SlideShare a Scribd company logo
1 of 48
Download to read offline
CYBER
ATTACKS
BY
AVINASH FULBARIA
INTRODUCTION
 Cyber crime is an activity done using computers
and internet. We can say that it is an unlawful
acts wherein the computer either a tool or
target or both.
TYPES OF CYBER CRIMES
 Hacking
 Child Pornography
 Virus Dissminition
 Denial Of Service Attack
 Computer Vandalism
 Software Piracy
 Cyber Terrorism
 Salami Attacks
SAFETY TIPS
 Use antivirus Software
 Insert Firewalls
 Uninstall unnecessary software
 Maintain backup
 Check security settings
CYBER TERRORISM
 It uses computer as weapon for
 Credit card fraud
 Email Fraud
 Fake Websites Pages
 Fake IDs on Social Networking Sites
 Spying
EMAIL
FRAUD
EMAIL FRAUD
 E-Mail known as Electronic Mail.
 Websites For Email are
 Yahoo
 Gmail
 Rediff
 Hotmail
EMAIL FRAUD
 With the help of
fake email generator
Websites
HOW TO CHECK
WHETHER THE
MAIL IS REAL
OR FAKE..
STEP 1 :-
On the right side of
the email there is a
arrow pointing
down next to reply
STEP 2
Click on it….
STEP 3
After clicking on it a tray
with different options is
appeared and we need
to select option
“SHOW ORIGINAL”..
STEP 4
After clicking on it a
new window with lots
of coding will be
opened..
STEP 5
On this tab of
coding search
“RECEIVED
FROM”….
FAKE MAIL
ORIGINAL MAIL
STEP 6
In Received from it is
written “EMKEI.CZ” so
copy this link and paste it
in Google to confirm
whether this mail is fake
or real…
FAKE
WEBPAGE
FAKE WEBPAGE
Fake Webpage also
known as duplicate
webpage.
In which duplicates of
WebPages are made for
cyber crime……
HOW TO
IDENTIFY THE
WEBPAGE
WHETHER IT IS
FAKE OR REAL…
STEPS
Before using any banking sites confirm
whether the site we are accessing is real or
not and for that we need to take few steps :
1. On the address bar of the explorer on the
left side address bar a “CLOSED LOCK”
with green color is observed….that means
we are accessing a real site.
STEP 2
This security is only
given to a single name
bank sites or any other
authorized sites.
STEP 3
The sites can be created
once with one name and
after making a fake webpage
of it there will be a
misspelling in the fake
WebPages.
SPYING
SPYING
It is the activity of recording
peoples Credit card number,
ATM pins, Email IDs and
Passwords or any
Confidential data's by means
of Spying Software's.
SPYING SOFTWARE'S FOR MOBILES
1. Mspy
2. Flexispy
3. TeenSafe
4. Mobile Spy
5. Mobi Stealth
6. Spyera
7. iSpyoo
8. TheOneSpy
9. TheTruthSPY
10. SpyBubble
SPYING SOFTWARE'S FOR PC
1.Spy Agent
2. Web Watcher
3.Pc Pandora 7
4.Specter Pro 7
5.Elite Keylogger
6.Refog Personal Monitor 7
7.eBlaster7
8.Sniperspy7
9.Iam big brother
10.XPCspy
ACTUAL SPY
SOFTWARE
ACTUAL SPY
 This Software is used for spying this software
can record :
1. Keyboard strokes
2. Screenshots
3. Application
4. Visited Websites Etc.
 It create a log file of the activities recorded
and send it to the third party.
SAFETY
SPYING PROTECTION SOFTWARE'S
1.Windows Defender
2.Spybot Search and Destroy
3.Ad-aware
4.Malwarbytes Anti malware
5.Spyware Blaster
6.Antimalware suites
SAFETY
 Do not share any of your personal details
with anyone.
 Do not keep the name or your birthday or
your mobile number as your password.
 Before visiting the sites do confirm.
SAFETY IS IN YOUR
HAND HOW TO GET IT
DEPENDS ON
YOU…….IT BELONGS TO
YOU AND YOUR FAMILY
SO DO NOT TAKE IT
THE END
THANK U

More Related Content

What's hot (20)

internet security
internet securityinternet security
internet security
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Web security
Web securityWeb security
Web security
 
Hacking
Hacking Hacking
Hacking
 
Analysis the causes and effects of cyber crime
Analysis the causes and effects of cyber crimeAnalysis the causes and effects of cyber crime
Analysis the causes and effects of cyber crime
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 

Viewers also liked

Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...wajug
 
Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Malachi Jones
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attackisc2-hellenic
 
Corporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligenceCorporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligenceMartin Brunet
 
Human as a virus
Human as a  virusHuman as a  virus
Human as a virusYaniv sela
 
Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio kennywhite
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaKarin Wahl-Jorgensen
 
FLAME Conference Program
FLAME Conference ProgramFLAME Conference Program
FLAME Conference ProgramLee Mordechai
 
10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More Profit10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More ProfitWhatRunsWhere
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Badgujar
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 

Viewers also liked (20)

Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Corporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligenceCorporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligence
 
Human as a virus
Human as a  virusHuman as a  virus
Human as a virus
 
Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: Media
 
FLAME Conference Program
FLAME Conference ProgramFLAME Conference Program
FLAME Conference Program
 
10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More Profit10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More Profit
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Cyber Defense in 2016
Cyber Defense in 2016Cyber Defense in 2016
Cyber Defense in 2016
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 

Similar to Cyber attack

ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroJared Broker
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptxChloeLucas4
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Jay Visavadiya
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 

Similar to Cyber attack (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Web Security
Web SecurityWeb Security
Web Security
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Phishing
PhishingPhishing
Phishing
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Information security
Information securityInformation security
Information security
 

More from Avinash Navin

CFL (Compact Fluorescent Lamp) Report
CFL (Compact Fluorescent Lamp) ReportCFL (Compact Fluorescent Lamp) Report
CFL (Compact Fluorescent Lamp) ReportAvinash Navin
 
Shaper, Planer and Slotter
Shaper, Planer and SlotterShaper, Planer and Slotter
Shaper, Planer and SlotterAvinash Navin
 
Mechanical properties of Material
Mechanical properties of MaterialMechanical properties of Material
Mechanical properties of MaterialAvinash Navin
 
Compound Gear train
 Compound Gear train Compound Gear train
Compound Gear trainAvinash Navin
 
CCt Curve (continuos cooling transformation)
CCt Curve (continuos cooling transformation)CCt Curve (continuos cooling transformation)
CCt Curve (continuos cooling transformation)Avinash Navin
 
Measurement and Metrology
Measurement and MetrologyMeasurement and Metrology
Measurement and MetrologyAvinash Navin
 

More from Avinash Navin (11)

CFL (Compact Fluorescent Lamp) Report
CFL (Compact Fluorescent Lamp) ReportCFL (Compact Fluorescent Lamp) Report
CFL (Compact Fluorescent Lamp) Report
 
Error and its types
Error and its typesError and its types
Error and its types
 
Shaper, Planer and Slotter
Shaper, Planer and SlotterShaper, Planer and Slotter
Shaper, Planer and Slotter
 
Nozzle and diffuser
Nozzle and diffuserNozzle and diffuser
Nozzle and diffuser
 
Milling machines
Milling machinesMilling machines
Milling machines
 
Mechanical properties of Material
Mechanical properties of MaterialMechanical properties of Material
Mechanical properties of Material
 
Manometer
ManometerManometer
Manometer
 
Compound Gear train
 Compound Gear train Compound Gear train
Compound Gear train
 
Coining process
Coining processCoining process
Coining process
 
CCt Curve (continuos cooling transformation)
CCt Curve (continuos cooling transformation)CCt Curve (continuos cooling transformation)
CCt Curve (continuos cooling transformation)
 
Measurement and Metrology
Measurement and MetrologyMeasurement and Metrology
Measurement and Metrology
 

Recently uploaded

The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunicationnovrain7111
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...arifengg7
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...KrishnaveniKrishnara1
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...gerogepatton
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...IJAEMSJORNAL
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHbirinder2
 

