SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Cyber Space
• Cyberspace is a domain characterized by the use
of electronics and the electromagnetic spectrum
to store, modify, and exchange data via
networked systems and associated physical
infrastructures.
• In effect, cyberspace can be thought of as the
interconnection of human beings through
computers and telecommunication, without
regard to physical geography.
Threats in Cyberspace
1.
2.
3.
4.
5.

Hacktivism
Cybercrime
Cyberespionage
Cyberwar
Cyberterrorism
1. Hacktivism
Hacktivism
• Hacktivism is the use of computers and
computer networks to promote political ends,
chiefly free speech, human rights, and
information ethics. It is carried out under the
premise that proper use of technology can
produce results similar to those of
conventional acts of protest, activism, and civil
disobedience
Defacing Web Pages
• Defacing Web Pages: Between 1995 and 1999
Attrition.org reported 5,000 website
defacements. In such a scenario, the hacktivist
will significantly alter the front page of a
company's or governmental agency's website.
Web Sit-ins
• In this form of hacktivism, hackers attempt to
send so much traffic to the site that the
overwhelmed site becomes inaccessible to
other users in a variation on a denial of
service.
E-mail Bombing
• E-mail Bombing: Hacktivists send scores of emails with large file attachments to their
target's e-mail address.
Website Mirroring
• It is used as a circumvention tool to bypass
censorship blocks on websites. It is a
technique that copies the content of a
censored website and posts it to other
domains and subdomains that are not
censored.
Geo-bombing
• Geo-bombing: a technique in which netizens
add a geo-tag while editing YouTube videos so
that the location of the video can be displayed
in Google Earth.
Anonymous blogging
• Anonymous blogging: a method of speaking
out to a wide audience about human rights
issues, government oppression, etc. that
utilizes various web tools such as free email
accounts, IP masking, and blogging software
to preserve a high level of anonymity.
Doxing
• Doxing is the practice of outing of private
information about individuals, but the term is
sometimes used more broadly to refer to
exposing embarrassing information about
organizations
Swatting
• Swatting is the act of triggering a police raid,
usually that of an anti-terrorist team SWAT in
the United States, typically for retaliation or
harassment and based on providing false
information to law enforcement.
Cyber crime
Cyber crime
Computer crime
Computer crime refers to any crime that
involves a computer and a network. The
computer may have been used in the
commission of a crime, or it may be the
target
Net crime
Net crime refers to criminal exploitation
of the Internet.
Cybercrimes
• Halder and Jaishankar (2011) defines Cybercrimes
as: "Offences that are committed against
individuals or groups of individuals with a
criminal motive to intentionally harm the
reputation of the victim or cause physical or
mental harm to the victim directly or indirectly,
using modern telecommunication networks such
as Internet (Chat rooms, emails, notice boards
and groups) and mobile phones (SMS/MMS)".
• Such crimes may threaten a nation’s security and
financial health.
Cybercrimes
• Issues surrounding this type of crime have
become high-profile, particularly those
surrounding cracking, copyright infringement,
child pornography, and child grooming. There
are also problems of privacy when confidential
information is lost or intercepted, lawfully or
otherwise.
Categories of Cybercrimes
Cyber crime encompasses a broad range of
activities. Generally, however, it may be divided
into two categories:
(1) crimes that target computers directly
(2) crimes facilitated by computer networks or
devices, the primary target of which is
independent of network or device.
Categories of Cybercrimes
1.Crimes that primarily target computer networks or
devices include:
1. Computer viruses
2. Denial-of-service attacks
3. Malware (malicious code)
2.Crimes that use computer networks or devices to
advance other ends include:
1. Cyber stalking
2. Fraud and identity theft
3. Information warfare
4. Phishing scams
computer virus
• A computer virus is a computer program that
can replicate itself and spread from one
computer to another. The term "virus" is also
commonly, but erroneously, used to refer to
other types of malware, including but not
limited to adware and spyware programs that
do not have a reproductive ability.
denial-of-service attack (DoS attack)
In computing, a denial-of-service attack (DoS
attack) or distributed denial-of-service attack
(DDoS attack) is an attempt to make a machine
or network resource unavailable to its intended
users. Although the means to carry out, motives
for, and targets of a DoS attack may vary, it
generally consists of the efforts of one or more
people to temporarily or indefinitely interrupt or
suspend services of a host connected to the
Internet.
Malware
• Malware, short for malicious (or malevolent)
software, is software used or programmed by
attackers to disrupt computer operation,
gather sensitive information, or gain access to
private computer systems. It can appear in the
form of code, scripts, active content, and
other software. Malware' is a general term
used to refer to a variety of forms of hostile or
intrusive software
Cyberstalking
• Cyberstalking is the use of the Internet or other
electronic means to stalk or harass an individual, a
group of individuals, or an organization. It may include
the making of false accusations or statements of fact (,
monitoring, making threats, identity theft, damage to
data or equipment, the solicitation of minors for sex, or
gathering information that may be used to harass. The
definition of "harassment" must meet the criterion
that a reasonable person, in possession of the same
information, would regard it as sufficient to cause
another reasonable person distress
Fraud
Fraud is intentional deception made for
personal gain or to damage another individual.
Fraud is a crime and a civil law violation, though
the specific criminal law definition varies by
legal jurisdiction. Defrauding people or entities
of money or valuables is a common purpose of
fraud.
Identity theft
• Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by assuming
that person's identity, typically in order to access resources
or obtain credit and other benefits in that person's name.
• The victim of identity theft (here meaning the person
whose identity has been assumed by the identity thief) can
suffer adverse consequences if they are held accountable
for the perpetrator's actions.
• Identity theft occurs when someone uses another's
personally identifying information, like their name,
identifying number, or credit card number, without their
permission, to commit fraud or other crimes.
Information Warfare
• Information Warfare (IW) is primarily an American
concept involving the use and management of
information technology in pursuit of a competitive
advantage over an opponent.
• Information warfare may involve collection of tactical
information, assurance that one's own information is
valid, spreading of propaganda or disinformation to
demoralize or manipulate the enemy and the public,
undermining the quality of opposing force information
and denial of information-collection opportunities to
opposing forces. Information warfare is closely linked
to psychological warfare.
Phishing
• Phishing is the act of attempting to acquire
information such as usernames, passwords, and
credit card details (and sometimes, indirectly,
money) by masquerading as a trustworthy entity
in an electronic communication.
• Communications purporting to be from popular
social web sites, auction sites, online payment
processors or IT administrators are commonly
used to lure the unsuspecting public. Phishing
emails may contain links to websites that are
infected with malware
Cyber terrorism
Cyber terrorism
Cyber terrorism is the use of Internet based
attacks in terrorist activities, including acts of
deliberate, large-scale disruption of computer
networks, especially of personal computers
attached to the Internet, by the means of tools
such as computer viruses.
Types of cyber terrorism
Simple-Unstructured
The capability to conduct basic hacks against
individual systems using tools created by
someone else. The organization possesses little
target analysis, command and control, or
learning capability.
Types of cyber terrorism
Advanced-Structured
The capability to conduct more sophisticated
attacks against multiple systems or networks
and possibly, to modify or create basic hacking
tools. The organization possesses an elementary
target analysis, command and control, and
learning capability.
Types of cyber terrorism
Complex-Coordinated:
The capability for a coordinated attacks capable
of causing mass-disruption against integrated,
heterogeneous defenses (including
cryptography). Ability to create sophisticated
hacking tools. Highly capable target analysis,
command and control, and organization learning
capability
Cyber crime
Halder and Jaishankar (2011) defines
Cybercrimes as: "Offences that are committed
against individuals or groups of individuals with
a criminal motive to intentionally harm the
reputation of the victim or cause physical or
mental harm to the victim directly or indirectly,
using modern telecommunication networks
such as Internet (Chat rooms, emails, notice
boards and groups) and mobile phones
(SMS/MMS)".
Cyber crime
• Such crimes may threaten a nation’s security
and financial health.
• Issues surrounding this type of crime have
become high-profile, particularly those
surrounding cracking, copyright, child
pornography, and child grooming.
• There are also problems
of privacy when confidential information is
lost or intercepted, lawfully or otherwise.
The Computer Crime and Intellectual
Property Section (CCIPS)
• The Computer Crime and Intellectual Property Section
(CCIPS) is responsible for implementing the Department's
national strategies in combating computer and intellectual
property crimes worldwide.
• CCIPS prevents, investigates, and prosecutes computer
crimes by working with other government agencies, the
private sector, academic institutions, and foreign
counterparts.
• Section attorneys work to improve the domestic and
international infrastructure-legal, technological, and
operational-to pursue network criminals most effectively.
The Section's enforcement responsibilities against
intellectual property crimes are similarly multi-faceted.
The Computer Crime and Intellectual
Property Section (CCIPS)
• Intellectual Property (IP) has become one of the
principal U.S. economic engines, and the nation is a
target of choice for thieves of material protected by
copyright, trademark, or trade-secret designation. In
pursuing all these goals, CCIPS attorneys regularly run
complex investigations, resolve unique legal and
investigative issues raised by emerging computer and
telecommunications technologies; litigate cases;
provide litigation support to other prosecutors; train
federal, state, and local law enforcement personnel;
comment on and propose legislation; and initiate and
participate in international efforts to combat computer
and intellectual property crime.
Cyber Space

