Search for notes by fellow students, in your own course and all over the country.
Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.
Title: Research on cyber crime awarness
Description: In this we have done research on the Cyber crime and aware people about Cyber crime . We have done an online survey and concluded the results about Cyber crime.
Description: In this we have done research on the Cyber crime and aware people about Cyber crime . We have done an online survey and concluded the results about Cyber crime.
Document Preview
Extracts from the notes are below, to see the PDF you'll receive please use the links above
TECHNICAL REPORT WRITING
Awareness
about cybercrime and its
precaution
Submitted to
Ms
...
Memoona Fatima
Submitted By:
Muhammad Taimoor Riaz
(BSCH-20-42)
Ali Afzal
(BSCH-20-54)
Ahmad Hassan
(BSCH-20-36)
Muhammad Talha Anjam
(BSCH-20-56)
Department of Chemistry
2
TECHNICAL REPORT WRITING
Executive summary / Abstract
Cybercrime is the most underrated and dangerous threat in today's world
...
So the risk
of cybercrime is present in this condition at a large volume
...
Spreading fake and rogue information is
a way through which cybercrime harms the integrity and honesty of a market and
marketers
...
This information may be in the form of
your personal data , banking passwords or any other thing
...
But it is most
catastrophic in Asian countries where mostly people are illiterate and do not know
about such things
...
They usually
deceive these innocent people by saying them that they have won a grand prize
in a reality show or some other way and in return steal their information and
blackmail them or steal away their money from their bank accounts
...
timely suggestions and inspired guidance offered by Ms
...
We conduct
online survey about cyber crime and collect records by using different questions
...
We are grateful of all people who cooperate with us
for establishing this report
...
4
TECHNICAL REPORT WRITING
Table of Content
Serial
No:
Name of Topic
Page
no
1
Cover Page
1
2
Title Page
2
3
Executive summary/ Abstract
3
4
Acknowledgment
4
4
Table of Content
5
5
Introduction
6
6
Categories of Cybercrime
7
7
Central Chapter
8
8
Current Scenario of Cybercrime
9
9
Cybercrime Statistics
9
10
Cybercrime prevention tips
10
11
Survey
12
12
Review of People
14
13
Conclusion
16
14
Reference
16
15
Bibliography
16
5
TECHNICAL REPORT WRITING
Introduction
What is cybercrime?
We often hear the term “cybercrime” it is a big risk now than ever before due to the sheer
number of connected people and devices
...
To go
into more detail is not as straightforward, as it takes shape in a variety of different formats
cyber crime in compass is any criminal act dealing with computers and networks
...
According to Interpol, cybercrime is one of the fastest growing area of crime
...
These include attacks against computer data and systems such as Daniel of service attacks,
identity theft, the distribution of child sexual abuse image, internet action fraud, the penetration
of online financial services as well as the deployment of viruses
...
➢ Individually
➢ 2-Property
➢ Government
1- Individually
This type of cyber crime can be in the form of hacking, identify theft, cyber bullying, cyber
stalking ,distributing pornography, trafficking and grooming
...
3- Government
In this category, criminals hack government websites, military websites, or circulate for
propaganda
...
7
TECHNICAL REPORT WRITING
Central Chapter
Cybercrime ranges across a spectrum of activities
...
How cybercriminal Attack
All these forms of Cyber Crime are due to one or more kind of Attacks by the Cyber Criminals
or the Hacktivist in question
...
Information systems and networks offer attractive targets and
should be resistant to attack from the full range of threat agents, from hackers to nation- states
...
Types of Cybercrime Attacks
There five types of cybercrimes:
1-Passive Attack:
A passive attack monitors unencrypted traffic and looks for clear-text passwords and sensitive
information that can be used in other types of attacks
...
2-Active Attack:
In an active attack, the attacker tries to bypass or break into secured systems
...
Active attacks include attempts to
circumvent or break protection features, to introduce malicious code, and to steal or modify
information
...
8
TECHNICAL REPORT WRITING
4-Insider Attack:
An insider attack involves someone from the inside, such as a disgruntled employee, attacking
the network Insider attacks can be malicious or no malicious
...
