CYBER CRIME AND CYBER SECURITY

CYBER CRIME AND CYBER SECURITY

Today internet computer smartphones and other communication technology devices have become an integral part of our life. imagine how much time we spend each day on the smart devices we have made internet communication mediums like Google emails, Whats App,Twitter, Facebook etc., Part and parcel of our everyday activities. But most of us are unaware of Cyber safety and cyber security essential to safeguard ourselves.

CYBER CRIME AND CYBER SECURITY

CYBER CRIME AND CYBER SECURITY

Note do you know that whatever information or personal details are shared on internet stay online forever as it is extremely difficult to delete the information completely.

What are Cyber Crimes

Cyber crimes are offences that may be committed against individuals, companies or institutions by using computers, internet or mobile technology. cyber criminals use platforms as such as social networking sites, emails,chat rooms, pirated software, websites etc to attack victims. Children are also vulnerable to various types of Cyber crimes.

cyber attack are becoming more complex and sophisticated and are increasingly targeted on stealing the personal information such as phone number at this photographs bank detail etc. the personal information can be used by cyber criminals against you in different ways like creating your fake profile cyber bullying etc.

Common ways used by Cyber Criminals

  • [tab]
    • Malware
      • Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission.
    • How malware works
      • Malware authors use a variety of physical and virtual means to spread malware that infect devices and networks. For example, malicious programs can be delivered to a system with a USB drive or can spread over the internet through drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge. Phishing attacks are another common type of malware delivery where emails disguised as legitimate messages contain malicious links or attachments that can deliver the malware executable to unsuspecting users. Sophisticated malware attacks often feature the use of a command-and-control server that allows threat actors to communicate with the infected systems, ex-filtrate sensitive data and even remotely control the compromised device or server.

Common types of malware

Types of malware
[next]
Different types of malware contain unique traits and characteristics. Types of malware include:
  • [vtab]
    • Virus
      • A virus is the most common type of malware which can execute itself and spread by infecting other programs or files.
    • Worm
      • A worm can self-replicate without a host program and typically spreads without any human interaction or directives from the malware authors.
    • Trojan horse
      • A Trojan horse is designed to appear as a legitimate program in order to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.
    • Spyware 
      • Spyware is made to collect information and data on the device user and observe their activity without their knowledge.
    • Ransomware
      •  Ransomware is designed to infect a user's system and encrypt the data. Cyber criminals then demand a ransom payment from the victim in exchange for decryption of the system's data.
    • Rootkit
      • A rootkit is created to obtain administrator-level access to the victim's system. Once installed, the program gives threat actors root or privileged access to the system.
    • Backdoor virus
      • A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an infected system that allows threat actors to remotely access it without alerting the user or the system's security programs.
    • Adware
      • Adware is used to track a user’s browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase. For example, an advertiser might use cookies to track the web pages a user visits to better target advertising.
    • Key loggers
      • Key loggers is also called system monitors, are used to see nearly everything a user does on their computer. This includes emails, opened web-pages, programs and keystrokes.

  • [message]
    • Malware
      • Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file.


  • [message]
    • Phishing
      • Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user.

CYBER CRIME AND CYBER SECURITY

  • [message]
    • Internet scams
      • Internet scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more.

  • [message]
    • Personal safety
      • The growth of the internet gave rise to many important services accessible to anyone with a connection. One of these important services is digital communication. While this service allowed communication with others through the internet, this also allowed the communication with malicious users. While malicious users often use the internet for personal gain, this may not be limited to financial/material gain. This is especially a concern to parents and children, as children are often targets of these malicious users. Common threats to personal safety include: phishing, internet scams, malware, cyberstalking,  cyberbullying,  online preditions.

  • [message]
    • Cyber stalking
      • Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment.


  • [message]
    • Cyberbullying
      • Cyber bullying is the attack upon an individual or group through the use of electronic means such as instant messaging, social media, e-mail and other forms of online communication with the intent to abuse, intimidate, or overpower.

Internet safety or online safety

  • [message]
    • Internet safety##check##
      • Internet safety or online safety is trying to be safe on the internet and is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.
    • Personal safety##check##
      • Sensitive information such as personal information and identity, passwords are often associated with personal property (for example, bank accounts) and privacy and may present security concerns if leaked. Unauthorized access and usage of private information may result in consequence such as identity theft, as well as theft of property.

