SlideShare a Scribd company logo
1 of 26
Cybercrime and Security
Team Members
Maliha Rahman (2014-3-50-007)
Noushad Hasan Jabin (2014-3-50-
025)
Sauradip Roy (2014-3-50-008)
Topics will be covered
 Introduction
 History of cybercrime
 Authenticity,Security,Privacy
 Database security
 Social Engineering & protection
 Database security
 Different cyber attacking methods
 Security tips
 What we covered
 References
Introduction
◇Cyber crime is Harmful or unlawful
acts wherein the computer is either a
tool or target or both.
◇Online or Internet-based illegal acts.
History of Cyber Crime
 The first recorded cyber crime took place
in the year 1820.
 The first spam email took place in 1978
when it was sent over the Arpanet.
 The first VIRUS was installed on an
Apple computer in 1982.
Authenticity, Security,
Privacy
Authenticity is assurance that a message, transaction,
or other exchange of information is from the source it
claims to be from. Authenticity involves proof of
identity.
Different Authentications:
1. Digital certificates
2. USB token
3. Password based Authentication
4. Biometric authentications (Fingerprints, Retina
Scans)
Security
Security simply refers to the term
Cyber security.
Cybersecurity is the technologies &
processes which protects networks,
computers, programs and data
from attack, damage or
unauthorized access.
Place your screenshot here
Privacy
◇Privacy is your right to control
what happens with personal
information about you.
◇Using Internet may affects
someones personal data &
Identity.
Social Engineering
◇Social engineering is the art of manipulating
people so they give up confidential information
such as password and the control over their
computers.
◇Protections:
●First & foremost is user consciousness
●Avoid installing third party softwares
●System firewall is turned on
●2 step authentication for log into account
●Code generator
●Trusted Contacts
Database
Security
DATABASE SECURITY
FEATURES
■Digital Certificate is a unique identifier given to an entity
to provide authentication of a computer, document, or
webpage.
■Encryptions alter the data so unauthorized users cannot
view data information.
■Firewalls protect a network from unauthorized access
from the internet.
■Proxy Servers shield the requests between the client
computers inside a private network and the internet.
■Security Socket Layer connects and transmits encrypted
data.
■S-HTTP (secure hypertext transport protocol) transmits
web pages securely.
RESPONSIBLITIES OF THE
DATABASE ADMINISTRATOR
◇Always keep in mind that whenever a system has
internet and network connections attached to a DBMS,
security breaches may occur.
◇Perform routine backup recovery procedures incase
of electrical outage and intruder attacks that can
damage the DBMS.
Built in Database Protection
◇They create built in solutions such
as:
■Password Controls
■Data access based on roles and profiles
■IP restrictions for off site access
■Auditing capabilities of who has run what reports
■Security logging
Different Cyber Attacking
Methods
Cyber attacks
◇Trojan horse attack
◇Backdoors
◇Keyloggers
◇DDoS Attack
◇Man in the Middle attack
Trojan Horse Attack
Trojan Horse
arrives via email
or software like
free games.
Trojan Horse is
activated when
the software or
attachment is
executed.
Trojan Horse releases
virus, monitors
computer activity,
installs backdoor, or
transmits information
to hacker.
BackDoors
◇A backdoor is a technique in
which a system security
mechanism is bypassed
undetectably to access a computer
or its data.
◇The backdoor access method is
sometimes written by the
programmer who develops a
program.
KeyLoggers
◇A keylogger is a type
of software(Spyware)
that records every
keystrokes in a log file
by encrypting this and
sends it to the hackers
email.
DDoS(Distributed denial of
service)
◇A
distributed (DDoS) attack o
ccurs when a group of
attacker use multiple
systems to flood the
bandwidth or resources of a
targeted system, usually one
or more web servers.
Man in the middle attack
◇In this attack a
Hacker inserts
himself as a middle
man between the
two parties or
mostly between the
network router an
its connected
devices to catch
their packets and
credentials.
Safety Tips:
◇Use antivirus software
◇Insert firewalls , pop up blocker
◇Uninstall unnecessary software
◇Maintain backup
 Check security settings
 Use secure connection
 Open attachments carefully
 Use strong passwords ,
don’t give personal
information unless required
References
◇https://www.scribd.com/doc/71120466/The-First-
Recorded-Cyber-Crime-Took-Place-in-the-Year-1820
Thanks!
Any questions?
SlidesCarnival icons are editable shapes.
This means that you can:
● Resize them without losing quality.
● Change fill color and opacity.
● Change line color, width and style.
Isn’t that nice? :)
Examples:
Now you can use any emoji as an icon!
And of course it resizes without losing quality and you can change the
color.
How? Follow Google instructions
https://twitter.com/googledocs/status/730087240156643328
✋👆👉👍👤👦👧👨👩👪💃🏃💑❤😂
😉😋😒😭👶😸🐟🍒🍔💣📌📖🔨🎃🎈
🎨🏈🏰🌏🔌🔑 and many more...
😉

More Related Content

What's hot (20)

Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cybercrime and Security

Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITYKak Yong
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OSC.U
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingMuhammad FAHAD
 

Similar to Cybercrime and Security (20)

Computer security and
Computer security andComputer security and
Computer security and
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
cyber security
cyber security cyber security
cyber security
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Data security
Data securityData security
Data security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
OSCh19
OSCh19OSCh19
OSCh19
 
OS_Ch19
OS_Ch19OS_Ch19
OS_Ch19
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
cyber security
cyber security cyber security
cyber security
 
Network security
Network security Network security
Network security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Cybercrime and Security

  • 2. Team Members Maliha Rahman (2014-3-50-007) Noushad Hasan Jabin (2014-3-50- 025) Sauradip Roy (2014-3-50-008)
  • 3. Topics will be covered  Introduction  History of cybercrime  Authenticity,Security,Privacy  Database security  Social Engineering & protection  Database security  Different cyber attacking methods  Security tips  What we covered  References
  • 4. Introduction ◇Cyber crime is Harmful or unlawful acts wherein the computer is either a tool or target or both. ◇Online or Internet-based illegal acts.
  • 5. History of Cyber Crime  The first recorded cyber crime took place in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first VIRUS was installed on an Apple computer in 1982.
  • 6. Authenticity, Security, Privacy Authenticity is assurance that a message, transaction, or other exchange of information is from the source it claims to be from. Authenticity involves proof of identity. Different Authentications: 1. Digital certificates 2. USB token 3. Password based Authentication 4. Biometric authentications (Fingerprints, Retina Scans)
  • 7. Security Security simply refers to the term Cyber security. Cybersecurity is the technologies & processes which protects networks, computers, programs and data from attack, damage or unauthorized access.
  • 8. Place your screenshot here Privacy ◇Privacy is your right to control what happens with personal information about you. ◇Using Internet may affects someones personal data & Identity.
  • 9. Social Engineering ◇Social engineering is the art of manipulating people so they give up confidential information such as password and the control over their computers. ◇Protections: ●First & foremost is user consciousness ●Avoid installing third party softwares ●System firewall is turned on ●2 step authentication for log into account ●Code generator ●Trusted Contacts
  • 11. DATABASE SECURITY FEATURES ■Digital Certificate is a unique identifier given to an entity to provide authentication of a computer, document, or webpage. ■Encryptions alter the data so unauthorized users cannot view data information. ■Firewalls protect a network from unauthorized access from the internet. ■Proxy Servers shield the requests between the client computers inside a private network and the internet. ■Security Socket Layer connects and transmits encrypted data. ■S-HTTP (secure hypertext transport protocol) transmits web pages securely.
  • 12. RESPONSIBLITIES OF THE DATABASE ADMINISTRATOR ◇Always keep in mind that whenever a system has internet and network connections attached to a DBMS, security breaches may occur. ◇Perform routine backup recovery procedures incase of electrical outage and intruder attacks that can damage the DBMS.
  • 13. Built in Database Protection ◇They create built in solutions such as: ■Password Controls ■Data access based on roles and profiles ■IP restrictions for off site access ■Auditing capabilities of who has run what reports ■Security logging
  • 15. Cyber attacks ◇Trojan horse attack ◇Backdoors ◇Keyloggers ◇DDoS Attack ◇Man in the Middle attack
  • 16. Trojan Horse Attack Trojan Horse arrives via email or software like free games. Trojan Horse is activated when the software or attachment is executed. Trojan Horse releases virus, monitors computer activity, installs backdoor, or transmits information to hacker.
  • 17. BackDoors ◇A backdoor is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data. ◇The backdoor access method is sometimes written by the programmer who develops a program.
  • 18.
  • 19. KeyLoggers ◇A keylogger is a type of software(Spyware) that records every keystrokes in a log file by encrypting this and sends it to the hackers email.
  • 20. DDoS(Distributed denial of service) ◇A distributed (DDoS) attack o ccurs when a group of attacker use multiple systems to flood the bandwidth or resources of a targeted system, usually one or more web servers.
  • 21. Man in the middle attack ◇In this attack a Hacker inserts himself as a middle man between the two parties or mostly between the network router an its connected devices to catch their packets and credentials.
  • 22. Safety Tips: ◇Use antivirus software ◇Insert firewalls , pop up blocker ◇Uninstall unnecessary software ◇Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords , don’t give personal information unless required
  • 25. SlidesCarnival icons are editable shapes. This means that you can: ● Resize them without losing quality. ● Change fill color and opacity. ● Change line color, width and style. Isn’t that nice? :) Examples:
  • 26. Now you can use any emoji as an icon! And of course it resizes without losing quality and you can change the color. How? Follow Google instructions https://twitter.com/googledocs/status/730087240156643328 ✋👆👉👍👤👦👧👨👩👪💃🏃💑❤😂 😉😋😒😭👶😸🐟🍒🍔💣📌📖🔨🎃🎈 🎨🏈🏰🌏🔌🔑 and many more... 😉