Advertisement
Guest User

Session 1

a guest
Feb 9th, 2020
837
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.80 KB | None | 0 0
  1.  
  2. INFORMATION SECURITY
  3. =====================
  4.  
  5.  
  6.  
  7.  
  8.  
  9.  
  10.  
  11.  
  12.  
  13.  
  14.  
  15. DATA | INFORMATION
  16.  
  17. Data : Raw Facts
  18. Information : Processed data or collection of data
  19.  
  20. Information Security : Covering up all the security aspects related to Information Technology.
  21.  
  22.  
  23.  
  24. CIA Traids : Confidentiality, integrity and availability.
  25.  
  26. Paytm, Flipcart, Amazon etc etc etc
  27.  
  28.  
  29.  
  30.  
  31.  
  32.  
  33.  
  34.  
  35.  
  36.  
  37. -----------------------------------------------------------------------------------------------------------------------------------
  38.  
  39.  
  40. Hacking : finding out the vurnability in the system or server.
  41. Hackers : who hack the system/server with the permission of any individual or for organisation.
  42.  
  43. Coders : the one who does coding or write programs
  44. Buider :
  45. enginnering :
  46.  
  47.  
  48.  
  49.  
  50.  
  51.  
  52.  
  53.  
  54.  
  55.  
  56.  
  57.  
  58.  
  59.  
  60.  
  61.  
  62.  
  63.  
  64.  
  65.  
  66.  
  67.  
  68.  
  69.  
  70.  
  71.  
  72. ETHICAL HACKING / CYBER SECURITY
  73. =================================
  74.  
  75. Ethical - Means legal practices which should be performed.
  76.  
  77. Hacking - Hacking means accessing any data, information or any system with the permission of individual.
  78.  
  79. Hackers - Hackers are the most skilled and technical people who are profiecient in understanding the technical aspects.
  80.  
  81.  
  82.  
  83.  
  84.  
  85.  
  86.  
  87.  
  88.  
  89.  
  90.  
  91.  
  92.  
  93.  
  94.  
  95.  
  96. ------------------------------------------------------------------------------------------------------------------------------------
  97.  
  98. TYPES OF HACKERS
  99. =================
  100.  
  101. 1. BLACK HAT HACKERS -
  102. THese are the bad people whon access and gain resources of any individual for the sake of there own wealth. Parents wala person,
  103. usually comes in newspaper Eg. Shadow Brokers
  104.  
  105.  
  106. 2. WHITE HAT HACKERS - THese are those people who gains access and tamper the resource for the sake of the individual. EG. Anshul Pandey etc
  107.  
  108.  
  109. 3. GREY HAT HACKERS - These are those hackers who hacks and gains resources for the sake of the society and culture.
  110.  
  111. Eg. Anonymous, Edward Snowden etc.
  112.  
  113. ----------------------------------------------------------------------
  114.  
  115. Other Categories
  116. ================
  117.  
  118. 1. Script Kiddies - These are those people who steals the programs, ideas or any other method of hacking and perform hacks without any knoweledge. Youtube people
  119.  
  120. 2. Noobz - These are the new born technical babies who just arrived in the field of cyber security.
  121.  
  122. 3. Crackers - These are those people who are good in cracking into a particular machine or a authentication check ,they crack into systems for a malicious purpose.
  123.  
  124.  
  125.  
  126. TYPES OF INFORMATION
  127. ====================
  128.  
  129. Critical Data :
  130.  
  131. 1. Confidentials INformation - Aadhar Cards, Passwords, Birth Certificates, PAN Cards etc.
  132. 2. Financial Information - Financial Statements, Bank Details, Login Credentials for banking poractices etc.
  133. 3. Health Information - Policies, Diseases etc.
  134. 4. Personal Information - Address, Phone Numbers, DOBs etc.
  135.  
  136. LPU :
  137.  
  138. Anuj
  139.  
  140. (Parimary Key)
  141.  
  142. Adhar card | Name | Contact No. | Email id | banking details | pancard etc | biometic | Retina Scanning | 10th Marks | 12th Marks | Permanent Address | Father's Name | Mother Name
  143.  
  144.  
  145. Security Question : The place where you born ? 95%
  146.  
  147.  
  148.  
  149. ----------------------------------------------------------------------
  150.  
  151.  
  152.  
  153. Ques: Why people hack ya fr kya motive hota hai logo ka hacking me indulge hone ka ?
  154.  
  155. 1.Hobby
  156. 2.Defame (Revenge)
  157. 3.Stealing information
  158. 4.Leaking information
  159. 5.Political motives
  160. 6.For SECURTIY REASONS i.e. securing digital space :)
  161.  
  162.  
  163. Cyber Terrorism
  164. =================
  165.  
  166.  
  167. Cyber War :
  168.  
  169. * Stuxnet :
  170.  
  171.  
  172. Terrorist have found a new way for indulging into disruptive activities through digital space.Jitta hm log technology ka use kr rhe hai waise hi sath hi saath iska koi na koi misuse bhi kr rha hai.
  173.  
  174. https://duo.com/decipher/debunking-myths-do-terrorists-use-game-consoles-to-communicate-with-each-other
  175.  
  176.  
  177. Pubg : Pulwama Attack
  178.  
  179. Email conversation ---> telephonic conversation --> gaming platform.
  180. cyber terrorism means to damage information, computer systems and data that result in harm against non-combatant targets.
  181.  
  182.  
  183.  
  184. CASE 26/11 ---> NATGrid :
  185.  
  186.  
  187. ----------------------------------------------------------
  188. ----------------------------------------------------------
  189.  
  190.  
  191.  
  192. ***___Cyber Laws___***
  193.  
  194.  
  195. IT Amendment Act 2010
  196.  
  197. Crime Patrol ( Section )
  198.  
  199. ** Section 43:
  200.  
  201. Penalty and compensation for damage to computer and computer system. (Server/ Server System)
  202.  
  203. ** Section 65:
  204.  
  205. Tempering with computer source Documents.
  206.  
  207. Changing and altering the documents which are available.
  208. Imprisonment upto 3 years and Fine upto 200,000 INR.
  209.  
  210. ** Section 66: Server/Computer Related Offences.
  211.  
  212. SECTION 66 A - Punishment for sending offensive messages through communication service.
  213. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  214.  
  215. SECTION 66 B - Dishonestly receiving and retaining any stolen computer resource or communication device is also made punishable by amendment.
  216. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  217.  
  218. SECTION 66 C - Identity Theft (Driving license, adhar card etc)
  219. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  220.  
  221. SECTION 66 D - Cheating by false Personation by using computer resource or communication device. (telecallers)
  222. Imprisonment upto 3 years and Fine upto 100,000 INR or both.
  223.  
  224. SECTION 66 E - Violation of Privacy
  225. Imprisonment upto 3 years and Fine upto 200,000 INR or both.
  226.  
  227.  
  228. SECTION 66 F - Punishment to cyber terrorism
  229. Data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offence of cyber terrorism.
  230.  
  231. ** Section 67: Punishment for publishing or transmitting obscene material in electronic from.
  232.  
  233. ** Section 71: Penalty for misrepresentation.
  234.  
  235. Banking : Loan
  236.  
  237. If you have uploaded your ID card, and given the wrong name and address,then again it is a crime.
  238. Imprisonment to Two years, or with fine of 1,00,000 INR, or with both.
  239.  
  240. ** Section 72: Breaching of Confidentiality and Privacy
  241.  
  242. I have some personal stuff in my hard disk drive and on google drive, If someone any how gets the access of those files without my permission, Then again it is a crime.
  243. Right To Privacy.
  244. Imprisonment for Ten Years, or with fine, or with both.
  245.  
  246. ** Section 73: Penalty for publishing electronic signature certificate false in certain particular. Signature Forgery.
  247.  
  248. Imprisonment for upto two years, or with fine upto 1,00,000 INR, or with both.
  249.  
  250. TASKS :
  251.  
  252.  
  253.  
  254.  
  255. follow theHackernews.com
  256. edward snowden
  257. Kevin MIttnick
  258. parrisa tabriz
  259.  
  260. +91 9915076930 : Anshul Pandey
  261.  
  262. https://www.facebook.com/imanshulpandey
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement