Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
317 views11 pages

Cyber Security Unit 1 Notes

The document outlines a detailed syllabus on Cyber Security, covering topics such as the definition and origins of cybercrime, classifications of cyber crimes, and the impact of mobile and wireless devices on security. It also discusses tools and methods used in cybercrime, the importance of computer forensics, and the need for security policies and cyber laws. Additionally, it emphasizes the global perspective on cybercrimes and provides strategies for netizens to stay safe in the digital world.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
317 views11 pages

Cyber Security Unit 1 Notes

The document outlines a detailed syllabus on Cyber Security, covering topics such as the definition and origins of cybercrime, classifications of cyber crimes, and the impact of mobile and wireless devices on security. It also discusses tools and methods used in cybercrime, the importance of computer forensics, and the need for security policies and cyber laws. Additionally, it emphasizes the global perspective on cybercrimes and provides strategies for netizens to stay safe in the digital world.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

e

ir
Cyber Security
es
D
u
Ed

2 Edu Desire

3
DETAILED SYLLABUS

Unit Topic

INTRODUCTION TO CYBER CRIME: Cybercrime- Definition and


Origins of the word Cybercrime and Information Security, Who are
Cybercriminals? Classifications of Cyber Crimes, A Global Perspective on
1 Cybercrimes, Cybercrime Era: Survival Mantra for the Netizens. Cyber
offences: How Criminals Plan the Attacks, Social Engineering, Cyber
stalking, Cybercafe and Cybercrimes, Botnets: The Fuel for Cybercrime,
Attack Vector.

CYBER CRIME: Mobile and Wireless Devices-Introduction, Proliferation


of Mobile and Wireless Devices, Trends in Mobility, Credit Card Frauds in

e
Mobile and Wireless Computing Era, Security Challenges Posed by Mobile
Devices, Registry Settings for Mobile Devices, Authentication Service

ir
2
Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security
Implications for organisations, Organisational Measures for Handling
Mobile, Organisational Security Policies and Measures in Mobile
Computing Era.
es
TOOLS AND METHODS USED IN CYBERCRIME: Introduction,
Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers
D
and Spywares, Virus and Worms, Trojan-horses and Backdoors,
3
Steganography, DoS and DDoS At-tacks, SQL Injection, Buffer Overflow,
Attacks on Wireless Networks. Phishing and Identity Theft: Introduction to
Phishing, Identity Theft (ID Theft).
u

UNDERSTANDING COMPUTER FORENSICS: Introduction, Digital


Forensics Science, The Need for Computer Forensics, Cyber forensics and
Ed

Digital Evidence, Forensics Analysis of E-Mail, Digital Forensics Life Cycle,


4
Chain of Custody Concept, Network Forensics, Approaching a Computer
Forensics Investigation. Forensics and Social Networking Sites: The
Security/Privacy Threats, Challenges in Computer Forensics.

INTRODUCTION TO SECURITY POLICIES AND CYBER LAWS:


Need for An Information Security Policy, Introduction to Indian Cyber
5 Law, Objective and Scope of the Digital Personal Data Protection Act 2023,
Intellectual Property Issues, Overview of Intellectual Property Related
Legislation in India, Patent, Copyright, Trademarks.

3 Edu Desire

4
Unit-1
Introduction to Cyber Crime

Definition: Cybercrime means doing bad things using computers and the
internet. It's like breaking the rules in the digital world. Imagine someone
stealing information or causing trouble online—that's cybercrime.

Origins of the Term: The word “cybercrime" comes from combining


"cyber" (related to computers) and "crime" (doing bad things). Back in
the 1990s, when computers were becoming popular globally, people

e
needed a word for these new digital crimes. So, they created "cybercrime"
to describe illegal activities happening in the digital space.

ir
When we say "cybercrime," we're talking about crimes that happen
es
online. It's like a catch-all term for rule-breaking in the digital world.
From hacking to online fraud, it covers a lot of different ways people can
break the law using computers and the internet.
D
Information Security: Information Security is like a digital
superhero—it protects your personal information from digital bad guys.
It's the guardian that ensures only the right people can access and use
u

your digital secrets.


Ed

Importance: Imagine it as the lock on your digital diary. Information


Security keeps your personal details safe from online mischief-makers.
Without it, your digital secrets could be like an open book for anyone to
read.

Key Aspects:
1. Confidentiality: Keeping your secrets safe.
2. Integrity: Making sure your information is accurate and not
tampered with.
3. Availability: Ensuring you can access your information when you
need it.

