• Post category:StudyBullet-13
  • Reading time:9 mins read


Types of Cyber Crime

What you will learn

Develop knowledge of Cyber Security

Learn about key compliance and threat intelligence

Very useful for Students seeking a career in Technology etc. Helpful for Academics

Cyber Certificate

Description

We live in the β€˜Information Age’. There is an abundance of information freely flowing and easily available for access. Computers, mobile phones, digital cameras and other electronic gadgets have become an inseparable part of our daily lives. On the other hand, anonymity, lack of defined boundaries and restrictions of information access, and a growing dependency on technology has attracted criminals to use these as a medium of conducting criminal activities. Such acts are known as cyber crimes.

When a cyber crime is reported, it gets investigated and an appropriate law is formed to check further crimes of this type.

What is Cyber Crime?

A cyber crime can be defined as any unlawful activity committed by using cyber space as a tool and/or target. The word cyber space encompasses electronic devices with the capacity of storing or processing data (electronically).

What is Cyber Space?


Get Instant Notification of New Courses on our Telegram channel.


Cyber crimes are committed in cyber space but are not limited to crimes committed using the internet or a computer. Any digital device or medium may be used. In this sense, mobile phones, CDs and DVDs, microwave ovens or even GPS navigation systems would all be considered cyber space.

What is Voyeurism?

Voyeurism is the act of spying on people engaged in acts that are usually considered to be private in nature.

People like to record and share some moments of their lives via technology. Unfortunately, a new form of cybercrime has emerged wherein hidden cameras capture the private moments of people’s lives that they do not otherwise wish to share.

The cameras used are small and can be easily hidden in unnoticeable places such as ceiling fans, two way mirrors, door locks, ceiling lights. Changing rooms and washrooms are the most probable places of hiding such cameras.

English
language

Content

Introduction

Introduction
Threats and Counter Measure
Information Security Measurement
Operational Issues
Cost Benefit Analysis
Risk Analysis
Formal Methods
Formal Evaluation Methodologies
ISMS
Security System Design Principles
Principle of Fail-Safe Defaults
Principle of Open Design
Principle of Least Common Mechanism
Vulnerability Analysis
Summary

Security Management Practices

Introduction
Management Responsibilities
Confidentiality Level
Integrity Level
Availability Level
Sensitivity Classification
Information Classification Policy
The Process of Protecting Information
Best Practices
Summary

Section 3

Introduction
Introduction 2
Goals for Security Policy
Confidentiality Policy
Integrity Policy
Policies
Acceptable Computer Use Policy
Anti-virus Policy
System Audit Policy
Server Security Policy
Backup Policy
Cryptographic Control Policy
Incident Response Procedure
Security Policy Waiver
Summary

Section

Introduction
Risk Assessment – 1
Risk Assessment – 2
Data Collection
Data Analysis 1
Data Analysis – 2
Data Analysis 3
Activities in Risk Assessment
Identification of Threats
Identification of Security Controls
Risk Prioritization
Summary

Section

Introduction
Security Policy and Procedures-1
Security Policy and Procedures-2
Flaw Hypothesis Methodology
Vulnerability AnalysisPenetration Testing
Assessment of the Existing System
Physical Access to Premises
Configuration Management Procedure
User Training Procedure
Summary

Section

Introduction
Disaster Recovery and Business Continuity
The Process
The Process 2
Tape Backup and Restore
Tape Backup and Restore 2
Remote Data Center
Summary

Section

Introduction
Security Assurance Process
ISMS
Reference
Organizational Assurance
Trading Partner Assurance
Physical Accessibility
Vulnerability Analysis
Level of Trust on the Users
Security Controls
Security Organization
Physical and Environmental Security
System development and Maintenance
Summary

Section

Introduction
Organizations Responsibilities
US Laws
Indian Information Technology Act 2000
HIPAA
GLBA
Law Enforcement
Summary

Section

Introduction
TCSEC
Discretionary Security Protection
Labeled Security Protection
Verified Design
ITSEC
Common Criteria (ISO 15408)
Standards for Evaluation of ISMS

Section

Introduction
Security Controls
Auditing
Checklists
System and Network Usage Audits
Summary

Section

Introduction
SSE-CMM
Process Areas
Engineering Process Areas
Project Process Areas
Organizational Process Areas
Implementation of SSE-CMM