Recently uploaded (20)

The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunication
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRH
 

Cyber attack

  • 2. INTRODUCTION  Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 3. TYPES OF CYBER CRIMES  Hacking  Child Pornography  Virus Dissminition  Denial Of Service Attack  Computer Vandalism  Software Piracy  Cyber Terrorism  Salami Attacks
  • 4. SAFETY TIPS  Use antivirus Software  Insert Firewalls  Uninstall unnecessary software  Maintain backup  Check security settings
  • 5. CYBER TERRORISM  It uses computer as weapon for  Credit card fraud  Email Fraud  Fake Websites Pages  Fake IDs on Social Networking Sites  Spying
  • 7. EMAIL FRAUD  E-Mail known as Electronic Mail.  Websites For Email are  Yahoo  Gmail  Rediff  Hotmail
  • 8. EMAIL FRAUD  With the help of fake email generator Websites
  • 9.
  • 10.
  • 11.
  • 12. HOW TO CHECK WHETHER THE MAIL IS REAL OR FAKE..
  • 13. STEP 1 :- On the right side of the email there is a arrow pointing down next to reply
  • 14.
  • 15. STEP 2 Click on it….
  • 16. STEP 3 After clicking on it a tray with different options is appeared and we need to select option “SHOW ORIGINAL”..
  • 17.
  • 18. STEP 4 After clicking on it a new window with lots of coding will be opened..
  • 19.
  • 20. STEP 5 On this tab of coding search “RECEIVED FROM”….
  • 23. STEP 6 In Received from it is written “EMKEI.CZ” so copy this link and paste it in Google to confirm whether this mail is fake or real…
  • 25. FAKE WEBPAGE Fake Webpage also known as duplicate webpage. In which duplicates of WebPages are made for cyber crime……
  • 26. HOW TO IDENTIFY THE WEBPAGE WHETHER IT IS FAKE OR REAL…
  • 27. STEPS Before using any banking sites confirm whether the site we are accessing is real or not and for that we need to take few steps : 1. On the address bar of the explorer on the left side address bar a “CLOSED LOCK” with green color is observed….that means we are accessing a real site.
  • 28.
  • 29. STEP 2 This security is only given to a single name bank sites or any other authorized sites.
  • 30.
  • 31. STEP 3 The sites can be created once with one name and after making a fake webpage of it there will be a misspelling in the fake WebPages.
  • 32.
  • 33.
  • 35. SPYING It is the activity of recording peoples Credit card number, ATM pins, Email IDs and Passwords or any Confidential data's by means of Spying Software's.
  • 36. SPYING SOFTWARE'S FOR MOBILES 1. Mspy 2. Flexispy 3. TeenSafe 4. Mobile Spy 5. Mobi Stealth 6. Spyera 7. iSpyoo 8. TheOneSpy 9. TheTruthSPY 10. SpyBubble
  • 37. SPYING SOFTWARE'S FOR PC 1.Spy Agent 2. Web Watcher 3.Pc Pandora 7 4.Specter Pro 7 5.Elite Keylogger 6.Refog Personal Monitor 7 7.eBlaster7 8.Sniperspy7 9.Iam big brother 10.XPCspy
  • 39. ACTUAL SPY  This Software is used for spying this software can record : 1. Keyboard strokes 2. Screenshots 3. Application 4. Visited Websites Etc.  It create a log file of the activities recorded and send it to the third party.
  • 40.
  • 41.
  • 42.
  • 44. SPYING PROTECTION SOFTWARE'S 1.Windows Defender 2.Spybot Search and Destroy 3.Ad-aware 4.Malwarbytes Anti malware 5.Spyware Blaster 6.Antimalware suites
  • 45. SAFETY  Do not share any of your personal details with anyone.  Do not keep the name or your birthday or your mobile number as your password.  Before visiting the sites do confirm.
  • 46. SAFETY IS IN YOUR HAND HOW TO GET IT DEPENDS ON YOU…….IT BELONGS TO YOU AND YOUR FAMILY SO DO NOT TAKE IT