Skip to main content

Cyber Crime and Cyber Security project

Introduction

Computer security, cybersecurity, or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
The field is becoming increasingly significant due to the continuously expanding reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology.

Types of Cyber Crime

There are literally a many ways in which a cybercrime can be perpretrated, and you need to know what they are -->

  1. Phishing
  2. This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer. Cybercriminals are becoming more established and many of these emails are not flagged as spam. Users are tricked into emails claiming they need to change their password or update their billing information, giving criminals access.

  3. Identity Theft
  4. This cybercrime occurs when a criminal gains access to a user’s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud. They can also open a phone/internet account in your name, use your name to plan a criminal activity and claim government benefits in your name. They may do this by finding out user’s passwords through hacking, retrieving personal information from social media, or sending phishing emails.

  5. Cyberstalking
  6. This kind of cybercrime involves online harassment where the user is subjected to a plethora of online messages and emails. Typically cyberstalkers use social media, websites and search engines to intimidate a user and instill fear. Usually, the cyberstalker knows their victim and makes the person feel afraid or concerned for their safety.

  7. Computer Vandalism
  8. In everyday life, there are vandals that seem to enjoy destroying things – even though it can be hard to understand how they derive any tangible benefit from their acts of vandalism. Unfortunately, the same type of behaviour is also present in cyberspace. There are malware creators that devote time and effort to acts of computer vandalism that can damage your computers and data, and affect the services that businesses deliver.

    Code for this Webpage: 

<!DOCTYPE html>
<html>

<head>
    <title>CyberSecurity_RAJ</title>
</head>
<link rel="stylesheet" href="additional.css">

<body>
    <h1>Cyber Crime and Security</h1>
    <h2>Introduction</h2>
    <p> Computer security, cybersecurity, or information technology security (IT security) is the protection of
        computer
        systems and networks from information disclosure, theft of or damage to their hardware, software, or
        electronic
        data, as well as from the disruption or misdirection of the services they provide. <br> The field is
        becoming
        increasingly significant due to the continuously expanding reliance on computer systems, the Internet and
        wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including
        smartphones, televisions, and the various devices that constitute the "Internet of things". Cybersecurity is
        also one of the significant challenges in the contemporary world, due to its complexity, both in terms of
        political usage and technology.</p>
    <h2>Types of Cyber Crime </h2>
    <p>There are literally a many ways in which a cybercrime can be perpretrated, and you need to know what they are
        --> <br>
    <ol>
        <h3>
            <li>Phishing</li>

        </h3>
        <p>This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to
            their
            accounts or computer. Cybercriminals are becoming more established and many of these emails are not flagged
            as
            spam. Users are tricked into emails claiming they need to change their password or update their billing
            information, giving criminals access.

        </p>
        <h3>
            <li>Identity Theft</li>

        </h3>
        <p>This cybercrime occurs when a criminal gains access to a user’s personal information to steal funds, access
            confidential information, or participate in tax or health insurance fraud. They can also open a
            phone/internet account in your name, use your name to plan a criminal activity and claim government benefits
            in your name. They may do this by finding out user’s passwords through hacking, retrieving personal
            information from social media, or sending phishing emails.</p>
        <h3>

            <li>Cyberstalking</li>

        </h3>
        <p>This kind of cybercrime involves online harassment where the user is subjected to a plethora of online
            messages
            and emails. Typically cyberstalkers use social media, websites and search engines to intimidate a user and
            instill fear. Usually, the cyberstalker knows their victim and makes the person feel afraid or concerned for
            their safety.

        </p>
        <h3>

            <li>Computer Vandalism</li>

        </h3>
        <p>In everyday life, there are vandals that seem to enjoy destroying things – even though it can be hard to
            understand how they derive any tangible benefit from their acts of vandalism. Unfortunately, the same type
            of behaviour is also present in cyberspace. There are malware creators that devote time and effort to acts
            of computer vandalism that can damage your computers and data, and affect the services that businesses
            deliver.</p>

    </ol>
    </p>

</body>
</html>

CSS file code: 

body { background-image:url(https://th.bing.com/th/id/OIP.tqIYFmT_vrSBsAH7riuL2wHaEK?pid=ImgDet&w=1024&h=576&rs=1); }
h1 {font-size:50px; color:red; text-decoration:underline; text-align: center;}
h2 {font-size:38px;color:yellow}
h3 {font-size:25px;color:yellow}
p {font-size:17px ;color: rgb(0, 255, 0); }

body { background-color:blue; }
.highlightme { background-color:#FFFF00; }
p { background-color:black;}

    Output:


Copyright© DengerousQuark International Pvt. Ltd.
A presentaion by RAJ RISHI

Comments

Post a Comment

If you think that you comment is important and should reach to the author, then click on "Notify Me" check box.

Popular posts from this blog

World's First 'Synthetic Embryos' Created Without Sperm, Eggs, And Fertilisation | Canis Great

World's First 'Synthetic Embryos' Created Without Sperm, Eggs, And Fertilisation What are "synthetic embryos"? These embryos are classified as synthetic because they are created without fertilised eggs. Scientists could better understand processes that help in the creation of organs and tissues during the development of natural embryos.Besides this, scientists hope that such synthetic embryos could reduce the burden on animal experimentation and in turn make way for new sources of cells and tissues for human transplantation. First 'Synthetic Embryos' Created Without Sperm, Eggs, And Fertilisation ©Provided by Indiatimes The world's first synthetic embryos are here. Scientists used stem cells from mice to create embryo-like structures that had an intestinal tract, a brain-like structure, and a beating heart. With this development, the need for sperm, eggs and fertilisation was ...