Beruflich Dokumente
Kultur Dokumente
Meghdoot Dhameliya
Content
Modern Technology
Key difference in new tactics
Increased anonymity
Facilitation of terrorism through IT
Political Propaganda and disinformation
(Iran,Iraq,Mexico,Northern Ireland, Saudi
Arabia)
Widest Possible Audience
Adobe Hack
Around 2.9 million people across the globe, using
popular software applications like Photoshop,
InDesign and Acrobat have had their private
information like passwords and even credit and
debit card details stolen in a sophisticated cyberattack on Adobe, the parent company.
Date 5th Oct 2013
Reference Times of India
Cyber Attacks
Cont..
BACK
Types of Cyber
Crime(Cont..)
Code hacker :They know computers inside
out. They can make the computer do nearly
anything they want it to.
Crackers: They break into computer
systems, operating systems and their
security is their favorite pastime
Cyber Pumps: They are masters of
cryptography
Phreakers : They combine their in-depth
knowledge of the Internet and mass
telecommunication systems.
Contraventions Accessing or
securing access to the
computer/network, Downloading any
data or information from the
computer/network, Introducing or
causing to be introduced any
computer contaminant or computer
VIRUS into the computer/network.
Types of Hacking
Cyber Murders
Effect on Government Site
Manipulating Stock Market
Transmission of Virus
Crashing of Site
Hacking Ordinary Site
Select * from
yourQueries
Where isDaubt = YES;
Thank you