Posts

Showing posts from May, 2020

What is Hacking? | Types of Illegal Hacking | Why should We Avoid Hacking?

Image
What is Hacking?-Introduction of Illegal Hacking Illegal access to a computer or a network is called hacking. Hacking involves compromising the security of networks, breaking the security of applications software, or creating malicious programs such as viruses. Types Of Illegal Hacking The most popular forms of network hacking are denial of Service (DoS) attacks and mail bombs. DoS attacks are designed to attack a computer network to crush it. Mail bombs also work similarly but they attack the network’s mail servers. eBay was attacked in February 2000 and its web server was bombarded with fake requests for web pages. It overloaded the site and caused it to crash. Network hackers also try to break into secure areas to find sensitive data such as credit card numbers. Application hackers break security on application software to get it for free. Such as hackers may set up a serial number generator that will try millions of combinations to find the correct match. Application hackers also a...

Security of Data | Data Loss Prevention | How to do security of information?

Image
What Is Security? Security is a system that is used to protect a computer system and data. It protects from voluntary or accidental damage or access by unauthorized persons. A computer can detect whether the user is authorized or not. Controlling Access For  security of information Four different means of controlling access to the computer are as follows: What you have:     The user may have a key, badge, token, or plastic card to get physical access to the server room or computer building. Some organizations use active badge. It is an identification card that contains an embedded computer chip. It signals the user’s location via radio waves that are read by sensors in the building. What you know:     The user may have to enter the user ID and password or special number to login to the machine. What you do:   The user may enter signatures on the documents to confirm that they are authorized, users. What you are:    A user may be...

Personal Computer Security | How to Secure your Computer?

Image
Personal Computer Security Computer hardware and it contains very vital information in it. It is very important to take care of the computer. Following steps must be taken for its security: Avoid Extreme Conditions The computer system should not be placed in extreme conditions. It should be safe from direct sun, rain, extreme temperature, and cigarette smoke, etc. The computers should be cleaned regularly. The computer should be placed in an environment that is free from dust and moisture. Personal Computer Security Software's Antivirus software must be installed on the computer. The software must be installed on the computer. The software must be updated regularly. All incoming files must be checked for viruses before executing or saving. Guard of the  Computer The user of the computer must guard the computer system. The computer should be placed on a stable surface. It should not be moved while it is turned on. The user should not place anything on a monitor be...

Types of computer crimes

Image
Methods used by Computer Criminals The persons who commit computer crimes are known as computer criminals or cyber criminals . The methods which are used by these criminals are the following. Bomb   It is a program that triggers under certain conditions. It is usually activated at a certain date. It may be planted in commercial software like shareware software. Data Diddling It is a process of changing data before or as it enters the system. The auditors must verify the accuracy of the source data and the processing that occurs.   This is one of the easiest ways of committing a computer-related crime, because even a computer beginner can do it. Despite this being a simple task, it can have damaging effects. For example, a person responsible for accounting may change data about themselves or a friend or relative showing that they’re paid in full. Denial of service It shows down a computer system or network. It floods a computer or network with requests for inform...

Security Threats | Network Attacks | How to Protect yourself from Security Threats?

Image
Security Threats  Computer Security threats can be a computer program, an event, or a person that violates computer security. It may cause loss of data and stealing of information. It may also affect the working of the computer. Different security threats are as follows: Ha cker & Network Attacks A Person who accesses a computer, network, and resources illegally is known as a hacker. Hackers are computer experts and use their computer knowledge for a negative purpose.  They often hack computers for no criminal reason and are sometimes even carried by companies needing to test their safety . Hardware Theft & Vandalism Hardware theft and vandalism is another computer security threat. Hardware theft is a process of stealing the hardware equipment such as hard disk or monitor etc. Hardware vandalism is a process of defacing the hardware equipment. For example, an employee in an organization may damage the keyboard or cut the wires, etc. Software Theft S...

Computer Crimes And Computer criminals

Image
Computer Crime A type of crime in which a computer is the target or tool for an illegal activity is called computer crime. It is often involves stealing, using, selling the company’s personals data. A type of crime that refers to an illegal act involving the internet is called cybercrime. Computer crime, sometimes known as cyber-crime, is a serious affair. The crime can be committed directly and its impacts can spread with ridiculous speed. Moreover, the ever-increasing use of computers, mainly in serving significant support, makes computer crime more serious. Computer Criminals The persons who commit computer crimes are known as computer criminals or cybercriminals. Cybercriminals are known to enter the cybercriminal resistance markets observed in the broad web to trade hateful goods and co-operation, such as hacking tools and seized data. Cybercriminal underground markets are known to concentrate on specific results or services. Different types of computer criminals are as ...

What is Cyber Crime? | Types of Cyber Crime | How to Prevent Cyber Crime?

Image
What is Crime? The word Crime we mostly hear in our daily life. Crime is an action or omission which creates an attack and is punishable by law. The act which is against the criminal law is called crime. There is no completely agreed definition of the crime is available. However, the most honest way of thinking about crime is to look at it in terms of a legalistic aspect - from this way a crime is an illegal act. Characteristics of  Cyber Crime §    Action §    Evil mind §    Prohibited action §    Punishment §    External outcomes Categories of  Crime §    Crime against Person §    Crime against Government §    Crime against Property §    Secret Crimes §    Sex Crimes §    Cyber crimes §    Corporate crimes §    Social Crimes §    Economical Crime What is Cyber Crime Cybercrime is also ca...