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
cyber security
cyber securitycyber security
cyber security
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 

Ähnlich wie Cyber Space

Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarDr.S.Jagadeesh Kumar
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxadnis1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 

Ähnlich wie Cyber Space (20)

CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 

Mehr von Kashif Latif

Linear Programming Application
Linear Programming ApplicationLinear Programming Application
Linear Programming ApplicationKashif Latif
 
Analysis of Variance
Analysis of VarianceAnalysis of Variance
Analysis of VarianceKashif Latif
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo ProcessorKashif Latif
 
SRX3600 Cluster & IDP
SRX3600 Cluster & IDPSRX3600 Cluster & IDP
SRX3600 Cluster & IDPKashif Latif
 
Routing Polices And Firewall Filter
Routing Polices And Firewall FilterRouting Polices And Firewall Filter
Routing Polices And Firewall FilterKashif Latif
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution ProtocolKashif Latif
 
HA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsHA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsKashif Latif
 
Ex8216 Core Switch
Ex8216 Core SwitchEx8216 Core Switch
Ex8216 Core SwitchKashif Latif
 
Difference Between XFP & SFP
Difference Between XFP & SFPDifference Between XFP & SFP
Difference Between XFP & SFPKashif Latif
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster ConfigurationKashif Latif
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway ProtocolKashif Latif
 

Mehr von Kashif Latif (17)

Linear Programming Application
Linear Programming ApplicationLinear Programming Application
Linear Programming Application
 
Analysis of Variance
Analysis of VarianceAnalysis of Variance
Analysis of Variance
 
DHCP
DHCPDHCP
DHCP
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo Processor
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
SRX3600 Cluster & IDP
SRX3600 Cluster & IDPSRX3600 Cluster & IDP
SRX3600 Cluster & IDP
 
Routing Polices And Firewall Filter
Routing Polices And Firewall FilterRouting Polices And Firewall Filter
Routing Polices And Firewall Filter
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
MX960 Router
MX960 RouterMX960 Router
MX960 Router
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
HA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsHA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy Groups
 
Ex8216 Core Switch
Ex8216 Core SwitchEx8216 Core Switch
Ex8216 Core Switch
 
Difference Between XFP & SFP
Difference Between XFP & SFPDifference Between XFP & SFP
Difference Between XFP & SFP
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster Configuration
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 

Kürzlich hochgeladen

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Kürzlich hochgeladen (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Cyber Space

  • 1.
  • 2. Cyber Space • Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures. • In effect, cyberspace can be thought of as the interconnection of human beings through computers and telecommunication, without regard to physical geography.
  • 5. Hacktivism • Hacktivism is the use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics. It is carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience
  • 6. Defacing Web Pages • Defacing Web Pages: Between 1995 and 1999 Attrition.org reported 5,000 website defacements. In such a scenario, the hacktivist will significantly alter the front page of a company's or governmental agency's website.
  • 7. Web Sit-ins • In this form of hacktivism, hackers attempt to send so much traffic to the site that the overwhelmed site becomes inaccessible to other users in a variation on a denial of service.
  • 8. E-mail Bombing • E-mail Bombing: Hacktivists send scores of emails with large file attachments to their target's e-mail address.
  • 9. Website Mirroring • It is used as a circumvention tool to bypass censorship blocks on websites. It is a technique that copies the content of a censored website and posts it to other domains and subdomains that are not censored.
  • 10. Geo-bombing • Geo-bombing: a technique in which netizens add a geo-tag while editing YouTube videos so that the location of the video can be displayed in Google Earth.
  • 11. Anonymous blogging • Anonymous blogging: a method of speaking out to a wide audience about human rights issues, government oppression, etc. that utilizes various web tools such as free email accounts, IP masking, and blogging software to preserve a high level of anonymity.
  • 12. Doxing • Doxing is the practice of outing of private information about individuals, but the term is sometimes used more broadly to refer to exposing embarrassing information about organizations
  • 13. Swatting • Swatting is the act of triggering a police raid, usually that of an anti-terrorist team SWAT in the United States, typically for retaliation or harassment and based on providing false information to law enforcement.
  • 15. Cyber crime Computer crime Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target Net crime Net crime refers to criminal exploitation of the Internet.
  • 16. Cybercrimes • Halder and Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". • Such crimes may threaten a nation’s security and financial health.
  • 17. Cybercrimes • Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 18. Categories of Cybercrimes Cyber crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: (1) crimes that target computers directly (2) crimes facilitated by computer networks or devices, the primary target of which is independent of network or device.
  • 19. Categories of Cybercrimes 1.Crimes that primarily target computer networks or devices include: 1. Computer viruses 2. Denial-of-service attacks 3. Malware (malicious code) 2.Crimes that use computer networks or devices to advance other ends include: 1. Cyber stalking 2. Fraud and identity theft 3. Information warfare 4. Phishing scams
  • 20. computer virus • A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
  • 21. denial-of-service attack (DoS attack) In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
  • 22. Malware • Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware' is a general term used to refer to a variety of forms of hostile or intrusive software
  • 23. Cyberstalking • Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass. The definition of "harassment" must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress
  • 24. Fraud Fraud is intentional deception made for personal gain or to damage another individual. Fraud is a crime and a civil law violation, though the specific criminal law definition varies by legal jurisdiction. Defrauding people or entities of money or valuables is a common purpose of fraud.
  • 25. Identity theft • Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. • The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held accountable for the perpetrator's actions. • Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
  • 26. Information Warfare • Information Warfare (IW) is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent. • Information warfare may involve collection of tactical information, assurance that one's own information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare.
  • 27. Phishing • Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. • Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware
  • 29. Cyber terrorism Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  • 30. Types of cyber terrorism Simple-Unstructured The capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target analysis, command and control, or learning capability.
  • 31. Types of cyber terrorism Advanced-Structured The capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses an elementary target analysis, command and control, and learning capability.
  • 32. Types of cyber terrorism Complex-Coordinated: The capability for a coordinated attacks capable of causing mass-disruption against integrated, heterogeneous defenses (including cryptography). Ability to create sophisticated hacking tools. Highly capable target analysis, command and control, and organization learning capability
  • 33. Cyber crime Halder and Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".
  • 34. Cyber crime • Such crimes may threaten a nation’s security and financial health. • Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright, child pornography, and child grooming. • There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 35. The Computer Crime and Intellectual Property Section (CCIPS) • The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide. • CCIPS prevents, investigates, and prosecutes computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts. • Section attorneys work to improve the domestic and international infrastructure-legal, technological, and operational-to pursue network criminals most effectively. The Section's enforcement responsibilities against intellectual property crimes are similarly multi-faceted.
  • 36. The Computer Crime and Intellectual Property Section (CCIPS) • Intellectual Property (IP) has become one of the principal U.S. economic engines, and the nation is a target of choice for thieves of material protected by copyright, trademark, or trade-secret designation. In pursuing all these goals, CCIPS attorneys regularly run complex investigations, resolve unique legal and investigative issues raised by emerging computer and telecommunications technologies; litigate cases; provide litigation support to other prosecutors; train federal, state, and local law enforcement personnel; comment on and propose legislation; and initiate and participate in international efforts to combat computer and intellectual property crime.