Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

download Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

of 41

Transcript of Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    1/41

    Kyb`r krnf`, w`b agkjnec, `fgnlirguhs,kyb`r t`rrdrnsf, us` di

    `ekryptnde by t`rrdrnsts

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    2/41

    S`b Agkjnec Aust gs kdev`etndegl onagkjnec di ge gnrplge` ns hde` by

    usnec idrk`,

    snfnlgrly w`b agkjnec f`ges idrk`iully tgjnec dv`r kdetrdldi g w`bsnt`

    Xo` fdtnv` ns usuglly to` sgf` gs onagkjnec Xo`p`rp`trgtdrs

    ogv` `nto`r g fde`tgry dr pdlntnkgl purpds` wonko to`y trytd sgtngt` by

    odlhnec to` dwe`rs di to` w`bsnt` td rgesdf

    Xons dkkurs wo`e sdf`de` idrk`iully tgj`s kdetrdl di gw`bsnt` /by

    krgkjnec to` pgsswdrh geh lgt`r kogecnec nt. Xo` gktugldwe`r di to`

    w`bsnt` hd`s edt ogv` gey fdr` kdetrdl dv`r wogt

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    3/41

    Odw hd`s w`b agkjnec tgj`

    plgk`4

    Xo` ghfnenstrgtdr di gey w`bsnt` ogs g pgsswdrh gehg us`regf` togt dely o` /dr sdf`de` gutodrnz`h byonf. fgy us` td upldgh inl`s irdf ons kdfput`r de to`w`b s`rv`r /snfply put, g s`rv`r ns g pdw`riulkdfput`r. wo`r` ons w`bsnt` ns odst`h

    Nh`glly, tons pgsswdrh r`fgnes s`kr`t wnto to`ghfnenstrgtdr

    Ni g ogkj`r c`ts odlh di tons us`regf` geh pgsswdrh,

    to`e o` kge pr`t`eh td b` to` ghfnenstrgtdr Kdfput`rs hdet r`kdcenz` p`dpl` dely us`regf`s

    geh pgsswdrhs

    Xo` w`b s`rv`r wnll crget kdetrdl di to` w`bsnt` td

    wod`v`r `et`rs to` kdrr`kt pgsswdrh geh us`regf`kdfbnegtnde

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    4/41

    Xo`r` gr` fgey wgys ne wonko g ogkj`r fgy c`ttd jedw g

    pgsswdrh, to` fdst kdffde b`nec pgsswdrhkrgkjnec wo`r`ne g krgkjnecsditwgr` ns us`h tdcu`ss g pgsswdrh

    ]gsswdrh krgkjnec gttgkjs gr` fdst kdffdelydi twd

    typ`s Xo` inrst de` ns jedwe gs to` hnktndegry gttgkj Ne

    tons typ` di

    gttgkj to` sditwgr` wnll gtt`fpt gll to` wdrhs

    kdetgne`h ne g pr`h`ine`h hnktndegry di wdrhs

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    5/41

    `xgfpl` Idr `xgfpl`, nt fgy try Rgonf, Rgoul, Rgj`so,

    Rgf, R``fg, R``eg ne g pr`h`ine`h hnktndegry

    di Nehnge egf`s Xo`s` typ`s di hnktndegrn`s gr`r`ghnly gvgnlgbl` de to` Net`re`t

    Xo` dto`r idrf di pgsswdrh krgkjnec ns by usnecbrut` idrk`% Ne

    tons jneh di gttgkj to` sditwgr` trn`s td cu`ss to`pgsswdrh by trynec dut gll pdssnbl` kdfbnegtndesdi eufb`rs, syfbdls, l`tt`rs tnll to` kdrr`ktpgsswdrh ns idueh

    Idr`xgfpl`, nt fgy try dut pgsswdrh

    kdfbnegtndes lnj` gbk72;, gkbh093>, sha+%U,w`ui! & !

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    6/41

    [df` sditwgr`, gvgnlgbl` idr pgsswdrh krgkjnecusnec to` brut` idrk` t`koenqu`, kge ko`kj gouc` eufb`r di pgsswdrh kdfbnegtndes p`rs`kdeh

    So`e kdfpgr`h wnto g hnktndegry gttgkj, g brut`idrk` gttgkj tgj`s fdr` tnf`, but nt ns h`inent`lyfdr` sukk`ssiul

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    7/41

    Nllustrgtnde Ne ge neknh`et r`pdrt`h ne to` P[G, to` dwe`r di g

    odbby w`bsnt` idr konlhr`e r`k`nv`h ge `&fgnlneidrfnec o`r togt g crdup di ogkj`rs ogh cgne`hkdetrdl dv`r o`r w`bsnt` Xo`y h`fgeh`h g

    rgesdf di 7 fnllnde hdllgrs irdf o`r Xo` dwe`r, g skoddlt`gko`r, hnh edt tgj` to`

    tor`gt s`rndusly [o` i`lt togt nt wgs aust g skgr`tgktnk geh ncedr`h to` `&fgnl

    Nt wgs tor`` hgys lgt`r togt so` kgf` td jedw,idlldwnec fgey

    t`l`pode` kglls irdf gll dv`r to` kduetry, togt to`ogkj`rs ogh w`b agkj`h o`r w`bsnt`

    [ubs`qu`etly, to`y ogh glt`r`h g pdrtnde di to`w`bsnt` wonko wgs `etntl`h Odw td ogv` iue wnto

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    8/41

    Ne gll to` plgk`s wo`r` nt ogh b``e f`etnde`h,to`y ogh r`plgk`h to` wdrh cdlhinso wnto to`wdrh pnrgeogs

    ]nrgeogs gr` tney but `xtr`f`ly hgec`rdus il`so&`gtnec inso Fgey konlhr`e ogh vnsnt`h to` pdpulgrw`bsnt` geh ogh b`ln`v`h wogt to` kdet`ets dito` w`bsnt` succ`st`h

    Xo`s` ueidrtuegt` konlhr`e idlldw`h to`nestruktndes, trn`h td plgy wnto pnrgeogs, wonkoto`y bducot irdf p`t sodps, geh w`r` v`rys`rndusly neaur`h'

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    9/41

    @fgnl Irguhs H`gr Fr% Austne Snllngfs, N#f Ynjgs Fgeant [neco

    irdf ]ueagb /Nehng.% N b`ldec td g knty egf`h

    Luhongeg%

    Fr% Snllngfs, N gf ogvnec g brdto`r ne Kgeghg

    wod ns glsd egf`h Austne Snllngfs% O` wgs

    ghdpt`h irdf fy pgr`ets by sdf` Fr% Snllngf

    Rgf di S`llgeh% F` geh fy fuf kgf` dv`r td

    Kgeghg td l`gv` Austne td ons e`w igfnly /Snllngf

    Rgf#s Igfnly.% Nt ogpp`e`h ne Aue` 7>?0%

    [d Fr% Austne Snllngfs, ni ydu gr` to` sgf`

    p`rsde Nf tgljnec gbdut% Xo`e pl`gs` cnv` f`

    sdf` tnf` sd togt N kge l`t ydu jedw to` r`glntn`s%

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    10/41

    Nfgcne` to` toducots cdnec torduco Fr Austne Snllngfso`gh git`r r`ghnec tons `fgnl Ns o` r`glly ghdpt`h4 So`r` gr` ons

    bnrto pgr`ets4 Ns tons `fgnl irdf ons bnrto brdto`r4

    Ne r`glnty, tons ns g skgf `fgnl drncnegtnec irdf g kdll`c` ne[gecrddr /Nehng.' Kgeghnge kntnz`es gr` tgrc`t`h wnto to`s` `fgnls Ni

    to` tgrc`ts stgrt b`ln`vnec to` s`eh`r td b` to`nr brdto`r, to`y gr`

    gsj`h td s`eh fde`y sd togt to`nrbrdto`r kge trgv`l td Kgeghg wnto to`

    prddi di to` vnktnfs ghdptnde' Xons ns aust de` di to` ouehr`hs di `fgnl skgfs b`nec

    p`rp`trgt`h de to` Net`re`t Xo`s` skgfs gr` kdffdely r`i`rr`h td gs

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    11/41

    Xo` 87> l`tt`r skgfs drncnegt`h ne to` `grly 7>?=s gs to`dnl&bgs`h `kdedfy di Enc`rng w`et hdweonll Ne to` 7>>=s,l`tt`r skgfs cgv` wgy td `fgnl skgfs

    Ne 2==3, Gsnge [koddl di Kyb`r Lgws kdehukt`h g ; fdetonet`esnv` nev`stncgtnde di ouehr`hs di skgf `fgnls Xo`r`sults w`r` v`ry surprnsnec td sgy to` l`gst L`ss toge7=% di to`s` `fgnls ogh gktuglly drncnegt`h irdf Enc`rng'

    G fgadrnty di to`s` `fgnls /fdr` toge 9=%. ogv`drncnegt`h irdf Nsrg`l, idlldw`h by to` E`to`rlgehs, PJgeh dto`r @urdp`ge kduetrn`s% Xo` bnrto brdto`r `fgnlwgs to` dely de` drncnegtnec irdf Nehng

    Fdst di to`s` skgf `fgnls prdfns` to` r`k`nv`r fnllndes/dr sdf`tnf`s bnllndes. di hdllgrs Fdst kdffdely to` `fgnl sgys togt

    sdf` rnko Girnkge bur`gukrgt dr busne`ssfge dr pdlntnkngeogs hn`h geh l`it b`oneh g ldt di fde`y

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    12/41

    `%c% kdeth% Xo` skgfst`r stgt`s togt to` Cdv`ref`et ns cdnec tdkdeinskgt` to` fde`y Xo` dely wgy dut ns td trgesi`r to`

    fde`y td to` bgej gkkduet di to` `fgnl r`knpn`et Gll togtto` `fgnl r`knpn`et ogs td hd ns s`eh ons bgej gkkdueth`tgnls Idr tons g c`e`rdus i`` di g i`w fnllnde hdllgrs wnllb`

    pgnh' Ni sdf`de` gktuglly iglls idr tons skgf geh prdvnh`s to`

    bgej h`tgnls, o` ns s`et sdf` diinkngl lddjnec hdkuf`ets r`lgtnec td to` bgej

    trgesi`r di g

    ouc` suf di fde`y Dek` to` vnktnf ns kdevnek`h di to`c`eune`e`ss

    di to` trgesgktnde, sdf`tonec gpp`grs td cd wrdec Xo` vnktnf ns neidrf`h togt g sfgll gfduet di fde`y

    /rgecnec irdf P[( 7== td 20==. ns e``h`h idr bgej

    kogrc`s dr dto`r pgp`r wdrj Xons fde`y ns to` fdtnv` b`oneh to` `lgbdrgt` skgf Dek` to`

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    13/41

    Ldtt`ry skgfs Xo` ldtt`ry skgf `fgnls neidrf to` r`knpn`et togt o` ogs

    wde g fnllnde

    hdllgr ldtt`ry rue by Fnkrdsdit, ^godd dr sdf` dto`r w`lljedwe cldbgl

    kdfpgey Xo` wnee`r ns gsj`h td prdvnh` ons bgej h`tgnls

    geh pgy g sfgll suf idr bgej kogrc`s geh dto`r prdk`ssnec i``s

    Gedto`r skgf `fgnl b`cnes wnto Xons ns td neidrf ydu togtw` gr` ne

    pdss`ssnde di g kdesncef`et, h`pdsnt`h by Brntnso EgtndeglLdtt`ry wonko ns td b` kdurn`r`h td ydu Xo` `fgnl gsjs idr83= pduehs td b` s`et td to` kdurn`r kdfpgey sd togt to`ko`qu` idr to` ldtt`ry prnz` kge b` s`et

    Gedto`r skgf `fgnl kdf`s wnto to` suba`kt lne` Bl`ss`h

    ns to` ogeh togt cnv`to Xo` s`eh`r klgnfs td b` g wnhdw de o`r h`gtob`h

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    14/41

    @urd ldtt`ry Gedto`r skgf `fgnl kdf`s irdf ge `fpldy`` di to` @urd

    Ldtt`ry Xo`

    `fpldy`` klgnfs td b` ne g pdsntnde td kgrry dut g ldtt`ryirguh geh ns

    wnllnec td sogr` to` fde`y wnto to` `fgnl r`knpn`et

    Sogt ns kdffde ne gll to`s` skgfs ns togt skgee`hv`rsndes di diinkngl

    hdkuf`ets gr` `fgnl`h td pdt`etngl vnktnfs Dek` to`vnktnf ns kdevnek`h di to` c`eune`e`ss di to` trgesgktnde, gsfgll i`` ns r`qu`st`h idr f``tnec bgej kogrc`s $ l`cgli``s $ kdurn`r kogrc`s `tk Nt ns tons sfgll i`` togt ns to`fdtnv` b`oneh to` skgf

    Nt ns b`ln`v`h togt todusgehs di p`dpl` gr` h`irguh`h dibnllndes di hdllgrs

    `v`ry y`gr torduco to`s` skgfs

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    15/41

    Nllustrgtnde 7 Ne 2==0, ge Nehnge busne`ssfge r`k`nv`h ge

    `fgnl irdf to` Ynk` ]r`snh`et di g fgadr Girnkgebgej dii`rnec onf g lukrgtnv` kdetrgkt ne r`ture idrg jnkjbgkj di Rs 7 fnllnde

    Xo` busne`ssfge ogh fgey t`l`podenkkdev`rsgtndes wnto to` s`eh`r di to` `fgnl O`glsd v`rnin`h to` `fgnl ghhr`ss di to` Ynk`pr`snh`et irdf to` w`bsnt` di to` bgej geh

    subs`qu`etly trgesi`rr`h to` fde`y td to` bgejgkkduet f`etnde`h ne to` `fgnl

    Nt lgt`r ture`h dut togt to` `fgnl wgs g spddi`hde` geh wgs gktuglly s`et by ge Nehnge bgs`h neEnc`rng

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    16/41

    Nllustrgtnde 2G e`w typ` di skgf `&fgnl tor`gt`es td jnll

    r`knpn`ets ni to`y hd edt pgy todusgehs di hdllgrstd to` s`eh`r, wod purpdrts td b` g onr`hgssgssne

    R`plynec td to` `&fgnls aust s`ehs g sncegl tds`eh`rs togt to`yv` r`gko`h g lnv` gkkduet Ntglsd `skglgt`s to` netnfnhgtnde

    Ne de` kgs`, g r`knpn`et tor`gt`e`h td kgllgutodrntn`s Xo` skgff`r, wod wgs h`fgehnec(2=,===, r`nt`rgt`h to` tor`gt geh s`et sdf`p`rsdegl h`tgnls gbdut to` r`knpn`etghhr`ss,hgucot`rs iull egf` `tk

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    17/41

    O` cgv` ge ultnfgtuf1 X@LL F@ EDS GR@ ^DP R@GH^ XD HD SOGX

    N [GNH DR HD ^DP SGEX F@ XD ]RDK@@HSNXO F^ ADB4 GE[S@R ^@[$ED GEH HDEX

    G[J GE^ WP@[XNDE['''

    [df` `fgnls klgnf td b` irdf to` IBN ne Ldehdegeh neidrf r`knpn`ets togt ge grr`st wgs fgh` neto` kgs`

    Xo` `&fgnl sgys to` r`knpn`ets neidrfgtnde wgsidueh wnto to` susp`kt geh togt to`y sodulh r`plytd gssnst ne to` nev`stncgtnde Xo`s` `fgnls gr`

    pgrt di to` skgf'

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    18/41

    K^B@R X@RRDRN[F Kdfput`r krnf` ogs ont fgejneh wnto ueb`ln`vgbl`

    s`v`rnty Kdfput`r vnrus`s, wdrfs, Xrdages, h`engl dis`rvnk` gttgkjs, spddinec gttgkjs geh `&irguhs ogv`tgj`e to` r`gl geh vnrtugl wdrlhs by stdrf

    Odw`v`r, gll to`s` pgl` ne to` igk` di to` fdsthr`gh`h tor`gt togt di kyb`r t`rrdrnsf

    Gsnge [koddl di Kyb`r Lgws ogs h`ine`h kyb`rt`rrdrnsf gs1

    Kyb`r t`rrdrnsf ns to` pr`f`hntgt`h us` di hnsruptnv`gktnvntn`s, dr to` tor`gt to`r`di, ne kyb`r spgk`, wntoto` net`etnde td iurto`r sdkngl, nh`dldcnkgl, r`lncndus,pdlntnkgl dr snfnlgr dba`ktnv`s, dr td netnfnhgt` gey

    p`rsde ne iurto`rgek` di suko dba`ktnv`s

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    19/41

    Nllustrgtnde 7 Ne 7>>9, g kdfput`r ogkj`r gll`c`hly gssdkngt`h

    wnto to` Sont` [upr`fgknst fdv`f`ett`fpdrgrnly hnsgbl`h g P[ bgs`h Net`re`t [`rvnk`]rdvnh`r /N[]. geh hgfgc`h pgrt di nts r`kdrh

    j``pnec syst`f Xo` N[] ogh gtt`fpt`h td stdp to` ogkj`r irdf

    s`ehnec dut wdrlhwnh` rgknst f`ssgc`s ueh`r to`N[]s egf` Xo` ogkj`r snce`h dii wnto to` tor`gt,

    "ydu ogv` y`t td s`` tru` `l`ktrdenk t`rrdrnsfXons ns g prdfns`"

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    20/41

    Nllustrgtnde 2 Ne 7>>?, [pgenso prdt`stdrs bdfbgrh`h to`

    Nestntut` idr Cldbgl Kdffuenkgtndes /NCK. wntotodusgehs di bdcus `&fgnl f`ssgc`s @&fgnl wgstn`h up geh ueh`lnv`rgbl` td to` N[]#s us`rs, geh

    suppdrt lne`s w`r` tn`h up wnto p`dpl` wodkdulhe#t c`t to`nr fgnl

    Xo` prdt`stdrs glsd spgff`h NCK stgii gehf`fb`r gkkduets, kldcc`h to`nr S`b pgc` wnto

    bdcus kr`hnt kgrh drh`rs, geh tor`gt`e`h td`fpldy to` sgf` tgktnks gcgnest

    drcgenzgtndes usnec NCK s`rvnk`s

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    21/41

    Xo`y h`fgeh`h togt NCK stdp odstnec to`w`bsnt` idr to` @usjgl O`rrng Aduregl, g E`w^drj&bgs`h publnkgtnde suppdrtnec Bgsqu`neh`p`eh`ek`

    ]rdt`stdrs sgnh NCK suppdrt`h t`rrdrnsf b`kgus`g s`ktnde de to` S`b pgc`s kdetgne`h fgt`rnglsde to` t`rrdrnst crdup @XG, wonko klgnf`hr`spdesnbnlnty idr gssgssnegtndes di [pgenso

    pdlntnkgl geh s`kurnty diinkngls, geh gttgkjs defnlntgry nestgllgtndes NCK ineglly r`l`et`h gehpull`h to` snt` b`kgus` di to` "fgnl bdfbnecs"

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    22/41

    Nllustrgtnde ; Ne 7>>?, g 72&y`gr&dlh bdy sukk`ssiully ogkj`h

    netd to`

    kdetrdls idr to` ouc` Rdds`v`lt Hgf de to` [gltRnv`r ne Grnzdeg, P[G

    O` fncot ogv` r`l`gs`h ilddhwgt`rs togt wdulhogv` neuehgt`h F`sg geh X`fp`, `ehgec`rnec gtl`gst 7fnllnde p`dpl`

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    23/41

    NLLP[XRGXNDE 8 Ne 2==0, P[ s`kurnty kdesultgets r`pdrt`h togt

    ogkj`rs w`r` tgrc`tnec to` P[ `l`ktrnk pdw`rcrnh geh ogh cgne`h gkk`ss td P[ utnlntn`s`l`ktrdenk kdetrdl syst`fs

    Nllustrgtnde 0

    Ne 7>>?, `toenk Xgfnl cu`rrnllgs swgfp`h [rnLgejge `fbgssn`s wnto ?== `&fgnls g hgy dv`r gtwdw``j p`rndh Xo` f`ssgc`s r`gh "S` gr` to`Net`re`t Blgkj Xnc`rs geh w`#r` hdnec tons tdhnsrupt ydur kdffuenkgtndes" Net`llnc`ek`gutodrntn`s kogrgkt`rnz`h nt gs to` inrst jedwegttgkj by t`rrdrnsts gcgnest g kduetry#s kdfput`rsyst`fs

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    24/41

    Nllustrgtnde 9

    Hurnec to` Jdsdvd kdeilnkt ne 7>>>, EGXDkdfput`rs w`r` blgst`h wnto `&fgnl bdfbs gehont wnto h`engl&dis`rvnk`

    gttgkjs by ogkjtnvnsts prdt`stnec to` EGXD

    bdfbnecs

    Ne ghhntnde, busne`ss`s, publnk drcgenzgtndes, gehgkgh`fnk

    nestntut`s r`k`nv`h oncoly pdlntnknz`h vnrus&lgh`e `&fgnls irdf g rgec` di @gst`re @urdp`gekduetrn`s, gkkdrhnec td r`pdrts S`b h`igk`f`etsw`r` glsd kdffde

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    25/41

    Nllustrgtnde 3

    [nek` H`k`fb`r 7>>3, to` @l`ktrdenk Hnsturbgek`Xo`gt`r /@HX. ogs b``e kdehuktnec S`b snt&nesgcgnest vgrndus snt`s ne suppdrt di to` F`xnkgeQgpgtnstgs

    Gt g h`sncegt`h tnf`, todusgehs di prdt`stdrs pdnetto`nr brdws`rs td g tgrc`t snt` usnec sditwgr` togtilddhs to` tgrc`t wnto rgpnh geh r`p`gt`h hdweldghr`qu`sts

    @HX#s sditwgr` ogs glsd b``e us`h by genfgl rncotscrdups gcgnest

    drcgenzgtndes sgnh td gbus` genfgls

    @l`ktrdonppn`s, gedto`r crdup di ogkjtnvnsts,

    kdehukt`h S`b snt&nes gcgnest to` SXD wo`e to`yf`t ne [`gttl` ne lgt` 7>>>

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    26/41

    Nllustrgtnde ?

