“

THE REAL OPPORTUNITY FOR
SUCCESS LIES W
ITHIN THE
PERSON AND NOT IN HIS
PERSONALITY.
~ Akshay Jain

”
CYBER SECURITY
What is Ethical Hacking and How can we save ourselves
knowing about Cyber Security?

Akshay Jain
BCA Semest...
TABLE OF CONTENTS
• What is Ethical Hacking?
• Ways of Invasion in your Personal Space?
• What is Cyber Security?
• How to...
WHO AM I REALLY?
I am Akshay Jain currently pursuing B.C.A. from JIMS, Rohini Sector 5,
Delhi. Apart from this I am a Inte...
WHAT IS ETHICAL HACKING?
Not Hacking Facebook Accounts, Then What?
Hacking is an unauthorized access to the Digital Proper...
SOME MYTHS TO BE FIXED
Most Unsecured Personalities on the Internet
•Government & Military Officials.
•Industrialist or Be...
WAYS OF INVASION
• You: You are the one who invites them.
• Viruses: Turn your System more vulnerable to Trojans.
• Backdo...
WHAT IS CYBER SECURITY?
• Not a Rocket Science.
• Very Easy to Perform.
• Your Security lies in your Hands.
SAVE YOURSELF FROM INVASION
• Use HTTPS
• Check URL
• Use Incognito Browsers
• Avoid Public Wi-Fi
• Use Anti-Viruses with ...
ARE YOU VICTIMIZED? DON’T WORRY
• Download Free Anti-Virus or Purchase Premium AV Packages.
• Delete un-necessary files.
•...
DID YOU KNOW?
1. Microsoft makes the most vulnerable Software. (Internet Explorer and Windows
XP)
2. Android Phones, iPhon...
WON’T TAKE YOUR MORE TIME
• Ethical Hacking: Unauthorized access to your Digital Property.
• Govt., Mil., & Celebs are uns...
Q & A SESSION
Ask Questions related to this presentations and I will clear your doubts in no-time.
THANK YOU
• I thank you all for sparing your time in listening to my esteemed presentation. I
personally thanks the lectur...
Upcoming SlideShare
Loading in...5
×

Cyber Security Presentation - PDS Fourth Semester

209

Published on

What is Ethical Hacking and How can we save ourselves knowing about Cyber Security?

This presentation is prepared by Akshay Jain.

For more information: http://www.AkshayJain.me

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
209
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cyber Security Presentation - PDS Fourth Semester

  1. 1. “ THE REAL OPPORTUNITY FOR SUCCESS LIES W ITHIN THE PERSON AND NOT IN HIS PERSONALITY. ~ Akshay Jain ”
  2. 2. CYBER SECURITY What is Ethical Hacking and How can we save ourselves knowing about Cyber Security? Akshay Jain BCA Semester 4th Second Shift 36
  3. 3. TABLE OF CONTENTS • What is Ethical Hacking? • Ways of Invasion in your Personal Space? • What is Cyber Security? • How to be safe from hacking? • How to deal if you are victimized? • Q&A Session
  4. 4. WHO AM I REALLY? I am Akshay Jain currently pursuing B.C.A. from JIMS, Rohini Sector 5, Delhi. Apart from this I am a Internet Marketer. I speak in many Web Seminars and Bloggers Meet also. In history, I was experienced White Hat Hacker (Level 1) and Professional Blogger too. I still run a Blogging Network of more than 5 Blogs privately and Yeah, It’s really doing well. I wish May God Bless You and Me for Future Ventures. @MrFriendism AkshayJain.me
  5. 5. WHAT IS ETHICAL HACKING? Not Hacking Facebook Accounts, Then What? Hacking is an unauthorized access to the Digital Property listed as follows •Statistical Reports •Your Work Plan •Documentations •Your Money •Your Loving Computer, Laptops and Smartphones
  6. 6. SOME MYTHS TO BE FIXED Most Unsecured Personalities on the Internet •Government & Military Officials. •Industrialist or Belongs to Corporate Sector. •Celebrities and Religion Speakers. •Common User (You, Me and All of us) Most Secured Personalities on the Internet •Hackers •No One •YOU. If you follow this presentation.
  7. 7. WAYS OF INVASION • You: You are the one who invites them. • Viruses: Turn your System more vulnerable to Trojans. • Backdoor Trojans & Malwares: Destroys your control over the System. • Key loggers and Spywares: Starts Sending information to the Attacker. • Phishing: Just another way of hacking. • Re-Victomization: Way of Victimizing a Victim Again. (Targeting Kids, Women, Oldies and Non-Techy People)
  8. 8. WHAT IS CYBER SECURITY? • Not a Rocket Science. • Very Easy to Perform. • Your Security lies in your Hands.
  9. 9. SAVE YOURSELF FROM INVASION • Use HTTPS • Check URL • Use Incognito Browsers • Avoid Public Wi-Fi • Use Anti-Viruses with Internet Security • Keep System Updated (Update Anti-Virus, OS, Drivers & Software Regularly) • Don’t Just Download Everything for no Reason.
  10. 10. ARE YOU VICTIMIZED? DON’T WORRY • Download Free Anti-Virus or Purchase Premium AV Packages. • Delete un-necessary files. • Remove External Devices (HDD, Webcams, Printers and Smartphones) . • If Possible: Reformat your system completely.
  11. 11. DID YOU KNOW? 1. Microsoft makes the most vulnerable Software. (Internet Explorer and Windows XP) 2. Android Phones, iPhones and MacBook are the most Secured Devices. 3. Kim Dotcom is the Richest Hacker & Going to Compete Elections in New Zealand. 4. Most of the Anti-Virus Companies makes their own Viruses. 5. Best AV Software: Kaspersky or ESET NOD 32 .
  12. 12. WON’T TAKE YOUR MORE TIME • Ethical Hacking: Unauthorized access to your Digital Property. • Govt., Mil., & Celebs are unsecured including us. Hackers are most secured. • Virus, Trojans, Phishing or Re-Victimization can harm you. • Cyber Security is Easy and lies in your hands. • Use Anti-Virus, HTTPs and Try to be familiar with Incognito. • Install Anti-Virus, Delete Files, Re-formant System.
  13. 13. Q & A SESSION Ask Questions related to this presentations and I will clear your doubts in no-time.
  14. 14. THANK YOU • I thank you all for sparing your time in listening to my esteemed presentation. I personally thanks the lecturer for giving me this opportunity. • I hope you liked my presentation. • Don’t Forget to leave feedbacks. @MrFriendism AkshayJain.me
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×