SlideShare a Scribd company logo
1 of 33
Security Threats
• Cybersecurity is the body of technologies, processes and
practices designed to protect networks, computers, programs
and data from attack, damage or unauthorized access.
There are some most common
“Security Threats”
that India are currently using.
MALWARE
Most PCs and laptop are now connected to the world wide
web i.e Internet, making easier the spread of malicious
software (known as malware), which includes Trojans ,
viruses, worms, spyware, adware.
How TO Make Your Android Phone Safe?
How To Make Your Computer Safe?
Email Spoofing
Email spoofing is the forgery of an email header so that the
message appears to have originated from someone or
somewhere other than the actual source.
Emkei.cz
SMS SPOOFING
• SMS spoofing is a relatively new technology which uses the
Short Message Service (SMS), available on most mobile
phones and personal digital assistants, to set who the message
appears to come from by replacing the
originating mobile number (Sender ID) with alphanumeric
text.
• Spoofing has both legitimate uses (setting the company name
from which the message is being sent, setting your
own mobile number, or a product name) and illegitimate uses
(such as impersonating another person, company, product)
• Tor :-
 Free of cost
 Hides IP address
 Hides Location
 Hides Identity
For Android Device We Use OrBot
How to hack Your
friend, Family
Member
Mobile Phone
Call Recording
• Record all incoming and outgoing phone calls.
• Record calls that are made to and from specific numbers
only.
• All call recordings are uploaded to your online
TheTruthSpy control panel which you can access from
anywhere with an internet connection. You can download
these recordings on to your computer or just listen to
them straight from the control panel at any time you want.
Facebook Messages
• View all Facebook chat conversations.
• Find out the names of people they have been chatting with.
• Get time and date stamps to know when each chat took place.
• Get access to any photos, videos or audio files sent through
Facebook chat and saved on the target phone.
• All Facebook chat conversations are uploaded to your online
TheTruthSpy control panel which you can access from
anywhere with an internet connection.
Live Call
• Click Start or Send a simple SMS command to activate the
Live Surroundings feature.
• The target phone user will not get any indication that you are
listening.
Rascastor.cz
Dumps Credit Card
How to protect kids from inappropriate Internet?
Google Maps
Cyber security
Cyber security
Cyber security

More Related Content

What's hot

computer viruses
computer virusescomputer viruses
computer virusesdayasunny7
 
u2f fido security key
u2f fido security keyu2f fido security key
u2f fido security keyGoTrust ID
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls AttacksHafiza Abas
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security riskssamthking25
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Genysis security 101
Genysis security 101Genysis security 101
Genysis security 101Mache Aggie
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 

What's hot (20)

computer viruses
computer virusescomputer viruses
computer viruses
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
u2f fido security key
u2f fido security keyu2f fido security key
u2f fido security key
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
MALWARE
MALWAREMALWARE
MALWARE
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Genysis security 101
Genysis security 101Genysis security 101
Genysis security 101
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Spoofing v2
Spoofing v2Spoofing v2
Spoofing v2
 
Kkocabiyik presentation
Kkocabiyik presentationKkocabiyik presentation
Kkocabiyik presentation
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Spyware
SpywareSpyware
Spyware
 
Telegram app
Telegram appTelegram app
Telegram app
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Telegram
TelegramTelegram
Telegram
 

Similar to Cyber security

Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile networkRAVITEJA828
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdam Varn
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 
Who's watching you
Who's watching youWho's watching you
Who's watching youTrent Morrow
 

Similar to Cyber security (20)

pp.pptx
pp.pptxpp.pptx
pp.pptx
 
Treads to mobile network
Treads to mobile networkTreads to mobile network
Treads to mobile network
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Advocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online CourseAdvocacy, Technology, and Safety Online Course
Advocacy, Technology, and Safety Online Course
 
Web Security
Web SecurityWeb Security
Web Security
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Avoid the Hack
Avoid the HackAvoid the Hack
Avoid the Hack
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Who's watching you
Who's watching youWho's watching you
Who's watching you
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Cyber security

  • 2. • Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
  • 3. There are some most common “Security Threats” that India are currently using.
  • 5. Most PCs and laptop are now connected to the world wide web i.e Internet, making easier the spread of malicious software (known as malware), which includes Trojans , viruses, worms, spyware, adware.
  • 6. How TO Make Your Android Phone Safe?
  • 7. How To Make Your Computer Safe?
  • 8. Email Spoofing Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source.
  • 10. SMS SPOOFING • SMS spoofing is a relatively new technology which uses the Short Message Service (SMS), available on most mobile phones and personal digital assistants, to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text. • Spoofing has both legitimate uses (setting the company name from which the message is being sent, setting your own mobile number, or a product name) and illegitimate uses (such as impersonating another person, company, product)
  • 11.
  • 12. • Tor :-  Free of cost  Hides IP address  Hides Location  Hides Identity
  • 13. For Android Device We Use OrBot
  • 14.
  • 15. How to hack Your friend, Family Member Mobile Phone
  • 16.
  • 17. Call Recording • Record all incoming and outgoing phone calls. • Record calls that are made to and from specific numbers only. • All call recordings are uploaded to your online TheTruthSpy control panel which you can access from anywhere with an internet connection. You can download these recordings on to your computer or just listen to them straight from the control panel at any time you want.
  • 18.
  • 19. Facebook Messages • View all Facebook chat conversations. • Find out the names of people they have been chatting with. • Get time and date stamps to know when each chat took place. • Get access to any photos, videos or audio files sent through Facebook chat and saved on the target phone. • All Facebook chat conversations are uploaded to your online TheTruthSpy control panel which you can access from anywhere with an internet connection.
  • 20.
  • 21. Live Call • Click Start or Send a simple SMS command to activate the Live Surroundings feature. • The target phone user will not get any indication that you are listening.
  • 22.
  • 25.
  • 26.
  • 27. How to protect kids from inappropriate Internet?
  • 28.
  • 29.