    Ne 7>>8, g 79&y`gr&dlh @eclnso bdy tddj hdwesdf` 7== P[ h`i`es` syst`fs

    Nllustrgtnde >

    Ne 7>>3, ;0 kdfput`r sp`knglnsts us`h ogkjnectddls ir``ly gvgnlgbl` de 7,>== w`b snt`s td southdwe lgrc` s`cf`ets di to` P[ pdw`r crnh

    Xo`y glsd snl`ek`h to` kdffgeh geh kdetrdl

    syst`f di to` ]gknink Kdffgeh ne Odedlulu

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    27/41

    Nllustrgtnde 7=

    Ne 2===, Gsnge [koddl di Kyb`r Lgws wgs r`culgrlygttgkj`h by Hnstrnbut`h H`engl di [`rvnk` gttgkjs byogktnvnsts prdpgcgtnec to` rncot td pdredcrgpoy

    Gsnge [koddl di Kyb`r Lgws ogs sp`gro`gh`h genet`regtndegl kgfpgnce gcgnest pdredcrgpoy de to`

    Net`re`t Nllustrgtnde 77

    Ne 2==7, ne to` bgkjhrdp di to` hdweture ne P[&Konegr`lgtndesonps, to` Kone`s` ogkj`rs r`l`gs`h to` Kdh`

    R`h vnrus netd to` wnlh Xons vnrus nei`kt`h fnllndes dikdfput`rs grdueh to` wdrlh geh to`e us`h to`s`kdfput`rs td lgueko h`engl di s`rvnk` gttgkjs de P[w`b snt`s, prdfne`etly to` w`b snt` di to` Sont`Odus`

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    28/41

    Nllustrgtnde 72

    Ne 2==7, ogkj`rs brdj` netd to` P[ Austnk`H`pgrtf`et#s w`b snt` geh r`plgk`h to`h`pgrtf`et#s s`gl wnto g swgstnjg, hubb`h to`gc`eky to` "Pent`h [tgt`s H`pgrtf`et di

    Neaustnk`" geh inll`h to` pgc` wnto dbsk`e`pnktur`s

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    29/41

    Ps` di `ekryptnde by t`rrdrnstsG hnsturbnec tr`eh togt ns `f`rcnec edwghgys ns

    to` nekr`gsnec us` di `ekryptnde, onco&ir`qu`eky`ekrypt`h vdnk`$hgtg lnejs, `ekryptnde sditwgr`lnj` ]r`tty Cddh ]rnvgky /]C]. `tk by t`rrdrnsts

    geh f`fb`rs di drcgenz`h krnf` kgrt`ls [trdec `ekryptnde ns to` krnfnegls b`st irn`eh geh

    to` pdlnk`fges wdrst `e`fy

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    30/41

    Nllustrgtnde 7 L`gry, wod wgs s`et`ek`h td >8 y`grs ne prnsde idrs`ttnec dii inr` bdfbs ne to` E`w ^drj /P[G. subwgy

    syst`f ne 7>>0, ogh h`v`ldp`h ons dwe glcdrntof idr`ekryptnec to` inl`s de ons kdfput`r

    Nllustrgtnde 2

    Xo` Kgln kgrt`l ns r`put`h td b` usnec sdponstnkgt`h `ekryptnde td kdek`gl to`nr t`l`pode`

    kdffuenkgtndes, rghnds togt hnstdrt vdnk`s, vnh`d pode`s wonko prdvnh` vnsugl guto`etnkgtnde di

