1,000,000,000 bytes
TB TERABYTE 1,000⁴ bytes 1,000,000,000,000 bytes
PB PETABYTE 1,000⁵ bytes 1,000,000,000,000,000 bytes
EB EXABYTE 1,000⁶ bytes 1,000,000,000,000,000,000 bytes
ZB ZETTABYTE 1,000⁷ bytes 1,000,000,000,000,000,000,000 bytes
7
YB YOTTABYTE 1,000⁸ bytes 1,000,000,000,000,000,000,000,000
DATA IN A DAY
500 million tweets are sent
294 billion emails are sent
4 petabytes of data created on
facebook
4 terabytes of data created from
each connected car
65 billion messages sent on
whatsapp
5 billion searches made
?
CYBER SECURITY
CYBER CRIME
AND
TYPES OF
CYBERCRIME
PERIOD-02
HACKING
• Illegal intrusion into a
computer system/ network
SCRIPT KIDDIE
Also known as a skid or skiddie
Unskilled hacker who breaks into computer systems by
using programs/ automated tools written by others
HACKERs
NEOPHYTE
Newbie, or "noob“
New to hacking
Has almost no knowledge or experience of the workings
of technology and hacking.
BLUE HAT
Someone outside computer security consulting firms
Used to bug-test a system prior to its launch
Look for exploits so they can be closed.
HACKTIVIST
A hacker who utilizes technology to publicize a social,
ideological, religious or political message.
?
CYBER SECURITY
CYBER CRIME
AND
TYPES OF
CYBERCRIME
PERIOD-03
Malware
Malware- malicious software e.g.
Computer viruses,
Worms,
Trojan horses,
Ransom ware,
Spyware,
Adware,
Scareware &
Other malicious programs.
Purpose---
Designed to infect computers and systems
Steal critical info
Delete applications, drives and files
Convert computers into an asset for an outsider or attacker
Monitoring your actions and keystrokes
Virus
Computer prgm
Requires a host prgm
When the prgm runs, the virus
is executed
When executed, it replicates
Modifies other prgms/ apps
Corrupts or modify files
VIRUS BEHAVIOUR
Dormant Phase:
The virus is idle.
INFECTION PHASE:
Execution phase:
Many viruses do unpleasant things such as
deleting files or changing random data on your disk,
simulating types or merely slowing your PC down;
Uncontrolled replication.
Harms to network by increasing
traffic.
Trojans
• Misled user of its true intent
• Backdoor unauthorized access
?
CYBER SECURITY
CYBER CRIME
AND
TYPES OF
CYBERCRIME
PERIOD-04
DOS Attack
A Denial-of-Service (DoS) attack is an attack meant to shut
down a machine or network, making it inaccessible to its
intended users.
DoS attacks accomplish this by flooding the target with
traffic, or sending it information that triggers a crash.
DDOS Attack
Distributed denial of service
(DDoS) attacks are a subclass
of denial of service (DoS)
attacks.
A DDoS attack involves
multiple connected online
devices, collectively known as
a botnet, which are used to
overwhelm a target website
with fake traffic.
Often go unnoticed.
?
CYBER SECURITY
CYBER CRIME
AND
TYPES OF
CYBERCRIME
PERIOD-05
PHISHING
Type of social engg.
Fraudulently obtaining sensitive
information
Most common attack
Email, sms, page hijacking etc
SNIFFERS
Tapping of phone.
Programs that
automatically detect
security weaknesses in
remote or local hosts.
SQL Injection
Code injection technique
Attack data-driven applications
Malicious SQL statements are
inserted into an entry field for
execution (e.g. to dump the
database contents to the attacker)
Exploit a security vulnerability in
an application's software
Attacker can execute malicious
SQL statements that control a web
application’s database server
Thank you
Cyber Security Is Everyone’s Responsibility