Chapter 1 DF
Chapter 1 DF
Introduction
1.8 Prevention of Cybercrime
1.9 Hacker
1.10 Crackers
1.11 Phreakers
To
1.12 Ethical Hacking Computer Crimes
1.13 Hacking & Ethical Hacking
1.14 Steps of Ethical Hacking
And
1.15 Tools for Ethical Hacking Ethical Hacking
1.16 What to Do if Been Hacked?
1.1 Cybercrime
1.2 Categories of Cybercrimes Introduction to Cybercrime
1.3 Types of Cybercrimes
The term cybercrime refers to crimes
1.4 Internet Spawns Crime committed using computer.
1.5 Worms Versus Viruses
Traditionally, cybercrime
1.6 Computer’s Role in Crimes refers to the crime involving computer
1.7 Cybercrime Statistics and computer network.
1.6 Computer’s Role in Crimes b. Google Dorks : While investigating people or companies, a lot of IT security
1.7 Cybercrime Statistics newbies forget the importance of using traditional search engines for recon and intel
gathering. In this case, Google Dorks can be your best friend.
1.8 Prevention of Cybercrime
1.9 Hacker c. Maltego : It is a tremendous tool to trace down footprints of any target you
wish to match.
1.10 Crackers
1.11 Phreakers
2. Scanning Tools :
1.12 Ethical Hacking a. Nexpose : Nexpose vulnerability scanner, developed by Rapid7, which is an
1.13 Hacking & Ethical Hacking open-source tool is developed by Rapid7
isand is used to scan the vulnerabilities and performs various network checks
1.14 Steps of Ethical Hacking
b. Wireshark : Wireshark is the world’s leading and extensively used network
1.15 Tools for Ethical Hacking protocol analyzer.
1.16 What to Do if Been c. Nessus : Wireshark is the world’s leading and extensively used network
protocol analyzer.
1.1 Cybercrime
1.2 Categories of Cybercrimes
1.3 Types of Cybercrimes What to do if Been Hacked ?
1.4 Internet Spawns Crime
1.5 Worms Versus Viruses
1. Cut-off your internet connection: If you think that you simply are
1.6 Computer’s Role in Crimes being hacked, the primary factor to try to do is to cut-off internet from your
1.7 Cybercrime Statistics system so as to prevent any more intrusion.
1.8 Prevention of Cybercrime
2. Turn on firewall: Typically, we have a tendency to close up windows
1.9 Hacker
firewall so as to put in some package. From a security purpose of read ,
1.10 Crackers forever we must always activate firewalls. Hardware firewall is another
1.11 Phreakers smart choice to install. It acts as an associate isolator between external
1.12 Ethical Hacking network and your internal systems.
1.13 Hacking & Ethical Hacking
3. Contact your internet service supplier: It’s a decent apply to contact
1.14 Steps of Ethical Hacking
your ISP within the case of hacking as a result of they need their own
1.15 Tools for Ethical Hacking policy and pointers for any malicious intrusion.
1.16 What to Do if Been
DR. NILAKSHI JAIN
Email ID : • Thank you
[email protected]