Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

2 семестр / Internet security

.docx
Скачиваний:
4
Добавлен:
09.04.2023
Размер:
16.18 Кб
Скачать

1)    To define and explain the terms «cybercrime», "computer security" and "internet security".

2)    Types of cybercrimes.

3)    Rules how  to prevent cybercrimes.

(1)A cybercrime is any illegal activity done through Internet.

Cybercrimes can be divided into three main categories: 1. Crime against an individual person. These crimes can be committed in the form of: 1) Email spoofing. E-mail address spoofing-spoofing the sender's e-mail address. 2) Cyber-stalking. Using the Internet to harass or harass a person, group, or organization. 3) Cyber bullying. Intentional insults, threats, defamation, and the communication of compromising data to others through modern means of communication, usually over a long period of time.

2. Crime against property. 1) Identity theft. A crime in which a person's personal data is unlawfully used for material gain. 2) Phishing. A type of Internet fraud that aims to gain access to confidential user data — usernames and passwords. 3) Pharming. Procedure for secretly redirecting the victim to a false IP address.

3. Crime against an organization/society. 1) Viruses. Boot Sector Virus. A computer virus that writes to the first sector of a floppy or hard disk and runs when the computer is loaded from the following main boot record (MBR), but before the first boot sector of the partition. Program File Virus. This type of virus infects the system by adding itself to the end of the file. It changes the program launch so that the control goes to its own code. After executing its code, the control returns back to the main program. Multipartite Virus. This type of virus can infect several parts of the system, including the boot sector, memory, and files. This makes detection and containment more difficult. Polymorphic virus. This is a template that can identify the virus (the sequence of bytes that make up the virus code). Thus, to avoid detection by antivirus software, the polymorphic virus changes every time it is installed. Network Virus. A type of malicious program that independently spreads through local and global (Internet) computer networks. Macro Virus. Unlike most viruses written in a low-level language (such as C or assembler), they are written in a high-level language, such as Visual Basic. These viruses are triggered when a program that can run a macro is started. For example, a macro virus may be contained in spreadsheet files. 2) Cyber Vandalism. The action involving deliberate destruction of or damage to public or private property. 3) Hacking. This is the practice of creating malicious changes in programs in order to achieve a goal that is not provided for by the original goal of the Creator. 4) Forgery. Is a white-collar crime that generally refers to the false making or material alteration of a legal instrument with the specific intent to defraud anyone. 5) Cyber Extortion. This is a form of blackmail, when victims of an IT attack are forced to pay to avoid its consequences. 6) Cyber Terrorism. The use of computer and telecommunications technologies (primarily the Internet) for terrorist purposes.

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Internet security is a branch of computer security specifically related to not only Internet, often involving browser security and the World Wide Web, but also network security as it applies to other applications or operating systems as a whole.

There are various ways to protect yourself from cybercrimes. 1) Antivirus. A specialized program for detecting computer viruses, as well as unwanted (considered malicious) programs and restoring files infected (modified) by such programs, and prevention — preventing infection (modification) of files or the operating system with malicious code. 2) Firewall. This is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block certain traffic based on a specific set of security rules. 3) Encryption software. This is software whose main task is to encrypt and decrypt data, usually in the form of files (or sectors), hard disks and removable media (floppies, CDs, USB flash drives), e-mail messages, or in the form of packets transmitted over computer networks.

In conclusion, I can say that you need to know about the types of cybercrimes and how to avoid them in order to protect yourself.

Соседние файлы в папке 2 семестр