Defamation
v The
act of any intentional False communication that harms the reputation of an
individual business product, government or a nation is called defamation
v Defamation
is also known as calumny vilification or traducement
v Banking
and credit card related crime, E-Commerce and investment fraud online sale of
illegal articles, online gambling etc also come under cyber crime
Forgery
v Forgery
includes counterfeit currency notes postage and revenue stamps, mark sheets etc
can be forged using sophisticated computers printers and scanners
v Impersonization
of another person is also considered as forgery
Email bombing
v Repeatedly
sending an email message to particular address for abuses
v It
is a type of denial of service attack
v Unauthorised
use of internet hours paid for by another person is known as the theft of
Internet hours
Email spoofing
v Creation
of email messages with fake sender address to mislead the recipient
v In
other word email spoofing is a technique commonly used to hide the origin of an
email message
v Spamming
and phishing uses email spoofing
v Email
spoofing in India charges the offender for forgery under section IPC 463
Spamdexing
Spamdexing
or search engine spamming is the practice of deliberately and dishonestly
modifying HTML pages to increase the chance of them being placed close to the
beginning of the search engine result
Email spamming
v Use
of emails for sending unsolicited bulk emails and commercial messages over the
internet
Intellectual property
right
v Intellectual
property infringement is the violation of an intellectual property right
v Intellectual
property right violations include Trademark violations computer source code
test, pattern violation and software piracy
v Under
intellectual property law owners are
guaranteed certain exclusive rights to a variety of intangible assets such as
inventions, discoveries , artistic and musical works etc
Theme
of World intellectual property day (April
26) 2016 digital creativity culture reimagined
Theme
of World Intellectual Property day 2017 - innovation improving lives
Position
of India in intellectual property index 2017 - 43
Pornography
v Pornography
is the portrayal of sexual acts for the purpose of sexual excitement
v Persons
who intentionally Prey upon children are known as pedophiles
v Pedophiles
eams children’s especially teens trust and gradually seduced them in to sexual or indecent act
Cyber Stalking
v Practice
of using internet to harass or threaten someone
v This
can be avoided by not disclosing any personal information, avoid sending
photographs to strangers and chat friends, proper disconnection of Internet
after its use
v It
is also known as cyber bullying
Website defacement
v Website
defacement is an attack on a website that changes the visual appearance of the
site or a web page
v Hackers
may choose to deface a website for a number of reasons in many cases website
defacement is done purely for fun
Pharming
v Pharming
is a cyber attack which malicious code is installed on a personal computer or
server mis directing uses to fraudlent website without their knowledge or
consent
v Pharming
is also known as phishing without a Lure
v Pharming
can be conducted either by changing the host file on a victims computer or by
exploitation of a vulnerability in DNS server software
v A
particularly ominous pharming tactic is known as domain name system poisoning
v in
DNS poisoning the domain name system table in a server is modified so that
someone who thinks they are accessing legitimate websites is actually directed
towards fraudulent ones
Domain name system
(DNS) is used to resolve human readable
hostnames into machine readable IP addresses
Snooping
v Snooping
is the unauthorised access to another persons or companies data
v Snooping
can include casual observance of an email that appears on another computer
screen or watching what someone else is typing
v More
sophisticated snooping user software program to remotely monitor activity on a
computer or network devices
Eavesdropping
v Eavesdropping
is the unauthorised real-time interception of a private communication such as
phone call, instant message, fax transmission etc
Salami attack
v Salami
attack is when small attack add up to 1
major attack that can go undetected due to the nature of this type of
cybercrime
v It
is a form of cybercrime usually used for the purpose of committing financial
crimes normally in banks
v It
is also known as penny shaving
Backdoor
v A
backdoor is a means of access to a computer program that bypasses security
mechanism
v The
back door is written by the programmer who create the code for the program
v A
backdoor is a potential security risk because there are always crackers out
there looking for any vulnerability to exploit
v A
programmer may sometimes install a back door so that the program can be
accessed for troubleshooting or other purposes
Cyber vandalism
v Cyber
vandalism means destroying or damaging the data or information stored in a
computer when a network service is stopped or disrupted
v Cyber
vandals are individuals who damage information and infrastructure purely for
their own enjoyment and pleasure
v It
include any kind of physical harm done to the computer of any person
v These
acts may take the form of the theft of a computer some part of a computer or
device attached to the computer
Cybersquatting
v It
is the act of registering a domain name that is the same as or confusingly
similar to The trademark of another and then offering to sell that domain and
Back To The trademark owner
v Cybersquatting
is also known as domain squatting
Cyber espionage
v Cyber
espionage describes the stealing of secret stored in digital formats on
computers and it network
v Cyber
espionage can be conducted through advanced persistent threat remote access
Trojan
Advanced persistent
threat (APT)
v An
advanced persistent threat is a network attack in which an unauthorised person
gains access to a network and stay there undetected for a long period of time
v The
intention of and APt attack is to steal data rather than to cause damage to the
network or organisation
Remote access Trojan
(RAT)
v A
remote access Trojan is a Malware program that includes a backdoor for
administrative control over the target computer
v RAT
are usually download invisible with a user requested program
v Once
the host system is compromised the Intruder may use it to distribute RATs to
other vulnerable computers and establish a botnet
v RATs
are also known as remote administrative tool
Cyber slacking
v The
use of an employees internet and email for personal activities during work
hours is called cyber slacking
v Employees
who uses company resources like computer and internet for personal activities
at work time are called cyber slacker
Data Diddling
v Data
diddling is the unauthorised changing of data before or during their input to a
computer system
v example
forgery, exchanging valid records with prepared replacement etc
Hacking
v Process
of unauthorised access of information system is known as hacking
v One
who does hacking is called hacker
v Hacker
destroys defects or alters the information in a computer resource
v Hackers
are of different categories such as White hat hackers, Black hat hackers, Grey
hat hackers etc
v White
hat hackers hack system for good reason
v Black
hat hackers hack the system for malicious reason
v Grey
hat hackers hack system sometimes for good reason and sometimes for malicious
reason
Hacktivism
v It
is the act of hacking a website or computer network in an effort to convey a social
or political message
v The
person who carries out the act of hacktivism is known as hacktivist
Web jacking
v Hacking
of website by password cracking and alteration of contents for fulfilling
politics objectives or for money
v Web
jacking punishes the offender Under IPC 383
Botnet
v A
botnet is an interconnected network of computers infected with Malware without
the users knowledge and controlled by cyber criminals
v Botnet
it is also known as Zombie Army
Password sniffer
v It
is a small program that monitor and retrieve the username or password of
network users during their login
Identity theft
v Procurement
of identifying information without permission and using it fraudulently to obtain goods and service is
called identity theft
Software piracy
v Unauthorised
copy reproduction use or manufacture of product is called software piracy
Software cracking
v Modification
of software to remove or disable features which are undesirable by a person is
called software cracking
No comments:
Post a Comment