Introduction to Cyber Laws Unit 5 Types of
Introduction to Cyber Laws Unit 5
Types of Attacks
Social Engineering Attack
Cyber Stalking �Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization �Cyberstalking is a criminal offense under various state antistalking, slander and harassment laws. A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail.
Cyber Stalking �Stalking by strangers �Of celebrities and public persons �By anonymous online mobs �Corporate cyberstalking
Cloud Computing and Cyber Crime �It is widely defined as a style of computing that uses Internet technology to offer scalable and elastic IT-enabled capabilities as a service to customers. �This ranges from routine tasks of communicating over the internet (e. g. Gmail), to sophisticated work such as Customer Relationship Management (CRM) that are operated and maintained in the “cloud” by providers.
Cloud Computing and Cyber Crime �When a client decides to employ the use of cloud computing, the data no longer belongs to the client alone. �The vendor, or the service provider, stores the user’s data on its own virtualized server and as such, vendors gain full access to the information available, confidential or not.
Cloud Computing and Cyber Crime �Further, the servers are moved outside the traditional security perimeter making it easy for the reach of cyber criminals. �This is a growing concern particularly when cloud computing stores sensitive data about customers.
- Slides: 9