cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
TRANSCRIPT
-
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
1/41
Kyb`r krnf`, w`b agkjnec, `fgnlirguhs,kyb`r t`rrdrnsf, us` di
`ekryptnde by t`rrdrnsts
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
2/41
S`b Agkjnec Aust gs kdev`etndegl onagkjnec di ge gnrplge` ns hde` by
usnec idrk`,
snfnlgrly w`b agkjnec f`ges idrk`iully tgjnec dv`r kdetrdldi g w`bsnt`
Xo` fdtnv` ns usuglly to` sgf` gs onagkjnec Xo`p`rp`trgtdrs
ogv` `nto`r g fde`tgry dr pdlntnkgl purpds` wonko to`y trytd sgtngt` by
odlhnec to` dwe`rs di to` w`bsnt` td rgesdf
Xons dkkurs wo`e sdf`de` idrk`iully tgj`s kdetrdl di gw`bsnt` /by
krgkjnec to` pgsswdrh geh lgt`r kogecnec nt. Xo` gktugldwe`r di to`
w`bsnt` hd`s edt ogv` gey fdr` kdetrdl dv`r wogt
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
3/41
Odw hd`s w`b agkjnec tgj`
plgk`4
Xo` ghfnenstrgtdr di gey w`bsnt` ogs g pgsswdrh gehg us`regf` togt dely o` /dr sdf`de` gutodrnz`h byonf. fgy us` td upldgh inl`s irdf ons kdfput`r de to`w`b s`rv`r /snfply put, g s`rv`r ns g pdw`riulkdfput`r. wo`r` ons w`bsnt` ns odst`h
Nh`glly, tons pgsswdrh r`fgnes s`kr`t wnto to`ghfnenstrgtdr
Ni g ogkj`r c`ts odlh di tons us`regf` geh pgsswdrh,
to`e o` kge pr`t`eh td b` to` ghfnenstrgtdr Kdfput`rs hdet r`kdcenz` p`dpl` dely us`regf`s
geh pgsswdrhs
Xo` w`b s`rv`r wnll crget kdetrdl di to` w`bsnt` td
wod`v`r `et`rs to` kdrr`kt pgsswdrh geh us`regf`kdfbnegtnde
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
4/41
Xo`r` gr` fgey wgys ne wonko g ogkj`r fgy c`ttd jedw g
pgsswdrh, to` fdst kdffde b`nec pgsswdrhkrgkjnec wo`r`ne g krgkjnecsditwgr` ns us`h tdcu`ss g pgsswdrh
]gsswdrh krgkjnec gttgkjs gr` fdst kdffdelydi twd
typ`s Xo` inrst de` ns jedwe gs to` hnktndegry gttgkj Ne
tons typ` di
gttgkj to` sditwgr` wnll gtt`fpt gll to` wdrhs
kdetgne`h ne g pr`h`ine`h hnktndegry di wdrhs
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
5/41
`xgfpl` Idr `xgfpl`, nt fgy try Rgonf, Rgoul, Rgj`so,
Rgf, R``fg, R``eg ne g pr`h`ine`h hnktndegry
di Nehnge egf`s Xo`s` typ`s di hnktndegrn`s gr`r`ghnly gvgnlgbl` de to` Net`re`t
Xo` dto`r idrf di pgsswdrh krgkjnec ns by usnecbrut` idrk`% Ne
tons jneh di gttgkj to` sditwgr` trn`s td cu`ss to`pgsswdrh by trynec dut gll pdssnbl` kdfbnegtndesdi eufb`rs, syfbdls, l`tt`rs tnll to` kdrr`ktpgsswdrh ns idueh
Idr`xgfpl`, nt fgy try dut pgsswdrh
kdfbnegtndes lnj` gbk72;, gkbh093>, sha+%U,w`ui! & !
