NEW STANDARD PUBLIC SCHOOL, RAEBARELI
CLASS-7
SUBJECT-COMPUTER
LESSON-11
(Cyber Crime and Cyber Security)
NO. OF PERIOD 7
NO. OF THEORY PERIOD 5
NO. OF PRACTICAL PERIOD 2
TEACHING AID Computer Lab.
REFERENCE BOOK Concept IT
Introductory Question
Que.1 What are threats associated with using Internet?
Que.2 How we can make our Computer system safe?
Cyber Crime :- Cybercrime is an illegal activity done with the help of Internet for example identity theft.
Types Of Cyber Crime :-
Cybercrime can be divided into three main categories-
1. Crime against Individual:-
The crimes which are done to cause harm or threat to an individual falls under this category there are many types of
crimes which come under this category
i. E-mail-Spoofing:-
Email spoofing is a form of Cyber Attack in which a hacker sends an email that has been manipulated to seem as if
it originated from a trusted source. When a user clicks on the link then the malware or virus enters into the computer
system.
ii. Cyber stalking:-
Cyberstalking is a crime committed when someone uses the internet and other technologies to harass or stalk
another person online.
1
Cyberstalker is a person who attacks the other person through e-mail, social media blogs and instant messaging. In
cyber stalking a person harass the other person online by posting their information which is false; monitor the
victim’s online activities, send virus to the victim’s computer to damage the system.
iii. Cyber bullying:-
The activity of using the internet to harm or frighten other person , especially by sending unpleasant messages,
posting embarrassing photos and videos of others on social media etc.
Difference between Cyberbullying and Cyberstalking is that Cyberbullying describes a broader set of online
behaviours than cyberstalking and can include one-time incidents.
2. Crime against property:-
Crime against property involves stealing or robbing of one’s property. There are many crimes that come under this
category which are as follows-
Identity Theft:-
Identity theft means to steal and misuse personal information of others using Internet like online shopping, banking
transaction and cash transaction. The person generally steals other person’s name, date of birth, account number,
credit debit card number, ATM etc. for misuse.
Phishing:-
Phishing is an E-mail that falsely claims to be from a trusted organization but ask the user to give their private
information like credit card details, password and username for the use in the fraudulent activities which can cause
financial loss.
Pharming:-
Pharming Attack is a cyber attack to get unauthorized access to someone's information. It is a technique to
redirect users to some malicious website resulting in losing their sensitive and confidential information to
attackers and hackers.
3. Crime against Organization:-
This category of crime includes the following crimes-
Cyber vandalism:-
Cyber vandalism (electronic vandalism or computer vandalism) is any malicious activity that disrupts or damages
computer systems.
Computer Virus:-
Virus stands for Vital Information resources under seize. A computer virus is a malicious code that creates
multiple copies of itself and enter into another program and affects the functioning of computer system. The sources
of spreading virus in a computer are hard disk. Computer virus is usually spread by following way-
1. Use of infected files.
2. Sending emails with viruses as attachment.
The following things get affected-
1. The processing speed.
2. Memory.
3. Data and programs.
4. Delete file.
5. Destroy data.
6. Prevent your computer from booting.
2
Types of Viruses
Boot Sector Virus Multipartite Virus
Program Virus Network Virus
infects booting system combination of boot
directly attack the Macro Virus replicate itself across
of computer. sector and program
virus , can affect two program files of the spread with the help of multiple computers
. Example- Stone, Disk systems system with extensions documents like word, through network
Killer simultaneously like .EXE, .SYS, excel, PowerPoint packets
Example- Sunday, documents Examples- Nimda and
Example- Flip, Invader
Cascade SQL slammer
Cyber Hacking:-
Hacking is the act of gaining unauthorized access to data in a system or computer.
Types Of Hacking:-
There are three types of hacking or hackers which are as follows-
1. Black Hat hackers: - Black hat hackers are criminals who break into computer networks with malicious
intent like steal or gain access to passwords, financial gains etc.
2. White Hat Hacker: - A white hat hacker or ethical hacker is an individual who uses hacking skills to identify
security vulnerabilities in hardware, software or networks.
3. Grey Hat Hackers:- A Grey Hat Hacker is a computer hacker or security expert who may violate ethical
standards or laws, but usually doesn't have the malicious intent of a black hat hacker.
Prevention against Cyber Crime:- Subject teacher will explain all points in class and students will read
from book.
Data Security and Protection:-
Data security is the practice of protecting digital information from unauthorized access, use, disclosure, disruption,
modification, or destruction.
Measures to Ensure Data security.
1. Antivirus Software:- Antivirus software also known as anti malware software is a computer software used
to prevent, detect and remove harmful software from the computer. Examples of antivirus software include-
McAfee, Norton, AVG, Quick Heal, Kaspersky etc.
2. Firewalls:- A Firewall is a security system to protect an internal network from unauthorized servers and
networks based on predefined rules. It can be hardware or software or combination of both.
3. Encryption Software:-
Data Encryption is a technique to protect the privacy of our data. Data Encryption converts the original data called
Plain Text into Cipher text or Encrypted Text which cannot be understood by anyone. This process is called
Encryption. The Cipher text is then converted again into Plain Text and this process is called Decryption.
4. Biometrics: - Biometrics are methods for identifying people based on their unique physical or behavioural
characteristics like Fingerprint, Face, Iris, Voice, DNA, Hand geometry, Signature.
3
Workstation
A. Tick the correct answer-
1. (b) Boot 2. (a) White hat 3. (c) Tongue 4. (b) Network 5. (b) Pharming
B. Fill in the blanks-
1. Cyber Crime 2. Virus 3. Spoofing 4. Hacking 5. Identity theft
C. True/False-
1. True 2. False 3. True 4. False 5. False
D. Match the following-
1. White Hat Hacker -------(d) The one who find loopholes in security system
2. Hacker ---------------------(c) The one illegally enters into another’s computer system
3. Multipartite virus---------(e) A combination of Boot sector and Program virus
4. Black Hat Hacker -------(b) The one knowingly cracks the other person’s system for personal gain
5. Stalker ---------------------(a) The person who keeps on eye on online activities
F – Lab activity will perform in computer lab with the help of teacher.
Creative Question: - What is Cyber Attack?
Achiever's Question: - What is the difference between Hacking and Cracking?
Kavita Sharma
J.HOD Computer Science