SlideShare a Scribd company logo
1 of 27
Welcome To Our Group Presentation
Topic : Cyber Crime And Security
Our Group Member List
• S M Shams Qamar • AF22LNB0167
• Muhammad Ehtasham • AF22LNB0169
• Abdul Rehman • AF22LNB0483
• Muhammad Naeem • AF22LNB0179
• Faraz Hassan • AF22LNB0194
S M Shams Qamar
I’m Shams &
My topics is
that’s
1
• Impact of Technology
2
• Introduction Of Topic
3
• Major Topics
Impact of Technology?
Safety Access
Healthcare Socialiazation
Impact
Definition Cyber Security & Cyber Crime?
Major Topics
Topics Malware
Virus
Trojan Horses
Hacking
Password Cracking
Muhammad Ehtasham
I’m Muhammad
Ehtasham
& My Topic is
Virus
Virus
Introduction
Solution
Viruses and Worms
Virus
worms
Solution?
Antivirus software
Protect your network
Operating system up to date
Abdul Rehman
I’m Abdul
Rehman &
My topics Is
That’s
Topics
Malware
Introduction
Solution
Trojan Horses
Introduction
Solution
Malware
Malware
About Solution
About Malware
About
Definition
Way of
Attacks
Effect's
Way of Attacks
Infected Files
Email Attachments
Malicious Websites
Effacts Of Malware
Steal Sensitive Info
Disrupting Normal
Operations
Taking Control
To Stop Malware
Use anti-malware
software
Use a firewall
Educate yourself
Trojan Horses
Trojan Horses
About Solution
About Trojan Horses
About
Definition Effect's
Effact’s
Stealing Passwords
Deleting or Modifying
Files
Installing Additional
SF
Solution?
Use reputable anti-
virus
Use a firewall
Educate yourself
Muhammad Naeem
I’m Muhammad
Naeem & My
topics is that’s
Topics
Hacking
Introduction
Solution
Password
Cracking
Introduction
Method
Securing
Hacking?
Hacking
About Solution
How To prevent hacking?
Use strong passwords
Use two-factor authentication
Use secure connections
Password Cracking
Password Cracking
About Method Securing
Methods for cracking passwords
Brute-force attack
Dictionary attack
Hybrid attack
Securing Password
Store passwords securely
Regularly change passwords
Use strong and unique passwords
Thanks To All

More Related Content

Similar to our ppt.pptx

Similar to our ppt.pptx (20)

SecArmour Security Group
SecArmour Security GroupSecArmour Security Group
SecArmour Security Group
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdf
 
Infosec
InfosecInfosec
Infosec
 
Infosec
InfosecInfosec
Infosec
 
Cyber security
Cyber securityCyber security
Cyber security
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurity
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
A Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdfA Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdf
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Bescherm jezelf tegen ransomware
Bescherm jezelf tegen ransomwareBescherm jezelf tegen ransomware
Bescherm jezelf tegen ransomware
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 

More from AbdulRehman703897 (10)

thightly.pptx
thightly.pptxthightly.pptx
thightly.pptx
 
Being Sensitive to Your Audience’s Needs.pptx
Being Sensitive to Your Audience’s Needs.pptxBeing Sensitive to Your Audience’s Needs.pptx
Being Sensitive to Your Audience’s Needs.pptx
 
Creating Effective Sentences.pptx
Creating Effective Sentences.pptxCreating Effective Sentences.pptx
Creating Effective Sentences.pptx
 
Week 2 Boolean Algebra.pptx
Week 2 Boolean Algebra.pptxWeek 2 Boolean Algebra.pptx
Week 2 Boolean Algebra.pptx
 
Presentation (1).pdf
Presentation (1).pdfPresentation (1).pdf
Presentation (1).pdf
 
cybercrimeandsecurity-181031153257 (1).pdf
cybercrimeandsecurity-181031153257 (1).pdfcybercrimeandsecurity-181031153257 (1).pdf
cybercrimeandsecurity-181031153257 (1).pdf
 
google.pptx
google.pptxgoogle.pptx
google.pptx
 
presentationongoogle.pdf
presentationongoogle.pdfpresentationongoogle.pdf
presentationongoogle.pdf
 
Principle of Computer Operation.ppt
Principle of Computer Operation.pptPrinciple of Computer Operation.ppt
Principle of Computer Operation.ppt
 
Introduction to Html and Css.pdf
Introduction to Html and Css.pdfIntroduction to Html and Css.pdf
Introduction to Html and Css.pdf
 

Recently uploaded

一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
apekaom
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
F
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 

Recently uploaded (20)

一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Local Call Girls in Jharsuguda 9332606886 HOT & SEXY Models beautiful and ch...
Local Call Girls in Jharsuguda  9332606886 HOT & SEXY Models beautiful and ch...Local Call Girls in Jharsuguda  9332606886 HOT & SEXY Models beautiful and ch...
Local Call Girls in Jharsuguda 9332606886 HOT & SEXY Models beautiful and ch...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 

our ppt.pptx

Editor's Notes

  1.  transport efficiency and safety to access to food and healthcare, socialization and productivity.
  2. Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device.
  3. A virus is a type of malware that infects a host computer by inserting its code into other programs or files on the system A worm, on the other hand, is a standalone program that replicates itself and spreads across networks and systems without the need for a host program.
  4. Install and update anti-virus and anti-malware software Keep software and operating systems up-to-date Use a firewall Be cautious with emails and attachments Use strong passwords Use virtual private networks (VPNs) Back up important data:
  5. Malware is a type of software designed to cause harm, damage, or disruption to computer systems or networks.
  6. Malware is a type of software designed to cause harm, damage, or disruption to computer systems or networks.
  7. Emotet 2014, so-called
  8. Next-Generation Antivirus (NGAV) Solution Malwarebytes
  9. A Trojan horse is a type of malware that disguises itself as legitimate software or files, it can give remote attackers unauthorized access to a computer system or steal sensitive information
  10. Keyloggers
  11. McAfee, Norton, Trend Micro
  12. Hacking refers to the act of using technical expertise and knowledge of computer systems and networks to gain unauthorized access to computer systems, networks, or data. Hacking can involve a variety of techniques, such as exploiting software vulnerabilities, social engineering, or phishing attacks.
  13. Use strong passwords Use two-factor authentication Use secure connections Keep software up-to-date Use anti-virus software Be cautious with emails and attachments Use a firewall Limit access Educate yourself
  14. Password cracking is the process of recovering or guessing passwords from data that has been stored or transmitted in an encrypted form.
  15. Brute-force attack Dictionary attack Hybrid attack
  16. Store passwords securely Regularly change passwords Use two-factor authentication Use strong and unique passwords