Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary Introduction to basics of Cyber security: Crimes and Types

Beoordeling
-
Verkocht
-
Pagina's
11
Geüpload op
30-01-2024
Geschreven in
2023/2024

Cybercrime: Definition and Origins of the Word, Cybercrime and Information Security, Who are Cybercriminals? Classifications of Cybercrimes, An Indian Perspective, Hacking and Indian Laws., Global Perspectives

Instelling
Vak

Voorbeeld van de inhoud

M2: Cyber Offenses BETCK105I Dr. Srilakshmi Prabhu



Module 2 – Cyber Offenses

1. Definition of terminologies: (a) Hacker (b) Brute Force Hacking (c)
Cracker (d) Cracker tools (e) Phreaking (f) War dialer (g) Spamdexing.
Hacker: A hacker is person with strong interest in computers who enjoys learning and
experimenting with them. He/She is very talented, smart people who understand computer
better than the others.
Brute Force Hacking: It is a technique used to find passwords or encryption keys. It
involves trying every possible combination of letters, number, etc, until the code is broken.
Cracker: A Cracker is a person who breaks into computers. Crackers should not be
confused with hackers the term "cracker” is usually connected to computer criminals.
Crimes conducted by crackers are vandalism, theft and snooping in unauthorized areas.
Cracking: It's the act of breaking into computers. Cracking is a popular growing subject on
the internet. There are websites supplying crackers with programs that allows them to crack
computers (like guessing passwords); they used to break phone line (phreaking). These files
display warnings such as "These files are illegal; we are not responsible for what you do
with them”
Cracker tools: These are programs that’ break into computer. These are widely distributed
on the internet. Like password crackers, Trojans, Viruses, war dialers and worms.
Phreaking: This is notorious art of breaking into phone or other communication systems.
War dialer: It is program that automatically dials phone numbers looking for computers on
the other end. It catalogs numbers so that the hackers can call back and try to break in.
Spamdexing: Search engine spam or Spamdexing is an attempt to manipulate search engine
rankings and generate traffic using repeated unrelated phrases, spammy links, spammy
keywords, spammy post & pages, etc by cyber criminals.
2. Differences between passive and active attacks provide tools as example.

Active attacks Passive attacks
Basic Type of attack in which the Type of attack where the attacker
attacker tries to modify tries to read/monitor or make use of
information or disrupt the system information from the system without
or network’s functioning by modifying any information
injecting malicious traffic or

, M2: Cyber Offenses BETCK105I Dr. Srilakshmi Prabhu


executing unauthorized
commands
Intent Compromise in data integrity, Gaining unauthorized access to
reduce the availability of system sensitive or confidential data or
resources, financial loss for the information without being detected
targeted organization
Mode of contact Attacker directly communicates Attacker is in indirect contact with
with the target system or network the target system or network
Modification in Occurs Doesn’t take place
information/data
Harm to system Always causes damage to system Doest not cause any harm
or network
Search for Does not check for loopholes or It scans the port and network in
loopholes and vulnerabilities search for loop holes and
vulnerabilities vulnerabilities
Threat to It is a threat to the integrity and It is a threat to data confidentiality
availability of the data
Attack Victim is aware of the attack Victim is unaware of the attack
awareness
Task performed Accomplished by gaining the Attacker just needs to observe the
by the attacker physical control over the transmission
communication link to capture and
insert transmission
Examples Masquerade attack, Replay attack, Release of message content, Traffic
Denial of Service, Session analysis, network mapping, sniffing,
hijacking dumpster diving

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
30 januari 2024
Aantal pagina's
11
Geschreven in
2023/2024
Type
SAMENVATTING

Onderwerpen

$11.69
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
srilakshmiprabhuphyresearch

Maak kennis met de verkoper

Seller avatar
srilakshmiprabhuphyresearch CIT-NC
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
4
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen