Name : Aman
Class : 11
Subject : Computer Science
Topic : Cyber Crime And Cyber Safety
Roll Number : 38
School : Kendriya Vidyalaya No. 1(Army)
Jodhpur, Rajasthan
Cyber Crime
• A cybercrime is a crime that involves a computer or a computer network.
The computer may have been used in committing the crime, or it may be the
target. Cybercrime may harm someone's security or finances.
• Most Common Cyber Crime :- The most common cyber crime are email
frauds, social media frauds, banking frauds, ransomware attacks, cyber
espionage, identity theft, clickjacking, spyware, etc.
Hacking
• Hacking is the unauthorized use of or access into computers or networks by
using security vulnerabilities or bypassing usual security steps to gain access.
Criminals may hack systems or networks to steal money or information, or
simply to disrupt businesses.
• Types of Hacking :-
• Black hat hackers
• White hat hackers
• Gray hat hackers
Black Hat Hackers
• Black hat hackers are malicious hackers, sometimes called crackers. Black hats
lack ethics, sometimes violate laws, and break into computer systems with
malicious intent, and they may violate the confidentiality, integrity, or
availability of an organization's systems and data.
• Black hat hackers use phishing, malware, or other forms of attacks to steal
data or penetrate systems with malicious intent. Their motives can vary from
financial to political, or they can simply be showing off their own skills.
White Hat Hackers
• A white hat hacker or ethical hacker is an individual who uses hacking skills
to identify security vulnerabilities in hardware, software or networks.
However, unlike black hat hackers or malicious hackers white hat hackers
respect the rule of law as it applies to hacking.
• A White Hat hacker tests systems and networks by trying to break into them.
They are hackers, but their talents are being used to improve Cyber Security.
Gray Hat Hacker
• Gray hat hackers enact a blend of both black hat and white hat activities.
Gray hat hackers often look for vulnerabilities in a system without the
owner's permission or knowledge. If issues are found, they report them to
the owner, sometimes requesting a small fee to fix the problem.
• White-Hat Hackers works for the organizations and government. Black -Hat
Hackers are criminals who violate computer security for their owner's
personal gain. Gray-Hat Hackers find issues in a system without the owner's
permission.
Eavesdropping
• An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of
information as it is transmitted over a network by a computer, smartphone, or another
connected device. The attack takes advantage of unsecured network communications to
access data as it is being sent or received by its user.
• Phishing attacks, weak password security, application-layer loopholes, etc., are all ways for a
hacker to gain access to sensitive information inconspicuously. At this point, the hacker can
listen in on various communication channels, steal data, and much more.
• There are two types of eavesdropping attacks; passive eavesdropping and active
eavesdropping. With passive eavesdropping, the hacker simply “listens” to data that is
passing through the network. With active eavesdropping, hackers disguise themselves.
Phishing And Fraud Emails
• Phishing attacks are the practice of sending fraudulent communications that
appear to come from a reputable source. It is usually done through email.
The goal is to steal sensitive data like credit card and login information, or to
install malware on the victim's machine.
• Example :- An email from PayPal arrives telling the victim that their account
has been compromised and will be deactivated unless they confirm their
credit card details. The link in the phishing email takes the victim to a fake
PayPal website and the stolen credit card information is used to commit
further crimes.
Ransomware
• Ransomware is a form of malware that encrypts a victim's files. The attacker
then demands a ransom from the victim to restore access to the data upon
payment. Users are shown instructions for how to pay a fee to get the
decryption key.
• Although there are countless strains of ransomware, they mainly fall into two
main types of ransomware. These are crypto-ransomware and locker
ransomware.
Preventing Cyber Crime
• Using anti-virus or a comprehensive internet security solution is a smart way
to protect your system from attacks. Anti-virus software allows you to scan,
detect and remove threats before they become a problem.
• Prevention is the key to reducing the risk of a data breach. By investing in
cybersecurity software, using a VPN, and being aware of common attack
methods, individuals and organizations can deter hackers and keep their data
private.
Cyber Safety
• Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks. It's
also known as information technology security or electronic information
security.
• The 3 major types of cyber security are network security, cloud security, and
physical security. Your operating systems and network architecture make up
your network security. It can include network protocols, firewalls, wireless
access points, hosts, and servers.
Safely Browsing The Web
Secure browsing involves the use of special security architecture to allow for
Web browsing that is more protected from various kinds of cyberattacks.
Secure browsing is a phenomenon supported by different types of tools
offered by the makers of Web browsers and other technology companies.
Identity Protection
Never share your password or account numbers over an e-mail or instant
message. Do not follow links from e-mails when conducting financial
transactions; instead, enter the URL yourself. Be wary of callers, pop-ups,
websites, or e-mails asking for personal information.
Confidentiality
Confidentiality means respecting someone's privacy, and abstaining from
sharing personal or potentially sensitive information about an individual,
especially if that information has been shared in confidence.
Cyber Trolls And Bullying
An internet troll, or online bully, deliberately tries to offend, cause trouble or
directly attack people by posting derogatory comments on Facebook posts,
blogs, under YouTube videos, on forums and other social media, such as
Twitter and Instagram.