SlideShare a Scribd company logo
SPAM AND HACKING
By :- Niyati and Saloni
NAME :- NIYATI & SALONI
CLASS :- 10 GLACIER
ROLL NO :- 21 AND 26
SUBJECT :- COMPUTER
TOPIC :- SPAM AND HACKING
• SPAM IS ANY KIND OF UNWANTED, UNSOLICITED DIGITAL
COMMUNICATION THAT GETS SENT OUT IN BULK. OFTEN SPAM IS
SENT VIA EMAIL, BUT IT CAN ALSO BE DISTRIBUTED VIA TEXT
MESSAGES, PHONE CALLS, OR SOCIAL MEDIA.
• MOST COMPUTER USERS RECEIVE THEIR SHARE OF
UNSOLICITED EMAILS OFFERING EVERYTHING FROM
ACCESS TO AFRICAN BANK ACCOUNTS OF DEPOSED
OFFICIALS TO THE LATEST INSIDER INFORMATION
ABOUT SOMETHING OF GREAT INTEREST TO THE
READER. THE SPAM EMAILS OFTEN INCLUDE LINKS TO
WEBSITES (OFTEN MALICIOUS WEBSITES) OR ATTACHED
FILES TO DOWNLOAD. THEY GENERALLY CLAIM TO
IMPROVE A READER'S FINANCIAL OR PROFESSIONAL
LIFE, BUT THE ATTACHMENT OR LINK EXPOSES THE
COMPUTER TO MALWARE.
• MANY OF THESE EMAILS ARE PHISHING EMAILS
DESIGNED TO "HOOK" INNOCENT PEOPLE USING SOME
TYPE OF INCENTIVE AS BAIT. SPEAR PHISHING
INVOLVES ATTACKS ON INDIVIDUALS USING REAL
PERSONAL DETAILS. CYBERCRIMINALS BAIT THESE
EMAIL HOOKS WITH DETAILS THAT ARE OF KNOWN
INTEREST TO THE TARGET.
.
• TAKE ADVANTAGE OF THE JUNK E-MAIL FILTER IN MICROSOFT OFFICE OUTLOOK
,
• BLOCK PICTURES IN HTML MESSAGES THAT SPAMMERS USE AS WEB BEACONS.
• TURN OFF READ AND DELIVERY RECEIPTS AND AUTOMATIC PROCESSING OF MEETING
REQUESTS .
• LIMIT THE PLACES WHERE YOU POST YOUR E-MAIL ADDRESS.
• REVIEW THE PRIVACY POLICIES OF WEB SITES.
HACKING IS THE ACT OF IDENTIFYING AND
THEN EXPLOITING WEAKNESSES IN A
COMPUTER SYSTEM OR NETWORK, USUALLY
TO GAIN UNAUTHORIZED ACCESS TO
PERSONAL OR ORGANIZATIONAL DATA.
HACKING IS NOT ALWAYS A MALICIOUS
ACTIVITY, BUT THE TERM HAS MOSTLY
NEGATIVE CONNOTATIONS DUE TO ITS
ASSOCIATION WITH CYBERCRIME.
Hacki
ng
SOME WAYS TO CONTROL INTERNET
HACKING
• PROTECT YOUR COMPUTER AGAINST UNAUTHORIZED
CODE OR SOFTWARE THAT MAY THREATEN YOUR
OPERATING SYSTEM. VIRUSES MAY HAVE EASY-TO-SPOT
EFFECTS – FOR EXAMPLE, THEY MIGHT SLOW YOUR
COMPUTER OR DELETE KEY FILES .
• YOU CAN PROTECT YOUR COMPUTERS BY USING
FIREWALLS AND ANTIVIRUS SOFTWARE AND BY
FOLLOWING BEST PRACTICES FOR COMPUTER USE .
• YOU CAN PROTECT YOUR MOBILES BY TURNING OFF
BLUETOOTH WHEN ITS NOT IN USE. THE WI-FI NETWORKS
YOU CONNECT TO AND USING SECURITY APPLICATIONS
TO IMPROVE MONITORING AND PROTECTION.
POINTS THAT HELP TO PREVENT HACKING
• USE A FIREWALL .
• INSTALL ANTIVIRUS SOFTWARE
• INSTALL AN ANTI SPYWARE PACKAGE
• USE COMPLEX PASSWORDS
• KEEP YOUR APPS AND BROWSER UP TO DATE
• IGNORE SPAM
• BACKUP YOUR COMPUTERS
• SECURE YOUR NETWORK
CONCLUSION
SO, BY THIS WE WOULD LIKE TO
CONCLUDE OUR POWERPOINT
PRESENTATION LIKE THIS WE HOPE
YOU ALL THIS POWERPOINT
PRESENTATION AND GAINED SOME
KNOWLEDGE ABOUT THIS CRITICAL
TOPIC THAT IS “INTERNET HACKING
AND SPAM”
TO:- REMI MAM
THANK YOU

More Related Content

Similar to Saloni & Niyati comp project.pptx

Cyber crime
Cyber crimeCyber crime
Cyber crime
Niraj Solanke
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
NilKhunt
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Ayush Chopra
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
Simon Salter
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
Gary Wagnon
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
internet security
internet securityinternet security
internet security
Cheryl Tanicala-Roldan
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
sakshiyad2611
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
Siphamandla Benedict
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra81
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
JuliusECatipon
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
JuliusECatipon
 

Similar to Saloni & Niyati comp project.pptx (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
CyberSecurityPPT_V3_1CyberSecurityPPT_V3_1
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
internet security
internet securityinternet security
internet security
 
Social engineering
Social engineering Social engineering
Social engineering
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
 

Recently uploaded

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 

Recently uploaded (19)

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 

Saloni & Niyati comp project.pptx

  • 1. SPAM AND HACKING By :- Niyati and Saloni
  • 2. NAME :- NIYATI & SALONI CLASS :- 10 GLACIER ROLL NO :- 21 AND 26 SUBJECT :- COMPUTER TOPIC :- SPAM AND HACKING
  • 3. • SPAM IS ANY KIND OF UNWANTED, UNSOLICITED DIGITAL COMMUNICATION THAT GETS SENT OUT IN BULK. OFTEN SPAM IS SENT VIA EMAIL, BUT IT CAN ALSO BE DISTRIBUTED VIA TEXT MESSAGES, PHONE CALLS, OR SOCIAL MEDIA.
  • 4. • MOST COMPUTER USERS RECEIVE THEIR SHARE OF UNSOLICITED EMAILS OFFERING EVERYTHING FROM ACCESS TO AFRICAN BANK ACCOUNTS OF DEPOSED OFFICIALS TO THE LATEST INSIDER INFORMATION ABOUT SOMETHING OF GREAT INTEREST TO THE READER. THE SPAM EMAILS OFTEN INCLUDE LINKS TO WEBSITES (OFTEN MALICIOUS WEBSITES) OR ATTACHED FILES TO DOWNLOAD. THEY GENERALLY CLAIM TO IMPROVE A READER'S FINANCIAL OR PROFESSIONAL LIFE, BUT THE ATTACHMENT OR LINK EXPOSES THE COMPUTER TO MALWARE. • MANY OF THESE EMAILS ARE PHISHING EMAILS DESIGNED TO "HOOK" INNOCENT PEOPLE USING SOME TYPE OF INCENTIVE AS BAIT. SPEAR PHISHING INVOLVES ATTACKS ON INDIVIDUALS USING REAL PERSONAL DETAILS. CYBERCRIMINALS BAIT THESE EMAIL HOOKS WITH DETAILS THAT ARE OF KNOWN INTEREST TO THE TARGET. .
  • 5. • TAKE ADVANTAGE OF THE JUNK E-MAIL FILTER IN MICROSOFT OFFICE OUTLOOK , • BLOCK PICTURES IN HTML MESSAGES THAT SPAMMERS USE AS WEB BEACONS. • TURN OFF READ AND DELIVERY RECEIPTS AND AUTOMATIC PROCESSING OF MEETING REQUESTS . • LIMIT THE PLACES WHERE YOU POST YOUR E-MAIL ADDRESS. • REVIEW THE PRIVACY POLICIES OF WEB SITES.
  • 6. HACKING IS THE ACT OF IDENTIFYING AND THEN EXPLOITING WEAKNESSES IN A COMPUTER SYSTEM OR NETWORK, USUALLY TO GAIN UNAUTHORIZED ACCESS TO PERSONAL OR ORGANIZATIONAL DATA. HACKING IS NOT ALWAYS A MALICIOUS ACTIVITY, BUT THE TERM HAS MOSTLY NEGATIVE CONNOTATIONS DUE TO ITS ASSOCIATION WITH CYBERCRIME. Hacki ng
  • 7. SOME WAYS TO CONTROL INTERNET HACKING • PROTECT YOUR COMPUTER AGAINST UNAUTHORIZED CODE OR SOFTWARE THAT MAY THREATEN YOUR OPERATING SYSTEM. VIRUSES MAY HAVE EASY-TO-SPOT EFFECTS – FOR EXAMPLE, THEY MIGHT SLOW YOUR COMPUTER OR DELETE KEY FILES . • YOU CAN PROTECT YOUR COMPUTERS BY USING FIREWALLS AND ANTIVIRUS SOFTWARE AND BY FOLLOWING BEST PRACTICES FOR COMPUTER USE . • YOU CAN PROTECT YOUR MOBILES BY TURNING OFF BLUETOOTH WHEN ITS NOT IN USE. THE WI-FI NETWORKS YOU CONNECT TO AND USING SECURITY APPLICATIONS TO IMPROVE MONITORING AND PROTECTION.
  • 8. POINTS THAT HELP TO PREVENT HACKING • USE A FIREWALL . • INSTALL ANTIVIRUS SOFTWARE • INSTALL AN ANTI SPYWARE PACKAGE • USE COMPLEX PASSWORDS • KEEP YOUR APPS AND BROWSER UP TO DATE • IGNORE SPAM • BACKUP YOUR COMPUTERS • SECURE YOUR NETWORK
  • 9. CONCLUSION SO, BY THIS WE WOULD LIKE TO CONCLUDE OUR POWERPOINT PRESENTATION LIKE THIS WE HOPE YOU ALL THIS POWERPOINT PRESENTATION AND GAINED SOME KNOWLEDGE ABOUT THIS CRITICAL TOPIC THAT IS “INTERNET HACKING AND SPAM”