SlideShare a Scribd company logo
1 of 69
UNIT 2- Cyber Safety
What is hacking/ hacker
• A hacker is a person skilled in information technology
who uses their technical knowledge to achieve a goal
or overcome an obstacle, within a computerized
system by non-standard means.
• Hacking is the act of compromising digital devices and
networks through unauthorized access to an account
or computer system.
History of Hacking:
First computer hack was in late 1960s when bell labs successfully
hacked and modified a UNIX operating system
Three phases of hacking:
1)Phase 1: the 1960’s and 1970’s
2)Phase 2: period from 1970’s to 1990’s
3)Phase 3: Beginning in the mid 1990’s with growth of the web.
Who were the first hackers?
• John draper
• Kevin Poulsen
• Robert Tappen Morris
QUIZ:
Suppose you want to learn some hacking skills for
good purpose and you start learning by
demonstrating hacking techniques which is
developed by others. Who are you ?
A. Green Hat Hacker
B. Black Hat Hacker
C. White Hat Hacker
D. Red Hat Hacker
QUIZ:
Who are ethical hackers?
A. Green Hat Hacker
B. Black Hat Hacker
C. White Hat Hacker
D. Red Hat Hacker
PHISHING: an email fraud method
PHARMING: Unobvious substitution of the
original website
Whenever you visit a banking or e-commerce website, look for a
“locked padlock” icon somewhere in the window of the browser, and
ensure that the site’s URL begins with “https”. Presence of these two
elements signify that you are on a secured website.
SMISHING: (SMS+PHISHING)
VISHING: (Voice+PHISHING)
QUIZ:
secret redirection of users to third-party
websites?
• In phishing – via e-mail.
• In vishing – by means of a phone call.
• In smishing – via SMS.
• In pharming – secret redirection of users to third-party websites?
How to protect yourself from Phishing, Vishing,
Smishing, Pharming?
•Every time pay attention to the sender and subject of the message. If
they look suspicious, just delete these emails or SMS;
•Do not click the suggested links in emails and messages from an
unknown sender;
•Never reply to messages requesting personal information;
•Watch for mistakes in the text, if you find them, most likely the letter is a
hoax;
•Files attached to an unknown message that have .exe, .msi, .bat, .pif,
.com, .vbs, .reg, and .zip extensions can install malicious software, there
is no point to open them
Types of Phishing
• Spear Phishing
• Whaling
• Deceptive Phishing
• Angler Phishing
Spear phishing involves targeting a specific
organization to try to steal their login credentials.
EXAMPLE :
Threat Group-4127 (Fancy Bear) targeted Hillary
Clinton's campaign with spear phishing attacks on
over 1,800 Google accounts, using the accounts-
google.com domain to threaten targeted users.
Whaling
Whaling : phishing techniques to target
senior executives(CEOs) and other high-
profile individuals with customized
content
Deceptive Phishing: refers to any attack where
the attacker impersonates a legitimate company in
an attempt to steal your personal information or
your login credentials.
Angler Phishing
Angler Phishing:
• Angler phishing is a type of phishing attack that targets social media
users. A hacker creates a fake social media account and pretends to
be a customer service employee working for a company. Next, they
contact customers of that company who have made complaints on
social media.
QUIZ:
You get an email from a bank claiming that your
account has been frozen unless you click on the
link provided and enter your account information.
Which type of Phishing attack is this?
A)Angler
B)whaling
C)Spear
D)Deceptive
QUIZ:
You get an email that’s supposedly from your
CEO saying they need you to wire transfer the
money, Which type of Phishing attack is this?
A)Angler
B)whaling
C)Spear
D)Deceptive
QUIZ:
Between 2013 and 2015, Evaldas Rimasauskas impersonated a
Taiwanese hardware supplier, Quanta computer, whose
services were used by two tech giants, Google and Facebook.
He sent out fake invoices worth $122 million ($99 million and
$23 million to Google and Facebook, respectively) to these
companies for almost three years until he was arrested and
prisoned for 30 years. Which type of Phishing attack is this?
A)Angler
B)whaling
C)Spear
D)Deceptive
So far we learned about
various CYBER CRIME
In Cyber Crime:
Computer is used either as a Target or a
weapon
General Knowledge:
Few other Cyber Crime related Terminologies
• Computer Vandalism
• Software Piracy
• Malware
• Virus
• Trojan Horse
• Worms
• Spyware
• Ransomware
/hardware
Software Piracy
•The use and or distribution of copyrighted
computer software in violation of the
copyright laws or applicable license
restrictions.
•Video on Malware- Differences between Virus,
Worm, Trojan Horse, Ransomware and Spyware.
Quiz time:
1)The malware which needs host program?
A)Worm
B)Virus
Quiz time:
1)The malware which needs host program?
• A)Worm- standalone
• B)Virus- needs host program
Quiz time:
2)The malware which looks legitimate but acts as a backdoor function
for various attacks?
• A)Worm
• B)Virus
• C)Trojan Horse
Quiz time:
2)The malware which acts as a backdoor for various attacks?
• A)Worm
• B)Virus
• C) Trojan Horse
Quiz time:
3)The malware which makes the victim blocked from access unless a
ransom is paid off?
A)Worm
B)Ransomware
C) Spyware
Quiz time:
3)The malware which makes the victim blocked from access unless a
ransom is paid off?
A)Worm
B)Ransomware
C) Spyware
Quiz time:
4) A type of computer program that is secretly installed on a person's
computer or mobile device in order to obtain the owner's private
information, such as lists of websites visited, passwords, and credit
card numbers.
A)Spyware
C) Ransomware
Quiz time:
4) A type of computer program that is secretly installed on a person's
computer or mobile device in order to obtain the owner's private
information, such as lists of websites visited, passwords, and credit
card numbers.
A)Spyware
C) Ransomware
Quiz time:
5)A piece of code that can copy itself and damage the system or
destroy data
A)Worm
B)Virus
Quiz time:
5)A piece of code that can copy itself and damage the system or
destroy data
A)Worm
B)Virus
Quiz time:
5)A piece of code that can copy itself and damage the system or
destroy data
A)Worm
B)Virus
How to be a SMART & SAFE
NETIZEN?
Cyber Crime

More Related Content

Similar to Cyber Crime

Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 

Similar to Cyber Crime (20)

Hacking
HackingHacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
hacking
hackinghacking
hacking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Cyber Crime

  • 1. UNIT 2- Cyber Safety
  • 2. What is hacking/ hacker • A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. • Hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system.
  • 3. History of Hacking: First computer hack was in late 1960s when bell labs successfully hacked and modified a UNIX operating system Three phases of hacking: 1)Phase 1: the 1960’s and 1970’s 2)Phase 2: period from 1970’s to 1990’s 3)Phase 3: Beginning in the mid 1990’s with growth of the web.
  • 4.
  • 5.
  • 6. Who were the first hackers? • John draper • Kevin Poulsen • Robert Tappen Morris
  • 7.
  • 8. QUIZ: Suppose you want to learn some hacking skills for good purpose and you start learning by demonstrating hacking techniques which is developed by others. Who are you ? A. Green Hat Hacker B. Black Hat Hacker C. White Hat Hacker D. Red Hat Hacker
  • 9. QUIZ: Who are ethical hackers? A. Green Hat Hacker B. Black Hat Hacker C. White Hat Hacker D. Red Hat Hacker
  • 10. PHISHING: an email fraud method
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. PHARMING: Unobvious substitution of the original website
  • 16.
  • 17.
  • 18. Whenever you visit a banking or e-commerce website, look for a “locked padlock” icon somewhere in the window of the browser, and ensure that the site’s URL begins with “https”. Presence of these two elements signify that you are on a secured website.
  • 20.
  • 21.
  • 23.
  • 24. QUIZ: secret redirection of users to third-party websites?
  • 25.
  • 26. • In phishing – via e-mail. • In vishing – by means of a phone call. • In smishing – via SMS. • In pharming – secret redirection of users to third-party websites?
  • 27.
  • 28. How to protect yourself from Phishing, Vishing, Smishing, Pharming?
  • 29. •Every time pay attention to the sender and subject of the message. If they look suspicious, just delete these emails or SMS; •Do not click the suggested links in emails and messages from an unknown sender; •Never reply to messages requesting personal information; •Watch for mistakes in the text, if you find them, most likely the letter is a hoax; •Files attached to an unknown message that have .exe, .msi, .bat, .pif, .com, .vbs, .reg, and .zip extensions can install malicious software, there is no point to open them
  • 30. Types of Phishing • Spear Phishing • Whaling • Deceptive Phishing • Angler Phishing
  • 31. Spear phishing involves targeting a specific organization to try to steal their login credentials. EXAMPLE : Threat Group-4127 (Fancy Bear) targeted Hillary Clinton's campaign with spear phishing attacks on over 1,800 Google accounts, using the accounts- google.com domain to threaten targeted users.
  • 33. Whaling : phishing techniques to target senior executives(CEOs) and other high- profile individuals with customized content
  • 34.
  • 35.
  • 36.
  • 37. Deceptive Phishing: refers to any attack where the attacker impersonates a legitimate company in an attempt to steal your personal information or your login credentials.
  • 38.
  • 39.
  • 41.
  • 42.
