You are on page 1of 14

Shri Vaishnav Institute of

Management, Indore.

ASSIGNMENT FOR B.Sc.(CS) II YR.


SUBJECT- Computer Networking

CASE STUDY ON
“CyberSecurity”

SUBMITTED TO: Disha Kusumakar


SUBMITTED BY: Pratham Rathore
Cybersecurity
Protecting Privacy,
Intellectual Property, and
Software Security

By:- Pratham Rathore


Contents
1. Introduction.

2. Cybersecurity Basics.

3. Hacking.

4. Cracking.

5. Viruses and Malware.

6. Software Privacy.

7. Intellectual Property.
01
Introduction

In our interconnected world, cybersecurity stands


as the guardian of our digital existence. It involves
strategies and measures to protect systems,
networks, and data from unauthorized access and
cyber threats. As we explore the dynamic
landscape of cybersecurity, we uncover the vital
role it plays in ensuring a secure and resilient
digital environment for individuals, businesses,
and governments alike.
02
Cybersecurity Basics
Cybersecurity is the practice of protecting computer systems, networks, and
data from digital threats, unauthorized access, and cyber attacks.
• Protection from Cyber Threats

• Preserving Privacy

• Business Continuity

• Intellectual Property Protection

• National Security

• Economic Stability

• Trust and Confidence

• Compliance and Legal Obligations


03
Hacking
Hacking is the unauthorized access, manipulation, or exploitation of computer
systems, networks, or data, often with the intent to gain information, disrupt
operations, or compromise security.

Types
1. White Hat Hacking: Ethical hackers use their skills to help organizations by
identifying and fixing security vulnerabilities.

2. Black Hat Hacking: Malicious hackers exploit weaknesses for personal gain, data
theft, or disruption without authorization.

3. Grey Hat Hacking: Individuals who may hack without explicit permission but
without malicious intent, often to point out vulnerabilities.
04
Cracking
Definition: Illegally modifying software to bypass security features or licensing
restrictions.

Purpose: Gain unauthorized access or use software without proper payment.

Methods: Altering software code to remove copy protection or license checks.

Legality: Generally illegal and can lead to legal consequences.

Context: Often associated with digital piracy and unauthorized software


distribution.

Distinction: Different from ethical hacking, which is legal and aims to identify
and fix security vulnerabilities.
Difference Between
Hacking & Cracking

Hacking Cracking
Definition: Ethical or unauthorized Definition: Unauthorized manipulation of
system access for understanding or software for bypassing security or
improvement. licensing.

Intent: Can be ethical (for system Intent: Primarily for unauthorized access
enhancement) or malicious or software use.
(unauthorized access).
Legality: Generally illegal, involving
Legality: Legal (ethical hacking) or unauthorized software manipulation.
illegal (unauthorized access).
Focus: Defeats security measures, often
Focus: Enhances system security. for personal gain.

Ethics: Ethical hacking is considered Ethics: Generally considered unethical


positive.
05
Virus / Virus Attack

 Virus

• Definition: A computer virus is a type of malicious software designed to


replicate itself and spread to other computers.

• Characteristics:
 Attaches to legitimate programs or files.
 Spreads when the infected program or file is executed.
 Can damage, modify, or delete files

• Intent: Typically designed to disrupt computer operations, steal information,


or gain unauthorized access.
 Virus Attack
How it Happens: Users unknowingly download infected files.
Opening infected email attachments or links.
Visiting compromised websites.

Effects: Slows down computer performance.


Causes system crashes.
Compromises data integrity and security.

Prevention: Use antivirus software.


Regularly update software.
Exercise caution when downloading files or clicking on links.
06
Software Piracy
Definition:
Unauthorized software copying, distribution, or use without proper licensing.

 Consequences:
• Undermines intellectual property rights.
• Legal repercussions for copyright infringement.
 Common Forms:
• Counterfeiting, online piracy, end-user piracy.
 Impact:
• Security risks due to lack of updates.
• Diminishes incentive for software development.
 Prevention:
• Licensing agreements, activation keys, DRM technologies.
 Legal Consequences:
• Risks associated with using pirated software.
• Possible fines, civil or criminal charges.

Example:- Downloading copyrighted films, music, games, or e-books from shady websites for free
07
Intellectual Property
Intellectual property (IP) refers to creations of the mind, such as inventions,
literary and artistic works, designs, symbols, names, and images used in
commerce. It is a category of property that includes intangible creations and the
legal rights that derive from them. Intellectual property is protected by law
through patents, copyrights, trademarks, and trade secrets, enabling creators and
innovators to control and benefit from their creations or inventions.
Here are the main types of intellectual property:
 Here are the main types of intellectual property:

• Patents: Provide exclusive rights for inventions or discoveries, typically


for a set period.
• Copyrights: Protect original works of authorship, such as literary, artistic,
and musical creations.
• Trademarks: Safeguard symbols, names, or designs used to identify and
distinguish goods or services.
• Trade Secrets: Include confidential business information, processes,
formulas, or strategies that provide a competitive advantage.
THANKYOU

You might also like