5-Close-in Attack:
A close-in attack involves someone attempting to get physically close to network components,
data, and systems in order to learn more about a network Close-in attacks consist of regular
individuals attaining close physical proximity to networks, systems, or facilities for the purpose
of modifying, gathering, or denying access to information
...
Cyber Crime Statistics
A study, titled The 2013 Cost of Cyber Crime Study, conducted by Ponemon Institute, provides
an estimation of the economic impact of cybercrime
...
Meanwhile, the average cost to resolve a single
attack totalled more than $1 million
...
56
million, with a range of $1
...
This is an increase of 26 percent,
or $2
...
➢ Data theft caused major costs, 43 percent of the total external costs, business disruption
or lost productivity accounts for 36% of external costs
...
9
TECHNICAL REPORT WRITING
➢ Organizations experienced an average of 122 successful attacks per week, up from 102
attacks per week in 2012
...
Make the passwords more complicated by combining letters, numbers, special
characters (minimum 10 characters in total) and change them on a regular basis
...
Firewalls are the first line of cyber defence; they block connections to
unknown or bogus sites and will keep out some types of viruses and hackers
...
Block spyware attacks: Prevent spyware from
infiltrating your computer by installing and updating anti- spyware software
...
Download applications
from trusted sources
...
g
...
Turn on automatic updates to prevent potential attacks on older software
...
Secure your wireless network
Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured
...
Stop using Public Wi-Fi, a
...
a
...
Use VPNs
...
Protect your e-identity
Be cautious when giving out personal information such as your name, address, phone number
or financial information on the Internet
...
g
...
10
TECHNICAL REPORT WRITING
Avoid being scammed
Always think before you click feel pressured by any emails
...
When in doubt, verify the source
...
Review bank and credit card statements regularly
The impact of identity theft and online crimes can be greatly reduced if you can catch it shortly
after your data is stolen or when the first use of your information is attempted
...
11
TECHNICAL REPORT WRITING
Survey
12
TECHNICAL REPORT WRITING
13
TECHNICAL REPORT WRITING
Reviews of People:
➢ We have to remain his things personal
...
➢ Yes
➢ AT INDIVIDUAL LEVEL , WE SHOULD BEHAVE FRIENDLY WITH
PERSONS WHOM WE DON'T KNOW
...
AND
GOVERNMENT SHOULD PREPARE LAWS FOR PERSONS WHO ARE
VICTIM OF THESE CYBER CRIMES AND PUNISH THE PERSONS WHO
ARE RESPONSIBLE FOR THIS AS HARD AS POSITIVE
...
Privacy is main point of
it
➢ Nothing
➢ We use privacy settings
➢ People care her data
➢ Don't share your vital information to dose that you don't know
➢ We should permote its knowledge so that we can save people by scammers
...
so it is need of our society because mostly dont know
how much there data is important for them
...
➢ Most of the people are aware of the cyber crimes but they face cyber crimes due to
there irresponsibility so there is need to become responsible
...
➢ Implement the cyber laws in the country strictly
...
save your password
...
➢ Limit the personal information you share online
...
Manage
your social media settings
...
➢ Don't fall for pop-ups
...
➢ Manage your social media settings
...
➢ Educate your children about internet risks
➢ For it's awareness parents should talk to their children about use of internet and
educational sectors should provide information to students about cyber crime and
how to prevent ourself from this
...
Training your employees and making them aware
is not only your best defence - it also shows you're paving your way to a more
GDPR compliant future
...
15
TECHNICAL REPORT WRITING
Conclusion
The issue of network and Internet security has become increasingly more important as more
and more business and people go on-line
...
We cannot use our names, initials
as passwords that are easily traced
...
We have to use
licensed anti-virus software
...
...
slideshare
...
wikipedia
...
2) Fortinet 2013 Cyber Crime Report
...
16
Title: Research on cyber crime awarness
Description: In this we have done research on the Cyber crime and aware people about Cyber crime . We have done an online survey and concluded the results about Cyber crime.
Description: In this we have done research on the Cyber crime and aware people about Cyber crime . We have done an online survey and concluded the results about Cyber crime.