SlideShare uma empresa Scribd logo
1 de 37
Cyber Space
• Cyberspace is a domain characterized by the use
of electronics and the electromagnetic spectrum
to store, modify, and exchange data via
networked systems and associated physical
infrastructures.
• In effect, cyberspace can be thought of as the
interconnection of human beings through
computers and telecommunication, without
regard to physical geography.
Threats in Cyberspace
1.
2.
3.
4.
5.

Hacktivism
Cybercrime
Cyberespionage
Cyberwar
Cyberterrorism
1. Hacktivism
Hacktivism
• Hacktivism is the use of computers and
computer networks to promote political ends,
chiefly free speech, human rights, and
information ethics. It is carried out under the
premise that proper use of technology can
produce results similar to those of
conventional acts of protest, activism, and civil
disobedience
Defacing Web Pages
• Defacing Web Pages: Between 1995 and 1999
Attrition.org reported 5,000 website
defacements. In such a scenario, the hacktivist
will significantly alter the front page of a
company's or governmental agency's website.
Web Sit-ins
• In this form of hacktivism, hackers attempt to
send so much traffic to the site that the
overwhelmed site becomes inaccessible to
other users in a variation on a denial of
service.
E-mail Bombing
• E-mail Bombing: Hacktivists send scores of emails with large file attachments to their
target's e-mail address.
Website Mirroring
• It is used as a circumvention tool to bypass
censorship blocks on websites. It is a
technique that copies the content of a
censored website and posts it to other
domains and subdomains that are not
censored.
Geo-bombing
• Geo-bombing: a technique in which netizens
add a geo-tag while editing YouTube videos so
that the location of the video can be displayed
in Google Earth.
Anonymous blogging
• Anonymous blogging: a method of speaking
out to a wide audience about human rights
issues, government oppression, etc. that
utilizes various web tools such as free email
accounts, IP masking, and blogging software
to preserve a high level of anonymity.
Doxing
• Doxing is the practice of outing of private
information about individuals, but the term is
sometimes used more broadly to refer to
exposing embarrassing information about
organizations
Swatting
• Swatting is the act of triggering a police raid,
usually that of an anti-terrorist team SWAT in
the United States, typically for retaliation or
harassment and based on providing false
information to law enforcement.
Cyber crime
Cyber crime
Computer crime
Computer crime refers to any crime that
involves a computer and a network. The
computer may have been used in the
commission of a crime, or it may be the
target
Net crime
Net crime refers to criminal exploitation
of the Internet.
Cybercrimes
• Halder and Jaishankar (2011) defines Cybercrimes
as: "Offences that are committed against
individuals or groups of individuals with a
criminal motive to intentionally harm the
reputation of the victim or cause physical or
mental harm to the victim directly or indirectly,
using modern telecommunication networks such
as Internet (Chat rooms, emails, notice boards
and groups) and mobile phones (SMS/MMS)".
• Such crimes may threaten a nation’s security and
financial health.
Cybercrimes
• Issues surrounding this type of crime have
become high-profile, particularly those
surrounding cracking, copyright infringement,
child pornography, and child grooming. There
are also problems of privacy when confidential
information is lost or intercepted, lawfully or
otherwise.
Categories of Cybercrimes
Cyber crime encompasses a broad range of
activities. Generally, however, it may be divided
into two categories:
(1) crimes that target computers directly
(2) crimes facilitated by computer networks or
devices, the primary target of which is
independent of network or device.
Categories of Cybercrimes
1.Crimes that primarily target computer networks or
devices include:
1. Computer viruses
2. Denial-of-service attacks
3. Malware (malicious code)
2.Crimes that use computer networks or devices to
advance other ends include:
1. Cyber stalking
2. Fraud and identity theft
3. Information warfare
4. Phishing scams
computer virus
• A computer virus is a computer program that
can replicate itself and spread from one
computer to another. The term "virus" is also
commonly, but erroneously, used to refer to
other types of malware, including but not
limited to adware and spyware programs that
do not have a reproductive ability.
denial-of-service attack (DoS attack)
In computing, a denial-of-service attack (DoS
attack) or distributed denial-of-service attack
(DDoS attack) is an attempt to make a machine
or network resource unavailable to its intended
users. Although the means to carry out, motives
for, and targets of a DoS attack may vary, it
generally consists of the efforts of one or more
people to temporarily or indefinitely interrupt or
suspend services of a host connected to the
Internet.
Malware
• Malware, short for malicious (or malevolent)
software, is software used or programmed by
attackers to disrupt computer operation,
gather sensitive information, or gain access to
private computer systems. It can appear in the
form of code, scripts, active content, and
other software. Malware' is a general term
used to refer to a variety of forms of hostile or
intrusive software
Cyberstalking
• Cyberstalking is the use of the Internet or other
electronic means to stalk or harass an individual, a
group of individuals, or an organization. It may include
the making of false accusations or statements of fact (,
monitoring, making threats, identity theft, damage to
data or equipment, the solicitation of minors for sex, or
gathering information that may be used to harass. The
definition of "harassment" must meet the criterion
that a reasonable person, in possession of the same
information, would regard it as sufficient to cause
another reasonable person distress
Fraud
Fraud is intentional deception made for
personal gain or to damage another individual.
Fraud is a crime and a civil law violation, though
the specific criminal law definition varies by
legal jurisdiction. Defrauding people or entities
of money or valuables is a common purpose of
fraud.
Identity theft
• Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by assuming
that person's identity, typically in order to access resources
or obtain credit and other benefits in that person's name.
• The victim of identity theft (here meaning the person
whose identity has been assumed by the identity thief) can
suffer adverse consequences if they are held accountable
for the perpetrator's actions.
• Identity theft occurs when someone uses another's
personally identifying information, like their name,
identifying number, or credit card number, without their
permission, to commit fraud or other crimes.
Information Warfare
• Information Warfare (IW) is primarily an American
concept involving the use and management of
information technology in pursuit of a competitive
advantage over an opponent.
• Information warfare may involve collection of tactical
information, assurance that one's own information is
valid, spreading of propaganda or disinformation to
demoralize or manipulate the enemy and the public,
undermining the quality of opposing force information
and denial of information-collection opportunities to
opposing forces. Information warfare is closely linked
to psychological warfare.
Phishing
• Phishing is the act of attempting to acquire
information such as usernames, passwords, and
credit card details (and sometimes, indirectly,
money) by masquerading as a trustworthy entity
in an electronic communication.
• Communications purporting to be from popular
social web sites, auction sites, online payment
processors or IT administrators are commonly
used to lure the unsuspecting public. Phishing
emails may contain links to websites that are
infected with malware
Cyber terrorism
Cyber terrorism
Cyber terrorism is the use of Internet based
attacks in terrorist activities, including acts of
deliberate, large-scale disruption of computer
networks, especially of personal computers
attached to the Internet, by the means of tools
such as computer viruses.
Types of cyber terrorism
Simple-Unstructured
The capability to conduct basic hacks against
individual systems using tools created by
someone else. The organization possesses little
target analysis, command and control, or
learning capability.
Types of cyber terrorism
Advanced-Structured
The capability to conduct more sophisticated
attacks against multiple systems or networks
and possibly, to modify or create basic hacking
tools. The organization possesses an elementary
target analysis, command and control, and
learning capability.
Types of cyber terrorism
Complex-Coordinated:
The capability for a coordinated attacks capable
of causing mass-disruption against integrated,
heterogeneous defenses (including
cryptography). Ability to create sophisticated
hacking tools. Highly capable target analysis,
command and control, and organization learning
capability
Cyber crime
Halder and Jaishankar (2011) defines
Cybercrimes as: "Offences that are committed
against individuals or groups of individuals with
a criminal motive to intentionally harm the
reputation of the victim or cause physical or
mental harm to the victim directly or indirectly,
using modern telecommunication networks
such as Internet (Chat rooms, emails, notice
boards and groups) and mobile phones
(SMS/MMS)".
Cyber crime
• Such crimes may threaten a nation’s security
and financial health.
• Issues surrounding this type of crime have
become high-profile, particularly those
surrounding cracking, copyright, child
pornography, and child grooming.
• There are also problems
of privacy when confidential information is
lost or intercepted, lawfully or otherwise.
The Computer Crime and Intellectual
Property Section (CCIPS)
• The Computer Crime and Intellectual Property Section
(CCIPS) is responsible for implementing the Department's
national strategies in combating computer and intellectual
property crimes worldwide.
• CCIPS prevents, investigates, and prosecutes computer
crimes by working with other government agencies, the
private sector, academic institutions, and foreign
counterparts.
• Section attorneys work to improve the domestic and
international infrastructure-legal, technological, and
operational-to pursue network criminals most effectively.
The Section's enforcement responsibilities against
intellectual property crimes are similarly multi-faceted.
The Computer Crime and Intellectual
Property Section (CCIPS)
• Intellectual Property (IP) has become one of the
principal U.S. economic engines, and the nation is a
target of choice for thieves of material protected by
copyright, trademark, or trade-secret designation. In
pursuing all these goals, CCIPS attorneys regularly run
complex investigations, resolve unique legal and
investigative issues raised by emerging computer and
telecommunications technologies; litigate cases;
provide litigation support to other prosecutors; train
federal, state, and local law enforcement personnel;
comment on and propose legislation; and initiate and
participate in international efforts to combat computer
and intellectual property crime.
Cyber Space

Mais conteúdo relacionado

Mais procurados (20)

CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Public Sector Threats and Responses Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Public Sector Threats and Responses
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Computer crime
Computer crimeComputer crime
Computer crime
 

Semelhante a Cyber Space

Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarDr.S.Jagadeesh Kumar
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxadnis1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 

Semelhante a Cyber Space (20)

CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 

Mais de Kashif Latif

Linear Programming Application
Linear Programming ApplicationLinear Programming Application
Linear Programming ApplicationKashif Latif
 
Analysis of Variance
Analysis of VarianceAnalysis of Variance
Analysis of VarianceKashif Latif
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo ProcessorKashif Latif
 
SRX3600 Cluster & IDP
SRX3600 Cluster & IDPSRX3600 Cluster & IDP
SRX3600 Cluster & IDPKashif Latif
 
Routing Polices And Firewall Filter
Routing Polices And Firewall FilterRouting Polices And Firewall Filter
Routing Polices And Firewall FilterKashif Latif
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution ProtocolKashif Latif
 
HA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsHA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsKashif Latif
 
Ex8216 Core Switch
Ex8216 Core SwitchEx8216 Core Switch
Ex8216 Core SwitchKashif Latif
 
Difference Between XFP & SFP
Difference Between XFP & SFPDifference Between XFP & SFP
Difference Between XFP & SFPKashif Latif
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster ConfigurationKashif Latif
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway ProtocolKashif Latif
 

Mais de Kashif Latif (17)

Linear Programming Application
Linear Programming ApplicationLinear Programming Application
Linear Programming Application
 
Analysis of Variance
Analysis of VarianceAnalysis of Variance
Analysis of Variance
 
DHCP
DHCPDHCP
DHCP
 
Core 2 Duo Processor
Core 2 Duo ProcessorCore 2 Duo Processor
Core 2 Duo Processor
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
SRX3600 Cluster & IDP
SRX3600 Cluster & IDPSRX3600 Cluster & IDP
SRX3600 Cluster & IDP
 
Routing Polices And Firewall Filter
Routing Polices And Firewall FilterRouting Polices And Firewall Filter
Routing Polices And Firewall Filter
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
MX960 Router
MX960 RouterMX960 Router
MX960 Router
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
HA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsHA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy Groups
 
Ex8216 Core Switch
Ex8216 Core SwitchEx8216 Core Switch
Ex8216 Core Switch
 
Difference Between XFP & SFP
Difference Between XFP & SFPDifference Between XFP & SFP
Difference Between XFP & SFP
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster Configuration
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 

Último

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 

Último (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 

Cyber Space

  • 1.
  • 2. Cyber Space • Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures. • In effect, cyberspace can be thought of as the interconnection of human beings through computers and telecommunication, without regard to physical geography.
  • 5. Hacktivism • Hacktivism is the use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics. It is carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience
  • 6. Defacing Web Pages • Defacing Web Pages: Between 1995 and 1999 Attrition.org reported 5,000 website defacements. In such a scenario, the hacktivist will significantly alter the front page of a company's or governmental agency's website.
  • 7. Web Sit-ins • In this form of hacktivism, hackers attempt to send so much traffic to the site that the overwhelmed site becomes inaccessible to other users in a variation on a denial of service.
  • 8. E-mail Bombing • E-mail Bombing: Hacktivists send scores of emails with large file attachments to their target's e-mail address.
  • 9. Website Mirroring • It is used as a circumvention tool to bypass censorship blocks on websites. It is a technique that copies the content of a censored website and posts it to other domains and subdomains that are not censored.
  • 10. Geo-bombing • Geo-bombing: a technique in which netizens add a geo-tag while editing YouTube videos so that the location of the video can be displayed in Google Earth.
  • 11. Anonymous blogging • Anonymous blogging: a method of speaking out to a wide audience about human rights issues, government oppression, etc. that utilizes various web tools such as free email accounts, IP masking, and blogging software to preserve a high level of anonymity.
  • 12. Doxing • Doxing is the practice of outing of private information about individuals, but the term is sometimes used more broadly to refer to exposing embarrassing information about organizations
  • 13. Swatting • Swatting is the act of triggering a police raid, usually that of an anti-terrorist team SWAT in the United States, typically for retaliation or harassment and based on providing false information to law enforcement.
  • 15. Cyber crime Computer crime Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target Net crime Net crime refers to criminal exploitation of the Internet.
  • 16. Cybercrimes • Halder and Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". • Such crimes may threaten a nation’s security and financial health.
  • 17. Cybercrimes • Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 18. Categories of Cybercrimes Cyber crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: (1) crimes that target computers directly (2) crimes facilitated by computer networks or devices, the primary target of which is independent of network or device.
  • 19. Categories of Cybercrimes 1.Crimes that primarily target computer networks or devices include: 1. Computer viruses 2. Denial-of-service attacks 3. Malware (malicious code) 2.Crimes that use computer networks or devices to advance other ends include: 1. Cyber stalking 2. Fraud and identity theft 3. Information warfare 4. Phishing scams
  • 20. computer virus • A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
  • 21. denial-of-service attack (DoS attack) In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
  • 22. Malware • Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware' is a general term used to refer to a variety of forms of hostile or intrusive software
  • 23. Cyberstalking • Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass. The definition of "harassment" must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress
  • 24. Fraud Fraud is intentional deception made for personal gain or to damage another individual. Fraud is a crime and a civil law violation, though the specific criminal law definition varies by legal jurisdiction. Defrauding people or entities of money or valuables is a common purpose of fraud.
  • 25. Identity theft • Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. • The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held accountable for the perpetrator's actions. • Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
  • 26. Information Warfare • Information Warfare (IW) is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent. • Information warfare may involve collection of tactical information, assurance that one's own information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare.
  • 27. Phishing • Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. • Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware
  • 29. Cyber terrorism Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  • 30. Types of cyber terrorism Simple-Unstructured The capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target analysis, command and control, or learning capability.
  • 31. Types of cyber terrorism Advanced-Structured The capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses an elementary target analysis, command and control, and learning capability.
  • 32. Types of cyber terrorism Complex-Coordinated: The capability for a coordinated attacks capable of causing mass-disruption against integrated, heterogeneous defenses (including cryptography). Ability to create sophisticated hacking tools. Highly capable target analysis, command and control, and organization learning capability
  • 33. Cyber crime Halder and Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".
  • 34. Cyber crime • Such crimes may threaten a nation’s security and financial health. • Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright, child pornography, and child grooming. • There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 35. The Computer Crime and Intellectual Property Section (CCIPS) • The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide. • CCIPS prevents, investigates, and prosecutes computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts. • Section attorneys work to improve the domestic and international infrastructure-legal, technological, and operational-to pursue network criminals most effectively. The Section's enforcement responsibilities against intellectual property crimes are similarly multi-faceted.
  • 36. The Computer Crime and Intellectual Property Section (CCIPS) • Intellectual Property (IP) has become one of the principal U.S. economic engines, and the nation is a target of choice for thieves of material protected by copyright, trademark, or trade-secret designation. In pursuing all these goals, CCIPS attorneys regularly run complex investigations, resolve unique legal and investigative issues raised by emerging computer and telecommunications technologies; litigate cases; provide litigation support to other prosecutors; train federal, state, and local law enforcement personnel; comment on and propose legislation; and initiate and participate in international efforts to combat computer and intellectual property crime.