Professional Documents
Culture Documents
1. INTRODUCTION:
2. CYBER CRIME:
Fig. : 12
WhatsApp: 1,500,000,000 users
8. ANDROID:
7. CLOUD COMPUTING:
Laws Applicable for Cyber Crimes bypassed, but can also facilitate the
influenced by the changes occurring in the commonly misuse this knowledge for
correlated phenomenon and value system devious reasons.
generated by these changes. a) SQL Injections: An SQL injection
is a technique that allows hackers
Impact of Cyber Crime over Teenager to play upon the security
These days a worst fear in vulnerabilities of the software that
teenager’s eyes is Cyber Bullying. It is runs a web site. It can be used to
become common over past five years, attack any type of unprotected or
generally from the age below eighteen are improperly protected SQL
more susceptible and feared from Cyber database.
Bullying as per inspection. It is becoming 2. Theft of FTP Passwords: This is another
an alarming trend in our society. very common way to tamper with web
sites. FTP password hacking takes
9.3 Computer Crimes:
advantage of the fact that many
In order to protect yourself you need to webmasters store their website login
know about the different ways in which your information on their poorly protected PCs.
computer can be compromised and your privacy The thief searches the victim’s system for
infringed. This isn’t an exhaustive list by any FTP login details, and then relays them to
means, but will give you a comprehensive idea of his own remote computer.
the loopholes in networks and security systems, 3. Logic bombs
which can be exploited by attackers, and also their A logic bomb, also known as “slag
possible motives for doing so. code”, is a malicious piece of code which
is intentionally inserted into software to
1. Hacking
execute a malicious task when triggered
In simple words, hacking is an act
by a specific event. It’s not a virus,
committed by an intruder by accessing
although it usually behaves in a similar
your computer system without your
manner. It is stealthily inserted into the
permission. Hackers (the people doing the
program where it lies dormant until
‘hacking’) are basically computer
specified conditions are met.
programmers, who have an advanced
understanding of computers and
4. Denial-of-Service attack
9
require extra securities apart from those Here are several approaches to security in
present in the applications used. computing; sometimes a combination of
IPv6: New internet protocol IPv6 is the approaches is valid:
new Internet protocol which is replacing Trust all the software to abide by a
IPv4 (the older version), which has been a security policy but the software is not
backbone of our networks in general and trustworthy (this is computer
the Internet at large. insecurity).
Encryption of the code: Encryption is Trust all the software to abide by a
the process of encoding messages in such security policy and the software is
a way that eavesdroppers or hackers validated as trustworthy (by tedious
cannot read it... In an encryption scheme, branch and path analysis for example).
the message or information is encrypted Trust no software but enforce a
using an encryption algorithm, turning it security policy with mechanisms that
into an unreadable cipher text. This is are not trustworthy (again this is
usually done with the use of an encryption computer insecurity).
key, which specifies how the message is to Trust no software but enforce a
be encoded. security policy with trustworthy
mechanisms.
9.6. Security Approaches:
One use of the term computer security refers to software that are often grouped together
technology to implement a secure operating and referred to as malware.
system. Much of this technology is based on Firewalls: A firewall is a software
science developed in the 1980s and used to program or piece of hardware that helps
produce what may be some of the most screen out hackers, viruses, and worms
impenetrable operating systems ever. that try to reach your computer over
Internet.
9.7. Techniques for Cyber Security:
Keep Private Information Private – in order to have a safe and secure future in cyber
Keep social security numbers, account space. Computer security is critical in almost any
numbers, and passwords private, as well as technology-driven industry which operates on
specific information about yourself, such computer systems. Computer security can also be
as your full name and date of birth. referred to as computer safety. The issues of
Lock Your Computer – Lock your computer based systems and addressing their
computer and smart phones when not in countless vulnerabilities are an integral part of
use. maintaining an operational industry.
Protect Your Computer – Be cautious
about opening attachments or clicking on
links in emails and remember that free 11. REFERENCES:
apps (games, ringtones, and screen savers)
LINKS:
can hide viruses or spam.
Own You’re Online Presence – Always 1. http://paperpresentationtopicsandpapers.bl
use privacy settings on social networking ogspot.com/2010/01/cyber-crime-and-
websites. security.html
2. https://arxiv.org/ftp/arxiv/papers/1402/140
10. CONCLUSION :
2.1842.pdf