The document provides an overview of a group presentation on cyber crime and security. It includes:
1. The names and topics of each group member: Shams will discuss the impact of technology and introduction; Ehtasham will cover viruses; Rehman will cover malware and trojan horses; Naeem will discuss hacking and password cracking.
2. Introductions and outlines for the topics of viruses, malware, trojan horses, hacking, and password cracking.
3. Suggested solutions and ways to prevent cyber threats such as using antivirus software, firewalls, strong passwords, and education.
1. Welcome To Our Group Presentation
Topic : Cyber Crime And Security
2. Our Group Member List
• S M Shams Qamar • AF22LNB0167
• Muhammad Ehtasham • AF22LNB0169
• Abdul Rehman • AF22LNB0483
• Muhammad Naeem • AF22LNB0179
• Faraz Hassan • AF22LNB0194
3. S M Shams Qamar
I’m Shams &
My topics is
that’s
1
• Impact of Technology
2
• Introduction Of Topic
3
• Major Topics
transport efficiency and safety to access to food and healthcare, socialization and productivity.
Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks.
Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device.
A virus is a type of malware that infects a host computer by inserting its code into other programs or files on the system
A worm, on the other hand, is a standalone program that replicates itself and spreads across networks and systems without the need for a host program.
Install and update anti-virus and anti-malware software
Keep software and operating systems up-to-date
Use a firewall
Be cautious with emails and attachments
Use strong passwords Use virtual private networks (VPNs)
Back up important data:
Malware is a type of software designed to cause harm, damage, or disruption to computer systems or networks.
Malware is a type of software designed to cause harm, damage, or disruption to computer systems or networks.
A Trojan horse is a type of malware that disguises itself as legitimate software or files, it can give remote attackers unauthorized access to a computer system or steal sensitive information
Keyloggers
McAfee, Norton, Trend Micro
Hacking refers to the act of using technical expertise and knowledge of computer systems and networks to gain unauthorized access to computer systems, networks, or data. Hacking can involve a variety of techniques, such as exploiting software vulnerabilities, social engineering, or phishing attacks.
Use strong passwords
Use two-factor authentication
Use secure connections
Keep software up-to-date
Use anti-virus software
Be cautious with emails and attachments
Use a firewall
Limit access
Educate yourself
Password cracking is the process of recovering or guessing passwords from data that has been stored or transmitted in an encrypted form.