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
6/41
[df` sditwgr`, gvgnlgbl` idr pgsswdrh krgkjnecusnec to` brut` idrk` t`koenqu`, kge ko`kj gouc` eufb`r di pgsswdrh kdfbnegtndes p`rs`kdeh
So`e kdfpgr`h wnto g hnktndegry gttgkj, g brut`idrk` gttgkj tgj`s fdr` tnf`, but nt ns h`inent`lyfdr` sukk`ssiul
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
7/41
Nllustrgtnde Ne ge neknh`et r`pdrt`h ne to` P[G, to` dwe`r di g
odbby w`bsnt` idr konlhr`e r`k`nv`h ge `&fgnlneidrfnec o`r togt g crdup di ogkj`rs ogh cgne`hkdetrdl dv`r o`r w`bsnt` Xo`y h`fgeh`h g
rgesdf di 7 fnllnde hdllgrs irdf o`r Xo` dwe`r, g skoddlt`gko`r, hnh edt tgj` to`
tor`gt s`rndusly [o` i`lt togt nt wgs aust g skgr`tgktnk geh ncedr`h to` `&fgnl
Nt wgs tor`` hgys lgt`r togt so` kgf` td jedw,idlldwnec fgey
t`l`pode` kglls irdf gll dv`r to` kduetry, togt to`ogkj`rs ogh w`b agkj`h o`r w`bsnt`
[ubs`qu`etly, to`y ogh glt`r`h g pdrtnde di to`w`bsnt` wonko wgs `etntl`h Odw td ogv` iue wnto
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
8/41
Ne gll to` plgk`s wo`r` nt ogh b``e f`etnde`h,to`y ogh r`plgk`h to` wdrh cdlhinso wnto to`wdrh pnrgeogs
]nrgeogs gr` tney but `xtr`f`ly hgec`rdus il`so&`gtnec inso Fgey konlhr`e ogh vnsnt`h to` pdpulgrw`bsnt` geh ogh b`ln`v`h wogt to` kdet`ets dito` w`bsnt` succ`st`h
Xo`s` ueidrtuegt` konlhr`e idlldw`h to`nestruktndes, trn`h td plgy wnto pnrgeogs, wonkoto`y bducot irdf p`t sodps, geh w`r` v`rys`rndusly neaur`h'
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
9/41
@fgnl Irguhs H`gr Fr% Austne Snllngfs, N#f Ynjgs Fgeant [neco
irdf ]ueagb /Nehng.% N b`ldec td g knty egf`h
Luhongeg%
Fr% Snllngfs, N gf ogvnec g brdto`r ne Kgeghg
wod ns glsd egf`h Austne Snllngfs% O` wgs
ghdpt`h irdf fy pgr`ets by sdf` Fr% Snllngf
Rgf di S`llgeh% F` geh fy fuf kgf` dv`r td
Kgeghg td l`gv` Austne td ons e`w igfnly /Snllngf
Rgf#s Igfnly.% Nt ogpp`e`h ne Aue` 7>?0%
[d Fr% Austne Snllngfs, ni ydu gr` to` sgf`
p`rsde Nf tgljnec gbdut% Xo`e pl`gs` cnv` f`
sdf` tnf` sd togt N kge l`t ydu jedw to` r`glntn`s%
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
10/41
Nfgcne` to` toducots cdnec torduco Fr Austne Snllngfso`gh git`r r`ghnec tons `fgnl Ns o` r`glly ghdpt`h4 So`r` gr` ons
bnrto pgr`ets4 Ns tons `fgnl irdf ons bnrto brdto`r4
Ne r`glnty, tons ns g skgf `fgnl drncnegtnec irdf g kdll`c` ne[gecrddr /Nehng.' Kgeghnge kntnz`es gr` tgrc`t`h wnto to`s` `fgnls Ni
to` tgrc`ts stgrt b`ln`vnec to` s`eh`r td b` to`nr brdto`r, to`y gr`
gsj`h td s`eh fde`y sd togt to`nrbrdto`r kge trgv`l td Kgeghg wnto to`
prddi di to` vnktnfs ghdptnde' Xons ns aust de` di to` ouehr`hs di `fgnl skgfs b`nec
p`rp`trgt`h de to` Net`re`t Xo`s` skgfs gr` kdffdely r`i`rr`h td gs
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
11/41
Xo` 87> l`tt`r skgfs drncnegt`h ne to` `grly 7>?=s gs to`dnl&bgs`h `kdedfy di Enc`rng w`et hdweonll Ne to` 7>>=s,l`tt`r skgfs cgv` wgy td `fgnl skgfs
