Ads Area

Cyber Crime & Cyber Security | Cyber-extortion | Cyber-terrorism

 Cybercrime and cyber security

Welcome to Hello friends science technology
My name is Amit Kumar


Crime involving computer equipment and internet is known as cybercrime.  

Cybercrime can be committed against an individual or group; it can also be committed against government and private organizations.    The purpose may be to damage one's reputation, physical damage, or mental damage.   


Cybercrime and cyber security



Cybercrime can cause direct harm or indirect harm to the victim. 




However, the biggest threat of cybercrime lies on the financial security of an individual and the government. 





Cybercrime can cause all kinds of harm to the victim.     







However, the biggest threat of cybercrime lies on the financial security of an individual and the government.   









Cybercrime damages billions of USD each year .   

Types of cybercrime

Let us now discuss every chijo of cybercrime −

Hacking
This is an unlawful practice by which a hacker violates one's computer security system for personal interest.  

Improper mass surveillance
Mass surveillance means the monitoring of a substantial fraction of a group of people by the authority specifically for security purpose, but if one does it for personal interest, it is considered cybercrime.  

Child pornography
This is one of the most heinous crimes shamelessly practiced worldwide.    Children are sexually abused and videos are being created and uploaded on the internet.  

Hair grooming
It is customary to establish an emotional connection with the child, especially for the purpose of child trafficking and child prostitution.  

Copyright infringement
If someone infringes someone's protected copyright without permission and publishes in their own name, the copyright is known as infringement.  

Money laundering
। Illegal possession of funds by an individual or organization is known as money laundering.     This usually involves the transfer of funds through foreign banks and/or legitimate business.     In other words, it is the practice of turning illegally earned money into a legitimate financial system.   


Cyber-extortion
When a Hacker hacks someone's email server, or computer system and asks for money to restore the system, it is known as cyber-extortion.  

Cyber terrorism
Usually, when someone hacks the government security system or threatens the government or such a large organization to pursue their political or social objectives by attacking the security system through computer networks, this is known as cyber terrorism.  

Cyber security
Cybersecurity is a potential activity by which information and other communication systems are protected and/or protected from unauthorized use or modification or exploitation or even theft.  

Likewise, cybersecurity is a well-designed technology to protect computers, networks, various programs, personal data, etc.   , From unauthorized access . 

Cybercrime and cyber security


 All types of data whether it is government, corporate, or personal need high security; however, some data, which are related to government defense system, banks, defense research and development organization, etc.     Are highly confidential and even the small amount of negligence for these figures can cause great harm to the whole country.     Therefore, such data requires protection at a very high level.   

How to secure data?
Let's now discuss how to secure the data .    You must focus to strengthen your security system -

Security architecture
Network diagram
Safety assessment process
Security policies
Risk management policy
Backup and restore procedures
Disaster recovery plan
Risk assessment procedures
Once you have a complete blueprint of the points mentioned above, you can put a better security system in your data and also retrieve your data if something goes wrong.   

Post a Comment

0 Comments

Ads Inside Post

Multi unit

Ads Area