Introduction to Cyber Security



Yüklə 1,12 Mb.
səhifə1/72
tarix07.01.2024
ölçüsü1,12 Mb.
#210959
  1   2   3   4   5   6   7   8   9   ...   72
Introduction-cyber-security





Introduction to Cyber Security (FCS)




Uttarakhand Open University, Haldwani- 263139

Toll Free Number: 18001804025 Email: info@uou.ac.in http://uou.ac.in

Title

Introduction to Cyber Security

Author

Dr. Jeetendra Pande, Assistant Professor-
School of CS & IT, Uttarakhand Open University, Haldwani

ISBN: 978-93-84813-96-3

Uttarakhand Open University, 2017

© Uttarakhand Open University, 2017. This work by Uttarakhand Open University is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. It is attributed to the sources marked in the References, Article Sources and Contributors section.

Published By: Uttarakhand Open University



Index

    1. INTRODUCTION 8

      1. History of Internet 8

        1. Internet Addresses 10

        2. DNS 12

        3. Internet Infrastructure 13

        4. World Wide Web 14

    2. INTRODUCTION TO CYBER CRIME 15

      1. Classification of Cyber Crimes 16

      2. Reasons for Commission of Cyber Crimes 18

    3. MALWARE AND ITS TYPE 19

      1. ADWARE 19

      2. SPYWARE 19

      3. Browser hijacking software 19

      4. VIRUS 19

      5. WORMS 20

      6. Trojan Horse 20

      7. Scareware 21

    4. KINDS OF CYBER CRIME 21

      1. Cyber Stalking 21

      2. Child Pornography 22

      3. Forgery and Counterfeiting 22

      4. Software Piracy and Crime related to IPRs 22

      5. Cyber Terrorism 22

      6. Phishing 22

      7. Computer Vandalism 22

      8. Computer Hacking 22

      9. Creating and distributing viruses over internet 23

      10. SPAMMING 23

      11. Cross Site Scripting 23

      12. Online Auction Fraud 24

      13. Cyber Squatting 24

      14. Logic Bombs 24

      15. Web Jacking 24

      16. Internet Time Thefts 24

      17. Denial of Service Attack 24

      18. Salami Attack 24

      19. Data Diddling 25

      20. Email Spoofing 25

    1. AUTHENTICATION 26

    2. ENCRYPTION 27

    3. DIGITAL SIGNATURES 28

    4. ANTIVIRUS 29

    5. FIREWALL 30

    6. STEGANOGRAPHY 31

    1. COMPUTER FORENSICS 33

    2. WHY SHOULD WE REPORT CYBER CRIME? 36

    1. INTRODUCTION 40

    2. SOME RECENT CYBER CRIME INCIDENTS 40

    1. INTRODUCTION 47

    2. COUNTER CYBER SECURITY INTIATIVES IN INDIA 47

    1. GENERATING SECURE PASSWORD 52

      1. Guideline for setting secure Password 52

    2. USING PASSWORD MANAGER 55

      1. What is a password manager? 56

      2. Why you should use it? 56

      3. How does it work? 56

      4. Some popular Password managers 56

    3. ENABLING TWO-STEP VERIFICATION 62

    4. SECURING COMPUTER USING FREE ANTIVIRUS 72

    1. CONFIGURING FIREWALL ON MAC COMPUTER 75

      1. Turning on and Configuring the Mac OS X Firewall 75

    2. WORKING WITH WINDOWS FIREWALL IN WINDOWS 78

      1. Firewall in Windows 7 78

      2. Configuring Windows Firewall 79

      3. How to Start & Use the Windows Firewall with Advanced Security 83

        1. How to Access the Windows Firewall with Advanced Security 83

        2. What Are The Inbound & Outbound Rules? 84

        3. What Are The Connection Security Rules? 86

        4. What Does the Windows Firewall with Advanced Security Monitor? 87

    1. FINDING THE BEST BROWSER ACCORDING TO THE USERS REQUIREMENT 89

    1. SAFE BROWSING 94

      1. How do I know if a website is secure? 94

    2. TIPS FOR BUYING ONLINE 95

    3. CLEARING CACHE FOR BROWSERS 96

      1. Clearing cache for Chrome Browsers above version 10 96

      2. Clearing cache for Chrome Browsers from version 1 to 9 99

      3. Clearing cache for Safari for iOS, iPhone and iPad 102

      4. Clearing cache for Safari for Mac OS x 103

      5. Clearing cache for Safari for windows 104

      6. Clearing cache for Internet explorer 9, 10 and 11 106

      7. Clearing cache for Internet explorer 8 108

      8. Clearing cache for Firefox 111

      9. Clearing cache for Firefox 33 112

      10. Clearing cache for opera 114

