, Introduction to Cyber Security
(FCS)
Uttarakhand Open University, Haldwani- 263139
Toll Free Number: 18001804025
Email:
http://uou.ac.in
,Title Introduction to Cyber Security
Author Dr. Jeetendra Pande, Assistant Professor-
School of CS & IT, Uttarakhand Open
University, Haldwani
ISBN: 978-93-84813-96-3
Uttarakhand Open University, 2017
© Uttarakhand Open University, 2017. This work by Uttarakhand Open University is licensed under
a Creative Commons Attribution-ShareAlike 4.0 International License. It is attributed to the sources
marked in the References, Article Sources and Contributors section.
Published By: Uttarakhand Open University
3
, Index
1.1 INTRODUCTION .......................................................................................................................................... 8
1.1.1 HISTORY OF INTERNET ..................................................................................................................................... 8
1.1.1.1 Internet Addresses ........................................................................................................................... 10
1.1.1.2 DNS .................................................................................................................................................. 12
1.1.1.3 Internet Infrastructure ..................................................................................................................... 13
1.1.1.4 World Wide Web ............................................................................................................................. 14
1.2 INTRODUCTION TO CYBER CRIME ............................................................................................................. 15
1.2.1 CLASSIFICATION OF CYBER CRIMES ................................................................................................................... 16
1.2.2 REASONS FOR COMMISSION OF CYBER CRIMES .................................................................................................. 18
1.3 MALWARE AND ITS TYPE .......................................................................................................................... 19
1.3.1 ADWARE ..................................................................................................................................................... 19
1.3.2 SPYWARE .................................................................................................................................................... 19
1.3.3 BROWSER HIJACKING SOFTWARE...................................................................................................................... 19
1.3.4 VIRUS......................................................................................................................................................... 19
1.3.5 WORMS ..................................................................................................................................................... 20
1.3.6 TROJAN HORSE ............................................................................................................................................ 20
1.3.7 SCAREWARE ................................................................................................................................................ 21
1.4 KINDS OF CYBER CRIME ............................................................................................................................ 21
1.4.1 CYBER STALKING .......................................................................................................................................... 21
1.4.2 CHILD PORNOGRAPHY ................................................................................................................................... 22
1.4.3 FORGERY AND COUNTERFEITING ...................................................................................................................... 22
1.4.4 SOFTWARE PIRACY AND CRIME RELATED TO IPRS ............................................................................................... 22
1.4.5 CYBER TERRORISM ........................................................................................................................................ 22
1.4.6 PHISHING .................................................................................................................................................... 22
1.4.7 COMPUTER VANDALISM ................................................................................................................................ 22
1.4.8 COMPUTER HACKING .................................................................................................................................... 22
1.4.9 CREATING AND DISTRIBUTING VIRUSES OVER INTERNET......................................................................................... 23
1.4.10 SPAMMING ............................................................................................................................................... 23
1.4.11 CROSS SITE SCRIPTING ................................................................................................................................. 23
1.4.12 ONLINE AUCTION FRAUD ............................................................................................................................. 24
1.4.13 CYBER SQUATTING ...................................................................................................................................... 24
1.4.14 LOGIC BOMBS ............................................................................................................................................ 24
1.4.15 WEB JACKING ............................................................................................................................................ 24
1.4.16 INTERNET TIME THEFTS ............................................................................................................................... 24
4
(FCS)
Uttarakhand Open University, Haldwani- 263139
Toll Free Number: 18001804025
Email:
http://uou.ac.in
,Title Introduction to Cyber Security
Author Dr. Jeetendra Pande, Assistant Professor-
School of CS & IT, Uttarakhand Open
University, Haldwani
ISBN: 978-93-84813-96-3
Uttarakhand Open University, 2017
© Uttarakhand Open University, 2017. This work by Uttarakhand Open University is licensed under
a Creative Commons Attribution-ShareAlike 4.0 International License. It is attributed to the sources
marked in the References, Article Sources and Contributors section.
Published By: Uttarakhand Open University
3
, Index
1.1 INTRODUCTION .......................................................................................................................................... 8
1.1.1 HISTORY OF INTERNET ..................................................................................................................................... 8
1.1.1.1 Internet Addresses ........................................................................................................................... 10
1.1.1.2 DNS .................................................................................................................................................. 12
1.1.1.3 Internet Infrastructure ..................................................................................................................... 13
1.1.1.4 World Wide Web ............................................................................................................................. 14
1.2 INTRODUCTION TO CYBER CRIME ............................................................................................................. 15
1.2.1 CLASSIFICATION OF CYBER CRIMES ................................................................................................................... 16
1.2.2 REASONS FOR COMMISSION OF CYBER CRIMES .................................................................................................. 18
1.3 MALWARE AND ITS TYPE .......................................................................................................................... 19
1.3.1 ADWARE ..................................................................................................................................................... 19
1.3.2 SPYWARE .................................................................................................................................................... 19
1.3.3 BROWSER HIJACKING SOFTWARE...................................................................................................................... 19
1.3.4 VIRUS......................................................................................................................................................... 19
1.3.5 WORMS ..................................................................................................................................................... 20
1.3.6 TROJAN HORSE ............................................................................................................................................ 20
1.3.7 SCAREWARE ................................................................................................................................................ 21
1.4 KINDS OF CYBER CRIME ............................................................................................................................ 21
1.4.1 CYBER STALKING .......................................................................................................................................... 21
1.4.2 CHILD PORNOGRAPHY ................................................................................................................................... 22
1.4.3 FORGERY AND COUNTERFEITING ...................................................................................................................... 22
1.4.4 SOFTWARE PIRACY AND CRIME RELATED TO IPRS ............................................................................................... 22
1.4.5 CYBER TERRORISM ........................................................................................................................................ 22
1.4.6 PHISHING .................................................................................................................................................... 22
1.4.7 COMPUTER VANDALISM ................................................................................................................................ 22
1.4.8 COMPUTER HACKING .................................................................................................................................... 22
1.4.9 CREATING AND DISTRIBUTING VIRUSES OVER INTERNET......................................................................................... 23
1.4.10 SPAMMING ............................................................................................................................................... 23
1.4.11 CROSS SITE SCRIPTING ................................................................................................................................. 23
1.4.12 ONLINE AUCTION FRAUD ............................................................................................................................. 24
1.4.13 CYBER SQUATTING ...................................................................................................................................... 24
1.4.14 LOGIC BOMBS ............................................................................................................................................ 24
1.4.15 WEB JACKING ............................................................................................................................................ 24
1.4.16 INTERNET TIME THEFTS ............................................................................................................................... 24
4