Cyber Security-Unit-II
Cyber Security-Unit-II
Cyber Security-Unit-II
Mr.V.Yuvaraj
Assistant Professor – Department of Computer Applications
Dr. N.G.P. ARTS AND SCIENCE COLLEGE
Dr. N.G.P.-KALAPATTI ROAD
COIMBATORE-641 048
Tamil Nadu, India
Mobile: +917502919891,
E-mail: [email protected]
Dr. NGPASC
COIMBATORE | INDIA
UNIT-II
Dr. NGPASC
COIMBATORE | INDIA
How Criminals Plan the Attacks
How Criminals Plan the Attacks
Dr. NGPASC
COIMBATORE | INDIA Cyber Security by Nina Godbole/Sunit Belapure
Copyright 2011 Wiley India Pvt. Ltd. All rights reserved.
How Criminals Plan the Attacks
Reconnaissance
“Reconnaissance” is an act of reconnoitering – explore, often with the goal of
finding something or somebody (especially to gain information about an
enemy or potential enemy).
Passive Attacks
A passive attack involves gathering information about a target without
his/her (individual’s or company’s) knowledge.
It is usually done using Internet searches or by Googling an individual or
company to gain information.
Dr. NGPASC
COIMBATORE | INDIA
How Criminals Plan the Attacks
Active Attacks
An active attack involves probing the network to discover individual hosts to
confirm the information gathered in the passive attack phase.
It involves the risk of detection and is also called “Rattling the doorknobs”or
“Active reconnaissance.”
Active reconnaissance can provide confirmation to an attacker about security
measures in place.
Dr. NGPASC
COIMBATORE | INDIA
How Criminals Plan the Attacks
Dr. NGPASC
COIMBATORE | INDIA
Social Engineering
Social Engineering
Dr. NGPASC
COIMBATORE | INDIA
Social Engineering
Dr. NGPASC
COIMBATORE | INDIA
Social Engineering
Dr. NGPASC
COIMBATORE | INDIA
Social Engineering
Dr. NGPASC
COIMBATORE | INDIA
Social Engineering
Dr. NGPASC
COIMBATORE | INDIA
Social Engineering
Dr. NGPASC
COIMBATORE | INDIA
Social Engineering
https://emkei.cz/
Dr. NGPASC
COIMBATORE | INDIA
Cyberstalking
Cyberstalking
It is defined as the use of information and communications
technology, particularly the Internet, by an individual or group
of individuals to harass another individual, group of
individuals, or organization.
Cyberstalking refers to the use of Internet and/or other
electronic communications devices to stalk another person.
It involves harassing or threatening behavior that an individual
will conduct repeatedly.
As the Internet has become an integral part of our personal
and professional lives, cyberstalkers take advantage of ease of
communication and an increased access to personal
information
Dr. NGPASC
available with a few mouse clicks or keystrokes.
COIMBATORE | INDIA
Cyberstalking
Types of Stalkers
There are primarily two types of stalkers as listed below:
1. Online stalkers: They aim to start the interaction with the
victim directly with the help of the Internet.
2. Offline stalkers: The stalker may begin the attack using
traditional methods such as following the victim, watching the
daily routine of the victim, etc.
Dr. NGPASC
COIMBATORE | INDIA
Cyberstalking
Dr. NGPASC
COIMBATORE | INDIA
Cybercafe and Cybercrimes
Dr. NGPASC
COIMBATORE | INDIA
Cybercafe and Cybercrimes
Dr. NGPASC
COIMBATORE | INDIA
Cybercafe and Cybercrimes
Cybercriminals can either install malicious programs such as
keyloggers and/or Spyware or launch an attack on the target.
Here are a few tips for safety and security while using the
computer in a cybercafe:
1. Always logout
2. Stay with the computer
3. Clear history and temporary files
4. Be alert
5. Avoid online financial transactions
6. Change passwords
7. Virtual keyboard
8. Security warnings
Dr. NGPASC
COIMBATORE | INDIA
Dr. NGPASC
COIMBATORE | INDIA
Dr. NGPASC
COIMBATORE | INDIA Cyber Security by Nina Godbole/Sunit Belapure
Copyright 2011 Wiley India Pvt. Ltd. All rights reserved.
Dr. NGPASC
COIMBATORE | INDIA
Dr. NGPASC
COIMBATORE | INDIA 29