Welcome to the world of space science, computer science, geography, geopolitics and many more topics. You will love our blogs and definitely like them. We post knowledgeful and helpful content, the content which fascinates the eyes of the emerging scientific era.
Search This Blog
Cyber Crime and Cyber Security project
Introduction
Computer security, cybersecurity, or information technology security (IT
security) is the protection of computer systems and networks from information
disclosure, theft of or damage to their hardware, software, or electronic
data, as well as from the disruption or misdirection of the services they
provide.
The field is becoming increasingly significant due to the continuously
expanding reliance on computer systems, the Internet and wireless network
standards such as Bluetooth and Wi-Fi, and due to the growth of "smart"
devices, including smartphones, televisions, and the various devices that
constitute the "Internet of things". Cybersecurity is also one of the
significant challenges in the contemporary world, due to its complexity, both
in terms of political usage and technology.
Types of Cyber Crime
There are literally a many ways in which a cybercrime can be perpretrated, and
you need to know what they are -->
Phishing
This type of attack involves hackers sending malicious email attachments or
URLs to users to gain access to their accounts or computer. Cybercriminals
are becoming more established and many of these emails are not flagged as
spam. Users are tricked into emails claiming they need to change their
password or update their billing information, giving criminals access.
Identity Theft
This cybercrime occurs when a criminal gains access to a user’s personal
information to steal funds, access confidential information, or participate
in tax or health insurance fraud. They can also open a phone/internet
account in your name, use your name to plan a criminal activity and claim
government benefits in your name. They may do this by finding out user’s
passwords through hacking, retrieving personal information from social
media, or sending phishing emails.
Cyberstalking
This kind of cybercrime involves online harassment where the user is
subjected to a plethora of online messages and emails. Typically
cyberstalkers use social media, websites and search engines to intimidate a
user and instill fear. Usually, the cyberstalker knows their victim and
makes the person feel afraid or concerned for their safety.
Computer Vandalism
In everyday life, there are vandals that seem to enjoy destroying things –
even though it can be hard to understand how they derive any tangible
benefit from their acts of vandalism. Unfortunately, the same type of
behaviour is also present in cyberspace. There are malware creators that
devote time and effort to acts of computer vandalism that can damage your
computers and data, and affect the services that businesses deliver.
Code for this Webpage:
<!DOCTYPEhtml>
<html>
<head>
<title>CyberSecurity_RAJ</title>
</head>
<linkrel="stylesheet" href="additional.css">
<body>
<h1>Cyber Crime and Security</h1>
<h2>Introduction</h2>
<p> Computer security, cybersecurity, or information technology security (IT security) is the protection of
computer
systems and networks from information disclosure, theft of or damage to their hardware, software, or
electronic
data, as well as from the disruption or misdirection of the services they provide. <br> The field is
becoming
increasingly significant due to the continuously expanding reliance on computer systems, the Internet and
wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including
smartphones, televisions, and the various devices that constitute the "Internet of things". Cybersecurity is
also one of the significant challenges in the contemporary world, due to its complexity, both in terms of
political usage and technology.</p>
<h2>Types of Cyber Crime </h2>
<p>There are literally a many ways in which a cybercrime can be perpretrated, and you need to know what they are
--> <br>
<ol>
<h3>
<li>Phishing</li>
</h3>
<p>This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to
their
accounts or computer. Cybercriminals are becoming more established and many of these emails are not flagged
as
spam. Users are tricked into emails claiming they need to change their password or update their billing
information, giving criminals access.
</p>
<h3>
<li>Identity Theft</li>
</h3>
<p>This cybercrime occurs when a criminal gains access to a user’s personal information to steal funds, access
confidential information, or participate in tax or health insurance fraud. They can also open a
phone/internet account in your name, use your name to plan a criminal activity and claim government benefits
in your name. They may do this by finding out user’s passwords through hacking, retrieving personal
information from social media, or sending phishing emails.</p>
<h3>
<li>Cyberstalking</li>
</h3>
<p>This kind of cybercrime involves online harassment where the user is subjected to a plethora of online
messages
and emails. Typically cyberstalkers use social media, websites and search engines to intimidate a user and
instill fear. Usually, the cyberstalker knows their victim and makes the person feel afraid or concerned for
their safety.
</p>
<h3>
<li>Computer Vandalism</li>
</h3>
<p>In everyday life, there are vandals that seem to enjoy destroying things – even though it can be hard to
understand how they derive any tangible benefit from their acts of vandalism. Unfortunately, the same type
of behaviour is also present in cyberspace. There are malware creators that devote time and effort to acts
of computer vandalism that can damage your computers and data, and affect the services that businesses
deliver.</p>
</ol>
</p>
</body>
</html>
CSS file code:
body { background-image:url(https://th.bing.com/th/id/OIP.tqIYFmT_vrSBsAH7riuL2wHaEK?pid=ImgDet&w=1024&h=576&rs=1); }
really appreciable
ReplyDeleteApni tarif khud he kar
Delete