    to` kgll`r#s nh`etnty, geh nestruf`ets idr skrgfblnec trgesfnssndes irdf

    kdfput`r fdh`fs

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    31/41

    Nllustrgtnde ; Xo` Ntglnge fging ns b`ln`v`h td us` ]C] /]r`tty Cddh

    ]rnvgky. sditwgr` idr syff`trnk gs w`ll gsgsyff`trnk

    `ekryptnde

    Nllustrgtnde 8 De Fgrko 2=, 7>>0, to` Guf [upr`f` Xruto kult

    hrdpp`h bgcs di

    sgrne e`rv` cgs ne to` Xdjyd subwgy, jnllnec 72 p`dpl`

    geh neaurnec 9,=== fdr`

    F`fb`rs di to` kult ogh h`v`ldp`h fgey ko`fnkglgeh bndldcnkgl

    w`gpdes, nekluhnec [grne, Y_, Fustgrh cgs, Kygenh`,

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    32/41

    Nt ns b`ln`v`h togt pr`pgrgtndes w`r` ueh`rwgy tdh`v`ldp eukl`gr kgpgbnlnty Xo` kult wgs glsdb`ln`v`h td b` h`v`ldpnec g "h`gto rgy" togt kdulhh`strdy gll lni`'

    Xo` r`kdrhs di to` kult ogh b``e stdr`h ne`ekrypt`h idrf /usnec to` R[G glcdrntof. dekdfput`rs

    Xo` `eidrk`f`et gutodrntn`s w`r` gbl` td h`kryptto` neidrfgtnde gs to` r`l`vget prnvgt` j`y wgsidueh ne g ildppy hnsj s`nz`h irdf to` kultspr`fns`s Xo` `ekrypt`h neidrfgtnde r`lgt`h tdplges di to` kult td kgus` fgss h`gtos ne Agpge

    geh P[G

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    33/41

    Nllustrgtnde 0 Ne 7>>3, g Bdlnvnge t`rrdrnst drcgenzgtnde ogh

    gssgssnegt`h idur P[ grfy p`rsdee`l

    G rgnh de de` di to` onh`duts di to` t`rrdrnstsyn`lh`h neidrfgtnde `ekrypt`h usnec syff`trnk

    `ekryptnde

    G 72&odur brut` idrk` gttgkj r`sult`h ne to`h`kryptnde di to` neidrfgtnde geh subs`qu`etlyl`h td de` di to` lgrc`st hruc busts ne Bdlnvngeonstdry geh to` grr`st di to` t`rrdrnsts

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    34/41

    Nllustrgtnde 9 Agf`s B`ll wgs grr`st`h idr vndlgtnec net`regl

    r`v`eu` lgws di

    to` P[G O` hnh tons by1

    kdll`ktnec to` egf`s geh odf` ghhr`ss`s digc`ets geh `fpldy``s di to` Net`regl R`v`eu`[`rvnk` /NR[. di to` P[G ne drh`r td netnfnhgt`to`f

    sdlnkntnec p`dpl` td adne ne g sko`f` jedwe gs"Gssgssnegtnde ]dlntnks"

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    35/41

    Peh`r tons sko`f` tods` wod jnll`h s`l`kt`hcdv`ref`et `fpldy``s, nekluhnec tgx kdll`ktdrs,wdulh b` r`wgrh`h:

    usnec igls` [dkngl [`kurnty Eufb`rs td onh`

    ons gss`ts

    geh gvdnh tgx`s:

    kdetgfnegtnec ge gr`g dutsnh` NR[ pr`fns`s

    ne fgey stgt`s di to` P[G wnto F`rkgptge /g stnejcgs.

    Nev`stncgtdrs idueh de ons kdfput`r hdkuf`etsr`lgtnec td g plge td h`strdy `l`ktrdenk `qunpf`et

    wnto enkj`l&plgt`h kgrbde inb`r

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    36/41

    Xo`y glsd idueh ge nevdnk` idr to` purkogs` dito` inb`r gt ons

    r`snh`ek`, geh g buehl` di to` fgt`rngl gt to`r`snh`ek` di ons

    gssdkngt`, Rdb`rt @gst B`ll ogh `xkogec`h]C]&`ekrypt`h `&fgnl f`ssgc`s wnto sdf` di onsgssdkngt`s

    Gs pgrt di ons pl`g bgrcgne, o` ture`h dv`r to`pgssporgs` td ons prnvgt` j`y Xons glldw`hnev`stncgtdrs td h`krypt f`ssgc`s

    togt o` ogh r`k`nv`h

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    37/41

    Nllustrgtnde 3 Hutko drcgenz`h krnf` syehnkgt`s us` ]C] geh

    ]C]ide` td `ekrypt to`nr kdffuenkgtndes Xo`yglsd us` pglftdp kdfput`rs nestgll`h wnto [`kur`H`vnk`, g Hutko sditwgr` prdhukt idr `ekryptnec

    hgtg wnto Net`regtndegl Hgtg @ekryptnde Glcdrntof/NH@G.

