Technology is being successfully used to support and enhance the ability of personal teaching by making attractive, positive and effective teaching and making teaching more flexible, creative and accessible. Find out safe ways to use technology with learners to promote self-esteem, perseverance, participation and develop friendship. To promote and discuss ‘Neticate’, e-protection and digital literacy. Show the learners that adults understand the techniques used by them – or protect women and children on the Internet.
Chatting friends attract their female friends using words like “beautiful figure”, “sexy”, and “attractive” etc., which is actually the beginning of a trap of obscenity. Gradually, the culprit takes his female friends into confidence and inspires them to become a victim of the crime of the virtual world. Troll them on any issue raised by them and bother women by sending porn e-mails, chasing women using a chat room, website etc., even the criminal threatens the victim girl that if she discusses any incident related to the sexual harassment caused by the said criminal with someone, she will transmit MMS and in some cases she could not tolerate insults and rich in some cases.
Explain to someone and assure that the woman has done the right thing; Refer to any existing priest aid/process. Help women and children to keep relevant evidence for any investigation (for example, do not remove the messages received, and take screen capture shots and note the web addresses of online cyber bullying events). Since the criminal is behind the screen and not in a public place, he gets the benefit of keeping the name secret. Therefore, everyone needs to be aware of the effects of cyber crimes against women and other types of crimes. Law enforcement agencies and parents should be made aware of the responsibilities of women and children in the use of information and communication technology, and should also be told what punishment can be imposed on its misuse. Women and children should know who can help them in case of cyber crime.
Introduction
There are always more than one way to solve the problem. Hacker and hacking words are being misinterpreted and misunderstood with the negative side. But, the quality and type of hackers depends on the attitude towards technology and it is related to practical methods of learn and learning. Hacking: The art of investigating various security violations is called hacking.
- Hacking program is searching for details of qualified systems.
- To expand the capabilities of the computer system.
- Sharing your computer expertise.
- This can also mean cracking in computer systems.
Hackers’ communities
- Hackers
- Crackers
- Freex
- script kiddies
Hackers: Hackers are intelligent computers professionals who create safety awareness by sharing knowledge. It is a team that works to find out what is happening on the depth of the system, what is happening behind the screen and detect potential security weaknesses in the system. The hacker clock allows you to report and share information, which helps to deal with and prevent the spread of internet hazards and unwanted network traffic. Hacking behavioral science and technology can also be an alternative to institution-based work. Computer security is a continuous fight. As computer security is getting tight, hackers are becoming more smart.
Types of hackers
Hackers are of three types and are classified on the basis of their intentions and hacking morality.
- White Hat Hacker: Those who work to secure it without breaking into the computer system. They work with software companies to overcome weaknesses; They will not declare weaknesses until the company is ready or found to be unlikely. They work morally and only when authorized by the owner will attack the system and show the code to the software manufacturer but will not tell anyone else how to take advantage of vulnerability.
- Black Hat Hacker: Those computer professionals who care more to control the system and reach preserved information than to secure the computer. They hack the system for their benefits or for malicious reasons and keep the unprotected information in the closed list to trade with other black hats.
- Gray Hat Hackers: Computer professionals who can make a dent in computer systems to raise awareness about safety flaws and declare vulnerability publicly without informing the software or system developer company or on the same day when the software company is informed. They release exploit codes that cannot be easily modified for hacking safety.
Gray shades: Many security experts classify hackers as white hats or black hats but in fact, most hackers come somewhere in the middle.
Vulnerability: This is a weakness that allows the attacker to reduce the information assurance of the system.
Crackers: A person who makes a dent in the computer with malicious intentions and can create unauthorized access to the system and can damage, destroy, destroy or reveal confidential information. Their purpose is to compromise the system to harass, harass or take revenge on the system to refuse to serve them. They can cause financial loss and image/reputation damage to individuals or organizations, defamation in society.
Freex: These are the individuals who use computer devices and software to make a dent in the phone network. They find flaws in the security of the phone network and make phone calls for free. They actually used your number to call and maybe you have to pay a large amount of phone bills without doing anything !!!
Script Kidies: These are the people who do not have technical skills to hack computer. They use the available information about the weaknesses known to dent distance systems. It is a work done for entertainment or curiosity in which no person or organization is damaged.
Hackers inspiration
- Fun
- Benefit
- Forcibly recovery
- Technical reputation
- Revenge/malicious
- Intellectual challenges
- Desire to embarrass
- Use
- Problem solution
- Highlighting the weakness of the system
- Want to be a hero of wild internet
Hackers strategies
- Reconnaissance
- Scanning
- Access
- Keep access.
- Clean the track.
The reconnaissance can be described as a phase before the attack and it is a systematic effort to detect, assemble, identify and record information about the goal. The hacker wants to get more information about the goal as much as possible.
- Scanning and calculation: Scanning and calculation are considered the second phase before the attack. This phase includes taking the information obtained during reconnaissance and using it to check the network. Scanning consists of stages such as intelligent system port scanning that are used to determine open ports and weak services. At this stage the attacker can use various automated equipment to detect the weaknesses of the system.
- Getting access: This is the stage where real hacking occurs. The weakens discovered during the reconnaissance and scanning phase are now advantage to achieve access. The connection method used for exploitation by the hacker may be local access to local area network, local access, internet or offline. Accessing access to the world of hackers is known as ownership of the system. This will be the phase during real safety violations where the hacker can use simple techniques to cause irreparable damage to the target system.
- Keep access and install back door: Once the hacker gets access, they want to maintain that access to exploitation and attacks in future. Sometimes, hackers separate the system from other hackers or security personnel by ensuring their special access with backdoor, root kit and trojan. The attacker can use automatic scripts and automatic equipment to hide the evidence of the attack and create back doors for further attacks.
- Clean the track: In this stage, once hackers are able to achieve access and maintain, they cover their tracks to avoid detection, continue using owned system, remove evidence of hacking or avoid legal action. Currently, many successful security violations are carried out but they are never known.
Read Also:
- Fraud In Mobile Financial Services: Safety Of Consumers, Providers And Systems
- Disability And Pension Benefits
- Health Care Fraud
- Online Romance Scam
- Causes And Types Of Cyber Crimes
- Something About Cyber Crime
- Big Awareness Alert: Fraudulent Contact Numbers And Playboy Job Scams In India
- Cyber Crime In India
- Cyber Fraud And Fraud Types You Should Be Aware
- Fraud And Scams
- Prevention Of Cyber Financial Fraud Scams: Role And Responsibility Of International Organizations
- Fraud Scams
- Common Types Of Health Fraud Scams
- Skokka, Oklute And Locanto Platforms Sex Romance Frauds Scams Are Increasing Day By Day
- Real History Frauds And Scams Of BJP Government
- Preventive Measures From Matrimonial Fraud And Scams
- What Are Matrimonial Frauds and Scams
- Types Of Scams And Frauds
- Types Of Frauds And Scams
- What Are Fraud And Scams
- Artificial Intelligence: How Fraud Happens Through Voice, How To Avoid It
- Immediate Requirement Of Judicial Reforms To Deal With Financial Fraud And To Ensure Compensation For Victims
- Bribery And Threats After Online Dating Or Romance Scams
- Public Warning: Beware Of Online Dating And Romance Scams Connected To These Bank Accounts
- ED Enforcement Direactorate (ED) Department Action On Anil Ambani Companies Completed: Raids At 35 Places In 3 Days; ₹ 3000 Crore Loan Fraud Allegations
- Investigation Of India Digital Financial Scenario: A Comprehensive Study Of Cyber Fraud Trends And Digital Literacy In India
- Fraud Scam Of Escort Agencies






