Introduction to Cyber Security



Yüklə 1,12 Mb.
səhifə9/72
tarix07.01.2024
ölçüsü1,12 Mb.
#210959
1   ...   5   6   7   8   9   10   11   12   ...   72
Introduction-cyber-security

Cyber Stalking


It is an act of stalking, harassing or threatening someone using Internet/computer as a medium. This is often done to defame a person and use email, social network, instant messenger, web-posting, etc. as a using Internet as a medium as it offers anonymity. The behaviour includes false accusations, threats, sexual exploitation to minors, monitoring, etc.


1 Image courtesy: https://www.flickr.com/photos/alamagordo/2372928527
      1. Child Pornography


It is an act of possessing image or video of a minor (under 18), engaged in sexual conduct.


      1. Forgery and Counterfeiting


It is a use of computer to forgery and counterfeiting is a document. With the advancement in the hardware and the software, it is possible to produce counterfeit which matches the original document to such an extent that it is not possible to judge the authenticity of the document without expert judgement.
      1. Software Piracy and Crime related to IPRs


Software piracy is an illegal reproduction and distribution for personal use or business. It comes under crime related to IPR infringement. Some of the other crimes under IPR infringement are: download of songs, downloading movies, etc.
      1. Cyber Terrorism


It is defined as the use of computer resources to intimidate or coerce government, the civilian population or any segment thereof in furtherance of political or social objectives.
      1. Phishing


It is a process of acquiring personal and sensitive information of an individual via email by disguising as a trustworthy entity in an electronic communication. The purpose of phishing is identity theft and the personal information like username, password, and credit card number etc. may be used to steal money from user account. If a telephone is used as a medium for identity theft, it is known as Vishing (voice phishing). Another form of phishing is Smishing, in which sms is used to lure customers.

      1. Yüklə 1,12 Mb.

        Dostları ilə paylaş:
1   ...   5   6   7   8   9   10   11   12   ...   72




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin