Академический Документы
Профессиональный Документы
Культура Документы
describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. Cyber crime in the context of national security may involve hacktivism, traditional espionage, or information warfare and related activities.
2
Secure Wifi
Use antivirus Firewalls Backups Software updates and patches
Types of Hacking
ETHICAL
UNETHICAL
become a major concern for businesses and Government. In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
10
networking skills Adept at installing and maintaining systems Detailed knowledge of Hardware and software
11
http://www.infosecacademy.com
It is a professional certification provided by the
12
Your name,
names and addresses of suspects and any other relevant information necessary.
What contents should be there in the application letter?
Contents vary with respect to the type of fraud or crime faced by you.
13
Implications
Offence Tampering with computer source documents Publishing any obscene material electronically Implication Upto 3 years and/or with a fine upto Rs. 2 Lakh 1st conviction upto 2 years + fine upto Rs. 5 Lakh 2nd conviction or subsequent upto 5 years + fine upto Rs. 10 Lakh 1st conviction upto 3 years + fine upto Rs. 10 Lakh 2nd conviction or subsequent conviction upto 7 years + fine upto Rs. 10 Lakh Upto 3 years + fine Upto 5 years + fine
14
Child pornography
Cheating using digital signature of other person Impersonation using communication network
15