    Ne 7>>0, to` Gfst`rhgf ]dlnk` kgptur`h g ]K nepdss`ssnde di de` drcgenz`h krnf` f`fb`r Xo`

    ]K kdetgne`h ge `ekrypt`h pgrtntnde, wonko to`yw`r` gbl` td r`kdv`r

    dely ne 7>>3

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    38/41

    Nllustrgtnde ? Ge `ekryptnde kgs` dkkurrnec ne Ynls`kj, S`st

    C`rfgey nevdlv`h to`it, irguh, geh `fb`zzl`f`et diP[ h`i`es` kdetrgktdr geh P[ cdv`ref`et iuehsirdf 7>?9 td 7>??

    Xo` gkkus`h ogh stdr`h inegekngl r`kdrhs r`lgtnec tdto` krnf`s de g p`rsdegl kdfput`r, to` ogrh hnsj diwonko ogh b``e pgsswdrh

    prdt`kt`h

    Xo` pdlnk` us`h ogkjnec sditwgr` td h`i`gt to`pgsswdrh prdt`ktnde, dely td ineh togt sdf` di to` inl`slnst`h ne to` hnr`ktdry ogh b``e `ekrypt`h

    Xo`y to`e idueh to` `ekryptnde prdcrgf de to` ogrh

    hnsj geh us`h brut` idrk` tddls td h`krypt to` inl`s

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    39/41

    Nllustrgtnde >

    Xo` Hgllgs ]dlnk` H`pgrtf`et ne to` P[G`ekduet`r`h `ekryptnde ne to` nev`stncgtnde di g hrucrnec, wonko wgs dp`rgtnec ne s`v`rgl stgt`s di to` P[Ggeh h`glnec ne @kstgsy

    G f`fb`r di to` rnec, r`snhnec wntone to`nr aurnshnktnde,

    ogh `ekrypt`h ons ghhr`ss bddj O` ture`h dv`r to`pgsswdrh, `egblnec to` pdlnk` td h`krypt to` inl` F`gewonl`, odw`v`r, to` gkkus`h wgs dut de bgnl geh

    gl`rt`h ons gssdkngt`s, sd to` h`krypt`h neidrfgtndewgs edt gs us`iul gs nt fncot ogv` b``e

    Xo` pdlnk` edt`h togt @kstgsy h`gl`rs w`r` fdr`jedwl`hc`gbl` gbdut kdfput`rs wo`e kdfpgr`h wnto dto`r typ`s di

    hruc h`gl`rs, fdst lnj`ly b`kgus` to`y w`r` yduec`rgeh b`tt`r `hukgt`h

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    40/41

    Nllustrgtnde 7= J`vne ]dulsde wgs g sjnll`h ogkj`r wod rncc`h rghnd

    kdet`sts geh burclgrnz`h t`l`pode`&swntkonec diink`sgeh ogkj`h netd to` t`l`pode` e`twdrj ne drh`r tdh`t`rfne` wods` pode` wgs b`nec tgpp`h geh td

    nestgll ons dwe pode` tgppnec h`vnk`s ]dulsde ogh `ekrypt`h inl`s hdkuf`etnec `v`rytonec

    irdf to` pode` tgppnec o` ogh hnskdv`r`h td to`hdssn`rs o` ogh kdfpnl`h gbdut ons `e`fn`s Xo`inl`s ogh b``e `ekrypt`h s`v`rgl tnf`s usnec to` Hgtg@ekryptnde [tgehgrh

    G P[ H`pgrtf`et di @e`rcy sup`rkdfput`r tddjs`v`rgl fdetos

    td ineh to` j`y, gt g kdst di fnllndes di hdllgrs Xo`r`sult yn`lh`h e`grly t`e todusgeh pgc`s di `vnh`ek`

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    41/41

    Nllustrgtnde 77

    Xo` fdto`r di g 70&y`gr dlh bdy inl`h g kdfplgnetgcgnest ge ghult wod ogh sdlh o`r sde P[ ( 7===wdrto di ogrhwgr` geh sditwgr` idr de` hdllgr

    Xo` fge ogh glsd cnv`e to` bdy l`wh pnktur`s de

    ildppy hnsjs Xo` fge subs`qu`etly fgnl`h to` bdy

    pdredcrgponk fgt`rngl de ildppy hnsjs geh s`etpdredcrgponk inl`s dv`r to` Net`re`t

    So`e to` gkkus`h wgs grr`st`h nt wgs idueh duttogt o` ogh

    `ekrypt`h g hnr`ktdry de to` syst`f usnec ]C]

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/