Tuesday, 8 August 2017

Cybercrime and the Preventive Measures

Cybercrime can be explained as misusing a computer for fraud or illegal activities like theft of private information, violating privacy of individuals etc. 

Today, Cybercrime is reported everywhere and every day, since computer and internet has started playing a vital role in each and every sector of our life, such as media, marketing, commerce, and entertainment.

New technologies are being invented in Information Technology every hour and it’s really great to have innovative technologies, but the fact is that, more the technologies, more the cybercrimes emerge. 

The difference between the cybercriminal activity and a traditional criminal activity is that a computer is to be used to commit a cybercrime, but the latter doesn’t require a computer. 

The most common type of cybercrime is the data stealing of individuals or corporate firms. 

Types of Cyber Crime

There are several kind of Cybercrime. Some of them are listed below:


The term masquerading means providing wrong information to the system by sending a TCP packet that has a fake source address which makes the packet seems coming from a reliable host.

Computer Intrusion

Computer Intrusion is a breaking activity that makes a computer harmful or the computer network works in an abnormal manner. These attacks include dispersal of viruses, misuse of the operating system etc. 

Denial of Service Attack

In the Denial of Service Attack, the directed users cannot get the resources or services on time. These attacks are executed on websites to damage their company activities or normal business functioning.

Salami Attack

This attack is executed for financial needs where a very small amount like $1 is deducted from a large base of single customers, and the individual customer may not notice the small change, but same time, the attacker gets a big wealth. 

Social Engineering

It is simply cheating the user by sending wrong emails or messages and also calling him/her to provide the confidential information.

Logic Bomb

It is an event driven attack, and generates only when an event occurs.

Smurf Attack

Smurf attack creates a huge amount of traffic on a network, and as a result, the network crashes. It is a type of DOS attack.

Email Bombing

It is an attack where a large number of emails are sent to the victim, causing his/her Email account to be crashed.

Cybercrime: The Protection Guidelines

  • Update and upgrade the Operating System ALWAYS.
  • Install or update Anti-virus/Anti-malware software regularly.
  • Keep the firewall on. A firewall helps to protect your device from cyber attackers or online intruders. 
  • Be careful while downloading. It’s better not to download anything from unknown resources; it may contain viruses or worms. Otherwise, turn ON the antivirus or antimalware software.
  • Turn off your computer. It’s a good and simple idea that turn your PC off always after the completion of your work. Delete the browser history and passwords each time also.

CCNP Security Training in Kochi 

Soften Technologies offers CCNP (Cisco Certified Network Professional) Security training with certification in Cochin, Kerala. CCNA (Cisco Certified Network Associate), CCIE (Cisco Certified Internetwork Expert), MCSE (Microsoft Certified Solutions Expert), RHCE (Red Hat Certified Engineer) courses along with the certification are also offered at our center in Kadavanthra, Cochin. 

Please visit our Networking Training page for the detailed information, syllabus and outline.

CALL: 8129199511, 0484 4037036 for your queries.
Email: softentechnologiescochin@gmail.com