Welcome to 'featurecoding' computer and any job exam crack tutorial site. If you're new to computers or just want to update your skills, you've come to the right place. All the courses are aimed at complete beginners, so you don't need experience to get started.

Cyber crime

Cyber crime and security,introduction to cybercrime,computer criminals in information security,cyber vandalism,cyber crime security

The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. 


There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.


DEFINING CYBER CRIME 

 Crime committed using a computer and the internet to steal data or information. 

 Illegal imports. 

 Malicious programs.


HISTORY

 • The first recorded cyber crime took place in the year 1820.


CATEGORIZATION OF CYBER CRIME 

• The Computer as a Target 

• The computer as a weapon 


TYPES OF CYBER CRIME 

• Hacking 

• Denial of service attack 

• Virus Dissemination 

• Computer Vandalism 

• Cyber Terrorism 

• Software Piracy 


HACKING 

• Hacking in simple terms means an illegal intrusion into a computer system and/or network.


DENIAL OF SERVICE ATTACK

 • Act by the criminal, who floods the bandwidth of the victims network. 

• Is his e-mail box with spam mail depriving him of the services.


VIRUS DISSEMINATION 

• Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.) 


COMPUTER VANDALISM 

• Damaging or destroying data rather than stealing. 

• Transmitting virus 


CYBER TERRORISM 

• Use of Internet based attacks in terrorist activities. 

• Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt. 


SOFTWARE PIRACY 

• Theft of software through the illegal copying of genuine programs. 

• Distribution of products intended to pass for the original. 


TYPES OF CYBER ATTACK BY PERCENTAGE

 • Financial fraud: 11% 

• Sabotage of data/networks: 17% 

• Theft of proprietary information: 20% 

• System penetration from the outside: 25% 

• Denial of service: 27% 

• Unauthorized access by insiders: 71% 

• Employee abuse of internet privileges 79% 

• Viruses 85% 


Cyber security

The term cyber security is used to refer to the security offered through on-line services to protect your online information. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also.


Meaning of the Word CYBER

It is a combining form relating to information technology, the Internet, and virtual reality.


Need of cyber security 

Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.


Major security problems 

 • Virus 

 • Hacker 

 • Malware 

 • Trojan horses 

 • Password cracking


Viruses and Worms 

A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes. 


Solution 

Install a security suite that protects the computer against threats such as viruses and worms. Hackers In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.


Hackers 

In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.



Types of Hackers 

White Hat Hacker 

Grey Hat Hacker 

Black Hat Hacker




How To prevent hacking 

It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.


Malware 

The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.

To Stop Malware 

Download an anti-malware program that also helps prevent infections. Activate Network Threat Protection, Firewall, Antivirus.



Trojan Horses 

Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers.


How to Avoid Trojans 

Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.


Password Cracking 

Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.


Securing Password 

Use always Strong password. Never use same password for two different sites.


SAFETY TIPS FOR CYBER CRIME 

• Use antivirus software’s. 

• Insert firewalls. 

• Uninstall unnecessary software 

• Maintain backup. 

• Check security settings. 

• Stay anonymous - choose a genderless screen name. 

• Never give your full name or address to strangers. 

• Learn more about Internet privacy.

Computer Trick Videos

Random Posts

Translate

Contact Form

Name

Email *

Message *