4 Edu Desire

5
Who are Cybercriminals?
Cybercriminals are like digital bad guys. They're people who use
computers and the internet to do naughty stuff.
1. Anyone Can Be a Cybercriminal: It could be your neighbour,
someone across the world, or even someone you know. There's no
specific "look" for a cybercriminal.
2. Digital Rule-Breakers: They break the online rules by doing things
like stealing information, spreading viruses, or causing trouble in
the digital world.

Example: Think of cybercriminals as the troublemakers in the digital

e
neighbourhood. They use their tech skills for not-so-nice things, like the
bullies of the internet.

ir
Classifications of Cyber Crimes:
es
D
u

Classifications of Cybercrimes are like groups of online rule-breaking.


They help us understand the different ways people misbehave on the
Ed

internet.
1. Hacking: Sneaking into computers or networks without asking.
2. Phishing: Tricking people into sharing their secrets by pretending
to be a friend.
3. Identity Theft: Pretending to be someone else online to steal their
private information.
4. Online Fraud: Tricking people into giving money or private info by
lying.
5. Cyberbullying: Using the internet to hurt or bother others.

5 Edu Desire

6
A Global Perspective on Cybercrimes is like looking at naughty actions
happening all around the world using computers and the internet.

More Details:
1. No Borders: Cybercrimes don't follow country lines. They can
happen anywhere, and bad actors from different countries might
even work together.

2. Digital Challenges Everywhere: It's not just a problem in one


place. People worldwide face similar digital troubles, and everyone
needs to be careful online.

e
ir
Example: Think of A Global Perspective on Cyber Crimes as looking at
a world map and seeing where digital mischief is happening. It's like a big
digital puzzle affecting everyone, no matter where they are.
es
Importance: Understanding A Global Perspective on Cyber Crimes
helps us realise that being cautious online is not just for one country—it's
D
a worldwide effort to stay safe in the digital space.

The Cybercrime Era is like living in a time where digital mischief is a


u

common challenge. Survival Mantra for the Netizens means having a set
of rules or practices to stay safe in this digital age.
Ed

Survival Mantra:

6 Edu Desire

7
1. Be Cyber-Aware: Stay alert and aware of potential online threats.
2. Use Strong Passwords: Create and regularly update strong, unique
passwords.
3. Keep Software Updated: Ensure your computer and apps have the
latest security updates.
4. Be Sceptical of Emails: Don't trust every email; be cautious,
especially with links or attachments.
5. Use Trusted Websites: Stick to reputable websites to minimise
risks.
6. Secure Personal Information: Be cautious about sharing sensitive
info online.

e
7. Install Antivirus Software: Have reliable antivirus software to
protect against digital threats.

ir
Example: Living in the Cybercrime Era is like being in a digital jungle
es
where you need a Survival Mantra for Netizens. It's similar to having a
set of rules when exploring an unknown territory. Just as you'd wear a
helmet in a construction zone, in the cyber world, you follow these
D
mantras to keep yourself safe from digital dangers.
u

Cyber Offences: How Criminals Plan the Attacks:


Cyber Offences are like digital crimes, and understanding how criminals
Ed

plan their attacks is crucial. It involves the strategies and methods they
use to carry out illegal activities in the digital space.

Planning Strategies:
1. Identifying Weak Points: Criminals look for vulnerabilities in
computer systems or networks.

7 Edu Desire

8
2. Exploiting Vulnerabilities: They use weaknesses to gain
unauthorised access or control.
3. Social Engineering: Tricking individuals into divulging sensitive
information.
4. Malware Deployment: Spreading malicious software to
compromise systems.
5. Planning Attack Routes: Deciding the best way to execute their
digital mischief.

Example: Think of Cyber Offences like planning a heist. Criminals study


the target (identifying weak points), find ways to break in (exploiting

e
vulnerabilities), use deception (social engineering), deploy tools for the
job (malware), and plan their entry and exit routes (planning attack

ir
routes). Understanding these steps helps in building stronger digital
defences.
es
Social Engineering: Social Engineering is like a digital magic trick. It's
when cybercriminals use charm, manipulation, or deceit to trick people
into giving up their personal information or doing something they
D
shouldn't.
u
Ed

Techniques Used:
1. Phishing: Sending fake emails or messages to trick individuals into
revealing sensitive information.
2. Pretexting: Creating a made-up scenario to obtain personal
information.
3. Impersonation: Posing as someone trustworthy to gain access to
information or systems.
4. Quizzes and Surveys: Using seemingly harmless quizzes or surveys
to gather information.