  • 43. Angler Phishing: • Angler phishing is a type of phishing attack that targets social media users. A hacker creates a fake social media account and pretends to be a customer service employee working for a company. Next, they contact customers of that company who have made complaints on social media.
  • 44. QUIZ: You get an email from a bank claiming that your account has been frozen unless you click on the link provided and enter your account information. Which type of Phishing attack is this? A)Angler B)whaling C)Spear D)Deceptive
  • 45. QUIZ: You get an email that’s supposedly from your CEO saying they need you to wire transfer the money, Which type of Phishing attack is this? A)Angler B)whaling C)Spear D)Deceptive
  • 46. QUIZ: Between 2013 and 2015, Evaldas Rimasauskas impersonated a Taiwanese hardware supplier, Quanta computer, whose services were used by two tech giants, Google and Facebook. He sent out fake invoices worth $122 million ($99 million and $23 million to Google and Facebook, respectively) to these companies for almost three years until he was arrested and prisoned for 30 years. Which type of Phishing attack is this? A)Angler B)whaling C)Spear D)Deceptive
  • 47.
  • 48. So far we learned about various CYBER CRIME
  • 49. In Cyber Crime: Computer is used either as a Target or a weapon
  • 50. General Knowledge: Few other Cyber Crime related Terminologies • Computer Vandalism • Software Piracy • Malware • Virus • Trojan Horse • Worms • Spyware • Ransomware
  • 51.
  • 53.
  • 54. Software Piracy •The use and or distribution of copyrighted computer software in violation of the copyright laws or applicable license restrictions.
  • 55. •Video on Malware- Differences between Virus, Worm, Trojan Horse, Ransomware and Spyware.
  • 56. Quiz time: 1)The malware which needs host program? A)Worm B)Virus
  • 57. Quiz time: 1)The malware which needs host program? • A)Worm- standalone • B)Virus- needs host program
  • 58. Quiz time: 2)The malware which looks legitimate but acts as a backdoor function for various attacks? • A)Worm • B)Virus • C)Trojan Horse
  • 59. Quiz time: 2)The malware which acts as a backdoor for various attacks? • A)Worm • B)Virus • C) Trojan Horse
  • 60. Quiz time: 3)The malware which makes the victim blocked from access unless a ransom is paid off? A)Worm B)Ransomware C) Spyware
  • 61. Quiz time: 3)The malware which makes the victim blocked from access unless a ransom is paid off? A)Worm B)Ransomware C) Spyware
  • 62. Quiz time: 4) A type of computer program that is secretly installed on a person's computer or mobile device in order to obtain the owner's private information, such as lists of websites visited, passwords, and credit card numbers. A)Spyware C) Ransomware
  • 63. Quiz time: 4) A type of computer program that is secretly installed on a person's computer or mobile device in order to obtain the owner's private information, such as lists of websites visited, passwords, and credit card numbers. A)Spyware C) Ransomware
  • 64. Quiz time: 5)A piece of code that can copy itself and damage the system or destroy data A)Worm B)Virus
  • 65. Quiz time: 5)A piece of code that can copy itself and damage the system or destroy data A)Worm B)Virus
  • 66. Quiz time: 5)A piece of code that can copy itself and damage the system or destroy data A)Worm B)Virus
  • 67.
  • 68. How to be a SMART & SAFE NETIZEN?