SlideShare a Scribd company logo
1 of 14
Presented by
Franklin simon
CYBER ATTACK
AND
CYBER SECURITY
CONTENTS
 INTRODUCTION
 TYPES OF CYBER CRIME
 THE MAIN VILLAIN :-“MALWARE”
 TYPES OF MALWARE
 SOME RE-KNOWNED VIRUS ATTACKS
 SYMPTOMS OF MALWARE INFECTION
 PREVENTIONS
 CONCLUSION
INTRODUCTION
 CYBER ATTACK/CRIME:-a cyber
attack is an attack initiated from a computer against a
website , computer system or individual computer in an
unauthorized manner , that compromises the availability
of data stored in it.
 CYBER SECURITY:- cyber security are
the techniques of protecting computers , networks ,
program and data from unauthorized access or attacks
that are aimed for exploitation.
TYPES OF CYBER
CRIME
 SOCIAL ENGINNERING
 PHISHING
 IDENTITY THEFT
 EMAIL BOMBING AND SPAMMING
 COMPUTER STALKING
 GEO TAGGING
 MALWARE ATTACK
MALWARE
 Malware is a kind of malicious files which are
basically created to destruct the data or to steal the
information.
malware needs any file or attachment to
work . malware sneaks the computer when user
click the malicious components which comes from
webpages in form of videos , audios , image file etc.
TYPES OF MALWARE
VIRUS:- its just like a biological virus . It spread by
sharing attaching or sending a malicious file.
TROJAN:-Trojan are the malicious files which create a
backdoor to the hacker and gave him the remote control access.
WORM:-It enters the operating system by consuming
access bandwith,deleting files or by sending documents through
emails.
SPYWARE:-they spy’s on the user activity.
RANSOMEWARE:-encrypts the user data and
generate a key which is provided to a user after the ransome is
being paid.
ROOTKIT:-these are made to remotely access or
control over the computer in the absence of the knowledge to the
user
SOME RE-KNOWNED VIRUS
ATTACKS
 WANNACRY RANSOMEWARE ATTACK
SYMPTOMS OF MALWARE
INFECTION
 Slow system
 Unexpected pop-ups
 Unexpected system crashes
 Excessisive and suspicious hardware activity
 Antivirus disabling
 New browser, home page or tool bar
 Pecullar program activity
 Random network activity
 Blacklisted ip address
 Blue screen of death
PREVENTION
 Understand the basic security measures to implement when
online..
 Configure web browsers in secure manner.
 Identify a secure website
 Understand the different threats post by instant messaging
apps and their counter measures
 Understand the different risks children are exposed to when
online
 Identify if a child is a victim of online abuse and take
corrective measures
 To inform or to take help from the cyber cell department in
any case of cyber crime
CONCLUSION
THE COMPUTER OFFERS ANOTHER KIND
OF CREATIVITY.YOU CANNOT IGNORE
THE CREATIVITY THAT COMPUTER
TECHNOLOGY CAN BRING.
BUT YOU NEED TO BE ABLE
TO MOVE BETWEEN THOSE TWO
DIFFERENT WORLDS.
NO ONE CAN HACK YOU UNTILL
,YOU AVAIL TO HACK
THANK YOU

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
Karan Bhandari
 

What's hot (20)

Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
1 security goals
1   security goals1   security goals
1 security goals
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Computer security
Computer securityComputer security
Computer security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Online safety
Online safety Online safety
Online safety
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber security

Similar to Cyber security (20)

CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime
cyber crime cyber crime
cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Computer security
Computer securityComputer security
Computer security
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Cyber security

  • 1.
  • 4. CONTENTS  INTRODUCTION  TYPES OF CYBER CRIME  THE MAIN VILLAIN :-“MALWARE”  TYPES OF MALWARE  SOME RE-KNOWNED VIRUS ATTACKS  SYMPTOMS OF MALWARE INFECTION  PREVENTIONS  CONCLUSION
  • 5. INTRODUCTION  CYBER ATTACK/CRIME:-a cyber attack is an attack initiated from a computer against a website , computer system or individual computer in an unauthorized manner , that compromises the availability of data stored in it.  CYBER SECURITY:- cyber security are the techniques of protecting computers , networks , program and data from unauthorized access or attacks that are aimed for exploitation.
  • 6. TYPES OF CYBER CRIME  SOCIAL ENGINNERING  PHISHING  IDENTITY THEFT  EMAIL BOMBING AND SPAMMING  COMPUTER STALKING  GEO TAGGING  MALWARE ATTACK
  • 7. MALWARE  Malware is a kind of malicious files which are basically created to destruct the data or to steal the information. malware needs any file or attachment to work . malware sneaks the computer when user click the malicious components which comes from webpages in form of videos , audios , image file etc.
  • 8. TYPES OF MALWARE VIRUS:- its just like a biological virus . It spread by sharing attaching or sending a malicious file. TROJAN:-Trojan are the malicious files which create a backdoor to the hacker and gave him the remote control access. WORM:-It enters the operating system by consuming access bandwith,deleting files or by sending documents through emails.
  • 9. SPYWARE:-they spy’s on the user activity. RANSOMEWARE:-encrypts the user data and generate a key which is provided to a user after the ransome is being paid. ROOTKIT:-these are made to remotely access or control over the computer in the absence of the knowledge to the user
  • 10. SOME RE-KNOWNED VIRUS ATTACKS  WANNACRY RANSOMEWARE ATTACK
  • 11. SYMPTOMS OF MALWARE INFECTION  Slow system  Unexpected pop-ups  Unexpected system crashes  Excessisive and suspicious hardware activity  Antivirus disabling  New browser, home page or tool bar  Pecullar program activity  Random network activity  Blacklisted ip address  Blue screen of death
  • 12. PREVENTION  Understand the basic security measures to implement when online..  Configure web browsers in secure manner.  Identify a secure website  Understand the different threats post by instant messaging apps and their counter measures  Understand the different risks children are exposed to when online  Identify if a child is a victim of online abuse and take corrective measures  To inform or to take help from the cyber cell department in any case of cyber crime
  • 13. CONCLUSION THE COMPUTER OFFERS ANOTHER KIND OF CREATIVITY.YOU CANNOT IGNORE THE CREATIVITY THAT COMPUTER TECHNOLOGY CAN BRING. BUT YOU NEED TO BE ABLE TO MOVE BETWEEN THOSE TWO DIFFERENT WORLDS. NO ONE CAN HACK YOU UNTILL ,YOU AVAIL TO HACK