Computer viruses, malware, spyware, and Trojan horses are types of malicious software that can harm computers. Viruses spread by infecting files or programs and getting copied to other computers. Malware performs unwanted tasks like displaying ads or stealing data. Spyware monitors users' online activities without consent. Trojan horses deliver malware hidden within seemingly harmless programs or files. Antivirus software and firewalls help prevent infection by viruses, malware, and other cyber threats.
1) Ethical hacking involves legally accessing a network or system with the owner's permission to test security vulnerabilities. It helps find weaknesses that malicious hackers could exploit.
2) The document provides a history of hacking from the 1960s to present day, including early hackers at MIT and incidents involving stolen credit cards and hacked email accounts.
3) It describes ethical hackers as "white hats" who test security with permission, and outlines some common hacking techniques like port scanning, password cracking, and denial of service attacks used to gather information and launch attacks. The document provides safety tips for online privacy and security.
This document discusses cyber crimes and how to secure computers from cyber threats. It is divided into several sections that cover the definition of cyber crimes, types of cyber crimes such as against persons and property, and types of hackers such as black hats and white hats. The document also provides tips for securing computers, including choosing a secure operating system, internet browser, and security software like firewalls, antivirus programs, and using safe internet practices.
This document discusses computer viruses, malware, and types of malware such as viruses, worms, trojans, spyware, ransomware, and cryptojacking malware. It provides details on how viruses and malware spread and infect systems. It outlines common symptoms of a virus attack such as slowed system speed, pop-up windows, and potential device crashing. It also describes how to categorize malware based on how it spreads and what actions it performs after infecting a system. Specific types of trojans like backdoor, banker, and dropper trojans are outlined. Signs of a spyware infection and examples of historic malware like ILOVEYOU and Conficker are also mentioned.
Firewall and antivirus software both help protect computer systems, but they do so in different ways. A firewall is hardware and software that monitors network traffic and restricts unauthorized access between a private network and the internet. An antivirus software scans for and removes malware like viruses, worms, and trojans that could already be inside a computer system. While firewalls prevent external threats, antivirus software addresses internal threats, and both work together to provide layered security protection.
The document discusses various tools and methods used in cybercrime, including proxy servers, anonymizers, phishing, password cracking, keyloggers, viruses, worms, Trojan horses, backdoors, steganography, denial of service attacks, SQL injection, and buffer overflows. It provides details on how each method works and how attackers use them to launch cyber attacks. The document also outlines the basic stages of a cyber attack, from initial reconnaissance to covering tracks.
The document discusses netiquette, which are guidelines for appropriate and effective communication online. It provides 10 basic rules of netiquette including making a good impression, identifying yourself, being brief, and avoiding rude language. It also discusses specific netiquette for sending messages, replying to messages, and maintaining confidentiality. The document outlines types of netiquette including basics for new users, message sending, replying, and maintaining confidentiality. It also discusses phishing, software piracy, end-user license agreements, and the dangers of software piracy.
This document discusses various types of cyber threats including viruses, worms, Trojan horses, spyware, malware, spam, and hackers/crackers. It defines each threat and provides examples. Viruses are programs that insert copies of themselves into other files or programs to spread. Worms replicate themselves across networks to spread. Trojan horses disguise themselves as useful programs but introduce viruses. Spyware monitors users' online activity without consent. Malware is any unwanted software intended to cause harm. Spam is unsolicited bulk email used for deception. Hackers and crackers aim to gain unauthorized access to systems for malicious purposes like theft. Antivirus tools can help protect against these cyber threats.
1. The document discusses network security goals such as protecting confidentiality, ensuring data integrity, and ensuring data availability.
2. It recommends planning for security which includes creating security policies and procedures, performing risk assessments, and ensuring adequate funding and staff training.
3. The document defines various types of malware like viruses, trojans, spyware, worms, and bots, and explains spam and phishing scams.
1) Ethical hacking involves legally accessing a network or system with the owner's permission to test security vulnerabilities. It helps find weaknesses that malicious hackers could exploit.
2) The document provides a history of hacking from the 1960s to present day, including early hackers at MIT and incidents involving stolen credit cards and hacked email accounts.
3) It describes ethical hackers as "white hats" who test security with permission, and outlines some common hacking techniques like port scanning, password cracking, and denial of service attacks used to gather information and launch attacks. The document provides safety tips for online privacy and security.
This document discusses cyber crimes and how to secure computers from cyber threats. It is divided into several sections that cover the definition of cyber crimes, types of cyber crimes such as against persons and property, and types of hackers such as black hats and white hats. The document also provides tips for securing computers, including choosing a secure operating system, internet browser, and security software like firewalls, antivirus programs, and using safe internet practices.
This document discusses computer viruses, malware, and types of malware such as viruses, worms, trojans, spyware, ransomware, and cryptojacking malware. It provides details on how viruses and malware spread and infect systems. It outlines common symptoms of a virus attack such as slowed system speed, pop-up windows, and potential device crashing. It also describes how to categorize malware based on how it spreads and what actions it performs after infecting a system. Specific types of trojans like backdoor, banker, and dropper trojans are outlined. Signs of a spyware infection and examples of historic malware like ILOVEYOU and Conficker are also mentioned.
Firewall and antivirus software both help protect computer systems, but they do so in different ways. A firewall is hardware and software that monitors network traffic and restricts unauthorized access between a private network and the internet. An antivirus software scans for and removes malware like viruses, worms, and trojans that could already be inside a computer system. While firewalls prevent external threats, antivirus software addresses internal threats, and both work together to provide layered security protection.
The document discusses various tools and methods used in cybercrime, including proxy servers, anonymizers, phishing, password cracking, keyloggers, viruses, worms, Trojan horses, backdoors, steganography, denial of service attacks, SQL injection, and buffer overflows. It provides details on how each method works and how attackers use them to launch cyber attacks. The document also outlines the basic stages of a cyber attack, from initial reconnaissance to covering tracks.
The document discusses netiquette, which are guidelines for appropriate and effective communication online. It provides 10 basic rules of netiquette including making a good impression, identifying yourself, being brief, and avoiding rude language. It also discusses specific netiquette for sending messages, replying to messages, and maintaining confidentiality. The document outlines types of netiquette including basics for new users, message sending, replying, and maintaining confidentiality. It also discusses phishing, software piracy, end-user license agreements, and the dangers of software piracy.
This document discusses various types of cyber threats including viruses, worms, Trojan horses, spyware, malware, spam, and hackers/crackers. It defines each threat and provides examples. Viruses are programs that insert copies of themselves into other files or programs to spread. Worms replicate themselves across networks to spread. Trojan horses disguise themselves as useful programs but introduce viruses. Spyware monitors users' online activity without consent. Malware is any unwanted software intended to cause harm. Spam is unsolicited bulk email used for deception. Hackers and crackers aim to gain unauthorized access to systems for malicious purposes like theft. Antivirus tools can help protect against these cyber threats.
1. The document discusses network security goals such as protecting confidentiality, ensuring data integrity, and ensuring data availability.
2. It recommends planning for security which includes creating security policies and procedures, performing risk assessments, and ensuring adequate funding and staff training.
3. The document defines various types of malware like viruses, trojans, spyware, worms, and bots, and explains spam and phishing scams.
This document provides an alphabetical list of terms related to cyber crimes, beginning with "Anonymizer" and ending with "Zombie". Each term is defined in 1-2 paragraphs. Some key terms summarized include:
- Anonymizer - A tool that hides a user's identity and location when browsing the internet. It can enable criminal behavior by avoiding consequences.
- ARP cache poisoning - A technique where an attacker sends fake ARP messages to intercept and alter network data like passwords or credit card numbers.
- Cyber stalking - The use of electronic devices to stalk or harass someone repeatedly in a threatening manner. Most states have laws against cyber stalking.
- DOS/DDOS attacks -
This document discusses different types of hackers: black hat, white hat, and grey hat. Black hat hackers illegally access computer systems for personal or financial gain through malware. White hat, or ethical, hackers are hired by companies to test security systems legally. Grey hat hackers fall in between, accessing systems without permission but reporting vulnerabilities in hopes of compensation. The document outlines the motives and activities of each hacker type.
Cyber crime introduction awareness program at st. xavierMo Han
This document provides an overview of cyber awareness and cybersecurity. It discusses common types of cybercrimes such as hacking, identity theft, and online fraud. It also outlines the main types of cybercriminals and their motivations. Statistics on cybercrime cases in Nepal from fiscal years 2071/72 to 2073/74 are presented, showing a rise in cases involving social media. The document concludes with tips for safe internet usage, social media practices, and basic router security settings.
1) The document discusses internet and computer security, including securing web browsers, encrypting emails, using firewalls and passwords, and protecting against malware like viruses, worms, Trojan horses, spyware, and adware.
2) It also covers types of computer crimes such as hacking, phishing, computer viruses, cyberstalking, and identity theft.
3) Some recommended anti-virus software includes BkavPro Internet Security and Kaspersky Internet Security 2011 which provide protection from threats, attacks, and unwanted information.
The document defines and describes different types of malware, including viruses, worms, Trojans, spyware, and adware. It notes that viruses replicate and spread between computers, while worms use networks to transfer. Trojans disguise themselves as useful programs but leave systems unprotected. Spyware and keyloggers monitor users' activities and record keystrokes without consent. Adware bombards users with advertisements. It also defines spam email and phishing, the goal of which is to acquire sensitive personal information through fraudulent emails linking to fake websites.
This document discusses five main internet threats: malware, spam, phishing, botnets, and DOS attacks. Malware includes viruses, worms, trojans, spyware, and adware which can replicate and spread between computers through various means to access users' information or monitor their activities without consent. Spam involves unwanted emails, often containing malware, from bots or advertisers. Phishing tricks users into providing private details like passwords or financial information. Botnets are networks of compromised computers controlled remotely. DOS attacks disrupt access to internet services.
System failures can occur due to various reasons such as user error, environmental factors, aging hardware, software errors, and power issues. This disrupts computer operation and can result in data loss. Surge protectors and uninterruptible power supplies (UPS) can help protect devices from electrical disturbances. For wireless networks, enabling encryption via WPA and changing default settings are important for security. Home users should take steps like filtering devices, using strong passwords, and enabling firewalls.
There are different types of hackers categorized by their intentions and methods:
1. White hat hackers legally hack to expose vulnerabilities and help organizations improve security.
2. Black hat hackers illegally hack with malicious intent to steal data or cause harm.
3. Grey hat hackers operate in a middle ground, sometimes hacking legally to expose issues but their methods may still be considered unauthorized access.
Types of hacking programs include trojan horses, computer viruses, and computer worms, which can spread maliciously or be used to gain unauthorized access. Popular hacker culture is also depicted in cyberpunk novels and films.
This document defines over 50 common internet safety terms, including adware, avatars, back doors, bit torrent, blogs, cookies, cyber grooming, cyberbullying, cyberstalking, encryption, flamers, grooming, hackers, identity theft, imposters, looping, lurkers, malware, mashups, mouse trapping, netiquette, netizens, personal information, pharming, phishing, predators, privacy, screen names, screenshots, sexting, social media sites, spam, spoofing, spyware, stalking, stranger danger, Trojan horses, trolls, urban legends, viruses, and worms. The definitions provide clarity on common online threats, behaviors,
This PPT help you to present the topic Hacking at collage level and professional level. If you need more please share an email rashed_ec2012@rediffmail.com
This document discusses hacking (cybercrime) and defines it as illegally accessing computer systems or networks without authorization. It outlines the history of hacking from the early positive use of the term to refer to clever programming to the modern negative connotation involving illegal activity. It describes different types of hackers (black hat, white hat, grey hat) and types of cybercrimes like hacking, denial of service attacks, and software piracy. Laws around catching and punishing hackers are also summarized.
Shawon Raffi is presenting on the topic of hacking. He explains that hacking has negative connotations but can actually be used for positive purposes like security testing and finding vulnerabilities. There are different types of hackers, including black hat hackers who perform criminal acts and white hat hackers who work in cybersecurity. The presentation then covers the history of hacking, definitions, famous hackers, countries with many hackers, and tips for protecting against hackers. It aims to provide an overview of hacking and clear up misconceptions, while emphasizing the importance of ethical hacking for security.
This document defines and describes different types of malware including viruses, worms, spyware, trojans, rootkits, backdoors, botnets, and ransomware. It provides examples of each type and notes key characteristics like how they spread, what damage they can cause, and whether they self-replicate or need user execution. Charts are included showing overall malware trends over time as well as trends in new malware detections.
Hacking involves gaining unauthorized access to computer systems or networks. There are three main types of hackers: white hats who hack for security testing, black hats who hack maliciously, and grey hats who may hack to expose vulnerabilities but also for profit. Common hacking targets include passwords, emails, websites, and credit card numbers. While hacking can be used to recover lost passwords or test security, it is illegal and poses disadvantages like enabling criminals, harming privacy, and allowing destruction of work.
Cyber safety involves being aware of risks to personal information and property when using the internet and protecting oneself from computer crime. Cyberbullying is a form of bullying using electronic means such as sending threats through email, spreading rumors online or on social media, and stealing account information. Common online threats include computer viruses, Trojan horses, adware/spyware, worms, and phishing. Viruses can infect other computers and steal data while Trojan horses pretend to be harmless but infect computers. Spyware aims to gather private information without consent. To stay safe online, do not share personal information with strangers and block unknown people.
This document discusses online reputation and internet safety. It notes that there are over 1.7 billion internet users worldwide, including 57.4 million in the Arab world and 13 million in Egypt. It emphasizes the importance of online reputation and discusses how what users post online can affect their employment, social lives, and relationships. The document provides tips for maintaining online safety, including being cautious of what personal information is shared, using privacy settings, and thinking before posting content. It also outlines best practices for computer security, such as using firewalls, antivirus software, and strong passwords.
This document discusses various types of cybercrime and network threats such as hacking, malware, phishing, and website defacing. It defines key terms like hackers, crackers, cyber terrorists, and botnets. It also examines the motivations of different cybercriminals such as hackers, malware writers, and describes common types of malware like viruses, worms, and trojan horses. The document uses examples to illustrate threats from defaced websites, domain hacking, and encourages basic cybersecurity practices like strong passwords.
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
IT security, hackers,IT security and risks and safe guards, password, how to create password, bio-metric authentication , virus , antivirus software ,how to safe a devices from virus.types of viruses
This document provides an alphabetical list of terms related to cyber crimes, beginning with "Anonymizer" and ending with "Zombie". Each term is defined in 1-2 paragraphs. Some key terms summarized include:
- Anonymizer - A tool that hides a user's identity and location when browsing the internet. It can enable criminal behavior by avoiding consequences.
- ARP cache poisoning - A technique where an attacker sends fake ARP messages to intercept and alter network data like passwords or credit card numbers.
- Cyber stalking - The use of electronic devices to stalk or harass someone repeatedly in a threatening manner. Most states have laws against cyber stalking.
- DOS/DDOS attacks -
This document discusses different types of hackers: black hat, white hat, and grey hat. Black hat hackers illegally access computer systems for personal or financial gain through malware. White hat, or ethical, hackers are hired by companies to test security systems legally. Grey hat hackers fall in between, accessing systems without permission but reporting vulnerabilities in hopes of compensation. The document outlines the motives and activities of each hacker type.
Cyber crime introduction awareness program at st. xavierMo Han
This document provides an overview of cyber awareness and cybersecurity. It discusses common types of cybercrimes such as hacking, identity theft, and online fraud. It also outlines the main types of cybercriminals and their motivations. Statistics on cybercrime cases in Nepal from fiscal years 2071/72 to 2073/74 are presented, showing a rise in cases involving social media. The document concludes with tips for safe internet usage, social media practices, and basic router security settings.
1) The document discusses internet and computer security, including securing web browsers, encrypting emails, using firewalls and passwords, and protecting against malware like viruses, worms, Trojan horses, spyware, and adware.
2) It also covers types of computer crimes such as hacking, phishing, computer viruses, cyberstalking, and identity theft.
3) Some recommended anti-virus software includes BkavPro Internet Security and Kaspersky Internet Security 2011 which provide protection from threats, attacks, and unwanted information.
The document defines and describes different types of malware, including viruses, worms, Trojans, spyware, and adware. It notes that viruses replicate and spread between computers, while worms use networks to transfer. Trojans disguise themselves as useful programs but leave systems unprotected. Spyware and keyloggers monitor users' activities and record keystrokes without consent. Adware bombards users with advertisements. It also defines spam email and phishing, the goal of which is to acquire sensitive personal information through fraudulent emails linking to fake websites.
This document discusses five main internet threats: malware, spam, phishing, botnets, and DOS attacks. Malware includes viruses, worms, trojans, spyware, and adware which can replicate and spread between computers through various means to access users' information or monitor their activities without consent. Spam involves unwanted emails, often containing malware, from bots or advertisers. Phishing tricks users into providing private details like passwords or financial information. Botnets are networks of compromised computers controlled remotely. DOS attacks disrupt access to internet services.
System failures can occur due to various reasons such as user error, environmental factors, aging hardware, software errors, and power issues. This disrupts computer operation and can result in data loss. Surge protectors and uninterruptible power supplies (UPS) can help protect devices from electrical disturbances. For wireless networks, enabling encryption via WPA and changing default settings are important for security. Home users should take steps like filtering devices, using strong passwords, and enabling firewalls.
There are different types of hackers categorized by their intentions and methods:
1. White hat hackers legally hack to expose vulnerabilities and help organizations improve security.
2. Black hat hackers illegally hack with malicious intent to steal data or cause harm.
3. Grey hat hackers operate in a middle ground, sometimes hacking legally to expose issues but their methods may still be considered unauthorized access.
Types of hacking programs include trojan horses, computer viruses, and computer worms, which can spread maliciously or be used to gain unauthorized access. Popular hacker culture is also depicted in cyberpunk novels and films.
This document defines over 50 common internet safety terms, including adware, avatars, back doors, bit torrent, blogs, cookies, cyber grooming, cyberbullying, cyberstalking, encryption, flamers, grooming, hackers, identity theft, imposters, looping, lurkers, malware, mashups, mouse trapping, netiquette, netizens, personal information, pharming, phishing, predators, privacy, screen names, screenshots, sexting, social media sites, spam, spoofing, spyware, stalking, stranger danger, Trojan horses, trolls, urban legends, viruses, and worms. The definitions provide clarity on common online threats, behaviors,
This PPT help you to present the topic Hacking at collage level and professional level. If you need more please share an email rashed_ec2012@rediffmail.com
This document discusses hacking (cybercrime) and defines it as illegally accessing computer systems or networks without authorization. It outlines the history of hacking from the early positive use of the term to refer to clever programming to the modern negative connotation involving illegal activity. It describes different types of hackers (black hat, white hat, grey hat) and types of cybercrimes like hacking, denial of service attacks, and software piracy. Laws around catching and punishing hackers are also summarized.
Shawon Raffi is presenting on the topic of hacking. He explains that hacking has negative connotations but can actually be used for positive purposes like security testing and finding vulnerabilities. There are different types of hackers, including black hat hackers who perform criminal acts and white hat hackers who work in cybersecurity. The presentation then covers the history of hacking, definitions, famous hackers, countries with many hackers, and tips for protecting against hackers. It aims to provide an overview of hacking and clear up misconceptions, while emphasizing the importance of ethical hacking for security.
This document defines and describes different types of malware including viruses, worms, spyware, trojans, rootkits, backdoors, botnets, and ransomware. It provides examples of each type and notes key characteristics like how they spread, what damage they can cause, and whether they self-replicate or need user execution. Charts are included showing overall malware trends over time as well as trends in new malware detections.
Hacking involves gaining unauthorized access to computer systems or networks. There are three main types of hackers: white hats who hack for security testing, black hats who hack maliciously, and grey hats who may hack to expose vulnerabilities but also for profit. Common hacking targets include passwords, emails, websites, and credit card numbers. While hacking can be used to recover lost passwords or test security, it is illegal and poses disadvantages like enabling criminals, harming privacy, and allowing destruction of work.
Cyber safety involves being aware of risks to personal information and property when using the internet and protecting oneself from computer crime. Cyberbullying is a form of bullying using electronic means such as sending threats through email, spreading rumors online or on social media, and stealing account information. Common online threats include computer viruses, Trojan horses, adware/spyware, worms, and phishing. Viruses can infect other computers and steal data while Trojan horses pretend to be harmless but infect computers. Spyware aims to gather private information without consent. To stay safe online, do not share personal information with strangers and block unknown people.
This document discusses online reputation and internet safety. It notes that there are over 1.7 billion internet users worldwide, including 57.4 million in the Arab world and 13 million in Egypt. It emphasizes the importance of online reputation and discusses how what users post online can affect their employment, social lives, and relationships. The document provides tips for maintaining online safety, including being cautious of what personal information is shared, using privacy settings, and thinking before posting content. It also outlines best practices for computer security, such as using firewalls, antivirus software, and strong passwords.
This document discusses various types of cybercrime and network threats such as hacking, malware, phishing, and website defacing. It defines key terms like hackers, crackers, cyber terrorists, and botnets. It also examines the motivations of different cybercriminals such as hackers, malware writers, and describes common types of malware like viruses, worms, and trojan horses. The document uses examples to illustrate threats from defaced websites, domain hacking, and encourages basic cybersecurity practices like strong passwords.
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
IT security, hackers,IT security and risks and safe guards, password, how to create password, bio-metric authentication , virus , antivirus software ,how to safe a devices from virus.types of viruses
This document provides information on data protection, cybersecurity, cybercrime, and how to protect yourself online. It defines cybersecurity, cybercrime, and related terms. It identifies different types of cybercrimes such as libel, illegal access, data interference, and identity theft. It also defines different types of malware like viruses, worms, trojan horses, spyware, and adware. Finally, it lists best practices for protecting against cybercrime and malware, which include using antivirus software, strong passwords, backing up files, and avoiding suspicious websites.
Feel free to share to every aspiring ICT SHS teacher that is starting out. Just please do not take the copyright credit. The content is taken from Rex and Abiva Empowerment Technologies books.
The document discusses various topics related to computer security including definitions of computer security, cyber security, and IT security. It defines key concepts like confidentiality, integrity, and availability. It also defines common security threats like unauthorized access, hackers, vulnerabilities, and attacks. It discusses security measures like antivirus software, firewalls, and provides examples of computer crimes and viruses.
Malware comes in many forms and can damage computers in several ways. It is designed to spread without permission and perform unwanted tasks. Common types of malware include viruses, trojans, worms, spyware, and ransomware. Malware spreads through emails, websites, removable drives, and social networks. It can steal personal information, encrypt files until payment is made, and turn computers into bots. Users should protect themselves by installing antivirus software, practicing caution online, and scanning for malware regularly.
Cyber security awareness is important as the internet allows attackers to target systems from anywhere in the world. Poor security practices can lead to identity theft, monetary theft, and legal issues. Common attack vectors include web browsers, IM clients, web applications, and excessive user rights. A secure system ensures confidentiality, integrity, and availability of information for authorized users. Threats like phishing, social engineering, malware, and ransomware put systems at risk. Cybercrime ranges from attacks on computer systems to using computers to enable traditional crimes. Maintaining cyber security requires a skilled workforce to protect increasingly connected infrastructure.
Cyber security awareness is important as the internet allows attackers to target systems from anywhere in the world. Poor security practices can lead to identity theft, monetary theft, and legal issues. Common attack vectors include web browsers, IM clients, web applications, and excessive user rights. Cyber security aims to protect computers and data through security best practices like authentication and availability of authorized access. Threats like phishing, social engineering, malware, and ransomware put systems at risk. Organizations must understand vulnerabilities and how to prevent and respond to cyber attacks and data breaches.
Computer Security: Vulnerabilities and Solutions is a document that discusses computer and internet security. It begins with an introduction to hacking, including the different types of hackers like white hat, black hat, and grey hat hackers. It then discusses common vulnerabilities like viruses, worms, Trojan horses, phishing attacks, and denial of service attacks. The document concludes by providing some common solutions for improving security, such as using antivirus software, firewalls, being cautious of unknown links and apps, and educating yourself on computer security best practices.
This document discusses computer security and cybercrime. It defines various types of cybercriminals like hackers and crackers. It also discusses different types of malware like viruses, worms, and Trojan horses. The document provides information on how to protect computers from malware through antivirus software and other security measures. It describes cybercrimes like denial of service attacks, spoofing, and information theft. The document also covers topics like encryption, digital certificates, and cyber ethics.
The document discusses various online security threats such as viruses, worms, Trojans, spyware, and denial of service attacks. It defines each threat and provides examples. Golden rules for staying safe online include not giving out personal information, not sending indecent photos, and telling someone if anything seen online causes worry. Understanding the differences between threats like privilege escalation, rootkits, botnets, and logic bombs is the first step to combating security risks. Maintaining up-to-date anti-virus software, patching systems, and timely updates help arm against these extensive and growing threats.
Computer security is the process of preventing and detecting unauthorized use of our computer. Prevention measures help us to stop unauthorized users from accessing any part of your computer system. Detection helps us to determine whether or not someone attempted to break into the system, if they were successful, and what they may have done.
This document discusses network and internet security and types of cyber crimes. It notes that while computers can be used for good or bad, some people use them to carry out illegal activities known as computer crimes. It then describes different types of perpetrators of cyber crimes like hackers, crackers, script kiddies, corporate spies, unethical employees, cyberextortionists, and cyberterrorists. The document also provides details on different types of computer viruses like worms, Trojan horses, macros, and boot sector viruses. It explains concepts like logic bombs, time bombs, data diddling, data stealing, and software piracy.
Computer viruses are small programs that spread from one computer to another and interfere with operations. They can corrupt or delete data, use email to spread, or erase hard disks. Viruses often spread through email attachments from unknown senders that appear to be images, cards, or files. Keeping computers updated and using antivirus tools can help avoid viruses.
Computer and network security helps protect data and equipment from internal and external threats. Internal threats come from inside an organization from users and employees, while external threats come from outside the organization from unauthorized users. Security threats can physically damage equipment or steal and corrupt data. Malware like viruses, worms, Trojans, and spyware are common security threats that can be installed without user knowledge and harm computers. Organizations implement security policies, passwords, and other measures to protect against these threats.
Introduction to Cyber Security
Understanding the need for CYBERSECURITY
Major security problems
Virus.
Malware.
Trojan Horses
Password Cracking
Hacker.
Types of Hackers
Role of a White Hat Hacker
Feel free to edit or modify or use it
PPT Theme Source/Credit-Aliena · SlidesCarnival
The document provides information about cybersecurity awareness and discusses various cyber threats such as computer viruses, social engineering attacks, and preventive measures. The objective is to educate university students on cybersecurity issues. It defines important terms like cyber crime and cyber security. It describes common cyber attacks like ransomware, phishing and social media attacks. It also discusses computer viruses, social engineering techniques, and provides tips to create strong passwords and protect personal information online. The document emphasizes that education and awareness are important to prevent cyber crimes.
This document discusses computer and cyber security. It begins by noting that the only truly secure system is one that is powered off, locked away, and guarded. It then discusses how the internet allows attackers to work remotely from anywhere. Common cyber attack vectors include web browsers, IM clients, web applications, and excessive user rights. Cyber security aims to protect computers and data in the same way we secure our homes from threats. The domains of cyber security include confidentiality, integrity, and availability of information. Threats include phishing, social engineering, malware like ransomware, and more.
Cyber attacks come in many forms, including virus attacks which infect software with viruses and destroy data, hack attacks which gain unauthorized access to information, and injection attacks which insert malicious code. The article outlines five ways to protect yourself from cyber attacks: use antivirus software and firewalls, protect your data with encryption and disabling third party apps, use security software, check for cyber attack alerts from organizations like NIST, and monitor your computer activity and check for warning signs to detect potential attacks.
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
This document discusses the meaning and scope of pedagogy. It begins by defining pedagogy as the study of how knowledge and skills are imparted in an educational context, considering interactions during learning. Pedagogy deals with ideas and techniques for teaching, and aims to understand student needs while developing proper conduct. The document then discusses pedagogy further as the act of teaching, using instructional strategies tailored to student backgrounds and goals. Finally, it addresses the scope of pedagogy, noting how technology has expanded interests in teacher education beyond the classroom to professional development with educational purposes and values.
The document is a student assignment on the topic of educational technology. It discusses the meaning, objectives, and scope of educational technology. Educational technology is defined as a system using machines, materials, media, methods, and men to achieve specific educational objectives. The objectives of educational technology include identifying educational needs, determining educational aims and curriculum, and developing models to improve teaching and learning. The scope of educational technology is as wide as education itself and includes administration, testing, and instructional processes.
Copyright is the exclusive legal right given to authors and creators for a certain period of time to control the publication, distribution and sale of copies of their original work. Creative Commons licenses enable free distribution of copyrighted works, allowing authors to specify how others can share, use and build upon their creations. There are different types of Creative Commons licenses that give others varying levels of permissions.
Copyright is the exclusive legal right given to authors and creators for a certain period of time to control the publication, distribution and sale of copies of their original work. Creative Commons licenses enable free distribution of copyrighted works, allowing authors to specify how others can share, use and build upon their creations. There are different types of Creative Commons licenses that give others varying levels of permissions.
Exploratory learning is a student-centered approach that encourages creative thinking, hands-on experience of key concepts, and reflection. It allows students to make unexpected discoveries by exploring relationships between new and existing knowledge through less structured means than traditional didactic learning. Exploratory learning is effective for teaching problem-solving and thinking skills, and fosters cognitive development through social interaction and a shift away from routine perspectives towards innovative thinking. It employs tools like micro worlds, hypertexts, and games/simulations to support an open-ended learning process focused on exciting insights and shifting habitual approaches.
The document is a curriculum vitae for Aparna Thampan J, providing personal and educational details. It includes her name, date of birth, family details, address, education history including undergraduate and postgraduate degrees in geography from the University of Kerala and Madurai Kamaraj University. It also lists her computer and language skills, as well as project experience analyzing land use changes in Thiruvananthapuram district.
This document discusses the roles and benefits of workbooks and reference books in geography education. It defines workbooks as books containing exercises and questions for students to work on independently at their own pace. Reference books provide extra information beyond textbooks and are used to look up specific facts. The document outlines advantages of each, such as workbooks allowing independent work and reference books providing brief overviews of topics. Overall, it argues that workbooks and reference books play important roles in supplementing textbooks and allowing students to learn at their own pace.
Exploratory learning is a student-centered approach that encourages creative thinking, hands-on experience of key concepts, and reflection. It allows students to explore relationships between new and existing knowledge through less didactic means. Exploratory learning is most effective for teaching problem-solving and thinking skills, as it allows students to reach their own conclusions through varied paths of investigation. It shifts perspectives away from routine approaches through discovery of new ideas and possibilities. Tools for exploratory learning include micro worlds, hypertexts, and some games and simulations.
1. The document discusses various approaches to organizing the curriculum for social science education, including the correlated, integrated, topical, concentric/spiral, and unit approaches.
2. It also outlines several principles for designing social science curriculum, such as being child-centered, activity-centered, environment-centered, focused on human relationships, and community-centered. Additional principles include correlation, interest, individual differences, utility, and fulfilling the needs of higher grades.
3. The conclusion emphasizes that developing social science curriculum should involve all stakeholders and consider the advice of experts to be most effective.
1) The document discusses various IT-enabled instructional resources that can be used in education, including online resources, videos, YouTube, animations, and film clippings.
2) It provides examples of educational YouTube channels like the Research Channel and National Geographic channels that provide scientific and curious information.
3) Animations are discussed as an engaging way to educate students through visual and verbal learning that develops skills like problem solving.
4) Film clippings and videos are highlighted as powerful educational tools that can create emotional connections and allow sharing content globally.
1. The document discusses the importance and effective use of print media like newspapers and magazines in social science learning. It notes how print media can enhance students' interests, broaden their perspectives, and provide current knowledge of world events.
2. It then defines print media as referring to printed matter disseminated through newspapers, journals, newsletters, and other publications. Common types of print media include books, magazines, and newspapers.
3. The document argues that a social science laboratory equipped with various maps, charts, models, reference books, and other resources can provide an engaging environment for hands-on social science learning and help make teaching more effective.
This document is an assignment on using community resources in social science education. It discusses the meaning and importance of community resources, provides examples of different types of community resources like places of civic, cultural, economic, geographical, and historical interest. It also outlines methods for utilizing community resources like field trips and bringing community members into the school. The teacher's role in enhancing parent-teacher cooperation and using community resources is discussed. Overall, the document emphasizes how community resources can make teaching and learning more relevant and help students become better citizens.
This document discusses e-resources, web resources, and social networking. It begins by defining e-resources as electronic files that can be accessed via computer, such as e-books, e-journals, and databases. It then discusses different types of e-resources like online and offline resources. Next, it defines web resources as anything that can be obtained from the world wide web, including web pages, email, and information from databases. The document then explains social networking sites as online platforms that allow users to create profiles and interact with other users through features such as Facebook, LinkedIn, and Twitter. In less than 3 sentences, the document provides an overview of key topics related to technology resources and social media.
A learning management system (LMS) is software that helps plan, implement, and assess educational courses. An LMS allows instructors to create and deliver content, monitor student participation, and assess performance. Students can use interactive features like discussions. Common LMS components include rosters, registration controls, document management, multiple device access, distributed instructors/students, course calendars, student engagement tools, assessments, and grading. LMS can increase learner motivation and interaction, provide feedback, and support learning anytime through various content formats. However, improved outcomes are not guaranteed - proper learning strategies must be used.
This document provides information about the accounting software GNUKhata, including how to install it, create an organization and accounts, and use its features. It discusses the following key points:
- GNUKhata is a free and open source accounting software that uses double-entry bookkeeping.
- To start, the user creates an organization, admin user, and ledger accounts grouped under assets, liabilities, income and expenses.
- Features include financial reports, linking transactions to invoices, password security, and customization to local languages.
- Accounts are created under predefined groups and sub-groups to organize the ledger. The software automatically generates some ledger accounts.
1. The document discusses the impact of GST on the Indian economy, noting that it unifies indirect taxes and brings transparency.
2. Key impacts include increasing competitiveness by reducing costs, simplifying the tax structure, creating a unified economic zone in India, and potentially increasing tax revenues.
3. The rates under GST are 0%, 5%, 12%, 18%, and 28% for different goods and services. The document provides examples of how GST affects prices of items like footwear, cab rides, airline tickets, and more.
Itinerant retailers are traders who do not have a fixed place of business and instead move from place to place to sell their products. They operate without a fixed location and travel around to different areas to conduct business.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
1. 1
Computer Virus
Computer viruses are small software programs that are designed to spread from
one computer to another and to interfere with computer operation. A virus might
corrupt or delete data on your computer, use your e-mail program to spread itself
to other computers, or even erase everything on your hard disk. Viruses often
perform some type of harmful activity on infected hosts, such as stealing hard disk
space or CPU time, accessing private information, corrupting data, increasing
maintenance cost etc. Viruses are most easily spread by attachments in e-mail
messages or instant messaging messages. Viruses also spread through downloads
on the Internet. They can be hidden in illicit software or other files or programs you
might download.
Malware
Malware (for “malicious software”) is any program or file that is harmful to a
computer user. Malware is a term for any software that gets installed on your
machine and performs unwanted tasks, often for some third party’s benefit.
Malware programs can range from being simple pop-up advertising to causing
serious computer invasion and the damage (eg. Stealing passwords and data or
infecting other machines on the network). Some malware provides no uninstall
option, and installs code in unexpected and hidden places (eg. Windows registry) or
modifies the operating system, thus making it more difficult to remove.
Spyware
A program written to monitor your action on a computer. A common type of
spyware is a key-logger program. This program can record every key stroke and
mouse click you make. Spyware can be delivered via a Trojan horse program.
Trojan horse
A program written to deliver a malicious program that may then cause
destruction to your computer. A Trojan horse is delivered by someone or hidden
within another program that may seem harmless.
2. 2
Adware
Adware is any software application in which advertising banners are displayed
while a program is running. The ads are delivered through pop-up windows or bars
that appear on the program's user interface. Adware is commonly created for
computers, but may also be found on mobile devices.
Preventive measures- (Firewall, antivirus software)
How to prevent computer viruses
Install a reliable antivirus program
Avoid suspicious websites
Never Open Email attachments without scanning them first.
Setup automatic scans
Stay away from cracked software
Install a firewall
Firewall
A firewall is a system designed to prevent unauthorized access to or from a
private network. Firewall can be implemented in both software and hardware.
Firewalls are frequently used to prevent unauthorized internet users from accessing
private networks connected to the Internet. All messages entering or leaving the
intranet pass through the firewall, which examines each message and blocks those
that do not meet the specified security criteria. Firewall is a network security system
that monitors and controls the incoming and outgoing network traffic based on
predetermined security rules.
Eg. Zone Alarm firewall, Shardaccess, Mpssvc, Lptables etc.
Antivirus Software
Antivirus software is a program or set of programs that are designed to
prevent, search for, detect and remove software viruses and other malicious
3. 3
software like worms, Trojans, adware and more. These tools are critical for users to
have installed and up-to-date because a computer without antivirus software
installed will be infected within minutes of connecting to the internet. There are
several different companies that build and offer antivirus software and what each
offers can vary but all perform some basic functions:
1. Scan specific files or directories for any malware or known malicious patterns
2. Allow you to schedule scans to automatically run for you
3. Allow you to initiate a scan of a specific file or of your computer, or of a CD or
flash drive at any time.
4. Remove any malicious code detected
Cyber privacy and password protection
Cyber Privacy
Privacy is our right to control what happens with personal information about
us.
Internet privacy violation risks may be minimized as follows:
• Always use preventative s/w applications such as Anti-virus anti-malware.
• Avoid shopping on unreliable websites
• Avoid exposing personal data on websites with lower security levels
• Clear the browser’s cache and browsing history on a consistent basis
• Always use very strong passwords consisting of letters numerals and special
characters.
Passwordprotection
• Never give out your password to any one
• Don’t just use one password
• Create password that easy to remember but hard to others guess.
• Make the password at least 8 characters long
4. 4
• Include numbers capital letters and symbols
• Don’t fall the phishing attack
Legal and ethical issues
Copyright
The exclusive right given by law for a certain term of years to an author,
composer etc. to print, publish and sell copies of his original work. Copyright allows
authors, musicians, artists etc. to make money of their labor. It also prevents people
from altering the work without permission. Copyright law can be protected, literary
work, musical work, Dramatic work, Choreographic work, pictorial, graphic,
sculptural works, motion pictures, AV, Sound recording, architectural works. It give
the copyright holders to reproduce the work, right to prepare derivative works,
right to distribute copies for sale, right to prepare AV work publicly, right to display
musical and artistic works publicly.
Creative Common License
A Creative Commons (CC) license is one of several public copy right
licenses that enable the free distribution of an otherwise copyrighted "work". A CC
license is used when an author wants to give other people the right to share, use,
and build upon a work that they (the author) have created.
Plagiarism
Plagiarism is the "wrongful appropriation" and "stealing and publication" of
another author's "language, thoughts, ideas, or expressions" and the representation
of them as one's own original work. Plagiarism is the act of taking another person’s
writing, conversation, song or even idea and passing it off as your own. This includes
information from web pages, books, songs, television shows, email messages,
interviews, articles, artworks or any other medium. Whenever you paraphrase,
summarize, words, phrases or sentence from another person’s work, it is necessary
to indicate the source of the information within your paper using an internal
citation.
5. 5
Hacking
The process of attempting to gain or successfully gaining unauthorized access
to computer resources for the purpose of help or secure system is called hacking.
Hacking is the technique in which any one can access and one’s computer without
his permission. A hacker knows all about the operating system and different holes in
the system. Computer hacking is when files on your computer are view created or
edited without your authorization. Hacker can gain complete access to your
computer from any were in the world if your computer is turned on, unprotected
and has an internet connection.
1. White-Hat Hackers
The good guys who identify the security weakness of the system or network
and inform the owner about them. A white hat hacker’s breaks security for no-
malicious reasons, perhaps to test their own security system or while working in
a security company which makes security software. White-hat hacker is also
referred to as the ethical hacker.
2. Black Hat Hackers
A black hat hacker is the villain or bad guy, who crash into victim’s security to
steal information and destroy the victim’s security network. Black hat hacker is
also known as cracker. Black hat hacker break into secure networks to destroy
data.
3. Grey Hat Hackers
Grey hat hacker is the combination of black hat hacker and white hat hacker. A
grey hat hacker may surf the internet and hack into a computer system for the
sole purpose of notifying the administrator that their system has a security
defect. Then they may offer correct the defect for a fee.
6. 6
Netiquette
Netiquette is short for "Internet etiquette." Just like etiquette is a code of
polite behavior in society, netiquette is a code of good behavior on the Internet.
This includes several aspects of the Internet, such as email, social media, online
chat, web forums, website comments, multiplayer gaming, and other types of
online communication. There are ten rules of netiquette that everyone who goes
online should follow
• Remember the Human
• Adhere to the same standards online that you follow in real life
• Know where you are in cyberspace
• Respect other people’s time
• Make yourself look good online
• Share expert knowledge
• Help keep flame wars under control
• Respect other people’s privacy
• Don’t abuse your power
• Be forgiving of other people’s mistakes
Phishing
Phishing is a fraudulent attempt, usually made through email, to steal your
personal information. Phishing emails usually appear to come from a well- known
organization and ask for your personal information- such as credit card number,
social security number, account number or password.
Prevent phishing attacks
Do not reply to emails that request financial information, even if ti appears to
be from a trusted source
Do not reply to emails from unrecognized senders.
7. 7
Do not open any links in suspicious emails, instant messages, or chat-room
messages.
Only communicate personal information over the phone or through a secure
website.
Never use email to share personal information.
Avoid using email on public computers.
Don’t click anything in pop-up windows.
Use security programs to protect your computer.
Check your credit report and financial statements regularly
Software piracy
Unauthorized copying or distribution of copyrighted software. It is done by
copying, downloading, sharing, selling or installing multiple copies onto personal or
work computers. A term used to describe the act of illegally using, copying or
distributing software without ownership or legal rights. The majority of software
today is purchased as an one-site license, meaning that only one computer may
have that software installed on it at one time. Copying that software to multiple
computers or sharing it with your friend without multiple Licenses is considered
software piracy, which is illegal. Under the Indian Copyright Act, a software pirate
can be tried under both civil and criminal law. The minimum jail term for software
copyright infringement is seven days and the maximum jail term is three years.
Statutory fines range from a minimum of 50,000 to a maximum of 200000 rupees.
Software privacy
Privacy software is software built to protect the privacy of its users. The
software typically works in conjunction with Internet usage to control or limit the
amount of information made available to third parties. The software can
apply encryption or filtering of various kinds. Privacy software can refer to two
different types of protection. One type is protecting a user's Internet privacy from
the World Wide Web. There are software products that will mask or hide a user's IP
address from the outside world in order to protect the user from identity theft. The
second type of protection is hiding or deleting the users Internet traces that are left
8. 8
on their PC after they have been surfing the Internet. There is software that will
erase all the users Internet traces and there is software that will hide and encrypt a
user's traces so that others using their PC will not know where they have been
surfing.
Cyber law- IT Act 2000,IT Act 2008
Cyber law is the law for regulating controlling and governing cyber space.
Cyber space includes computers network, software, data storage devices, Internet,
websites email and other electronic devices such as mobile phone ATM machines
etc. The Information technology Act 2000 passed by Indian parliament on 17
October 2000.The original act contained in 94 sections, divided in 13 chapters and 4
schedules.
Section Offence Penalty
65 Tampering with computer
source documents
Imprisonment up to three years or/and with
fine up to Rs.200000
66 Hacking with computer
system
Imprisonment up to three years or/and with
fine up to Rs.500000
66A Sending offensive messages **24th
march 2015 SC cancelled this section
66B Receiving stolen computer or
communication device
Imprisonment up to three years or/and with
fine up to Rs.100000
66C Using password of another
person
Imprisonment up to three years or/and with
fine up to Rs.100000
66D Cheating using computer
resource
Imprisonment up to three years or/and with
fine up to Rs.100000
66E Publishing private images of
others
Imprisonment up to three years or/and with
fine up to Rs.200000
66F Acts of cyber terrorism Imprisonment up to life.
67 Publishing information which
is obscene in electronic form
Imprisonment up to five years or/and with
fine up to Rs.1000000
9. 9
67A Publishing images containing
sexual acts
Imprisonment up to seven years or/and
with fine up to Rs.1000000
67B Publishing Child porn or
predating children online
Imprisonment up to five years or/and with
fine up to Rs.1000000 on first conviction.
Imprisonment up to seven years or/and
with fine up to Rs.1000000 on second
conviction.
67C Failure to maintain records Imprisonment up to three years or/and with
fine
68 Failure/refusal to comply
with orders
Imprisonment up to three years or/and with
fine up to Rs.200000
69 Failure/refusal to decrypt
data
Imprisonment up to seven years and
possible fine
70 Securing access or
attempting to secure access
to a protected system
Imprisonment up to tenyears or/and with
fine
71 Misrepresentation Imprisonment up to three years or/and with
fine up to Rs.100000
IT Act 2008
The information technology Amendment Act, 2008(IT Act 2008) is a
substantial addition to India’s Information Technology Act 2000. In the 2008 version
of the act there are 124 sections and 14 chapters. The IT Amendment Act was
passed by the Indian parliament in October 2008 and came into force a year later.
The Act is administered by the Indian Computer Emergency Response Team (CERT-
In). The original Act was developed to promote the IT industry, regulate e-
commerce, facilitate e-governance and prevent cybercrimes. The Amendment has
been criticized for decreasing the penalties for some cybercrimes and for lacking
sufficient safeguards to protect the civil rights of individuals.
10. 10
Morphing
Short for metamorphosing, morphing refers to an animation technique in
which one image is gradually turned into another. Many advanced animation
programs support some type of morphing feature. Morphing is editing the original
picture by unauthorized user or fake identity. It was identified that female’s pictures
are downloaded by fake users and again re-posted/uploaded on different websites
by creating fake profiles after editing it.
Pornography
Porn is the abbreviation for pornography, which is sexual material that is
explicitly portrayed for the primary purpose of sexual arousal. Sexually explicit
material can be presented in a variety of ways, including magazines, photographs,
Films, writings, sculptures, animation, sound recordings and video games. The
effects of pornography have a tremendous amount of negative outcomes. Some
research has shown that viewing/using pornography has an influence on domestic
violence, sexual dysfunction, rape, difficulties with a sexual relationship and child
sexual abuse.
Health hazards of using computer
Repetitive Strain Injury(RSI) in Wrists and Hands
Typing and using a mouse for long periods are common causes of RSI in
the wrist (it is often called carpal-tunnel syndrome)
1. Use a wrist-rest to support the wrists while typing and when using the
mouse
2. Take regular break from typing or using the mouse
Back and Neck Ache
People suffer from back and neck pain after working at a computer for a
long time. This is usually due to them having a bad sitting posture.
1. Use an adjustable, ergonomic chair and take the time to set it up
properly.
11. 11
2. The computer keyboard and monitor should be at the correct height for
the seated person (keyboard lower than the elbow, top of monitor at eye
level)
3. Take regular breaks: get up, walk around, stretch your muscles
Eye-Strain
This is caused by looking at a monitor which is a constant distance away.
The muscles that focus your eyes do not move, so get tired and painful. Eye-
strain can also causes headaches.
1. Look away from the monitor at regular Intervals refocus on distant or
close objects to exercise the muscles in the eye.
2. Use an anti-glare filter in front of the monitor to cut down on screen
reflections that can also tire the eyes.