[go: up one dir, main page]

0% found this document useful (0 votes)
490 views5 pages

Title Author Dr. Jeetendra Pande, Assistant Professor

This document provides an introduction to cyber security including the history of the internet, types of cyber crimes and malware, cyber security techniques, cyber crime incidents, and counter measures in India. It covers topics such as authentication, encryption, digital signatures, antivirus software, firewalls, steganography, and computer forensics. Guidelines for secure passwords and using a password manager are also discussed.

Uploaded by

data swa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
490 views5 pages

Title Author Dr. Jeetendra Pande, Assistant Professor

This document provides an introduction to cyber security including the history of the internet, types of cyber crimes and malware, cyber security techniques, cyber crime incidents, and counter measures in India. It covers topics such as authentication, encryption, digital signatures, antivirus software, firewalls, steganography, and computer forensics. Guidelines for secure passwords and using a password manager are also discussed.

Uploaded by

data swa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Title Introduction to Cyber Security

Author Dr. Jeetendra Pande, Assistant Professor-


School of CS & IT, Uttarakhand Open
University, Haldwani
ISBN: 978-93-84813-96-3

Uttarakhand Open University, 2017


© Uttarakhand Open University, 2017. This work by Uttarakhand Open University is licensed under
a Creative Commons Attribution-ShareAlike 4.0 International License. It is attributed to the sources
marked in the References, Article Sources and Contributors section.
Published By: Uttarakhand Open University

3
Index
1.1 INTRODUCTION .......................................................................................................................................... 8

1.1.1 HISTORY OF INTERNET ..................................................................................................................................... 8


1.1.1.1 Internet Addresses ........................................................................................................................... 10
1.1.1.2 DNS .................................................................................................................................................. 12
1.1.1.3 Internet Infrastructure ..................................................................................................................... 13
1.1.1.4 World Wide Web ............................................................................................................................. 14

1.2 INTRODUCTION TO CYBER CRIME ............................................................................................................. 15

1.2.1 CLASSIFICATION OF CYBER CRIMES ................................................................................................................... 16


1.2.2 REASONS FOR COMMISSION OF CYBER CRIMES .................................................................................................. 18

1.3 MALWARE AND ITS TYPE .......................................................................................................................... 19

1.3.1 ADWARE ..................................................................................................................................................... 19


1.3.2 SPYWARE .................................................................................................................................................... 19
1.3.3 BROWSER HIJACKING SOFTWARE...................................................................................................................... 19
1.3.4 VIRUS......................................................................................................................................................... 19
1.3.5 WORMS ..................................................................................................................................................... 20
1.3.6 TROJAN HORSE ............................................................................................................................................ 20
1.3.7 SCAREWARE ................................................................................................................................................ 21

1.4 KINDS OF CYBER CRIME ............................................................................................................................ 21

1.4.1 CYBER STALKING .......................................................................................................................................... 21


1.4.2 CHILD PORNOGRAPHY ................................................................................................................................... 22
1.4.3 FORGERY AND COUNTERFEITING ...................................................................................................................... 22
1.4.4 SOFTWARE PIRACY AND CRIME RELATED TO IPRS ............................................................................................... 22
1.4.5 CYBER TERRORISM ........................................................................................................................................ 22
1.4.6 PHISHING .................................................................................................................................................... 22
1.4.7 COMPUTER VANDALISM ................................................................................................................................ 22
1.4.8 COMPUTER HACKING .................................................................................................................................... 22
1.4.9 CREATING AND DISTRIBUTING VIRUSES OVER INTERNET......................................................................................... 23
1.4.10 SPAMMING ............................................................................................................................................... 23
1.4.11 CROSS SITE SCRIPTING ................................................................................................................................. 23
1.4.12 ONLINE AUCTION FRAUD ............................................................................................................................. 24
1.4.13 CYBER SQUATTING ...................................................................................................................................... 24
1.4.14 LOGIC BOMBS ............................................................................................................................................ 24
1.4.15 WEB JACKING ............................................................................................................................................ 24
1.4.16 INTERNET TIME THEFTS ............................................................................................................................... 24

4
1.4.17 DENIAL OF SERVICE ATTACK.......................................................................................................................... 24
1.4.18 SALAMI ATTACK ......................................................................................................................................... 24
1.4.19 DATA DIDDLING ......................................................................................................................................... 25
1.4.20 EMAIL SPOOFING........................................................................................................................................ 25

2.1 AUTHENTICATION .................................................................................................................................... 26

2.2 ENCRYPTION............................................................................................................................................. 27

2.3 DIGITAL SIGNATURES ............................................................................................................................... 28

2.4 ANTIVIRUS ................................................................................................................................................ 29

2.5 FIREWALL ................................................................................................................................................. 30

2.6 STEGANOGRAPHY .................................................................................................................................... 31

3.1 COMPUTER FORENSICS ............................................................................................................................ 33

3.2 WHY SHOULD WE REPORT CYBER CRIME? ................................................................................................ 36

4.1 INTRODUCTION ........................................................................................................................................ 40

4.2 SOME RECENT CYBER CRIME INCIDENTS .................................................................................................. 40

5.1 INTRODUCTION ........................................................................................................................................ 47

5.2 COUNTER CYBER SECURITY INTIATIVES IN INDIA ...................................................................................... 47

6.1 GENERATING SECURE PASSWORD ............................................................................................................ 52

6.1.1 GUIDELINE FOR SETTING SECURE PASSWORD ...................................................................................................... 52

6.2 USING PASSWORD MANAGER .................................................................................................................. 55

6.2.1 WHAT IS A PASSWORD MANAGER? .................................................................................................................. 56


6.2.2 WHY YOU SHOULD USE IT? ............................................................................................................................. 56
6.2.3 HOW DOES IT WORK? .................................................................................................................................... 56
6.2.4 SOME POPULAR PASSWORD MANAGERS............................................................................................................ 56

6.3 ENABLING TWO-STEP VERIFICATION ........................................................................................................ 62

6.4 SECURING COMPUTER USING FREE ANTIVIRUS ........................................................................................ 72

7.1 CONFIGURING FIREWALL ON MAC COMPUTER ........................................................................................ 75

7.1.1 TURNING ON AND CONFIGURING THE MAC OS X FIREWALL.................................................................................. 75

7.2 WORKING WITH WINDOWS FIREWALL IN WINDOWS .............................................................................. 78

7.2.1 FIREWALL IN WINDOWS 7 .............................................................................................................................. 78


7.2.2 CONFIGURING WINDOWS FIREWALL ................................................................................................................ 79
7.2.3 HOW TO START & USE THE WINDOWS FIREWALL WITH ADVANCED SECURITY .......................................................... 83

5
7.2.3.1 How to Access the Windows Firewall with Advanced Security ........................................................ 83
7.2.3.2 What Are The Inbound & Outbound Rules? ..................................................................................... 84
7.2.3.3 What Are The Connection Security Rules? ....................................................................................... 86
7.2.3.4 What Does the Windows Firewall with Advanced Security Monitor? ............................................. 87

8.1 FINDING THE BEST BROWSER ACCORDING TO THE USERS REQUIREMENT ............................................... 89

9.1 SAFE BROWSING ...................................................................................................................................... 94

9.1.1 HOW DO I KNOW IF A WEBSITE IS SECURE? ........................................................................................................ 94

9.2 TIPS FOR BUYING ONLINE ......................................................................................................................... 95

9.3 CLEARING CACHE FOR BROWSERS ............................................................................................................ 96

9.3.1 CLEARING CACHE FOR CHROME BROWSERS ABOVE VERSION 10 ............................................................................. 96


9.3.2 CLEARING CACHE FOR CHROME BROWSERS FROM VERSION 1 TO 9......................................................................... 99
9.3.3 CLEARING CACHE FOR SAFARI FOR IOS, IPHONE AND IPAD.................................................................................. 102
9.3.4 CLEARING CACHE FOR SAFARI FOR MAC OS X................................................................................................... 103
9.3.5 CLEARING CACHE FOR SAFARI FOR WINDOWS ................................................................................................... 104
9.3.6 CLEARING CACHE FOR INTERNET EXPLORER 9, 10 AND 11 .................................................................................. 106
9.3.7 CLEARING CACHE FOR INTERNET EXPLORER 8.................................................................................................... 108
9.3.8 CLEARING CACHE FOR FIREFOX ...................................................................................................................... 111
9.3.9 CLEARING CACHE FOR FIREFOX 33 ................................................................................................................. 112
9.3.10 CLEARING CACHE FOR OPERA ...................................................................................................................... 114
9.3.11 CLEARING CACHE FOR CCLEANER ................................................................................................................. 115

10.1 WHAT IS WIRELESS LAN? ...................................................................................................................... 117

10.2 MAJOR ISSUES WITH WLAN .................................................................................................................. 118

10.2.1 SECURE WLAN ........................................................................................................................................ 118


10.2.2 WI-FI AT HOME........................................................................................................................................ 118

11.1 SAFE BROWSING GUIDELINES FOR SOCIAL NETWORKING SITES ........................................................... 123

11.1.1GENERAL TIPS ON USING SOCIAL NETWORKING PLATFORMS SAFELY .................................................................... 124


11.1.2 POSTING PERSONAL DETAILS ...................................................................................................................... 125
11.1.3 FRIENDS, FOLLOWERS AND CONTACTS .......................................................................................................... 125
11.1.4 STATUS UPDATES ..................................................................................................................................... 126
11.1.5 SHARING ONLINE CONTENT ........................................................................................................................ 126
11.1.6 REVEALING YOUR LOCATION ....................................................................................................................... 126
11.1.7 SHARING VIDEOS AND PHOTOS ................................................................................................................... 127
11.1.8 INSTANT CHATS ........................................................................................................................................ 127
11.1.9 JOINING AND CREATING GROUPS, EVENTS AND COMMUNITIES ......................................................................... 127

6
11.2 EMAIL SECURITY TIPS ........................................................................................................................... 128

12.1 INTRODUCTION .................................................................................................................................... 130

12.2 SMARTPHONE SECURITY GUIDELINES ................................................................................................... 131

12.2.1 PURSES, WALLETS, SMARTPHONES .............................................................................................................. 131


12.2.2 PLATFORMS, SETUP AND INSTALLATION ........................................................................................................ 132
12.2.2.1 Platforms and Operating Systems ............................................................................................... 132
12.2.2.2 Feature Phones ............................................................................................................................ 132
12.2.2.3 Branded and locked smartphones ............................................................................................... 133
12.2.2.4 General Setup .............................................................................................................................. 133
12.2.2.5 Installing and updating applications ........................................................................................... 133
12.2.3 COMMUNICATING SECURELY(THROUGH VOICE AND MESSAGES) WITH A SMARTPHONE ......................................... 134
12.2.3.1 Secure Voice Communication ...................................................................................................... 134
12.2.3.2 Sending Messages Securely ......................................................................................................... 137
12.2.3.3 Storing Information on your Smartphone .................................................................................... 138
12.2.3.4 Sending Email from your Smartphone ......................................................................................... 139
12.2.3.5 Capturing Media with your Smartphone ..................................................................................... 139
12.2.3.6 Accessing the Internet Securely from your Smartphone .............................................................. 140
12.2.3.7Advanced Smart Phone Security ................................................................................................... 141
REFERENCES ....................................................................................................................................................... 144

You might also like