057 F Sci

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Date

Cyber Law Saath


8 Explah wth
C eraop e
oPEmare Piracy
>0 Software ASA
Pra cy ts
Softvare creode ornothig but
coy1ight violation Of
insthution L igì nall y by an indivicluol ov a n
T+ ncludes
StecLAq oficacdes
1
fomoaron illegoly and /pograms onc o'th er
nauthornzkd meanS and uteeatg
tizng
Heimlto te (opy by
this data iejther
Ówh for
benefit on proft maEio i
O exampe, wten yOudown looad a dopy Of a licensed
SofeOYe u0bile dOwolOOdt ng
Sha g website withouut pay ing
games FyDim a f'ie
fora't,itis acOftwa
PYaay

ncuuthonizec access t
0Gainiq acAS thouti the users'pemssjom i s
krown ca
uhawtboriz8d aaces c ri bi
0 Autho iatorn means' grantinq access T1ghts to meccur
is relaUred: to inforoatios eeourtty cesaihich
compuuter secur ty aha
to acesS con troL in patHlahisecCtoY
ThiS is'*Ypicalty
Possiblei iarhen thel tariculay eof tnare9erYice is
PUchoseo thYDgh legal ahd Fomal proedur.
Atten ptine to get informction Ci ke emails, onk
Occownt intellectuau or
any Gter personoy ane conAderkaJ
ttorhmadicnEoo unauori2ed percon ts khown cs
accessiq HOMaONVetllegaluy iio
Examples OR Unuuthatizaa aCeess a ? V
HaCkI A'nanclaubanle acouE relaeo infoTmaton
Stdaltngt o rgani2atmal(intetlectiod in-formatton.
rllegal oohitorignoPin #ornoolom oxneal by t ruse
a) Iileqad use/ bmeak ioA togin and page Wond O otrusers
Page No.
Date
Saath
iYritation
to ot sers tby me
users

t'ntmt'onal
infornnaaja
Caus ing and im portant
on.
Sorewave
O damag ing

fnformcs
Phishings extiacthg
conhdent/a)
ai
This a technique of userbame Pess
numbersand
ard
uchias cedt't
asralegal
enterpa'sesl
Combos by
pretnding
camiaout emaispco
ty.emai
Ph ichq is ty picatly
Examples of phishivgin
Opcraole scan
Email Account
y Paylat ccam otiio
ataohment d
yCtickinqcun email

Plagiarsm ee'g KWOrkk or


cr ida
ideo
0Pa9aricm is preenting someone
deykeg geCn.
re
Cytems compuke rs/netWork
you
a h d RuncH'ona
The overolssauence 1from tdentyivq thrEaN
to
ahe
roec n ond recovtnq fomCyber atta ckSe
ThYecus Orooni ScuHODS.i laitn09 2921
o r examle, 3tubmi g a full text thad 19 h0
yOu oun han ioo

s r g 2 Stoute ond explah secunty prpcedunes toOYOrd


t yber erimesciioiiub or osthnntOi
Security procdumer fo avoid eyber chime a
EncrupHonT s aoeth Gd ocoDN eNa He
a Origina/ message nto random tEYE ahtch
le Shotud be
compler to nderstard the idtfAcult
o for ahackey to decode.cThe
d ea s to ensu ne
scurity
e ahd sa fehy of data and tS trand misic
Page Na
Date
Gaathi
OS1 Geare Socre Layed Tt is the most Consis tent
Secuyy medel Through the SsL,tYansmission
tS Of data
encrypt d client-servee nfor oaHon s authentcaed
ahol a tso o essage In tegrity for TcP/TP connecHon s
Secuyee
Fiewatl FivewaIl Tefers to netwOrE SeultyCHOYdae
ahd Satmare) ystem whtb blocke Cer tajn type of
tomowon foxming a borie befmeeh a tuGcel ond
Uhthstd netNOreIt atteop ts o block the spread
Of Compuuter atta cles.

9 H O w do users tdehtify Yi'sk and threate Ofybey atatk


In the f o t l o I g a y s r useYs Snoulel idenHy isE
and thre ads of cyber attace
O The system Computer) operoues slowly wth moe
Tesponse tme.
E t h e system Crashes suddenly and uncub le
download upcl cutes
A Ppea rOnce of newunfamilror icons or mes soqes
On dese top:

Page No.

You might also like