THREATS ON CYBER SPACE

A cyber attack is any attempt to gain unauthorized access to a computer system or network, with the intent to steal, alter, disrupt, or destroy data or systems.

Mobile Misuse Issues

Overuse of your cell phone or smartphone can result in a number of different physical problems that may cause permanent damage or be difficult to treat.

Steganography

The practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection.

Cyber Stalking

Technologically-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge or control.

Cyber Terrorism

Disruptive attacks by recognised terrorist organisations against computer systems with the intent of generating alarm, panic, or the physical disruption of the information system.

Cyber Pornography

Cyber Pornography means the publishing, distributing or designing pornography by using cyberspace. The technology has its pros and cons and cyber pornography is the result of the advancement of technology.

Piracy

Piracy is an act of robbery or criminal violence by ship or boat-borne attackers upon another ship or a coastal area, typically with the goal of stealing cargo and other valuable goods.

Social Engineering

All techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons.

Hacking

The act of compromising digital devices and networks through unauthorized access to an account or computer system.

Addiction & Depression

Young’s Internet Addiction Scale, and Depression Anxiety Stress Scales 21 (DASS21) were used in the study. Chi-square test and Fisher’s exact test were used to assess the association between Internet addiction and depression, stress, and anxiety.

Cyber Bullying

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

Cyber Blackmailing

A form of cybercrime where scammers and blackmailers manipulate individuals through emotional tactics to exploit their trust.

Cyber Hygiene

The steps that users of computers and other devices can take to improve their online security and maintain system health.