COMMENTS

BLOGGER: 9
  1. This comment has been removed by the author.

    ReplyDelete
  2. I found one successful example of this truth through this blog. I am going to use such information now.
      Best Tech Blogs

    ReplyDelete
  3. I love reading to improve my knowledge and this kind of blogs helps me to do so, Thanks.If you need accountants In delhi
    leading audit firms delhi
    big audit firms delhi
    please click on it.

    ReplyDelete
  4. Nice post! This is a very nice blog that I will definitively come back to more times this year! Thanks for informative post. Phishing Testing

    ReplyDelete
  5. I Like to add one more important thing here, Digital Signature Market by Solution (Software and Hardware), Service, Deployment Mode, Application (BFSI, Government & Defense, Legal, Real Estate, HR, Manufacturing & Engineering, Healthcare & Life Sciences), and Region - Global Forecast to 2021-2026- Executive Data Report

    ReplyDelete
  6. Thanks for the nice video. It was very useful for me. We are one of the best Digital Signature Agency in Delhi

    ReplyDelete
  7. This article is very nice. I got information to improve my blog traffic. Thank you very much
    Digital Signature Certificate

    ReplyDelete
  8. very nice blog post , thank you for sharing great experience

    To learn more PDF Signer Software

    ReplyDelete

Name

AUDIO VISUAL COMMUNICATION,1,basics of computer,1,ChatGPT,1,ChatGpt and ICT,1,computer,1,COMPUTER OBJECTIVE QUESTIONS,4,Create HTML Page,1,CYBER CRIME,2,CYBER SECURITY,3,Data Authenticity,1,Data Security,1,DIGITAL RUPEE,1,Digital Signature,1,EXCEL,1,EXCEL XLOOKUP,1,full form of ict,1,GPT,1,ICT,3,ICT CLASSROOM,1,ICT Classroom benefits,1,ICT Classroom policies,1,ICT Classroom Teaching,1,ict curriculum,1,ict full form,1,ICT IN EDUCATION,1,ICT tools,1,INPUT DEVICE,1,Internet,2,INTERNET AND ICT ENVIRONMENT,1,internet safety,1,internet working,1,KEYBOARD,1,KYAN COMPUTER,1,LOGO COMMANDS,1,LOGO EXAMPLE,1,LOGO TUTORIALS,1,MALWARE,1,Meaning of ICT Classroom,1,MIND MAP,1,MOUSE,1,MS-EXCEL,1,MS-PowerPoint,1,MSW Logo,1,Open AI,1,OPEN SHOT VIDEO EDITOR,1,OUTPUT DEVICE,1,parts of computer,1,PowerPoint,1,SCANNER,1,Slideshow,1,social media safety,1,Turtle Art,1,turtle art examples,1,turtle art PDF tutorials,1,VUE,1,what is ict in education,1,
ltr
item
ICT eduworld | ICT IN EDUCATION | ICT TOOLS | ICT SKILLS: CYBER CRIME AND CYBER SECURITY
CYBER CRIME AND CYBER SECURITY
CYBER CRIME AND CYBER SECURITY
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguOjHZkMbGgFdnKVKWP8EH8iKVd2WbEY2ernZGQlJGMNtTqLJgaHo5ntWBFhA7_Ozv7Ni024GMgTmIev6OdsrUd6uy7Z10S2i1AQgrBqMFIF65RMakkW-lIqyWIQd6qxvyuu7IXn_94HXY/s640/cybercrime.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguOjHZkMbGgFdnKVKWP8EH8iKVd2WbEY2ernZGQlJGMNtTqLJgaHo5ntWBFhA7_Ozv7Ni024GMgTmIev6OdsrUd6uy7Z10S2i1AQgrBqMFIF65RMakkW-lIqyWIQd6qxvyuu7IXn_94HXY/s72-c/cybercrime.jpg
ICT eduworld | ICT IN EDUCATION | ICT TOOLS | ICT SKILLS
https://icteduworld.blogspot.com/2019/01/internet-safety.html
https://icteduworld.blogspot.com/
https://icteduworld.blogspot.com/
https://icteduworld.blogspot.com/2019/01/internet-safety.html
true
4515903466503800059
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content