Cyber Crime

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

Digital

technology
THE LEARNING
EXPERIENCE – 2
SESSION -1
Session-1 : Digital through Information safety Sparkling and
happening crime
After this experience we,
By knowing about the various crimes organized
through digital devices and the Internet and
their impact, we can ensure information
security by practicing security strategies.
Let us know: Any act
against society and law is
a crime. And the crimes
that are committed online
or using the Internet are
cyber crimes or cyber
crimes.
Computers or digital
devices and the Internet
are certainly used to
commit cyber crimes, and
sometimes the device or
network itself is the
victim of a cyber attack.
Various types of information
Now let's look at an incident...
When Abir accidentally drops his mobile phone
at his friend's house one day, his friend picks it
up and tries to enter out of curiosity. Although
the password on the mobile phone Even then his
friend guessed different passwords He repeatedly
tries to access the mobile and one time he
succeeds. By doing this, many of Abir's personal
information and documents went to his friend.
In the previous class we have
learned how to hard or hard
password must be used. Because
the password Or if the pattern
lock is given very easily, it is easy
to enter the devices by guessing.
As the above incident shows,
since Abir's mobile password was
not very strong, many of his
personal information was
exposed.
Brute the force Brute Force
Attack
Just as in real life a thief uses different keys to enter a
locked room and try to open the lock, digital criminals can
access different types of people's accounts such as Banks,
social media, and email accounts often use different types
of software to hack into digital devices and try to guess
one after the other. Sometimes if successful, they commit
various crimes by stealing the person's personal
information. This is a type of cyber attack which is
definitely a serious cyber crime. In the language of
technology, this is brute force A Tak ( Brute Force Attack)
is called.
how work
by doing
Here we list the experiences that may threaten the security of
our personal information through non-digital and digital media.

Non - digital medium Digital medium

1. 1.

2. 2.

3. 3.

4. 4.

5. 5.
Know: There are various types of cyber crimes through
digital means, through which information security risks
are created.
For example: Data Interception ( Data Interception)
DDos Attack ( DDos Attack)
Hacking _
Computer Malware ( Computer Malware) etc.
Data interception:

Digital through Information of exchange the time


when recipient And of the sender intermediate
someone that Adi to get theft to do can _ this theft
to be The process data interception in the name
known _ Usually Software or Apps at End to And
encryption to do If so , intermediate someone in
favor of Information ( messages , photos , videos ,
voice call or Message , document , status update )
stolen to do impossible become goes _
And to And encryption
DDos Attack
( DDos Attack)

In the digital world, Distributed


Denial of Service or Deeds is an
attack on a specific target using
multiple devices.
Hacking _

Cybercriminals take full or


partial control of a website, computer,
computer system or network function
for nefarious purposes. This crime
of cyber world is hacking which
can be both good and bad.
Computer Malware

Malware is harmful software. It is a


type of software or program that can
continue its operation on our
computer, mobile or any other device
without our permission. Those
activities may steal confidential
information, monitor us, degrade the
performance of our devices or damage
important data on our devices.
Mind Mapping

You might also like