0% found this document useful (0 votes)
16 views6 pages

Is (61) Assignment

This document contains information about cyber security, cyber crimes, ethics in information security, privacy and anonymity of data, and how to set up a Tor relay network. It defines cyber crimes such as phishing, ransomware, hacking and others. It outlines key aspects of ethics in information security including confidentiality, integrity, accountability and more. It discusses strategies to enhance privacy and anonymity such as data minimization, user consent, security measures and legal compliance. Finally, it provides steps to set up a Tor relay including understanding relay types, installing Tor software, configuring and starting the relay.

Uploaded by

jawadalij65353
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views6 pages

Is (61) Assignment

This document contains information about cyber security, cyber crimes, ethics in information security, privacy and anonymity of data, and how to set up a Tor relay network. It defines cyber crimes such as phishing, ransomware, hacking and others. It outlines key aspects of ethics in information security including confidentiality, integrity, accountability and more. It discusses strategies to enhance privacy and anonymity such as data minimization, user consent, security measures and legal compliance. Finally, it provides steps to set up a Tor relay including understanding relay types, installing Tor software, configuring and starting the relay.

Uploaded by

jawadalij65353
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

ASSIGNMENT

JAWAD ALI JAMSHAID

INFT211102061

CYBER SECURITY (5A)

INFORMATION SECURITY

PROFF ADEEN RAIZ


Cyber Crime :
Cybercrime refers to criminal activities that involve the use of computers, networks, and digital
technologies. These crimes may target individuals, organizations, or governments, and they can
cause financial, reputational, or personal harm. Cybercriminals often exploit vulnerabilities in
computer systems and networks to gain unauthorized access, steal information, commit fraud,
or disrupt normal operations.

Examples
Here are some common examples of cybercrime:

1. Phishing: Cybercriminals use deceptive emails, messages, or websites to trick


individuals into providing sensitive information such as usernames, passwords,
and credit card details.

2. Ransomware: Malicious software is used to encrypt a user's files or system, and a


ransom is demanded in exchange for the decryption key. If the ransom is not
paid, the victim may lose access to their data permanently.

3. Identity Theft: Cybercriminals steal personal information, such as Social Security


numbers or credit card details, to impersonate individuals for financial gain or to
commit other crimes.

4. Hacking: Unauthorized access to computer systems or networks with the


intention of stealing, altering, or destroying data. This can also involve gaining
control over systems for malicious purposes.

5. Malware: Malicious software, including viruses, worms, and trojan horses, is


designed to disrupt or damage computer operations. Malware can be used to
steal information, spy on users, or cause other types of harm.

6. Denial-of-Service (DoS) Attacks: Cybercriminals flood a network, system, or


website with traffic, causing it to become overwhelmed and unavailable to users.
This can result in significant financial losses for businesses.

7. Cyber Espionage: State-sponsored or individual hackers may infiltrate computer


systems to gain access to sensitive information, trade secrets, or government
intelligence.
8. Online Scams: Various scams exist online, such as fake online auctions,
fraudulent investment schemes, and deceptive online marketplaces designed to
trick users into paying for goods or services that do not exist.

9. Cyberbullying: The use of digital platforms to harass, intimidate, or threaten


individuals. This can take the form of online harassment, spreading false
information, or impersonating someone online.

10. Child Exploitation: Criminal activities involving the online exploitation of


children, including the production, distribution, and possession of child
pornography

Ethics in information security :


Ethics in information security refers to the principles and standards that guide the
behavior and actions of individuals and organizations involved in the field of
information security. These ethical considerations are crucial in maintaining trust,
integrity, and responsible conduct in the use of information technology. Here are some
key aspects of ethics in information security:

1. Confidentiality: Respecting the confidentiality of sensitive information is a


fundamental ethical principle. Professionals in information security should ensure
that confidential data is only accessed by authorized individuals and is not
disclosed or shared without proper permission.

2. Integrity: Maintaining the integrity of data and systems is essential. This involves
ensuring that information is accurate, reliable, and has not been tampered with.
Information security professionals should act with honesty and prevent
unauthorized alterations to data.

