Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

> View & review (study) the Lynda.com video presentation Chapter 2 Defining Cybe

ID: 3700861 • Letter: #

Question

> View & review (study) the Lynda.com video presentation Chapter 2 Defining Cyber Crime. **See the link below.**

Discuss by briefly (no more than one paragraph for each topic) but specifically summarizing (in your own words) each of the following separate topics included in the video presentation (which includes a full transcript of its contents): See attached link for the video Question 1 to 5.

1. Classifying cyber-crime

Link to question 1:- https://www.lynda.com/Security-tutorials/Classifying-cyber-crime/419360/455997-4.html

2. Defining identity theft

Link to question 2:- https://www.lynda.com/Security-tutorials/Defining-identity-theft/419360/455998-4.html

3. Examining cyber harassment

Link to question 3:-  https://www.lynda.com/Security-tutorials/Examining-cyber-harassment/419360/455999-4.html

4. Explaining hacking techniques

Link to question 4:- https://www.lynda.com/Security-tutorials/Explaining-hacking-techniques/419360/456000-4.html

5. Differentiating no-access crimes (aka denial of service attacks)

Link to question 5:- https://www.lynda.com/Security-tutorials/Differentiating-nonaccess-crimes/419360/456001-4.html

Explanation / Answer

1. Cybercrime can be defined as any criminal activity that involves a computer, networked device or a network.The computer can be object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense.People who perform these activities are often referred to as hackers.

2. Identity Theft

Identity Theft or Identity fraud are the terms used to refer to the crimes in which some one wrongfully obtains and uses personal data of others for financial gain.

Phishing is the most popular attack which is usually done by sending emails that seem to appear to come from credible source which require users to put in personal data

Some times information is stealed from cached contents in browser and can also steal using spyware which captures text input using keyloggers.

3.Cyber Harrasment

Cyber Harassment is the use of Information and Communications Technology (ICT) to harass, control, manipulate adult, business or group without a direct or implied threat of physical harm.

When minors are involved, Cyberbullying is the term describing Cyber Harassment and it  does not involve face-to-face contact and primarily occurs online using electronic devices.

The cyberstalker uses the email bomb to annoy the victim and potentially flood the victim's email account, so that it shuts down. A lot of cyberstalking or cyberbullying occurs either in internet chat or instant messaging.

4.Hacking techniques

There are many hacking techniques which are used to gain unauthorized access to a system . One major hacking technique is SQL INJECTION.

SQL INJECTION:

A user enters an SQL, Structured Query Language query into an entry field.This is a database query. The trouble starts if the SQL query isn't validated. The malicious actor can then spoof their identity and access the database where all the sensitive data is stored.Finally, once they have access to your database, they can tamper, change, delete, or collect any of your sensitive information

5. No-access crimes

In this case, the malicious agent doesn't need to try to hack the system. Either they can get their malware into the system without breaking in, or they don't need to bother breaking in, they just try to keep others out.

Denial of service :The malicious actor wants to make sure that the machine or network resources are unavailable to the intended user community..

Virus Infection: There are many viruses like permannet viruses, overwrite viruses, boot viruses which damages the system to the most extent.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote