Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cybercrime and Cyber Terrorism, Exams of Cybercrime, Cybersecurity and Data Privacy

Social, Political, Ethical and Psychological Dimensions

Typology: Exams

2017/2018
On special offer
30 Points
Discount

Limited-time offer


Uploaded on 05/07/2018

pavan-sesha-sai
pavan-sesha-sai 🇮🇳

1 document

1 / 30

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Cybercrime and Cyber Terrorism
Social, Political, Ethical and
Psychological Dimensions
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
Discount

On special offer

Partial preview of the text

Download Cybercrime and Cyber Terrorism and more Exams Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

Cybercrime and Cyber Terrorism

Social, Political, Ethical and Psychological Dimensions

Hacker

  • (^) Hacker is a word used to mean someone who illegally breaks into a computer or network or writes a malicious code.
  • (^) Modern day cybercriminals work like “Pros”. They use methods of planning cyberattacks and tools used by hackers to exploit security weaknesses.
  • (^) Privacy is the right to be left alone and the right to be free of unreasonable personal intrusions.

Intellectual Property in Cyberspace

  • (^) Intellectual Property is a number of distinct types of creations of the mind, such as inventions; literary and artistic works; and symbols, names, images, and designs used in commerce.
  • (^) The term “Intellectual property” denotes the specific legal rights assigned to authors, inventors and other IP holders who may exercise those rights; however the term does not denote the intellectual work itself.

Intellectual Property in Cyberspace

  • (^) IP laws are meant to protect varied forms of subjects as below: - (^) Copyright - (^) Patent - (^) Trademark - (^) Trade Secret - (^) Trade Name - (^) Domain Name

Patent

  • (^) A “Patent” is a document that grants the holder exclusive rights on an invention for a fixed number of years.
  • (^) “Patent” is the term usually refers to a privilege, that is, a right granted to one who invents or discovers a new method or a useful process, machine, article of manufacture or composition of matter or any new and useful improvement thereof.

Trademark

  • (^) “Trademarks” are the symbols used by businesses to identify their goods and services; government registration of the trademark confers exclusive legal right to its use.
  • (^) A TM is a type of IP, and typically comprises a name, word, phrase, logo, symbol, design, image or a combination of all of these.

Trade Name

  • (^) A “Trade Name” also known as trading name or business name, is the name that a business trades under for commercial purposes.
  • (^) Its registered legal name is used for contracts and other formal situations.

Domain Name

  • (^) Registering DNS mapping IP addresses.
  • (^) Associated with domain names is a phenomenon called as “Cybersquatting”.

Ethical Dimensions of Cyber Crime

Ethical Hackers: Good Guys in bad land

Hackers and Cybercriminals: Evolution and

Technical Prowess and Skills

  • (^) There are several levels of expertise in hacking…they are - (^) Black Hat Hacker & - (^) White Hat Hackers

Inside the minds of Hackers and Criminals

  • (^) The basic motives behind web attacks and hacking are: - (^) Money - (^) Freedom (Hacktivists and Neo Hackers) - (^) Love - (^) Personal Gain (Script Kiddie or Skiddie)

Generation of Hackers: 1 st^ Gen: Creative Programmer breed. Creative Programmers and Scientists , they had some sense of ethics and would do right things within their boundary 2 nd^ Gen: Computer evolutionary They are more hardware hackers used kits like Altair and Apple 3 rd^ Gen: Games and Copyright Breakers Breaks protection and copyrights of games , they are involved with minor criminal activities 4 th^ Gen: Criminals & Cyberpunks They are criminal oriented and motivated primarily by Greed , Power, revenge & Malicious Intent Coders are motivated by a sense of power and prestige. They are revered in their community but dangerous to us they have hidden agendas such as writing deadly codes like TROGANS ……… Evolution of Technical Prowess and Skills

Ethical Hackers

  • (^) Cyberterorists are well funded and they are also quite very motivated… They thrive due to the opportunities they get for mixing political rhetoric with criminal activity
  • (^) Ethical Hackers: They seek answer some basic questions:-
    • (^) To what information, location and systems an intruder can gain access? What is being protected?
    • (^) What are you trying to protect against?
    • (^) When an intruder gains access, what can he/she see on the target facilities, networks and systems?
    • (^) What can an intruder do with that information and data?
    • (^) Does anyone at the target notice the intruders attempts or successes?
    • (^) How much time, effort and money are you willing to expend to obtain adequate protection?