CYBER CRIME Topics
CYBER CRIME Topics
CYBER CRIME
Cybercrime or computer crime is any Criminal offense that involves a computer and a network.
Cybercrimes can take various forms including the creation of malicious programs, denial of service attacks,
rouge wi-fi hotspot, data manipulation, Identity theft, internet scams, and Cyberbullying.
The bellow are some of the aspects that computer criminals can be dangerous:
a. Human threat
b. Organizational Threat
c. Group Threat
d. National Security Threat
2nd prelim.
COMPUTER PRIVACY & CYBER CRIME
Cybersecurity awareness encourages basic knowledge of cyber vulnerabilities and risk, as a
cyber hygiene effective solution options. When people are faced with cyber threats, it educates them on best
practices and preventive steps.
Cyber understanding about cyber-related risk should be promoted among the general population, businesses,
and government employees.
A global repository will help improve the number and quality of national cybersecurity awareness
programs by streamlining and facilitating them. The archive should be preserved and revised on the general
basis to incorporate recent technical advancement and perspective.
People benefits greatly from technology, but it is often necessary to consider the negative, or possibly
negative, effect. Computer Technology must be implemented in such way that it gives effect are maximized and
its negative effects are minimized.
a. Firewall- connection to a company’s intranet and other internal network is controlled by hardware and
software. All messages between the company’s internal network and the outside world are routed via a
proxy server, which is a special device. The proxy server determines whether it is secure to let a single
message or file flow into or out of the organizations network by analyzing the source and quality of each
contact.
b. Intrusion Detection System (IDS)- this is used in conjunction with firewall to secure a company’s
network. These program measures both incoming and outgoing network traffic using mathematical
techniques. An IDS can detect signs of network intrusion and block access before an attacker can do harm
using sophisticated pattern matching and heuristic.
c. Virtual Private Networks (VPN)- established a protected private link between a remote user and the
network of an enterprise. Between a user’s home or desktop computer and business server, special VPN
protocol create the equivalent of a dedicated thread. The link is strongly encrypted, and from the user’s
viewpoint, the workstation seems to be connected to the corporate network.