4. CONTENTS
INTRODUCTION
TYPES OF CYBER CRIME
THE MAIN VILLAIN :-“MALWARE”
TYPES OF MALWARE
SOME RE-KNOWNED VIRUS ATTACKS
SYMPTOMS OF MALWARE INFECTION
PREVENTIONS
CONCLUSION
5. INTRODUCTION
CYBER ATTACK/CRIME:-a cyber
attack is an attack initiated from a computer against a
website , computer system or individual computer in an
unauthorized manner , that compromises the availability
of data stored in it.
CYBER SECURITY:- cyber security are
the techniques of protecting computers , networks ,
program and data from unauthorized access or attacks
that are aimed for exploitation.
6. TYPES OF CYBER
CRIME
SOCIAL ENGINNERING
PHISHING
IDENTITY THEFT
EMAIL BOMBING AND SPAMMING
COMPUTER STALKING
GEO TAGGING
MALWARE ATTACK
7. MALWARE
Malware is a kind of malicious files which are
basically created to destruct the data or to steal the
information.
malware needs any file or attachment to
work . malware sneaks the computer when user
click the malicious components which comes from
webpages in form of videos , audios , image file etc.
8. TYPES OF MALWARE
VIRUS:- its just like a biological virus . It spread by
sharing attaching or sending a malicious file.
TROJAN:-Trojan are the malicious files which create a
backdoor to the hacker and gave him the remote control access.
WORM:-It enters the operating system by consuming
access bandwith,deleting files or by sending documents through
emails.
9. SPYWARE:-they spy’s on the user activity.
RANSOMEWARE:-encrypts the user data and
generate a key which is provided to a user after the ransome is
being paid.
ROOTKIT:-these are made to remotely access or
control over the computer in the absence of the knowledge to the
user
11. SYMPTOMS OF MALWARE
INFECTION
Slow system
Unexpected pop-ups
Unexpected system crashes
Excessisive and suspicious hardware activity
Antivirus disabling
New browser, home page or tool bar
Pecullar program activity
Random network activity
Blacklisted ip address
Blue screen of death
12. PREVENTION
Understand the basic security measures to implement when
online..
Configure web browsers in secure manner.
Identify a secure website
Understand the different threats post by instant messaging
apps and their counter measures
Understand the different risks children are exposed to when
online
Identify if a child is a victim of online abuse and take
corrective measures
To inform or to take help from the cyber cell department in
any case of cyber crime
13. CONCLUSION
THE COMPUTER OFFERS ANOTHER KIND
OF CREATIVITY.YOU CANNOT IGNORE
THE CREATIVITY THAT COMPUTER
TECHNOLOGY CAN BRING.
BUT YOU NEED TO BE ABLE
TO MOVE BETWEEN THOSE TWO
DIFFERENT WORLDS.
NO ONE CAN HACK YOU UNTILL
,YOU AVAIL TO HACK