SlideShare a Scribd company logo
Digital Threats From PC to Cell Phone By Dr.Tapan Sengupta
Digital Threats ,[object Object],[object Object],[object Object]
Vulnerabilities ,[object Object],[object Object],[object Object]
Activities Leading to a Threat ,[object Object],[object Object],[object Object],[object Object]
What Are The Common Threats   The basic types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What A The Common Types Of Threats ,[object Object],[object Object],[object Object],[object Object]
What A The Common Types Of Threats ,[object Object],[object Object],[object Object],[object Object]
Misleading Application ,[object Object],[object Object]
Known Misleading Application ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Known Misleading Application ,[object Object],[object Object],[object Object],[object Object],[object Object]
Anatomy Of A Typical Malware Malware Server Keyboard Logger Etc. Infected PC Network Keyboard Logger Etc. Un-infected PC Malware Account number Credit Card Info User Id, password etc. Step-1 Step-2
What Can These Malware Do? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Danger vs. Annoyance ,[object Object],[object Object],[object Object]
What To Do? ,[object Object],[object Object]
What To Do? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What To Do? ,[object Object],[object Object],[object Object]
Personal Security Policy  ,[object Object],[object Object],[object Object]
Personal Security Policy  ,[object Object],[object Object],[object Object]
Personal Security Policy ,[object Object],[object Object],[object Object]
Personal Security Policy ,[object Object],[object Object],[object Object]
LAST BUT NOT THE LEAST ,[object Object]
Security Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless SOHO Network Router Configuration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virus on cell phone ,[object Object],[object Object],[object Object],[object Object],[object Object]
Virus on cell phone What to do ,[object Object],[object Object],[object Object]
[object Object]

More Related Content

What's hot

Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
William Mann
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
Computer viruses and removal techniques
Computer viruses and removal techniquesComputer viruses and removal techniques
Computer viruses and removal techniques
St. Joseph Health System
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
Aasim Mushtaq
 
Sowmya
SowmyaSowmya
Jeopardy
JeopardyJeopardy
Jeopardy
zed_o07
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
San Diego Continuing Education
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
Nitish Nagar
 
Computer virus
Computer virusComputer virus
Computer virus
SeethaDinesh
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
Amrit Kaur
 
computer virus
computer viruscomputer virus
computer virus
Kunal Yadav
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
Tanu Basoiya
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
nasya
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
simron2002
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 

What's hot (20)

Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer viruses and removal techniques
Computer viruses and removal techniquesComputer viruses and removal techniques
Computer viruses and removal techniques
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Sowmya
SowmyaSowmya
Sowmya
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Computer virus
Computer virusComputer virus
Computer virus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
computer virus
computer viruscomputer virus
computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 

Viewers also liked

Gaming2
Gaming2Gaming2
Gaming2habawi
 
Adobe ACROBAT 9: crea innovazione nella tua azienda!
Adobe ACROBAT 9: crea innovazione nella tua azienda!Adobe ACROBAT 9: crea innovazione nella tua azienda!
Adobe ACROBAT 9: crea innovazione nella tua azienda!
EvolutionBook S.r.l.
 
Trabajo
TrabajoTrabajo
Trabajo
busta_shaman
 
India20080928
India20080928India20080928
India20080928
ywwang
 
Gaming
GamingGaming
Gaminghabawi
 
Banner1
Banner1Banner1
Banner1
guest9a6c67
 
fun
funfun
Trava
TravaTrava
Trava
mllopez
 
041c101952159200894917
041c101952159200894917041c101952159200894917
041c101952159200894917
mllopez
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 
Chap1 chipset
Chap1 chipsetChap1 chipset
Chap1 chipset
Faiq Ali Sayed
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
CLOCKLESS CHIP BY Saurabh singh
CLOCKLESS CHIP BY Saurabh singhCLOCKLESS CHIP BY Saurabh singh
CLOCKLESS CHIP BY Saurabh singh
Saurabh Singh
 
Optical mouse working principle
Optical mouse working principleOptical mouse working principle
Optical mouse working principle
anasibrahim2011411
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
Manish Sharma
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
Krishna Kumari
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
Helge Tennø
 

Viewers also liked (18)

Gaming2
Gaming2Gaming2
Gaming2
 
Adobe ACROBAT 9: crea innovazione nella tua azienda!
Adobe ACROBAT 9: crea innovazione nella tua azienda!Adobe ACROBAT 9: crea innovazione nella tua azienda!
Adobe ACROBAT 9: crea innovazione nella tua azienda!
 
Trabajo
TrabajoTrabajo
Trabajo
 
India20080928
India20080928India20080928
India20080928
 
Gaming
GamingGaming
Gaming
 
Banner1
Banner1Banner1
Banner1
 
fun
funfun
fun
 
Trava
TravaTrava
Trava
 
041c101952159200894917
041c101952159200894917041c101952159200894917
041c101952159200894917
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Chap1 chipset
Chap1 chipsetChap1 chipset
Chap1 chipset
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
CLOCKLESS CHIP BY Saurabh singh
CLOCKLESS CHIP BY Saurabh singhCLOCKLESS CHIP BY Saurabh singh
CLOCKLESS CHIP BY Saurabh singh
 
Optical mouse working principle
Optical mouse working principleOptical mouse working principle
Optical mouse working principle
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar to Presented to Compass

091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
dkp205
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
M
MM
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
Zoaib Mirza
 
Information security
Information securityInformation security
Information security
Appin Faridabad
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
smeech
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
C3
C3C3
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
backdoor
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
Computer Explorers
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
Eugene Mukuka, BSc. MBA, MSc
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
cyber_security
cyber_securitycyber_security
cyber_security
Jana Baxter
 

Similar to Presented to Compass (20)

091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
M
MM
M
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Information security
Information securityInformation security
Information security
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
C3
C3C3
C3
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
cyber_security
cyber_securitycyber_security
cyber_security
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Presented to Compass

  • 1. Digital Threats From PC to Cell Phone By Dr.Tapan Sengupta
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Anatomy Of A Typical Malware Malware Server Keyboard Logger Etc. Infected PC Network Keyboard Logger Etc. Un-infected PC Malware Account number Credit Card Info User Id, password etc. Step-1 Step-2
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.