Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Cyber security

Rating
-
Sold
-
Pages
10
Uploaded on
27-01-2025
Written in
2024/2025

Notes about cyber security

Institution
Course

Content preview

UNIT -2

INTRODUCTION TO CYBER CRIME AND NETWORK ATTACKS

Cyber Security


What is Cyber Crime-
Cybercrime or a computer-oriented crime is a crime that includes a computer and a network. The
computer may have been used in the execution of a crime or it may be the target. Cybercrime is
the use of a computer as a weapon for committing crimes such as committing fraud, identity theft,
or breaching privacy. Cybercrime, especially through the Internet, has grown in importance as the
computer has become central to every field like commerce, entertainment, and government.
Cybercrime may endanger a person or a nation’s security and financial health.
(OR)
Cybercrime is defined as a crime where a computer is the object of the crime or is used as a tool to
commit an offense. A cybercriminal may use a device to access a user’s personal
information, confidential business information, or government information, or disable a device. It is
also a cybercrime to sell or elicit the above information online.

Cybercrime encloses a wide range of activities, but these can generally be divided
into two categories:
• Crimes that aim at computer networks or devices. These types of crimes involve
different threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.
• Crimes that use computer networks to commit other criminal activities. These types of
crimes include cyber stalking, financial fraud or identity theft.
Disadvantages of cybercrime-
• lost money due to online theft.
• expenses incurred to fix problems and prevent future cybercrimes.
• loss of reputation due to personal information that is revealed.
• corrupted files due to virus
Key aspects and elements of cybercrime include:
• Digital Environment: Cybercrime takes place in the digital realm, which includes
computers, networks, servers, mobile devices, and the internet. Criminals leverage
these technologies to commit various illicit activities.
• Global Reach: One of the defining features of cybercrime is its borderless nature.
Cybercriminals can operate from anywhere in the world and target victims across
geographic boundaries.
• Victims: Cybercrime can target individuals, businesses, governments, and critical
infrastructure. Anyone with an online presence can potentially become a victim of
cybercrime.
• Consequences: The consequences of cybercrime can be severe and wide-ranging.
Victims may suffer financial losses, reputational damage, legal ramifications, and
emotional distress. In some cases, cyber-attacks can lead to national security threats
and economic disruptions.

, • Legal Framework: Governments around the world have enacted laws and
regulations to combat cybercrime. These laws define cybercrimes, prescribe
penalties for offenders, and empower law enforcement agencies to investigate and
prosecute cybercriminals.

Prevention of Cyber Crime:
Below are some points by means of which we can prevent cyber crime:
• Use strong password –
Maintain different password and username combinations for each account and
resist the temptation to write them down. Weak passwords can be easily
cracked using certain attacking methods like Brute force attack, Rainbow table
attack etc, So make them complex. That means combination of letters, numbers
and special characters.

• Use trusted antivirus in devices -
Always use trustworthy and highly advanced antivirus software in mobile and
personal computers. This leads to the prevention of different virus attack
devices.

• Keep social media private –
Always keep your social media accounts data privacy only to your friends. Also
make sure only to make friends who are known to you.

• Keep your device software updated –
Whenever you get the updates of the system software update it at the same
time because sometimes the previous version can be easily attacked.
• Use secure network –
Public Wi-Fi are vulnerable. Avoid conducting financial or corporate transactions
on these networks.

• Never open attachments in spam emails –
A computer get infected by malware attacks and other forms of cybercrime is
via email attachments in spam emails. Never open an attachment from a sender
you do not know.

• Software should be updated –
Operating system should be updated regularly when it comes to internet
security. This can become a potential threat when cybercriminals exploit flaws in
the system.

Classification of Cybercrime –
It can be classified in to 4 major categories as
• Cyber-crime against Individual
• Cyber-crime Against Property
• Cyber-crime Against Organization

Written for

Institution
Course

Document information

Uploaded on
January 27, 2025
Number of pages
10
Written in
2024/2025
Type
Class notes
Professor(s)
Myself
Contains
Bca 1 semester

Subjects

$20.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
agarwalvansh616

Get to know the seller

Seller avatar
agarwalvansh616 Teerthanker mahaveer university
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 year
Number of followers
0
Documents
2
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions