Professional Documents
Culture Documents
Cyber Crime
Cyber Crime
Cyber Crime
technology
THE LEARNING
EXPERIENCE – 2
SESSION -1
Session-1 : Digital through Information safety Sparkling and
happening crime
After this experience we,
By knowing about the various crimes organized
through digital devices and the Internet and
their impact, we can ensure information
security by practicing security strategies.
Let us know: Any act
against society and law is
a crime. And the crimes
that are committed online
or using the Internet are
cyber crimes or cyber
crimes.
Computers or digital
devices and the Internet
are certainly used to
commit cyber crimes, and
sometimes the device or
network itself is the
victim of a cyber attack.
Various types of information
Now let's look at an incident...
When Abir accidentally drops his mobile phone
at his friend's house one day, his friend picks it
up and tries to enter out of curiosity. Although
the password on the mobile phone Even then his
friend guessed different passwords He repeatedly
tries to access the mobile and one time he
succeeds. By doing this, many of Abir's personal
information and documents went to his friend.
In the previous class we have
learned how to hard or hard
password must be used. Because
the password Or if the pattern
lock is given very easily, it is easy
to enter the devices by guessing.
As the above incident shows,
since Abir's mobile password was
not very strong, many of his
personal information was
exposed.
Brute the force Brute Force
Attack
Just as in real life a thief uses different keys to enter a
locked room and try to open the lock, digital criminals can
access different types of people's accounts such as Banks,
social media, and email accounts often use different types
of software to hack into digital devices and try to guess
one after the other. Sometimes if successful, they commit
various crimes by stealing the person's personal
information. This is a type of cyber attack which is
definitely a serious cyber crime. In the language of
technology, this is brute force A Tak ( Brute Force Attack)
is called.
how work
by doing
Here we list the experiences that may threaten the security of
our personal information through non-digital and digital media.
1. 1.
2. 2.
3. 3.
4. 4.
5. 5.
Know: There are various types of cyber crimes through
digital means, through which information security risks
are created.
For example: Data Interception ( Data Interception)
DDos Attack ( DDos Attack)
Hacking _
Computer Malware ( Computer Malware) etc.
Data interception: