cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

Upload: oureducationin

Post on 10-Feb-2018

227 views

Category:

Documents


3 download

TRANSCRIPT

  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    1/41

    Kyb`r krnf`, w`b agkjnec, `fgnlirguhs,kyb`r t`rrdrnsf, us` di

    `ekryptnde by t`rrdrnsts

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    2/41

    S`b Agkjnec Aust gs kdev`etndegl onagkjnec di ge gnrplge` ns hde` by

    usnec idrk`,

    snfnlgrly w`b agkjnec f`ges idrk`iully tgjnec dv`r kdetrdldi g w`bsnt`

    Xo` fdtnv` ns usuglly to` sgf` gs onagkjnec Xo`p`rp`trgtdrs

    ogv` `nto`r g fde`tgry dr pdlntnkgl purpds` wonko to`y trytd sgtngt` by

    odlhnec to` dwe`rs di to` w`bsnt` td rgesdf

    Xons dkkurs wo`e sdf`de` idrk`iully tgj`s kdetrdl di gw`bsnt` /by

    krgkjnec to` pgsswdrh geh lgt`r kogecnec nt. Xo` gktugldwe`r di to`

    w`bsnt` hd`s edt ogv` gey fdr` kdetrdl dv`r wogt

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    3/41

    Odw hd`s w`b agkjnec tgj`

    plgk`4

    Xo` ghfnenstrgtdr di gey w`bsnt` ogs g pgsswdrh gehg us`regf` togt dely o` /dr sdf`de` gutodrnz`h byonf. fgy us` td upldgh inl`s irdf ons kdfput`r de to`w`b s`rv`r /snfply put, g s`rv`r ns g pdw`riulkdfput`r. wo`r` ons w`bsnt` ns odst`h

    Nh`glly, tons pgsswdrh r`fgnes s`kr`t wnto to`ghfnenstrgtdr

    Ni g ogkj`r c`ts odlh di tons us`regf` geh pgsswdrh,

    to`e o` kge pr`t`eh td b` to` ghfnenstrgtdr Kdfput`rs hdet r`kdcenz` p`dpl` dely us`regf`s

    geh pgsswdrhs

    Xo` w`b s`rv`r wnll crget kdetrdl di to` w`bsnt` td

    wod`v`r `et`rs to` kdrr`kt pgsswdrh geh us`regf`kdfbnegtnde

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    4/41

    Xo`r` gr` fgey wgys ne wonko g ogkj`r fgy c`ttd jedw g

    pgsswdrh, to` fdst kdffde b`nec pgsswdrhkrgkjnec wo`r`ne g krgkjnecsditwgr` ns us`h tdcu`ss g pgsswdrh

    ]gsswdrh krgkjnec gttgkjs gr` fdst kdffdelydi twd

    typ`s Xo` inrst de` ns jedwe gs to` hnktndegry gttgkj Ne

    tons typ` di

    gttgkj to` sditwgr` wnll gtt`fpt gll to` wdrhs

    kdetgne`h ne g pr`h`ine`h hnktndegry di wdrhs

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    5/41

    `xgfpl` Idr `xgfpl`, nt fgy try Rgonf, Rgoul, Rgj`so,

    Rgf, R``fg, R``eg ne g pr`h`ine`h hnktndegry

    di Nehnge egf`s Xo`s` typ`s di hnktndegrn`s gr`r`ghnly gvgnlgbl` de to` Net`re`t

    Xo` dto`r idrf di pgsswdrh krgkjnec ns by usnecbrut` idrk`% Ne

    tons jneh di gttgkj to` sditwgr` trn`s td cu`ss to`pgsswdrh by trynec dut gll pdssnbl` kdfbnegtndesdi eufb`rs, syfbdls, l`tt`rs tnll to` kdrr`ktpgsswdrh ns idueh

    Idr`xgfpl`, nt fgy try dut pgsswdrh

    kdfbnegtndes lnj` gbk72;, gkbh093>, sha+%U,w`ui! & !

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    6/41

    [df` sditwgr`, gvgnlgbl` idr pgsswdrh krgkjnecusnec to` brut` idrk` t`koenqu`, kge ko`kj gouc` eufb`r di pgsswdrh kdfbnegtndes p`rs`kdeh

    So`e kdfpgr`h wnto g hnktndegry gttgkj, g brut`idrk` gttgkj tgj`s fdr` tnf`, but nt ns h`inent`lyfdr` sukk`ssiul

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    7/41

    Nllustrgtnde Ne ge neknh`et r`pdrt`h ne to` P[G, to` dwe`r di g

    odbby w`bsnt` idr konlhr`e r`k`nv`h ge `&fgnlneidrfnec o`r togt g crdup di ogkj`rs ogh cgne`hkdetrdl dv`r o`r w`bsnt` Xo`y h`fgeh`h g

    rgesdf di 7 fnllnde hdllgrs irdf o`r Xo` dwe`r, g skoddlt`gko`r, hnh edt tgj` to`

    tor`gt s`rndusly [o` i`lt togt nt wgs aust g skgr`tgktnk geh ncedr`h to` `&fgnl

    Nt wgs tor`` hgys lgt`r togt so` kgf` td jedw,idlldwnec fgey

    t`l`pode` kglls irdf gll dv`r to` kduetry, togt to`ogkj`rs ogh w`b agkj`h o`r w`bsnt`

    [ubs`qu`etly, to`y ogh glt`r`h g pdrtnde di to`w`bsnt` wonko wgs `etntl`h Odw td ogv` iue wnto

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    8/41

    Ne gll to` plgk`s wo`r` nt ogh b``e f`etnde`h,to`y ogh r`plgk`h to` wdrh cdlhinso wnto to`wdrh pnrgeogs

    ]nrgeogs gr` tney but `xtr`f`ly hgec`rdus il`so&`gtnec inso Fgey konlhr`e ogh vnsnt`h to` pdpulgrw`bsnt` geh ogh b`ln`v`h wogt to` kdet`ets dito` w`bsnt` succ`st`h

    Xo`s` ueidrtuegt` konlhr`e idlldw`h to`nestruktndes, trn`h td plgy wnto pnrgeogs, wonkoto`y bducot irdf p`t sodps, geh w`r` v`rys`rndusly neaur`h'

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    9/41

    @fgnl Irguhs H`gr Fr% Austne Snllngfs, N#f Ynjgs Fgeant [neco

    irdf ]ueagb /Nehng.% N b`ldec td g knty egf`h

    Luhongeg%

    Fr% Snllngfs, N gf ogvnec g brdto`r ne Kgeghg

    wod ns glsd egf`h Austne Snllngfs% O` wgs

    ghdpt`h irdf fy pgr`ets by sdf` Fr% Snllngf

    Rgf di S`llgeh% F` geh fy fuf kgf` dv`r td

    Kgeghg td l`gv` Austne td ons e`w igfnly /Snllngf

    Rgf#s Igfnly.% Nt ogpp`e`h ne Aue` 7>?0%

    [d Fr% Austne Snllngfs, ni ydu gr` to` sgf`

    p`rsde Nf tgljnec gbdut% Xo`e pl`gs` cnv` f`

    sdf` tnf` sd togt N kge l`t ydu jedw to` r`glntn`s%

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    10/41

    Nfgcne` to` toducots cdnec torduco Fr Austne Snllngfso`gh git`r r`ghnec tons `fgnl Ns o` r`glly ghdpt`h4 So`r` gr` ons

    bnrto pgr`ets4 Ns tons `fgnl irdf ons bnrto brdto`r4

    Ne r`glnty, tons ns g skgf `fgnl drncnegtnec irdf g kdll`c` ne[gecrddr /Nehng.' Kgeghnge kntnz`es gr` tgrc`t`h wnto to`s` `fgnls Ni

    to` tgrc`ts stgrt b`ln`vnec to` s`eh`r td b` to`nr brdto`r, to`y gr`

    gsj`h td s`eh fde`y sd togt to`nrbrdto`r kge trgv`l td Kgeghg wnto to`

    prddi di to` vnktnfs ghdptnde' Xons ns aust de` di to` ouehr`hs di `fgnl skgfs b`nec

    p`rp`trgt`h de to` Net`re`t Xo`s` skgfs gr` kdffdely r`i`rr`h td gs

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    11/41

    Xo` 87> l`tt`r skgfs drncnegt`h ne to` `grly 7>?=s gs to`dnl&bgs`h `kdedfy di Enc`rng w`et hdweonll Ne to` 7>>=s,l`tt`r skgfs cgv` wgy td `fgnl skgfs

    Ne 2==3, Gsnge [koddl di Kyb`r Lgws kdehukt`h g ; fdetonet`esnv` nev`stncgtnde di ouehr`hs di skgf `fgnls Xo`r`sults w`r` v`ry surprnsnec td sgy to` l`gst L`ss toge7=% di to`s` `fgnls ogh gktuglly drncnegt`h irdf Enc`rng'

    G fgadrnty di to`s` `fgnls /fdr` toge 9=%. ogv`drncnegt`h irdf Nsrg`l, idlldw`h by to` E`to`rlgehs, PJgeh dto`r @urdp`ge kduetrn`s% Xo` bnrto brdto`r `fgnlwgs to` dely de` drncnegtnec irdf Nehng

    Fdst di to`s` skgf `fgnls prdfns` to` r`k`nv`r fnllndes/dr sdf`tnf`s bnllndes. di hdllgrs Fdst kdffdely to` `fgnl sgys togt

    sdf` rnko Girnkge bur`gukrgt dr busne`ssfge dr pdlntnkngeogs hn`h geh l`it b`oneh g ldt di fde`y

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    12/41

    `%c% kdeth% Xo` skgfst`r stgt`s togt to` Cdv`ref`et ns cdnec tdkdeinskgt` to` fde`y Xo` dely wgy dut ns td trgesi`r to`

    fde`y td to` bgej gkkduet di to` `fgnl r`knpn`et Gll togtto` `fgnl r`knpn`et ogs td hd ns s`eh ons bgej gkkdueth`tgnls Idr tons g c`e`rdus i`` di g i`w fnllnde hdllgrs wnllb`

    pgnh' Ni sdf`de` gktuglly iglls idr tons skgf geh prdvnh`s to`

    bgej h`tgnls, o` ns s`et sdf` diinkngl lddjnec hdkuf`ets r`lgtnec td to` bgej

    trgesi`r di g

    ouc` suf di fde`y Dek` to` vnktnf ns kdevnek`h di to`c`eune`e`ss

    di to` trgesgktnde, sdf`tonec gpp`grs td cd wrdec Xo` vnktnf ns neidrf`h togt g sfgll gfduet di fde`y

    /rgecnec irdf P[( 7== td 20==. ns e``h`h idr bgej

    kogrc`s dr dto`r pgp`r wdrj Xons fde`y ns to` fdtnv` b`oneh to` `lgbdrgt` skgf Dek` to`

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    13/41

    Ldtt`ry skgfs Xo` ldtt`ry skgf `fgnls neidrf to` r`knpn`et togt o` ogs

    wde g fnllnde

    hdllgr ldtt`ry rue by Fnkrdsdit, ^godd dr sdf` dto`r w`lljedwe cldbgl

    kdfpgey Xo` wnee`r ns gsj`h td prdvnh` ons bgej h`tgnls

    geh pgy g sfgll suf idr bgej kogrc`s geh dto`r prdk`ssnec i``s

    Gedto`r skgf `fgnl b`cnes wnto Xons ns td neidrf ydu togtw` gr` ne

    pdss`ssnde di g kdesncef`et, h`pdsnt`h by Brntnso EgtndeglLdtt`ry wonko ns td b` kdurn`r`h td ydu Xo` `fgnl gsjs idr83= pduehs td b` s`et td to` kdurn`r kdfpgey sd togt to`ko`qu` idr to` ldtt`ry prnz` kge b` s`et

    Gedto`r skgf `fgnl kdf`s wnto to` suba`kt lne` Bl`ss`h

    ns to` ogeh togt cnv`to Xo` s`eh`r klgnfs td b` g wnhdw de o`r h`gtob`h

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    14/41

    @urd ldtt`ry Gedto`r skgf `fgnl kdf`s irdf ge `fpldy`` di to` @urd

    Ldtt`ry Xo`

    `fpldy`` klgnfs td b` ne g pdsntnde td kgrry dut g ldtt`ryirguh geh ns

    wnllnec td sogr` to` fde`y wnto to` `fgnl r`knpn`et

    Sogt ns kdffde ne gll to`s` skgfs ns togt skgee`hv`rsndes di diinkngl

    hdkuf`ets gr` `fgnl`h td pdt`etngl vnktnfs Dek` to`vnktnf ns kdevnek`h di to` c`eune`e`ss di to` trgesgktnde, gsfgll i`` ns r`qu`st`h idr f``tnec bgej kogrc`s $ l`cgli``s $ kdurn`r kogrc`s `tk Nt ns tons sfgll i`` togt ns to`fdtnv` b`oneh to` skgf

    Nt ns b`ln`v`h togt todusgehs di p`dpl` gr` h`irguh`h dibnllndes di hdllgrs

    `v`ry y`gr torduco to`s` skgfs

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    15/41

    Nllustrgtnde 7 Ne 2==0, ge Nehnge busne`ssfge r`k`nv`h ge

    `fgnl irdf to` Ynk` ]r`snh`et di g fgadr Girnkgebgej dii`rnec onf g lukrgtnv` kdetrgkt ne r`ture idrg jnkjbgkj di Rs 7 fnllnde

    Xo` busne`ssfge ogh fgey t`l`podenkkdev`rsgtndes wnto to` s`eh`r di to` `fgnl O`glsd v`rnin`h to` `fgnl ghhr`ss di to` Ynk`pr`snh`et irdf to` w`bsnt` di to` bgej geh

    subs`qu`etly trgesi`rr`h to` fde`y td to` bgejgkkduet f`etnde`h ne to` `fgnl

    Nt lgt`r ture`h dut togt to` `fgnl wgs g spddi`hde` geh wgs gktuglly s`et by ge Nehnge bgs`h neEnc`rng

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    16/41

    Nllustrgtnde 2G e`w typ` di skgf `&fgnl tor`gt`es td jnll

    r`knpn`ets ni to`y hd edt pgy todusgehs di hdllgrstd to` s`eh`r, wod purpdrts td b` g onr`hgssgssne

    R`plynec td to` `&fgnls aust s`ehs g sncegl tds`eh`rs togt to`yv` r`gko`h g lnv` gkkduet Ntglsd `skglgt`s to` netnfnhgtnde

    Ne de` kgs`, g r`knpn`et tor`gt`e`h td kgllgutodrntn`s Xo` skgff`r, wod wgs h`fgehnec(2=,===, r`nt`rgt`h to` tor`gt geh s`et sdf`p`rsdegl h`tgnls gbdut to` r`knpn`etghhr`ss,hgucot`rs iull egf` `tk

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    17/41

    O` cgv` ge ultnfgtuf1 X@LL F@ EDS GR@ ^DP R@GH^ XD HD SOGX

    N [GNH DR HD ^DP SGEX F@ XD ]RDK@@HSNXO F^ ADB4 GE[S@R ^@[$ED GEH HDEX

    G[J GE^ WP@[XNDE['''

    [df` `fgnls klgnf td b` irdf to` IBN ne Ldehdegeh neidrf r`knpn`ets togt ge grr`st wgs fgh` neto` kgs`

    Xo` `&fgnl sgys to` r`knpn`ets neidrfgtnde wgsidueh wnto to` susp`kt geh togt to`y sodulh r`plytd gssnst ne to` nev`stncgtnde Xo`s` `fgnls gr`

    pgrt di to` skgf'

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    18/41

    K^B@R X@RRDRN[F Kdfput`r krnf` ogs ont fgejneh wnto ueb`ln`vgbl`

    s`v`rnty Kdfput`r vnrus`s, wdrfs, Xrdages, h`engl dis`rvnk` gttgkjs, spddinec gttgkjs geh `&irguhs ogv`tgj`e to` r`gl geh vnrtugl wdrlhs by stdrf

    Odw`v`r, gll to`s` pgl` ne to` igk` di to` fdsthr`gh`h tor`gt togt di kyb`r t`rrdrnsf

    Gsnge [koddl di Kyb`r Lgws ogs h`ine`h kyb`rt`rrdrnsf gs1

    Kyb`r t`rrdrnsf ns to` pr`f`hntgt`h us` di hnsruptnv`gktnvntn`s, dr to` tor`gt to`r`di, ne kyb`r spgk`, wntoto` net`etnde td iurto`r sdkngl, nh`dldcnkgl, r`lncndus,pdlntnkgl dr snfnlgr dba`ktnv`s, dr td netnfnhgt` gey

    p`rsde ne iurto`rgek` di suko dba`ktnv`s

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    19/41

    Nllustrgtnde 7 Ne 7>>9, g kdfput`r ogkj`r gll`c`hly gssdkngt`h

    wnto to` Sont` [upr`fgknst fdv`f`ett`fpdrgrnly hnsgbl`h g P[ bgs`h Net`re`t [`rvnk`]rdvnh`r /N[]. geh hgfgc`h pgrt di nts r`kdrh

    j``pnec syst`f Xo` N[] ogh gtt`fpt`h td stdp to` ogkj`r irdf

    s`ehnec dut wdrlhwnh` rgknst f`ssgc`s ueh`r to`N[]s egf` Xo` ogkj`r snce`h dii wnto to` tor`gt,

    "ydu ogv` y`t td s`` tru` `l`ktrdenk t`rrdrnsfXons ns g prdfns`"

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    20/41

    Nllustrgtnde 2 Ne 7>>?, [pgenso prdt`stdrs bdfbgrh`h to`

    Nestntut` idr Cldbgl Kdffuenkgtndes /NCK. wntotodusgehs di bdcus `&fgnl f`ssgc`s @&fgnl wgstn`h up geh ueh`lnv`rgbl` td to` N[]#s us`rs, geh

    suppdrt lne`s w`r` tn`h up wnto p`dpl` wodkdulhe#t c`t to`nr fgnl

    Xo` prdt`stdrs glsd spgff`h NCK stgii gehf`fb`r gkkduets, kldcc`h to`nr S`b pgc` wnto

    bdcus kr`hnt kgrh drh`rs, geh tor`gt`e`h td`fpldy to` sgf` tgktnks gcgnest

    drcgenzgtndes usnec NCK s`rvnk`s

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    21/41

    Xo`y h`fgeh`h togt NCK stdp odstnec to`w`bsnt` idr to` @usjgl O`rrng Aduregl, g E`w^drj&bgs`h publnkgtnde suppdrtnec Bgsqu`neh`p`eh`ek`

    ]rdt`stdrs sgnh NCK suppdrt`h t`rrdrnsf b`kgus`g s`ktnde de to` S`b pgc`s kdetgne`h fgt`rnglsde to` t`rrdrnst crdup @XG, wonko klgnf`hr`spdesnbnlnty idr gssgssnegtndes di [pgenso

    pdlntnkgl geh s`kurnty diinkngls, geh gttgkjs defnlntgry nestgllgtndes NCK ineglly r`l`et`h gehpull`h to` snt` b`kgus` di to` "fgnl bdfbnecs"

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    22/41

    Nllustrgtnde ; Ne 7>>?, g 72&y`gr&dlh bdy sukk`ssiully ogkj`h

    netd to`

    kdetrdls idr to` ouc` Rdds`v`lt Hgf de to` [gltRnv`r ne Grnzdeg, P[G

    O` fncot ogv` r`l`gs`h ilddhwgt`rs togt wdulhogv` neuehgt`h F`sg geh X`fp`, `ehgec`rnec gtl`gst 7fnllnde p`dpl`

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    23/41

    NLLP[XRGXNDE 8 Ne 2==0, P[ s`kurnty kdesultgets r`pdrt`h togt

    ogkj`rs w`r` tgrc`tnec to` P[ `l`ktrnk pdw`rcrnh geh ogh cgne`h gkk`ss td P[ utnlntn`s`l`ktrdenk kdetrdl syst`fs

    Nllustrgtnde 0

    Ne 7>>?, `toenk Xgfnl cu`rrnllgs swgfp`h [rnLgejge `fbgssn`s wnto ?== `&fgnls g hgy dv`r gtwdw``j p`rndh Xo` f`ssgc`s r`gh "S` gr` to`Net`re`t Blgkj Xnc`rs geh w`#r` hdnec tons tdhnsrupt ydur kdffuenkgtndes" Net`llnc`ek`gutodrntn`s kogrgkt`rnz`h nt gs to` inrst jedwegttgkj by t`rrdrnsts gcgnest g kduetry#s kdfput`rsyst`fs

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    24/41

    Nllustrgtnde 9

    Hurnec to` Jdsdvd kdeilnkt ne 7>>>, EGXDkdfput`rs w`r` blgst`h wnto `&fgnl bdfbs gehont wnto h`engl&dis`rvnk`

    gttgkjs by ogkjtnvnsts prdt`stnec to` EGXD

    bdfbnecs

    Ne ghhntnde, busne`ss`s, publnk drcgenzgtndes, gehgkgh`fnk

    nestntut`s r`k`nv`h oncoly pdlntnknz`h vnrus&lgh`e `&fgnls irdf g rgec` di @gst`re @urdp`gekduetrn`s, gkkdrhnec td r`pdrts S`b h`igk`f`etsw`r` glsd kdffde

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    25/41

    Nllustrgtnde 3

    [nek` H`k`fb`r 7>>3, to` @l`ktrdenk Hnsturbgek`Xo`gt`r /@HX. ogs b``e kdehuktnec S`b snt&nesgcgnest vgrndus snt`s ne suppdrt di to` F`xnkgeQgpgtnstgs

    Gt g h`sncegt`h tnf`, todusgehs di prdt`stdrs pdnetto`nr brdws`rs td g tgrc`t snt` usnec sditwgr` togtilddhs to` tgrc`t wnto rgpnh geh r`p`gt`h hdweldghr`qu`sts

    @HX#s sditwgr` ogs glsd b``e us`h by genfgl rncotscrdups gcgnest

    drcgenzgtndes sgnh td gbus` genfgls

    @l`ktrdonppn`s, gedto`r crdup di ogkjtnvnsts,

    kdehukt`h S`b snt&nes gcgnest to` SXD wo`e to`yf`t ne [`gttl` ne lgt` 7>>>

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    26/41

    Nllustrgtnde ?

    Ne 7>>8, g 79&y`gr&dlh @eclnso bdy tddj hdwesdf` 7== P[ h`i`es` syst`fs

    Nllustrgtnde >

    Ne 7>>3, ;0 kdfput`r sp`knglnsts us`h ogkjnectddls ir``ly gvgnlgbl` de 7,>== w`b snt`s td southdwe lgrc` s`cf`ets di to` P[ pdw`r crnh

    Xo`y glsd snl`ek`h to` kdffgeh geh kdetrdl

    syst`f di to` ]gknink Kdffgeh ne Odedlulu

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    27/41

    Nllustrgtnde 7=

    Ne 2===, Gsnge [koddl di Kyb`r Lgws wgs r`culgrlygttgkj`h by Hnstrnbut`h H`engl di [`rvnk` gttgkjs byogktnvnsts prdpgcgtnec to` rncot td pdredcrgpoy

    Gsnge [koddl di Kyb`r Lgws ogs sp`gro`gh`h genet`regtndegl kgfpgnce gcgnest pdredcrgpoy de to`

    Net`re`t Nllustrgtnde 77

    Ne 2==7, ne to` bgkjhrdp di to` hdweture ne P[&Konegr`lgtndesonps, to` Kone`s` ogkj`rs r`l`gs`h to` Kdh`

    R`h vnrus netd to` wnlh Xons vnrus nei`kt`h fnllndes dikdfput`rs grdueh to` wdrlh geh to`e us`h to`s`kdfput`rs td lgueko h`engl di s`rvnk` gttgkjs de P[w`b snt`s, prdfne`etly to` w`b snt` di to` Sont`Odus`

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    28/41

    Nllustrgtnde 72

    Ne 2==7, ogkj`rs brdj` netd to` P[ Austnk`H`pgrtf`et#s w`b snt` geh r`plgk`h to`h`pgrtf`et#s s`gl wnto g swgstnjg, hubb`h to`gc`eky to` "Pent`h [tgt`s H`pgrtf`et di

    Neaustnk`" geh inll`h to` pgc` wnto dbsk`e`pnktur`s

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    29/41

    Ps` di `ekryptnde by t`rrdrnstsG hnsturbnec tr`eh togt ns `f`rcnec edwghgys ns

    to` nekr`gsnec us` di `ekryptnde, onco&ir`qu`eky`ekrypt`h vdnk`$hgtg lnejs, `ekryptnde sditwgr`lnj` ]r`tty Cddh ]rnvgky /]C]. `tk by t`rrdrnsts

    geh f`fb`rs di drcgenz`h krnf` kgrt`ls [trdec `ekryptnde ns to` krnfnegls b`st irn`eh geh

    to` pdlnk`fges wdrst `e`fy

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    30/41

    Nllustrgtnde 7 L`gry, wod wgs s`et`ek`h td >8 y`grs ne prnsde idrs`ttnec dii inr` bdfbs ne to` E`w ^drj /P[G. subwgy

    syst`f ne 7>>0, ogh h`v`ldp`h ons dwe glcdrntof idr`ekryptnec to` inl`s de ons kdfput`r

    Nllustrgtnde 2

    Xo` Kgln kgrt`l ns r`put`h td b` usnec sdponstnkgt`h `ekryptnde td kdek`gl to`nr t`l`pode`

    kdffuenkgtndes, rghnds togt hnstdrt vdnk`s, vnh`d pode`s wonko prdvnh` vnsugl guto`etnkgtnde di

    to` kgll`r#s nh`etnty, geh nestruf`ets idr skrgfblnec trgesfnssndes irdf

    kdfput`r fdh`fs

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    31/41

    Nllustrgtnde ; Xo` Ntglnge fging ns b`ln`v`h td us` ]C] /]r`tty Cddh

    ]rnvgky. sditwgr` idr syff`trnk gs w`ll gsgsyff`trnk

    `ekryptnde

    Nllustrgtnde 8 De Fgrko 2=, 7>>0, to` Guf [upr`f` Xruto kult

    hrdpp`h bgcs di

    sgrne e`rv` cgs ne to` Xdjyd subwgy, jnllnec 72 p`dpl`

    geh neaurnec 9,=== fdr`

    F`fb`rs di to` kult ogh h`v`ldp`h fgey ko`fnkglgeh bndldcnkgl

    w`gpdes, nekluhnec [grne, Y_, Fustgrh cgs, Kygenh`,

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    32/41

    Nt ns b`ln`v`h togt pr`pgrgtndes w`r` ueh`rwgy tdh`v`ldp eukl`gr kgpgbnlnty Xo` kult wgs glsdb`ln`v`h td b` h`v`ldpnec g "h`gto rgy" togt kdulhh`strdy gll lni`'

    Xo` r`kdrhs di to` kult ogh b``e stdr`h ne`ekrypt`h idrf /usnec to` R[G glcdrntof. dekdfput`rs

    Xo` `eidrk`f`et gutodrntn`s w`r` gbl` td h`kryptto` neidrfgtnde gs to` r`l`vget prnvgt` j`y wgsidueh ne g ildppy hnsj s`nz`h irdf to` kultspr`fns`s Xo` `ekrypt`h neidrfgtnde r`lgt`h tdplges di to` kult td kgus` fgss h`gtos ne Agpge

    geh P[G

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    33/41

    Nllustrgtnde 0 Ne 7>>3, g Bdlnvnge t`rrdrnst drcgenzgtnde ogh

    gssgssnegt`h idur P[ grfy p`rsdee`l

    G rgnh de de` di to` onh`duts di to` t`rrdrnstsyn`lh`h neidrfgtnde `ekrypt`h usnec syff`trnk

    `ekryptnde

    G 72&odur brut` idrk` gttgkj r`sult`h ne to`h`kryptnde di to` neidrfgtnde geh subs`qu`etlyl`h td de` di to` lgrc`st hruc busts ne Bdlnvngeonstdry geh to` grr`st di to` t`rrdrnsts

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    34/41

    Nllustrgtnde 9 Agf`s B`ll wgs grr`st`h idr vndlgtnec net`regl

    r`v`eu` lgws di

    to` P[G O` hnh tons by1

    kdll`ktnec to` egf`s geh odf` ghhr`ss`s digc`ets geh `fpldy``s di to` Net`regl R`v`eu`[`rvnk` /NR[. di to` P[G ne drh`r td netnfnhgt`to`f

    sdlnkntnec p`dpl` td adne ne g sko`f` jedwe gs"Gssgssnegtnde ]dlntnks"

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    35/41

    Peh`r tons sko`f` tods` wod jnll`h s`l`kt`hcdv`ref`et `fpldy``s, nekluhnec tgx kdll`ktdrs,wdulh b` r`wgrh`h:

    usnec igls` [dkngl [`kurnty Eufb`rs td onh`

    ons gss`ts

    geh gvdnh tgx`s:

    kdetgfnegtnec ge gr`g dutsnh` NR[ pr`fns`s

    ne fgey stgt`s di to` P[G wnto F`rkgptge /g stnejcgs.

    Nev`stncgtdrs idueh de ons kdfput`r hdkuf`etsr`lgtnec td g plge td h`strdy `l`ktrdenk `qunpf`et

    wnto enkj`l&plgt`h kgrbde inb`r

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    36/41

    Xo`y glsd idueh ge nevdnk` idr to` purkogs` dito` inb`r gt ons

    r`snh`ek`, geh g buehl` di to` fgt`rngl gt to`r`snh`ek` di ons

    gssdkngt`, Rdb`rt @gst B`ll ogh `xkogec`h]C]&`ekrypt`h `&fgnl f`ssgc`s wnto sdf` di onsgssdkngt`s

    Gs pgrt di ons pl`g bgrcgne, o` ture`h dv`r to`pgssporgs` td ons prnvgt` j`y Xons glldw`hnev`stncgtdrs td h`krypt f`ssgc`s

    togt o` ogh r`k`nv`h

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    37/41

    Nllustrgtnde 3 Hutko drcgenz`h krnf` syehnkgt`s us` ]C] geh

    ]C]ide` td `ekrypt to`nr kdffuenkgtndes Xo`yglsd us` pglftdp kdfput`rs nestgll`h wnto [`kur`H`vnk`, g Hutko sditwgr` prdhukt idr `ekryptnec

    hgtg wnto Net`regtndegl Hgtg @ekryptnde Glcdrntof/NH@G.

    Ne 7>>0, to` Gfst`rhgf ]dlnk` kgptur`h g ]K nepdss`ssnde di de` drcgenz`h krnf` f`fb`r Xo`

    ]K kdetgne`h ge `ekrypt`h pgrtntnde, wonko to`yw`r` gbl` td r`kdv`r

    dely ne 7>>3

    http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    38/41

    Nllustrgtnde ? Ge `ekryptnde kgs` dkkurrnec ne Ynls`kj, S`st

    C`rfgey nevdlv`h to`it, irguh, geh `fb`zzl`f`et diP[ h`i`es` kdetrgktdr geh P[ cdv`ref`et iuehsirdf 7>?9 td 7>??

    Xo` gkkus`h ogh stdr`h inegekngl r`kdrhs r`lgtnec tdto` krnf`s de g p`rsdegl kdfput`r, to` ogrh hnsj diwonko ogh b``e pgsswdrh

    prdt`kt`h

    Xo` pdlnk` us`h ogkjnec sditwgr` td h`i`gt to`pgsswdrh prdt`ktnde, dely td ineh togt sdf` di to` inl`slnst`h ne to` hnr`ktdry ogh b``e `ekrypt`h

    Xo`y to`e idueh to` `ekryptnde prdcrgf de to` ogrh

    hnsj geh us`h brut` idrk` tddls td h`krypt to` inl`s

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    39/41

    Nllustrgtnde >

    Xo` Hgllgs ]dlnk` H`pgrtf`et ne to` P[G`ekduet`r`h `ekryptnde ne to` nev`stncgtnde di g hrucrnec, wonko wgs dp`rgtnec ne s`v`rgl stgt`s di to` P[Ggeh h`glnec ne @kstgsy

    G f`fb`r di to` rnec, r`snhnec wntone to`nr aurnshnktnde,

    ogh `ekrypt`h ons ghhr`ss bddj O` ture`h dv`r to`pgsswdrh, `egblnec to` pdlnk` td h`krypt to` inl` F`gewonl`, odw`v`r, to` gkkus`h wgs dut de bgnl geh

    gl`rt`h ons gssdkngt`s, sd to` h`krypt`h neidrfgtndewgs edt gs us`iul gs nt fncot ogv` b``e

    Xo` pdlnk` edt`h togt @kstgsy h`gl`rs w`r` fdr`jedwl`hc`gbl` gbdut kdfput`rs wo`e kdfpgr`h wnto dto`r typ`s di

    hruc h`gl`rs, fdst lnj`ly b`kgus` to`y w`r` yduec`rgeh b`tt`r `hukgt`h

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    40/41

    Nllustrgtnde 7= J`vne ]dulsde wgs g sjnll`h ogkj`r wod rncc`h rghnd

    kdet`sts geh burclgrnz`h t`l`pode`&swntkonec diink`sgeh ogkj`h netd to` t`l`pode` e`twdrj ne drh`r tdh`t`rfne` wods` pode` wgs b`nec tgpp`h geh td

    nestgll ons dwe pode` tgppnec h`vnk`s ]dulsde ogh `ekrypt`h inl`s hdkuf`etnec `v`rytonec

    irdf to` pode` tgppnec o` ogh hnskdv`r`h td to`hdssn`rs o` ogh kdfpnl`h gbdut ons `e`fn`s Xo`inl`s ogh b``e `ekrypt`h s`v`rgl tnf`s usnec to` Hgtg@ekryptnde [tgehgrh

    G P[ H`pgrtf`et di @e`rcy sup`rkdfput`r tddjs`v`rgl fdetos

    td ineh to` j`y, gt g kdst di fnllndes di hdllgrs Xo`r`sult yn`lh`h e`grly t`e todusgeh pgc`s di `vnh`ek`

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/
  • 7/22/2019 Cyber crime, web jacking, email frauds,cyber terrorism, use of encryption by terrorists

    41/41

    Nllustrgtnde 77

    Xo` fdto`r di g 70&y`gr dlh bdy inl`h g kdfplgnetgcgnest ge ghult wod ogh sdlh o`r sde P[ ( 7===wdrto di ogrhwgr` geh sditwgr` idr de` hdllgr

    Xo` fge ogh glsd cnv`e to` bdy l`wh pnktur`s de

    ildppy hnsjs Xo` fge subs`qu`etly fgnl`h to` bdy

    pdredcrgponk fgt`rngl de ildppy hnsjs geh s`etpdredcrgponk inl`s dv`r to` Net`re`t

    So`e to` gkkus`h wgs grr`st`h nt wgs idueh duttogt o` ogh

    `ekrypt`h g hnr`ktdry de to` syst`f usnec ]C]

    http://www.blog.oureducation.in/http://www.blog.oureducation.in/http://www.blog.oureducation.in/