8 Edu Desire

9
Example: Imagine someone pretending to be a friend and asking for your
password. That's Social Engineering in action. It's like a digital con artist
using charm or deception to get people to share their secrets. Always be
cautious, and never share sensitive information online, even if it seems
harmless.

Cyber Stalking: Cyber Stalking is like someone following you online. It


involves persistent and unwanted attention, harassment, or monitoring
through digital means.

e
ir
es
D
Characteristics:
1. Unwanted Attention: Receiving excessive, unsolicited online
communication.
u

2. Monitoring: Being observed without consent, often through social


media or other online platforms.
Ed

3. Harassment: Repeated and intrusive behaviour causing emotional


distress.
4. Threats: Expressing harmful intentions or making individuals feel
unsafe.

Example: Imagine someone constantly commenting on your social


media, sending numerous messages, or tracking your online activity.
That's Cyber Stalking. It's like an online shadow that won't go away,
causing discomfort and potentially putting your digital well-being at
risk. Always report such behaviour and take steps to protect your online
privacy.

9 Edu Desire

10
Cybercafe: A Cybercafe is like a digital hangout spot where people can
use computers and the internet. It's a place where individuals, often
without personal computers, can access online services, play games, or
work on projects.

Features:
1. Computer Access: Provides computers with internet connectivity
for public use.
2. Internet Browsing: Users can surf the web, check emails, and
engage in online activities.
3. Gaming: Some cybercafes offer gaming setups for multiplayer or

e
individual gaming sessions.

ir
Common Uses:
1. Study and Work: Students or professionals without personal
es
computers may use cybercafes for assignments or work.
2. Socialising: People may gather to play games, socialise, or
collaborate on projects.
D
Example: Imagine a place with rows of computers, people typing away,
and the hum of online activity—that's a Cybercafe. It's like a digital
u

community hub where individuals come together to explore the online


world, whether for work, study, or leisure.
Ed

Cybercrimes: Cybercrimes are like digital offences, where people use


computers and the internet to break the law or cause harm. These actions
can range from stealing personal information to disrupting digital
systems.

10 Edu Desire

11
Common Types:
1. Hacking: Unauthorised access to computer systems or networks.
2. Phishing: Tricking individuals into revealing sensitive information
through fake emails or messages.
3. Identity Theft: Pretending to be someone else online to steal
personal information.
4. Malware Attacks: Spreading harmful software to compromise
computer systems.
5. Online Fraud: Deceiving individuals to gain money or sensitive
information.

e
Impact:

ir
1. Financial Loss: Individuals or businesses may lose money.
2. Privacy Invasion: Personal information may be exposed.
3. Disruption: Digital systems may be interrupted or damaged.
es
Prevention:
1. Use Strong Passwords: Create complex and unique passwords.
D
2. Install Antivirus Software: Protect devices from malicious
software.
3. Be Cautious Online: Avoid clicking on suspicious links or sharing
u

sensitive information.
Ed

Example: Imagine someone stealing your online banking information or


spreading a virus to disrupt a website—that's a Cybercrime. It's like
digital rule-breaking that can have real-world consequences,
emphasising the need for cybersecurity measures and awareness.

Botnets are like digital zombie armies. They're networks of infected


computers controlled by a single entity, often a cybercriminal. These
infected computers, known as "bots," work together without their
owners' knowledge to perform malicious activities.

11 Edu Desire

12
How Botnets Work:
1. Infection: Cybercriminals infect computers with malicious
software.
2. Control: Once infected, these computers become part of the
botnet, and the attacker can control them remotely.
3. Coordination: Bots work together to perform tasks, like spreading
malware, stealing information, or launching cyberattacks.

Fuel for Cybercrime:


1. Distributed Power: Botnets provide attackers with a distributed
and powerful network, making it harder to trace and stop their

e
activities.

ir
2. Multipurpose Use: They can be used for various cybercrimes, from
launching massive DDoS attacks to sending spam emails.
es
Attack Vector: An Attack Vector is like finding a secret entry point. It's
the method or path that cybercriminals use to gain unauthorised access
to computer systems or networks.
D
u
Ed

Types of Attack Vectors:


1. Malware: Infecting systems with malicious software.
2. Phishing: Tricking individuals into revealing sensitive information.
3. Drive-By Downloads: Installing malware when a user visits a
compromised website.
4. Zero-Day Exploits: Taking advantage of undiscovered
vulnerabilities in software.

12 Edu Desire

13

You might also like