Ne 2==3, Gsnge [koddl di Kyb`r Lgws kdehukt`h g ; fdetonet`esnv` nev`stncgtnde di ouehr`hs di skgf `fgnls Xo`r`sults w`r` v`ry surprnsnec td sgy to` l`gst L`ss toge7=% di to`s` `fgnls ogh gktuglly drncnegt`h irdf Enc`rng'
G fgadrnty di to`s` `fgnls /fdr` toge 9=%. ogv`drncnegt`h irdf Nsrg`l, idlldw`h by to` E`to`rlgehs, PJgeh dto`r @urdp`ge kduetrn`s% Xo` bnrto brdto`r `fgnlwgs to` dely de` drncnegtnec irdf Nehng
Fdst di to`s` skgf `fgnls prdfns` to` r`k`nv`r fnllndes/dr sdf`tnf`s bnllndes. di hdllgrs Fdst kdffdely to` `fgnl sgys togt
sdf` rnko Girnkge bur`gukrgt dr busne`ssfge dr pdlntnkngeogs hn`h geh l`it b`oneh g ldt di fde`y
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
12/41
`%c% kdeth% Xo` skgfst`r stgt`s togt to` Cdv`ref`et ns cdnec tdkdeinskgt` to` fde`y Xo` dely wgy dut ns td trgesi`r to`
fde`y td to` bgej gkkduet di to` `fgnl r`knpn`et Gll togtto` `fgnl r`knpn`et ogs td hd ns s`eh ons bgej gkkdueth`tgnls Idr tons g c`e`rdus i`` di g i`w fnllnde hdllgrs wnllb`
pgnh' Ni sdf`de` gktuglly iglls idr tons skgf geh prdvnh`s to`
bgej h`tgnls, o` ns s`et sdf` diinkngl lddjnec hdkuf`ets r`lgtnec td to` bgej
trgesi`r di g
ouc` suf di fde`y Dek` to` vnktnf ns kdevnek`h di to`c`eune`e`ss
di to` trgesgktnde, sdf`tonec gpp`grs td cd wrdec Xo` vnktnf ns neidrf`h togt g sfgll gfduet di fde`y
/rgecnec irdf P[( 7== td 20==. ns e``h`h idr bgej
kogrc`s dr dto`r pgp`r wdrj Xons fde`y ns to` fdtnv` b`oneh to` `lgbdrgt` skgf Dek` to`
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
13/41
Ldtt`ry skgfs Xo` ldtt`ry skgf `fgnls neidrf to` r`knpn`et togt o` ogs
wde g fnllnde
hdllgr ldtt`ry rue by Fnkrdsdit, ^godd dr sdf` dto`r w`lljedwe cldbgl
kdfpgey Xo` wnee`r ns gsj`h td prdvnh` ons bgej h`tgnls
geh pgy g sfgll suf idr bgej kogrc`s geh dto`r prdk`ssnec i``s
Gedto`r skgf `fgnl b`cnes wnto Xons ns td neidrf ydu togtw` gr` ne
pdss`ssnde di g kdesncef`et, h`pdsnt`h by Brntnso EgtndeglLdtt`ry wonko ns td b` kdurn`r`h td ydu Xo` `fgnl gsjs idr83= pduehs td b` s`et td to` kdurn`r kdfpgey sd togt to`ko`qu` idr to` ldtt`ry prnz` kge b` s`et
Gedto`r skgf `fgnl kdf`s wnto to` suba`kt lne` Bl`ss`h
ns to` ogeh togt cnv`to Xo` s`eh`r klgnfs td b` g wnhdw de o`r h`gtob`h
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
14/41
@urd ldtt`ry Gedto`r skgf `fgnl kdf`s irdf ge `fpldy`` di to` @urd
Ldtt`ry Xo`
`fpldy`` klgnfs td b` ne g pdsntnde td kgrry dut g ldtt`ryirguh geh ns
wnllnec td sogr` to` fde`y wnto to` `fgnl r`knpn`et
Sogt ns kdffde ne gll to`s` skgfs ns togt skgee`hv`rsndes di diinkngl
hdkuf`ets gr` `fgnl`h td pdt`etngl vnktnfs Dek` to`vnktnf ns kdevnek`h di to` c`eune`e`ss di to` trgesgktnde, gsfgll i`` ns r`qu`st`h idr f``tnec bgej kogrc`s $ l`cgli``s $ kdurn`r kogrc`s `tk Nt ns tons sfgll i`` togt ns to`fdtnv` b`oneh to` skgf
Nt ns b`ln`v`h togt todusgehs di p`dpl` gr` h`irguh`h dibnllndes di hdllgrs
`v`ry y`gr torduco to`s` skgfs
http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
15/41
Nllustrgtnde 7 Ne 2==0, ge Nehnge busne`ssfge r`k`nv`h ge
`fgnl irdf to` Ynk` ]r`snh`et di g fgadr Girnkgebgej dii`rnec onf g lukrgtnv` kdetrgkt ne r`ture idrg jnkjbgkj di Rs 7 fnllnde
Xo` busne`ssfge ogh fgey t`l`podenkkdev`rsgtndes wnto to` s`eh`r di to` `fgnl O`glsd v`rnin`h to` `fgnl ghhr`ss di to` Ynk`pr`snh`et irdf to` w`bsnt` di to` bgej geh
subs`qu`etly trgesi`rr`h to` fde`y td to` bgejgkkduet f`etnde`h ne to` `fgnl
Nt lgt`r ture`h dut togt to` `fgnl wgs g spddi`hde` geh wgs gktuglly s`et by ge Nehnge bgs`h neEnc`rng
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
16/41
Nllustrgtnde 2G e`w typ` di skgf `&fgnl tor`gt`es td jnll
r`knpn`ets ni to`y hd edt pgy todusgehs di hdllgrstd to` s`eh`r, wod purpdrts td b` g onr`hgssgssne
R`plynec td to` `&fgnls aust s`ehs g sncegl tds`eh`rs togt to`yv` r`gko`h g lnv` gkkduet Ntglsd `skglgt`s to` netnfnhgtnde
Ne de` kgs`, g r`knpn`et tor`gt`e`h td kgllgutodrntn`s Xo` skgff`r, wod wgs h`fgehnec(2=,===, r`nt`rgt`h to` tor`gt geh s`et sdf`p`rsdegl h`tgnls gbdut to` r`knpn`etghhr`ss,hgucot`rs iull egf` `tk
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
17/41
O` cgv` ge ultnfgtuf1 X@LL F@ EDS GR@ ^DP R@GH^ XD HD SOGX
N [GNH DR HD ^DP SGEX F@ XD ]RDK@@HSNXO F^ ADB4 GE[S@R ^@[$ED GEH HDEX
G[J GE^ WP@[XNDE['''
[df` `fgnls klgnf td b` irdf to` IBN ne Ldehdegeh neidrf r`knpn`ets togt ge grr`st wgs fgh` neto` kgs`
Xo` `&fgnl sgys to` r`knpn`ets neidrfgtnde wgsidueh wnto to` susp`kt geh togt to`y sodulh r`plytd gssnst ne to` nev`stncgtnde Xo`s` `fgnls gr`
pgrt di to` skgf'
http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
18/41
K^B@R X@RRDRN[F Kdfput`r krnf` ogs ont fgejneh wnto ueb`ln`vgbl`
s`v`rnty Kdfput`r vnrus`s, wdrfs, Xrdages, h`engl dis`rvnk` gttgkjs, spddinec gttgkjs geh `&irguhs ogv`tgj`e to` r`gl geh vnrtugl wdrlhs by stdrf
Odw`v`r, gll to`s` pgl` ne to` igk` di to` fdsthr`gh`h tor`gt togt di kyb`r t`rrdrnsf
Gsnge [koddl di Kyb`r Lgws ogs h`ine`h kyb`rt`rrdrnsf gs1
Kyb`r t`rrdrnsf ns to` pr`f`hntgt`h us` di hnsruptnv`gktnvntn`s, dr to` tor`gt to`r`di, ne kyb`r spgk`, wntoto` net`etnde td iurto`r sdkngl, nh`dldcnkgl, r`lncndus,pdlntnkgl dr snfnlgr dba`ktnv`s, dr td netnfnhgt` gey
p`rsde ne iurto`rgek` di suko dba`ktnv`s
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
19/41
Nllustrgtnde 7 Ne 7>>9, g kdfput`r ogkj`r gll`c`hly gssdkngt`h
wnto to` Sont` [upr`fgknst fdv`f`ett`fpdrgrnly hnsgbl`h g P[ bgs`h Net`re`t [`rvnk`]rdvnh`r /N[]. geh hgfgc`h pgrt di nts r`kdrh
j``pnec syst`f Xo` N[] ogh gtt`fpt`h td stdp to` ogkj`r irdf
s`ehnec dut wdrlhwnh` rgknst f`ssgc`s ueh`r to`N[]s egf` Xo` ogkj`r snce`h dii wnto to` tor`gt,
"ydu ogv` y`t td s`` tru` `l`ktrdenk t`rrdrnsfXons ns g prdfns`"
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
20/41
Nllustrgtnde 2 Ne 7>>?, [pgenso prdt`stdrs bdfbgrh`h to`
Nestntut` idr Cldbgl Kdffuenkgtndes /NCK. wntotodusgehs di bdcus `&fgnl f`ssgc`s @&fgnl wgstn`h up geh ueh`lnv`rgbl` td to` N[]#s us`rs, geh
suppdrt lne`s w`r` tn`h up wnto p`dpl` wodkdulhe#t c`t to`nr fgnl
Xo` prdt`stdrs glsd spgff`h NCK stgii gehf`fb`r gkkduets, kldcc`h to`nr S`b pgc` wnto
bdcus kr`hnt kgrh drh`rs, geh tor`gt`e`h td`fpldy to` sgf` tgktnks gcgnest
drcgenzgtndes usnec NCK s`rvnk`s
http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
21/41
Xo`y h`fgeh`h togt NCK stdp odstnec to`w`bsnt` idr to` @usjgl O`rrng Aduregl, g E`w^drj&bgs`h publnkgtnde suppdrtnec Bgsqu`neh`p`eh`ek`
]rdt`stdrs sgnh NCK suppdrt`h t`rrdrnsf b`kgus`g s`ktnde de to` S`b pgc`s kdetgne`h fgt`rnglsde to` t`rrdrnst crdup @XG, wonko klgnf`hr`spdesnbnlnty idr gssgssnegtndes di [pgenso
pdlntnkgl geh s`kurnty diinkngls, geh gttgkjs defnlntgry nestgllgtndes NCK ineglly r`l`et`h gehpull`h to` snt` b`kgus` di to` "fgnl bdfbnecs"
http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
22/41
Nllustrgtnde ; Ne 7>>?, g 72&y`gr&dlh bdy sukk`ssiully ogkj`h
netd to`
kdetrdls idr to` ouc` Rdds`v`lt Hgf de to` [gltRnv`r ne Grnzdeg, P[G
O` fncot ogv` r`l`gs`h ilddhwgt`rs togt wdulhogv` neuehgt`h F`sg geh X`fp`, `ehgec`rnec gtl`gst 7fnllnde p`dpl`
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
23/41
NLLP[XRGXNDE 8 Ne 2==0, P[ s`kurnty kdesultgets r`pdrt`h togt
ogkj`rs w`r` tgrc`tnec to` P[ `l`ktrnk pdw`rcrnh geh ogh cgne`h gkk`ss td P[ utnlntn`s`l`ktrdenk kdetrdl syst`fs
Nllustrgtnde 0
Ne 7>>?, `toenk Xgfnl cu`rrnllgs swgfp`h [rnLgejge `fbgssn`s wnto ?== `&fgnls g hgy dv`r gtwdw``j p`rndh Xo` f`ssgc`s r`gh "S` gr` to`Net`re`t Blgkj Xnc`rs geh w`#r` hdnec tons tdhnsrupt ydur kdffuenkgtndes" Net`llnc`ek`gutodrntn`s kogrgkt`rnz`h nt gs to` inrst jedwegttgkj by t`rrdrnsts gcgnest g kduetry#s kdfput`rsyst`fs
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
24/41
Nllustrgtnde 9
Hurnec to` Jdsdvd kdeilnkt ne 7>>>, EGXDkdfput`rs w`r` blgst`h wnto `&fgnl bdfbs gehont wnto h`engl&dis`rvnk`
gttgkjs by ogkjtnvnsts prdt`stnec to` EGXD
bdfbnecs
Ne ghhntnde, busne`ss`s, publnk drcgenzgtndes, gehgkgh`fnk
nestntut`s r`k`nv`h oncoly pdlntnknz`h vnrus&lgh`e `&fgnls irdf g rgec` di @gst`re @urdp`gekduetrn`s, gkkdrhnec td r`pdrts S`b h`igk`f`etsw`r` glsd kdffde
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
25/41
Nllustrgtnde 3
[nek` H`k`fb`r 7>>3, to` @l`ktrdenk Hnsturbgek`Xo`gt`r /@HX. ogs b``e kdehuktnec S`b snt&nesgcgnest vgrndus snt`s ne suppdrt di to` F`xnkgeQgpgtnstgs
Gt g h`sncegt`h tnf`, todusgehs di prdt`stdrs pdnetto`nr brdws`rs td g tgrc`t snt` usnec sditwgr` togtilddhs to` tgrc`t wnto rgpnh geh r`p`gt`h hdweldghr`qu`sts
@HX#s sditwgr` ogs glsd b``e us`h by genfgl rncotscrdups gcgnest
drcgenzgtndes sgnh td gbus` genfgls
@l`ktrdonppn`s, gedto`r crdup di ogkjtnvnsts,
kdehukt`h S`b snt&nes gcgnest to` SXD wo`e to`yf`t ne [`gttl` ne lgt` 7>>>
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
26/41
Nllustrgtnde ?
Ne 7>>8, g 79&y`gr&dlh @eclnso bdy tddj hdwesdf` 7== P[ h`i`es` syst`fs
Nllustrgtnde >
Ne 7>>3, ;0 kdfput`r sp`knglnsts us`h ogkjnectddls ir``ly gvgnlgbl` de 7,>== w`b snt`s td southdwe lgrc` s`cf`ets di to` P[ pdw`r crnh
Xo`y glsd snl`ek`h to` kdffgeh geh kdetrdl
syst`f di to` ]gknink Kdffgeh ne Odedlulu
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
27/41
Nllustrgtnde 7=
Ne 2===, Gsnge [koddl di Kyb`r Lgws wgs r`culgrlygttgkj`h by Hnstrnbut`h H`engl di [`rvnk` gttgkjs byogktnvnsts prdpgcgtnec to` rncot td pdredcrgpoy
Gsnge [koddl di Kyb`r Lgws ogs sp`gro`gh`h genet`regtndegl kgfpgnce gcgnest pdredcrgpoy de to`
Net`re`t Nllustrgtnde 77
Ne 2==7, ne to` bgkjhrdp di to` hdweture ne P[&Konegr`lgtndesonps, to` Kone`s` ogkj`rs r`l`gs`h to` Kdh`
R`h vnrus netd to` wnlh Xons vnrus nei`kt`h fnllndes dikdfput`rs grdueh to` wdrlh geh to`e us`h to`s`kdfput`rs td lgueko h`engl di s`rvnk` gttgkjs de P[w`b snt`s, prdfne`etly to` w`b snt` di to` Sont`Odus`
http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
28/41
Nllustrgtnde 72
Ne 2==7, ogkj`rs brdj` netd to` P[ Austnk`H`pgrtf`et#s w`b snt` geh r`plgk`h to`h`pgrtf`et#s s`gl wnto g swgstnjg, hubb`h to`gc`eky to` "Pent`h [tgt`s H`pgrtf`et di
Neaustnk`" geh inll`h to` pgc` wnto dbsk`e`pnktur`s
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
29/41
Ps` di `ekryptnde by t`rrdrnstsG hnsturbnec tr`eh togt ns `f`rcnec edwghgys ns
to` nekr`gsnec us` di `ekryptnde, onco&ir`qu`eky`ekrypt`h vdnk`$hgtg lnejs, `ekryptnde sditwgr`lnj` ]r`tty Cddh ]rnvgky /]C]. `tk by t`rrdrnsts
geh f`fb`rs di drcgenz`h krnf` kgrt`ls [trdec `ekryptnde ns to` krnfnegls b`st irn`eh geh
to` pdlnk`fges wdrst `e`fy
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
30/41
Nllustrgtnde 7 L`gry, wod wgs s`et`ek`h td >8 y`grs ne prnsde idrs`ttnec dii inr` bdfbs ne to` E`w ^drj /P[G. subwgy
syst`f ne 7>>0, ogh h`v`ldp`h ons dwe glcdrntof idr`ekryptnec to` inl`s de ons kdfput`r
Nllustrgtnde 2
Xo` Kgln kgrt`l ns r`put`h td b` usnec sdponstnkgt`h `ekryptnde td kdek`gl to`nr t`l`pode`
kdffuenkgtndes, rghnds togt hnstdrt vdnk`s, vnh`d pode`s wonko prdvnh` vnsugl guto`etnkgtnde di
to` kgll`r#s nh`etnty, geh nestruf`ets idr skrgfblnec trgesfnssndes irdf
kdfput`r fdh`fs
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
31/41
Nllustrgtnde ; Xo` Ntglnge fging ns b`ln`v`h td us` ]C] /]r`tty Cddh
]rnvgky. sditwgr` idr syff`trnk gs w`ll gsgsyff`trnk
`ekryptnde
Nllustrgtnde 8 De Fgrko 2=, 7>>0, to` Guf [upr`f` Xruto kult
hrdpp`h bgcs di
sgrne e`rv` cgs ne to` Xdjyd subwgy, jnllnec 72 p`dpl`
geh neaurnec 9,=== fdr`
F`fb`rs di to` kult ogh h`v`ldp`h fgey ko`fnkglgeh bndldcnkgl
w`gpdes, nekluhnec [grne, Y_, Fustgrh cgs, Kygenh`,
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
32/41
Nt ns b`ln`v`h togt pr`pgrgtndes w`r` ueh`rwgy tdh`v`ldp eukl`gr kgpgbnlnty Xo` kult wgs glsdb`ln`v`h td b` h`v`ldpnec g "h`gto rgy" togt kdulhh`strdy gll lni`'
Xo` r`kdrhs di to` kult ogh b``e stdr`h ne`ekrypt`h idrf /usnec to` R[G glcdrntof. dekdfput`rs
Xo` `eidrk`f`et gutodrntn`s w`r` gbl` td h`kryptto` neidrfgtnde gs to` r`l`vget prnvgt` j`y wgsidueh ne g ildppy hnsj s`nz`h irdf to` kultspr`fns`s Xo` `ekrypt`h neidrfgtnde r`lgt`h tdplges di to` kult td kgus` fgss h`gtos ne Agpge
geh P[G
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
33/41
Nllustrgtnde 0 Ne 7>>3, g Bdlnvnge t`rrdrnst drcgenzgtnde ogh
gssgssnegt`h idur P[ grfy p`rsdee`l
G rgnh de de` di to` onh`duts di to` t`rrdrnstsyn`lh`h neidrfgtnde `ekrypt`h usnec syff`trnk
`ekryptnde
G 72&odur brut` idrk` gttgkj r`sult`h ne to`h`kryptnde di to` neidrfgtnde geh subs`qu`etlyl`h td de` di to` lgrc`st hruc busts ne Bdlnvngeonstdry geh to` grr`st di to` t`rrdrnsts
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
34/41
Nllustrgtnde 9 Agf`s B`ll wgs grr`st`h idr vndlgtnec net`regl
r`v`eu` lgws di
to` P[G O` hnh tons by1
kdll`ktnec to` egf`s geh odf` ghhr`ss`s digc`ets geh `fpldy``s di to` Net`regl R`v`eu`[`rvnk` /NR[. di to` P[G ne drh`r td netnfnhgt`to`f
sdlnkntnec p`dpl` td adne ne g sko`f` jedwe gs"Gssgssnegtnde ]dlntnks"
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
35/41
Peh`r tons sko`f` tods` wod jnll`h s`l`kt`hcdv`ref`et `fpldy``s, nekluhnec tgx kdll`ktdrs,wdulh b` r`wgrh`h:
usnec igls` [dkngl [`kurnty Eufb`rs td onh`
ons gss`ts
geh gvdnh tgx`s:
kdetgfnegtnec ge gr`g dutsnh` NR[ pr`fns`s
ne fgey stgt`s di to` P[G wnto F`rkgptge /g stnejcgs.
Nev`stncgtdrs idueh de ons kdfput`r hdkuf`etsr`lgtnec td g plge td h`strdy `l`ktrdenk `qunpf`et
wnto enkj`l&plgt`h kgrbde inb`r
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
36/41
Xo`y glsd idueh ge nevdnk` idr to` purkogs` dito` inb`r gt ons
r`snh`ek`, geh g buehl` di to` fgt`rngl gt to`r`snh`ek` di ons
gssdkngt`, Rdb`rt @gst B`ll ogh `xkogec`h]C]&`ekrypt`h `&fgnl f`ssgc`s wnto sdf` di onsgssdkngt`s
Gs pgrt di ons pl`g bgrcgne, o` ture`h dv`r to`pgssporgs` td ons prnvgt` j`y Xons glldw`hnev`stncgtdrs td h`krypt f`ssgc`s
togt o` ogh r`k`nv`h
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
37/41
Nllustrgtnde 3 Hutko drcgenz`h krnf` syehnkgt`s us` ]C] geh
]C]ide` td `ekrypt to`nr kdffuenkgtndes Xo`yglsd us` pglftdp kdfput`rs nestgll`h wnto [`kur`H`vnk`, g Hutko sditwgr` prdhukt idr `ekryptnec
hgtg wnto Net`regtndegl Hgtg @ekryptnde Glcdrntof/NH@G.
Ne 7>>0, to` Gfst`rhgf ]dlnk` kgptur`h g ]K nepdss`ssnde di de` drcgenz`h krnf` f`fb`r Xo`
]K kdetgne`h ge `ekrypt`h pgrtntnde, wonko to`yw`r` gbl` td r`kdv`r
dely ne 7>>3
http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
38/41
Nllustrgtnde ? Ge `ekryptnde kgs` dkkurrnec ne Ynls`kj, S`st
C`rfgey nevdlv`h to`it, irguh, geh `fb`zzl`f`et diP[ h`i`es` kdetrgktdr geh P[ cdv`ref`et iuehsirdf 7>?9 td 7>??
Xo` gkkus`h ogh stdr`h inegekngl r`kdrhs r`lgtnec tdto` krnf`s de g p`rsdegl kdfput`r, to` ogrh hnsj diwonko ogh b``e pgsswdrh
prdt`kt`h
Xo` pdlnk` us`h ogkjnec sditwgr` td h`i`gt to`pgsswdrh prdt`ktnde, dely td ineh togt sdf` di to` inl`slnst`h ne to` hnr`ktdry ogh b``e `ekrypt`h
Xo`y to`e idueh to` `ekryptnde prdcrgf de to` ogrh
hnsj geh us`h brut` idrk` tddls td h`krypt to` inl`s
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
39/41
Nllustrgtnde >
Xo` Hgllgs ]dlnk` H`pgrtf`et ne to` P[G`ekduet`r`h `ekryptnde ne to` nev`stncgtnde di g hrucrnec, wonko wgs dp`rgtnec ne s`v`rgl stgt`s di to` P[Ggeh h`glnec ne @kstgsy
G f`fb`r di to` rnec, r`snhnec wntone to`nr aurnshnktnde,
ogh `ekrypt`h ons ghhr`ss bddj O` ture`h dv`r to`pgsswdrh, `egblnec to` pdlnk` td h`krypt to` inl` F`gewonl`, odw`v`r, to` gkkus`h wgs dut de bgnl geh
gl`rt`h ons gssdkngt`s, sd to` h`krypt`h neidrfgtndewgs edt gs us`iul gs nt fncot ogv` b``e
Xo` pdlnk` edt`h togt @kstgsy h`gl`rs w`r` fdr`jedwl`hc`gbl` gbdut kdfput`rs wo`e kdfpgr`h wnto dto`r typ`s di
hruc h`gl`rs, fdst lnj`ly b`kgus` to`y w`r` yduec`rgeh b`tt`r `hukgt`h
http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
40/41
Nllustrgtnde 7= J`vne ]dulsde wgs g sjnll`h ogkj`r wod rncc`h rghnd
kdet`sts geh burclgrnz`h t`l`pode`&swntkonec diink`sgeh ogkj`h netd to` t`l`pode` e`twdrj ne drh`r tdh`t`rfne` wods` pode` wgs b`nec tgpp`h geh td
nestgll ons dwe pode` tgppnec h`vnk`s ]dulsde ogh `ekrypt`h inl`s hdkuf`etnec `v`rytonec
irdf to` pode` tgppnec o` ogh hnskdv`r`h td to`hdssn`rs o` ogh kdfpnl`h gbdut ons `e`fn`s Xo`inl`s ogh b``e `ekrypt`h s`v`rgl tnf`s usnec to` Hgtg@ekryptnde [tgehgrh
G P[ H`pgrtf`et di @e`rcy sup`rkdfput`r tddjs`v`rgl fdetos
td ineh to` j`y, gt g kdst di fnllndes di hdllgrs Xo`r`sult yn`lh`h e`grly t`e todusgeh pgc`s di `vnh`ek`
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/ -
7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists
41/41
Nllustrgtnde 77
Xo` fdto`r di g 70&y`gr dlh bdy inl`h g kdfplgnetgcgnest ge ghult wod ogh sdlh o`r sde P[ ( 7===wdrto di ogrhwgr` geh sditwgr` idr de` hdllgr
Xo` fge ogh glsd cnv`e to` bdy l`wh pnktur`s de
ildppy hnsjs Xo` fge subs`qu`etly fgnl`h to` bdy
pdredcrgponk fgt`rngl de ildppy hnsjs geh s`etpdredcrgponk inl`s dv`r to` Net`re`t
So`e to` gkkus`h wgs grr`st`h nt wgs idueh duttogt o` ogh
`ekrypt`h g hnr`ktdry de to` syst`f usnec ]C]
http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/