A Project on CYBER SECURITY доклад по теме Информатика

Вашему вниманию предлагается доклад и презентация по теме A Project on CYBER SECURITY. Данны материал, представленный на 7 страницах, поможет подготовится к уроку Информатика. Он будет полезен как ученикам и студентам, так и преподавателям школ и вузов. Вы можете ознакомиться и скачать этот и любой другой доклад у нас на сайте. Все материалы абсолютно бесплатны и доступны. Ссылку на скачивание Вы можете найти вконце страницы. Если материал Вам понравились – поделитесь им с друзьями с помощью социальных кнопок и добавьте сайт в закладки в своем браузере.
Страница #1
A Project on CYBER SECURITY BY:- MD.TAMEEM MD.AMIN GENERAL 601-TATA C-4
Страница #2
INTRODUCTION
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
Government agencies, the military, corporations, financial institutions, hospitals, and other groups collect, process, and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.
INTRODUCTION Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Government agencies, the military, corporations, financial institutions, hospitals, and other groups collect, process, and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.
Страница #3
TYPES OF CRIMES
Crimes that use computer networks or devices to advance other ends include:
Fraud and identity theft (although this increasingly uses malware, hacking and/or phishing, making it an example of both "computer as target" and "computer as tool" crime)
Information warfare.
Phishing scams.
Spam.
TYPES OF CRIMES Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking and/or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. Phishing scams. Spam.
Страница #4
MORE ON ‘TYPES OF CYBER CRIME’
Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. In the United States, hacking is classified as a felony and punishable as such. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.
Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading.
Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
MORE ON ‘TYPES OF CYBER CRIME’ Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. In the United States, hacking is classified as a felony and punishable as such. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location. Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading. Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
Страница #5
Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.
Malicious Software: These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.
Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.
Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history. Malicious Software: These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system. Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.
Страница #6
Информация вложена в изображении слайда
Страница #7
References
http://zeenews.india.com/entertainment/celebrity/hrithik-roshans-facebook-account-hacked-now-restored_1926418.html
http://www.cyberlawsindia.net/
http://www.crossdomainsolutions.com/cyber-crime/
https://www.umuc.edu/academic-programs/cyber-security/about.cfm
https://en.wikipedia.org/wiki/Cybercrime
References http://zeenews.india.com/entertainment/celebrity/hrithik-roshans-facebook-account-hacked-now-restored_1926418.html http://www.cyberlawsindia.net/ http://www.crossdomainsolutions.com/cyber-crime/ https://www.umuc.edu/academic-programs/cyber-security/about.cfm https://en.wikipedia.org/wiki/Cybercrime

Раздел "Презентации по информатике" собрал готовые презентации почти на все темы, которые проходят в школах и ВУЗах на уроках информатики. В данном разделе сайта Вы можете скачать готовые презентации по информатике. Презентация на тему информатика может быть использована как на уроках, так и на занятиях по информационным технологиям.