3. Availability: Ethical behavior involves ensuring the availability of information and


systems to authorized users. This includes protecting against unauthorized
disruptions or denial-of-service attacks that could impact the availability of
critical resources.

4. Accountability: Individuals and organizations in information security should be


accountable for their actions. This includes taking responsibility for the security of
systems and data under their control, promptly addressing security incidents, and
learning from mistakes to improve security practices.
5. Non-Discrimination: Information security professionals should not engage in
discriminatory practices. Fair treatment and equal access to information security
resources and opportunities should be provided to all individuals, regardless of
factors such as race, gender, religion, or nationality.

6. Informed Consent: Ethical behavior involves obtaining informed consent before


collecting, processing, or sharing personal information. Individuals should be
aware of how their data will be used and have the option to provide or withhold
consent.

7. Professional Competence: Information security professionals should continually


update their skills and knowledge to stay current with evolving threats and
technologies. Employing best practices and industry standards demonstrates a
commitment to professional competence.

8. Lawful Behavior: Ethical conduct in information security includes adherence to


local and international laws and regulations. Security professionals should not
engage in illegal activities, and they should be aware of and comply with relevant
legal requirements.

9. Social Responsibility: Information security professionals have a social


responsibility to contribute positively to society. This includes considering the
broader impact of their work on individuals, communities, and the environment.

10. Continuous Improvement: Ethical behavior involves a commitment to


continuous improvement in information security practices. Learning from
experiences, staying informed about emerging threats, and adapting security
measures accordingly are key aspects of ethical conduct.

Privacy and Anonymity of data :


Privacy refers to the right of individuals to control their personal information and how it
is collected, used, shared, and stored.

Anonymity involves concealing the identity of individuals or entities in data sets, making
it difficult or impossible to trace the data back to specific individuals.
How can we achieve Privacy and Anonymity?
Achieving a balance between privacy and anonymity involves implementing a
combination of technical, organizational, and legal measures. Here are some strategies
to enhance privacy and anonymity in the handling of data:

1. Data Minimization
2. User Consent and Transparency
3. Security Measures (Encryption, Access Controls, Audits)
4. Pseudonymization and Anonymization
5. Legal and Regulatory Compliance
6. Ethical Considerations
7. Technology Solutions (Differential Privacy, Homomorphic Encryption)
8. User Empowerment
9. Global Standards Adherence
10. Training and Awareness
11. Incident Response and Monitoring

How to setup tor relay/network?

Setting up a Tor relay involves a few steps to contribute to the Tor network. Keep in
mind that running a relay requires a stable internet connection, sufficient bandwidth,
and adherence to legal and ethical considerations. Here's a general guide:
1. Understand the Types of Relays:
• Entry Relay: The first node that Tor clients connect to.
• Middle Relay: Routes traffic through multiple relays without knowing the source
or destination.
• Exit Relay: The final node that connects to the destination server.
2. Check Legal and Ethical Considerations:
• Ensure running a Tor relay is legal in your jurisdiction.
• Understand the responsibility of being an exit relay, as it involves potentially
relaying traffic for others.
3. Install Tor Software:
• Install the Tor software on your server. The instructions may vary depending on
your operating system (Linux is commonly used).
• On Linux, you can typically install Tor using your package manager (e.g., apt-get
for Debian/Ubuntu).
4. Configure Tor:
• Edit the Tor configuration file (usually located at /etc/tor/torrc).
• Configure your relay type (entry, middle, or exit) and adjust bandwidth limits if
needed.
5. Port Forwarding:
• If your server is behind a router, you'll need to forward the chosen Tor ports
(default is 9001) to your server.
6. Register Your Relay:
• While not required, you can register your relay on the Tor Project website to get
it listed and monitored.
7. Start Tor:
• After configuration, start the Tor service using the appropriate command (sudo
service tor start on many Linux distributions).
8. Monitor and Maintain:
• Monitor your relay's bandwidth usage and performance.
• Keep the Tor software up to date.
• Be aware of any notifications from the Tor Project about your relay.

End…………

You might also like