KINDS OF CYBER CRIME

Cyber Stalking It is an act of stalking, harassing or threatening someone using Internet/computer as a medium. This is often done to defame a person and use email, social network, instant messenger, web-posting, etc. as a using Internet as a medium as it offers anonymity. The behaviour includes false accusations, threats, sexual exploitation to minors, … Read more

FIREWALL (CYBER SECURITY TECHNIQUE)

It is a hardware/software which acts as a shield between an organization‟s network and the internet and protects it from the threats like virus, malware, hackers, etc. It can be used to limit the persons who can have access to your network and send information to you. Figure : Firewall There are two type of … Read more

ANTIVIRUS(CYBER SECURITY TECHNIQUE)

There are verities of malicious programs like virus, worms, trojan horse, etc that are spread over internet to compromise the security of a computer either to destroy data stored into the computer or gain financial benefits by sniffing passwords etc. To prevent these malicious codes to enter to your system, a special program called an … Read more

DIGITAL SIGNATURES(CYBER SECURITY TECHNIQUE)

It is a technique for validation of data. Validation is a process of certifying the content of a document. The digital signatures not only validate the data but also used for authentication. The digital signature is created by encrypting the data with the private key of the sender. The encrypted data is attached along with … Read more

ENCRYPTION(CYBER SECURITY TECHNIQUE)

It is a technique to convert the data in unreadable form before transmitting it over the internet. Only the person who have the access to the key and convert it in the readable form and read it. Formally encryption can be defined as a technique to lock the data by converting it to complex codes … Read more

AUTHENTICATION(CYBER SECURITY TECHNIQUE)

It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be. A typical method for authentication over internet is via username and password. With the increase in the reported cases of cyber crime by identity theft over internet, the organizations have made some additional arrangements … Read more

Reasons for Commission of Cyber Crimes

There are many reasons which act as a catalyst in the growth of cyber crime. Some of the prominent reasons are: a.  Money:People are motivated towards committing cyber crime is to make quick and easy money. b.  Revenge:Some people try to take revenge with other person/organization/society/ caste or religion by defaming its reputation or bringing … Read more

Classification of Cyber Crimes

he cyber criminal could be internal or external to the organization facing the cyber attack. Based on this fact, the cyber crime could be categorized into two types: Insider Attack:An attack to the network or the computer system by some person with authorized system access is known as insider attack. It is generally performed by … Read more

INTRODUCTION TO CYBER CRIME

The internet was born around 1960‟s where its access was limited to few scientist, researchers and the defence only.Internet user base have evolved expontinanlty. Initially the computer crime was only confined to making a physical damage to the computer and related infrastructure. Around 1980‟s the trend changed from causing the physical damaging to computers to … Read more

INTRODUCTION TO CYBER SPACE

Internet is among the most important inventions of the 21stcentury which have affected our life. Today internet have crosses every barrier and have changed the way we use to talk, play games, work, shop, make friends, listen music, see movies, order food, pay bill, greet your friend on his birthday/ anniversary, etc. You name it, … Read more