0% found this document useful (0 votes)
30 views3 pages

Cyber

The document provides information about cyber security topics like digital footprints, cyber crimes, threats to computer security, and preventive measures. It defines cyber crimes and threats like viruses, worms, Trojan horses, spyware, spamming, and phishing. The document also discusses types of cyber crimes including cyber trolling, stalking, and hacking. It outlines strategies to prevent cyber crimes such as using antivirus software, regular backups, strong passwords, and following basic online safety practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views3 pages

Cyber

The document provides information about cyber security topics like digital footprints, cyber crimes, threats to computer security, and preventive measures. It defines cyber crimes and threats like viruses, worms, Trojan horses, spyware, spamming, and phishing. The document also discusses types of cyber crimes including cyber trolling, stalking, and hacking. It outlines strategies to prevent cyber crimes such as using antivirus software, regular backups, strong passwords, and following basic online safety practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

SYLLABUS:

(AS PER CBSE )

Unit III: Society, Law and Ethics


● Digital Footprints
● Digital society and Netizen: net etiquettes, communication etiquettes,
social media etiquettes
● Data protection: Intellectual Property Right (copyright, patent, trademark),
violation of IPR
(plagiarism, copyright infringement, trademark infringement),
open source softwares and licensing (Creative Commons, GPL and Apache)
● Cyber-crime: definition, hacking, eavesdropping, phishing and fraud
emails, ransomware,preventing cyber crime
● Cyber safety: safely browsing the web, identity protection, confidentiality,
cyber trolls and bullying.
(COVERED IN LESSON 2)
● Safely accessing web sites: malware, viruses, Trojans, adware
● E-waste management: proper disposal of used electronic gadgets
● Indian Information Technology Act (IT Act)
● Technology & Society: Gender and disability issues while teaching and
using computers
LESSON - 2
CYBER CRIME AND THREATS
CYBER SPACE:
It is an online world of computer networks and especially the Internet.
THREATS TO COMPUTER SECURITY:
A threat is a potential violation of security. Some common threats are:
1. COMPUTER VIRUSE: are the malicious programs that cause damage to
data and files on the system. There are two similar programs are a) Worms :
are self-replicating program which eats up entire disk space or memory.
b) Trojan Horses: is a program that appears to be harmless and useful but
actually performs malicious functions such as deleting or damaging files.
2. SPYWARE: is a software which is installed on your computer to spy on
your activities and report the data to people willing to pay for it.
3. ADWARE: are the programs that deliver unwanted ads to our computer
in the Pop-Up form).
4. SPAMMING: It refers to sending bulk-mail by an identified or unidentified
source. In malicious form, the attacker keeps on sending bulk until the
mail-server runs out of disk space.
5. PC INTRUSION: Computers connected to Internet are under constant
attack from cyber vandals in the form of:
1. Sweep Attack: This deletes all data from system.
2. Denial of Services: it attacks all the resources and system comes to halt.
3. Password Guessing: Hackers crack passwords to gain entry into remote
computer systems.
6. EAVESDROPPING: is Unauthorised monitoring of other people’s
communications.
7. PHISING and PHARMING: Phishing is a criminally fraudulent process of
attempting to acquire sensitive information such as usernames, passwords,
credit card information, account data etc.
Pharming is an attack in which a hacker attempts to redirect a website’s
traffic to another website.
8. COOKIES: are a small piece of data sent from a website and stored in
user’s web browser while a user is browsing a website.
CYBER CRIME:
Criminal activities or offences carried out in a digital environment can be
considered as cyber-crime. It includes online fraud, identity theft, cyber
stalking, cyber trolling, cyber bullying, email scam, online bank frauds,
hacking, cracking, pornography etc.
TYPES OF CYBER CRIME
1. CYBER TROLLS: are derogatory messages or comments posted online
targeting people.
2. CYBER TROLLING: Harassing, dreaming, embarrassing, defaming or
intimidating someone using modern technologies like internet, cell phones,
instant messengers, social networks etc.
3. CYBER STALKING: is an online harassment wherein the victim is
subjected to a barrage of online messages and emails.
4. Spreading ROUMOURS ONLINE: is posting fake information, comments
that could harm the others.
Hacking
Hacking is the act of unauthorised access to a computer, computer network
or any digital system. Hackers usually have technical expertise of the
hardware and software. They look for bugs to exploit and break into the
system.
Hacking, when done with a positive intent, is called ethical hacking. Such
ethical hackers are known as white hat hackers.

A non-ethical hacker is the one who tries to gain unauthorised access to


computers or networks in order to steal sensitive data with the intent to
damage or bring down systems. They are called black hat hackers or
crackers. Their primary focus is on security cracking and data stealing.

Combatting and Preventing Cyber Crime


The challenges of cyber crime can be mitigated with the twin approach of
being alert and taking legal help.
Following points can be considered as safety measures to reduce the risk of
cyber crime:
• Take regular backup of important data
• Use an antivirus software and keep it updated always
• Avoid installing pirated software. Always download software from known
and secure (HTTPS) sites
• Always update the system software which include the Internet browser and
other application software
• Do not visit or download anything from untrusted websites
• Usually the browser alerts users about doubtful websites whose security
certificate could not be verified; avoid visiting such sites
• Use strong password for web login, and change it periodically. Do not use
same password for all the websites. Use different combinations characters.
Ignore common words or names in password
• While using someone else’s computer, don’t allow browser to save
password or auto fill data, and try to browse in your private browser
window.
• For an unknown site, do not agree to use cookies when asked for, through
a Yes/No option.
• Perform online transaction like shopping, ticketing, and other such
services only through well-known and secure sites
• Always secure wireless network at home with strong password and
regularly change it.
PREVENTIVE MEASURES FOR ETHICAL ISSUES:
1. ANTI-VIRUS SOFTWARE
2. PREVENT SPYWARE
3. DATA BACKUP: store the data in external disk for safety.
4. DATA PROTECTION:
5. CYBER LAW
COMMON SECURITY CONTROLS:

You might also like