      11. Clearing cache for Ccleaner 115

    1. WHAT IS WIRELESS LAN? 117

    2. MAJOR ISSUES WITH WLAN 118

      1. SECURE WLAN 118

      2. WI-FI AT HOME 118

    1. SAFE BROWSING GUIDELINES FOR SOCIAL NETWORKING SITES 123

      1. General Tips on using Social Networking platforms safely 124

      2. Posting Personal Details 125

      3. Friends, Followers and Contacts 125

      4. Status Updates 126

      5. Sharing Online Content 126

      6. Revealing your Location 126

      7. Sharing Videos and Photos 127

      8. Instant Chats 127

      9. Joining and Creating Groups, Events and Communities 127

    2. EMAIL SECURITY TIPS 128

    1. INTRODUCTION 130

    2. SMARTPHONE SECURITY GUIDELINES 131

      1. Purses, Wallets, Smartphones 131

      2. Platforms, Setup and Installation 132

        1. Platforms and Operating Systems 132

        2. Feature Phones 132

        3. Branded and locked smartphones 133

        4. General Setup 133

        5. Installing and updating applications 133

      3. Communicating Securely(Through Voice and Messages) with a Smartphone 134

        1. Secure Voice Communication 134

        2. Sending Messages Securely 137

        3. Storing Information on your Smartphone 138

        4. Sending Email from your Smartphone 139

        5. Capturing Media with your Smartphone 139

        6. Accessing the Internet Securely from your Smartphone 140

        7. Advanced Smart Phone Security 141

References 144

INTRODUCTION TO CYBER SPACE




    1. INTRODUCTION


Internet is among the most important inventions of the 21st century which have affected our life. Today internet have crosses every barrier and have changed the way we use to talk, play games, work, shop, make friends, listen music, see movies, order food, pay bill, greet your friend on his birthday/ anniversary, etc. You name it, and we have an app in place for that. It has facilitated our life by making it comfortable. Gone are the days when we have to stand in a long queue for paying our telephone and electricity bills. Now we can pay it at a click of a button from our home or office. The technology have reached to an extent that we don‟t even require a computer for using internet. Now we have internet enabled smartphone, palmtops, etc. through which we can remain connected to our friends, family and office 24x7. Not only internet has simplified our life but also it has brought many things within the reach of the middle class by making them cost effective. It was not long back, while making an ISD or even a STD call, the eyes were stricken on the pulse meter. The calls were very costly. ISD and STD were used to pass on urgent messages only and the rest of the routine communication was done using letters since it was a relatively very cheap. Now internet have made it possible to not only talk but use video conference using popular applications like skype, gtalk etc. at a very low price to a level where a one hour video chat using internet is cheaper that the cost of sending a one page document from Delhi to Bangalore using speed- post or courier service. Not only this, internet has changed the use of the typical devices that were used by us. Television can be used not only for watching popular tv shows and movies but can be used for calling/ video chatting with friend using internet. Mobile phone is not only used for making a call but viewing a latest movie. We can remain connected to everyone, no matter what our location is. Working parents from office can keep eye on their children at home and help them in their homework. A businessman can keep eye on his staff, office, shop, etc with a click of a button. It has facilitated our life in more than one way. Have you ever wondered from where this internet came? Let us discuss the brief history of internet and learn how this internet was invented and how it evolved to an extent that now we cannot think of our lives without it.

      1. Yüklə 1,12 Mb.

        Dostları ilə paylaş:
  1   2   3   4   5   6   7   8   9   ...   72




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin