SlideShare a Scribd company logo
Cyber Space
• Cyberspace is a domain characterized by the use
of electronics and the electromagnetic spectrum
to store, modify, and exchange data via
networked systems and associated physical
infrastructures.
• In effect, cyberspace can be thought of as the
interconnection of human beings through
computers and telecommunication, without
regard to physical geography.
Threats in Cyberspace
1.
2.
3.
4.
5.

Hacktivism
Cybercrime
Cyberespionage
Cyberwar
Cyberterrorism
1. Hacktivism
Hacktivism
• Hacktivism is the use of computers and
computer networks to promote political ends,
chiefly free speech, human rights, and
information ethics. It is carried out under the
premise that proper use of technology can
produce results similar to those of
conventional acts of protest, activism, and civil
disobedience
Defacing Web Pages
• Defacing Web Pages: Between 1995 and 1999
Attrition.org reported 5,000 website
defacements. In such a scenario, the hacktivist
will significantly alter the front page of a
company's or governmental agency's website.
Web Sit-ins
• In this form of hacktivism, hackers attempt to
send so much traffic to the site that the
overwhelmed site becomes inaccessible to
other users in a variation on a denial of
service.
E-mail Bombing
• E-mail Bombing: Hacktivists send scores of emails with large file attachments to their
target's e-mail address.
Website Mirroring
• It is used as a circumvention tool to bypass
censorship blocks on websites. It is a
technique that copies the content of a
censored website and posts it to other
domains and subdomains that are not
censored.
Geo-bombing
• Geo-bombing: a technique in which netizens
add a geo-tag while editing YouTube videos so
that the location of the video can be displayed
in Google Earth.
Anonymous blogging
• Anonymous blogging: a method of speaking
out to a wide audience about human rights
issues, government oppression, etc. that
utilizes various web tools such as free email
accounts, IP masking, and blogging software
to preserve a high level of anonymity.
Doxing
• Doxing is the practice of outing of private
information about individuals, but the term is
sometimes used more broadly to refer to
exposing embarrassing information about
organizations
Swatting
• Swatting is the act of triggering a police raid,
usually that of an anti-terrorist team SWAT in
the United States, typically for retaliation or
harassment and based on providing false
information to law enforcement.
Cyber crime
Cyber crime
Computer crime
Computer crime refers to any crime that
involves a computer and a network. The
computer may have been used in the
commission of a crime, or it may be the
target
Net crime
Net crime refers to criminal exploitation
of the Internet.
Cybercrimes
• Halder and Jaishankar (2011) defines Cybercrimes
as: "Offences that are committed against
individuals or groups of individuals with a
criminal motive to intentionally harm the
reputation of the victim or cause physical or
mental harm to the victim directly or indirectly,
using modern telecommunication networks such
as Internet (Chat rooms, emails, notice boards
and groups) and mobile phones (SMS/MMS)".
• Such crimes may threaten a nation’s security and
financial health.
Cybercrimes
• Issues surrounding this type of crime have
become high-profile, particularly those
surrounding cracking, copyright infringement,
child pornography, and child grooming. There
are also problems of privacy when confidential
information is lost or intercepted, lawfully or
otherwise.
Categories of Cybercrimes
Cyber crime encompasses a broad range of
activities. Generally, however, it may be divided
into two categories:
(1) crimes that target computers directly
(2) crimes facilitated by computer networks or
devices, the primary target of which is
independent of network or device.
Categories of Cybercrimes
1.Crimes that primarily target computer networks or
devices include:
1. Computer viruses
2. Denial-of-service attacks
3. Malware (malicious code)
2.Crimes that use computer networks or devices to
advance other ends include:
1. Cyber stalking
2. Fraud and identity theft
3. Information warfare
4. Phishing scams
computer virus
• A computer virus is a computer program that
can replicate itself and spread from one
computer to another. The term "virus" is also
commonly, but erroneously, used to refer to
other types of malware, including but not
limited to adware and spyware programs that
do not have a reproductive ability.
denial-of-service attack (DoS attack)
In computing, a denial-of-service attack (DoS
attack) or distributed denial-of-service attack
(DDoS attack) is an attempt to make a machine
or network resource unavailable to its intended
users. Although the means to carry out, motives
for, and targets of a DoS attack may vary, it
generally consists of the efforts of one or more
people to temporarily or indefinitely interrupt or
suspend services of a host connected to the
Internet.
Malware
• Malware, short for malicious (or malevolent)
software, is software used or programmed by
attackers to disrupt computer operation,
gather sensitive information, or gain access to
private computer systems. It can appear in the
form of code, scripts, active content, and
other software. Malware' is a general term
used to refer to a variety of forms of hostile or
intrusive software
Cyberstalking
• Cyberstalking is the use of the Internet or other
electronic means to stalk or harass an individual, a
group of individuals, or an organization. It may include
the making of false accusations or statements of fact (,
monitoring, making threats, identity theft, damage to
data or equipment, the solicitation of minors for sex, or
gathering information that may be used to harass. The
definition of "harassment" must meet the criterion
that a reasonable person, in possession of the same
information, would regard it as sufficient to cause
another reasonable person distress
Fraud
Fraud is intentional deception made for
personal gain or to damage another individual.
Fraud is a crime and a civil law violation, though
the specific criminal law definition varies by
legal jurisdiction. Defrauding people or entities
of money or valuables is a common purpose of
fraud.
Identity theft
• Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by assuming
that person's identity, typically in order to access resources
or obtain credit and other benefits in that person's name.
• The victim of identity theft (here meaning the person
whose identity has been assumed by the identity thief) can
suffer adverse consequences if they are held accountable
for the perpetrator's actions.
• Identity theft occurs when someone uses another's
personally identifying information, like their name,
identifying number, or credit card number, without their
permission, to commit fraud or other crimes.
Information Warfare
• Information Warfare (IW) is primarily an American
concept involving the use and management of
information technology in pursuit of a competitive
advantage over an opponent.
• Information warfare may involve collection of tactical
information, assurance that one's own information is
valid, spreading of propaganda or disinformation to
demoralize or manipulate the enemy and the public,
undermining the quality of opposing force information
and denial of information-collection opportunities to
opposing forces. Information warfare is closely linked
to psychological warfare.
Phishing
• Phishing is the act of attempting to acquire
information such as usernames, passwords, and
credit card details (and sometimes, indirectly,
money) by masquerading as a trustworthy entity
in an electronic communication.
• Communications purporting to be from popular
social web sites, auction sites, online payment
processors or IT administrators are commonly
used to lure the unsuspecting public. Phishing
emails may contain links to websites that are
infected with malware
Cyber terrorism
Cyber terrorism
Cyber terrorism is the use of Internet based
attacks in terrorist activities, including acts of
deliberate, large-scale disruption of computer
networks, especially of personal computers
attached to the Internet, by the means of tools
such as computer viruses.
Types of cyber terrorism
Simple-Unstructured
The capability to conduct basic hacks against
individual systems using tools created by
someone else. The organization possesses little
target analysis, command and control, or
learning capability.
Types of cyber terrorism
Advanced-Structured
The capability to conduct more sophisticated
attacks against multiple systems or networks
and possibly, to modify or create basic hacking
tools. The organization possesses an elementary
target analysis, command and control, and
learning capability.
Types of cyber terrorism
Complex-Coordinated:
The capability for a coordinated attacks capable
of causing mass-disruption against integrated,
heterogeneous defenses (including
cryptography). Ability to create sophisticated
hacking tools. Highly capable target analysis,
command and control, and organization learning
capability
Cyber crime
Halder and Jaishankar (2011) defines
Cybercrimes as: "Offences that are committed
against individuals or groups of individuals with
a criminal motive to intentionally harm the
reputation of the victim or cause physical or
mental harm to the victim directly or indirectly,
using modern telecommunication networks
such as Internet (Chat rooms, emails, notice
boards and groups) and mobile phones
(SMS/MMS)".
Cyber crime
• Such crimes may threaten a nation’s security
and financial health.
• Issues surrounding this type of crime have
become high-profile, particularly those
surrounding cracking, copyright, child
pornography, and child grooming.
• There are also problems
of privacy when confidential information is
lost or intercepted, lawfully or otherwise.
The Computer Crime and Intellectual
Property Section (CCIPS)
• The Computer Crime and Intellectual Property Section
(CCIPS) is responsible for implementing the Department's
national strategies in combating computer and intellectual
property crimes worldwide.
• CCIPS prevents, investigates, and prosecutes computer
crimes by working with other government agencies, the
private sector, academic institutions, and foreign
counterparts.
• Section attorneys work to improve the domestic and
international infrastructure-legal, technological, and
operational-to pursue network criminals most effectively.
The Section's enforcement responsibilities against
intellectual property crimes are similarly multi-faceted.
The Computer Crime and Intellectual
Property Section (CCIPS)
• Intellectual Property (IP) has become one of the
principal U.S. economic engines, and the nation is a
target of choice for thieves of material protected by
copyright, trademark, or trade-secret designation. In
pursuing all these goals, CCIPS attorneys regularly run
complex investigations, resolve unique legal and
investigative issues raised by emerging computer and
telecommunications technologies; litigate cases;
provide litigation support to other prosecutors; train
federal, state, and local law enforcement personnel;
comment on and propose legislation; and initiate and
participate in international efforts to combat computer
and intellectual property crime.
Cyber Space

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
Prof. (Dr.) Tabrez Ahmad
 
Cyber law
Cyber lawCyber law
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
Parakum Pathirana
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
Ayesha Majid
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
RoshiniVijayakumar1
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Avinash
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 

Similar to Cyber Space

CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!
Milan Kapoor
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
Abhishek Viswam
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
karanjohar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
Varun Mathur
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Dr.S.Jagadeesh Kumar
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
ArmaanBishnoi
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
nanjeebarifa
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
Roshan Kumar Bhattarai
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptx
adnis1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
Darshan Aswani
 

Similar to Cyber Space (20)

CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 

More from Kashif Latif

Linear Programming Application
Linear Programming ApplicationLinear Programming Application
Linear Programming Application
Kashif Latif
 
Analysis of Variance
Analysis of VarianceAnalysis of Variance
Analysis of Variance
Kashif Latif
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo ProcessorKashif Latif
 
SRX3600 Cluster & IDP
SRX3600 Cluster & IDPSRX3600 Cluster & IDP
SRX3600 Cluster & IDPKashif Latif
 
Routing Polices And Firewall Filter
Routing Polices And Firewall FilterRouting Polices And Firewall Filter
Routing Polices And Firewall FilterKashif Latif
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution ProtocolKashif Latif
 
HA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsHA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsKashif Latif
 
Ex8216 Core Switch
Ex8216 Core SwitchEx8216 Core Switch
Ex8216 Core SwitchKashif Latif
 
Difference Between XFP & SFP
Difference Between XFP & SFPDifference Between XFP & SFP
Difference Between XFP & SFPKashif Latif
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster ConfigurationKashif Latif
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway ProtocolKashif Latif
 

More from Kashif Latif (17)

Linear Programming Application
Linear Programming ApplicationLinear Programming Application
Linear Programming Application
 
Analysis of Variance
Analysis of VarianceAnalysis of Variance
Analysis of Variance
 
DHCP
DHCPDHCP
DHCP
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo Processor
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
SRX3600 Cluster & IDP
SRX3600 Cluster & IDPSRX3600 Cluster & IDP
SRX3600 Cluster & IDP
 
Routing Polices And Firewall Filter
Routing Polices And Firewall FilterRouting Polices And Firewall Filter
Routing Polices And Firewall Filter
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
MX960 Router
MX960 RouterMX960 Router
MX960 Router
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
HA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsHA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy Groups
 
Ex8216 Core Switch
Ex8216 Core SwitchEx8216 Core Switch
Ex8216 Core Switch
 
Difference Between XFP & SFP
Difference Between XFP & SFPDifference Between XFP & SFP
Difference Between XFP & SFP
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster Configuration
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 

Recently uploaded

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Cyber Space

  • 1.
  • 2. Cyber Space • Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures. • In effect, cyberspace can be thought of as the interconnection of human beings through computers and telecommunication, without regard to physical geography.
  • 5. Hacktivism • Hacktivism is the use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics. It is carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience
  • 6. Defacing Web Pages • Defacing Web Pages: Between 1995 and 1999 Attrition.org reported 5,000 website defacements. In such a scenario, the hacktivist will significantly alter the front page of a company's or governmental agency's website.
  • 7. Web Sit-ins • In this form of hacktivism, hackers attempt to send so much traffic to the site that the overwhelmed site becomes inaccessible to other users in a variation on a denial of service.
  • 8. E-mail Bombing • E-mail Bombing: Hacktivists send scores of emails with large file attachments to their target's e-mail address.
  • 9. Website Mirroring • It is used as a circumvention tool to bypass censorship blocks on websites. It is a technique that copies the content of a censored website and posts it to other domains and subdomains that are not censored.
  • 10. Geo-bombing • Geo-bombing: a technique in which netizens add a geo-tag while editing YouTube videos so that the location of the video can be displayed in Google Earth.
  • 11. Anonymous blogging • Anonymous blogging: a method of speaking out to a wide audience about human rights issues, government oppression, etc. that utilizes various web tools such as free email accounts, IP masking, and blogging software to preserve a high level of anonymity.
  • 12. Doxing • Doxing is the practice of outing of private information about individuals, but the term is sometimes used more broadly to refer to exposing embarrassing information about organizations
  • 13. Swatting • Swatting is the act of triggering a police raid, usually that of an anti-terrorist team SWAT in the United States, typically for retaliation or harassment and based on providing false information to law enforcement.
  • 15. Cyber crime Computer crime Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target Net crime Net crime refers to criminal exploitation of the Internet.
  • 16. Cybercrimes • Halder and Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". • Such crimes may threaten a nation’s security and financial health.
  • 17. Cybercrimes • Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 18. Categories of Cybercrimes Cyber crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: (1) crimes that target computers directly (2) crimes facilitated by computer networks or devices, the primary target of which is independent of network or device.
  • 19. Categories of Cybercrimes 1.Crimes that primarily target computer networks or devices include: 1. Computer viruses 2. Denial-of-service attacks 3. Malware (malicious code) 2.Crimes that use computer networks or devices to advance other ends include: 1. Cyber stalking 2. Fraud and identity theft 3. Information warfare 4. Phishing scams
  • 20. computer virus • A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
  • 21. denial-of-service attack (DoS attack) In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
  • 22. Malware • Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware' is a general term used to refer to a variety of forms of hostile or intrusive software
  • 23. Cyberstalking • Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass. The definition of "harassment" must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress
  • 24. Fraud Fraud is intentional deception made for personal gain or to damage another individual. Fraud is a crime and a civil law violation, though the specific criminal law definition varies by legal jurisdiction. Defrauding people or entities of money or valuables is a common purpose of fraud.
  • 25. Identity theft • Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. • The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held accountable for the perpetrator's actions. • Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
  • 26. Information Warfare • Information Warfare (IW) is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent. • Information warfare may involve collection of tactical information, assurance that one's own information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare.
  • 27. Phishing • Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. • Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware
  • 29. Cyber terrorism Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  • 30. Types of cyber terrorism Simple-Unstructured The capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target analysis, command and control, or learning capability.
  • 31. Types of cyber terrorism Advanced-Structured The capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses an elementary target analysis, command and control, and learning capability.
  • 32. Types of cyber terrorism Complex-Coordinated: The capability for a coordinated attacks capable of causing mass-disruption against integrated, heterogeneous defenses (including cryptography). Ability to create sophisticated hacking tools. Highly capable target analysis, command and control, and organization learning capability
  • 33. Cyber crime Halder and Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".
  • 34. Cyber crime • Such crimes may threaten a nation’s security and financial health. • Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright, child pornography, and child grooming. • There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 35. The Computer Crime and Intellectual Property Section (CCIPS) • The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide. • CCIPS prevents, investigates, and prosecutes computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts. • Section attorneys work to improve the domestic and international infrastructure-legal, technological, and operational-to pursue network criminals most effectively. The Section's enforcement responsibilities against intellectual property crimes are similarly multi-faceted.
  • 36. The Computer Crime and Intellectual Property Section (CCIPS) • Intellectual Property (IP) has become one of the principal U.S. economic engines, and the nation is a target of choice for thieves of material protected by copyright, trademark, or trade-secret designation. In pursuing all these goals, CCIPS attorneys regularly run complex investigations, resolve unique legal and investigative issues raised by emerging computer and telecommunications technologies; litigate cases; provide litigation support to other prosecutors; train federal, state, and local law enforcement personnel; comment on and propose legislation; and initiate and participate in international efforts to combat computer and intellectual property crime.