CYBER
ATTACKS
BY
AVINASH FULBARIA
INTRODUCTION
 Cyber crime is an activity done using computers
and internet. We can say that it is an unlawful
acts wherein the computer either a tool or
target or both.
TYPES OF CYBER CRIMES
 Hacking
 Child Pornography
 Virus Dissminition
 Denial Of Service Attack
 Computer Vandalism
 Software Piracy
 Cyber Terrorism
 Salami Attacks
SAFETY TIPS
 Use antivirus Software
 Insert Firewalls
 Uninstall unnecessary software
 Maintain backup
 Check security settings
CYBER TERRORISM
 It uses computer as weapon for
 Credit card fraud
 Email Fraud
 Fake Websites Pages
 Fake IDs on Social Networking Sites
 Spying
EMAIL
FRAUD
EMAIL FRAUD
 E-Mail known as Electronic Mail.
 Websites For Email are
 Yahoo
 Gmail
 Rediff
 Hotmail
EMAIL FRAUD
 With the help of
fake email generator
Websites
HOW TO CHECK
WHETHER THE
MAIL IS REAL
OR FAKE..
STEP 1 :-
On the right side of
the email there is a
arrow pointing
down next to reply
STEP 2
Click on it….
STEP 3
After clicking on it a tray
with different options is
appeared and we need
to select option
“SHOW ORIGINAL”..
STEP 4
After clicking on it a
new window with lots
of coding will be
opened..
STEP 5
On this tab of
coding search
“RECEIVED
FROM”….
FAKE MAIL
ORIGINAL MAIL
STEP 6
In Received from it is
written “EMKEI.CZ” so
copy this link and paste it
in Google to confirm
whether this mail is fake
or real…
FAKE
WEBPAGE
FAKE WEBPAGE
Fake Webpage also
known as duplicate
webpage.
In which duplicates of
WebPages are made for
cyber crime……
HOW TO
IDENTIFY THE
WEBPAGE
WHETHER IT IS
FAKE OR REAL…
STEPS
Before using any banking sites confirm
whether the site we are accessing is real or
not and for that we need to take few steps :
1. On the address bar of the explorer on the
left side address bar a “CLOSED LOCK”
with green color is observed….that means
we are accessing a real site.
STEP 2
This security is only
given to a single name
bank sites or any other
authorized sites.
STEP 3
The sites can be created
once with one name and
after making a fake webpage
of it there will be a
misspelling in the fake
WebPages.
SPYING
SPYING
It is the activity of recording
peoples Credit card number,
ATM pins, Email IDs and
Passwords or any
Confidential data's by means
of Spying Software's.
SPYING SOFTWARE'S FOR MOBILES
1. Mspy
2. Flexispy
3. TeenSafe
4. Mobile Spy
5. Mobi Stealth
6. Spyera
7. iSpyoo
8. TheOneSpy
9. TheTruthSPY
10. SpyBubble
SPYING SOFTWARE'S FOR PC
1.Spy Agent
2. Web Watcher
3.Pc Pandora 7
4.Specter Pro 7
5.Elite Keylogger
6.Refog Personal Monitor 7
7.eBlaster7
8.Sniperspy7
9.Iam big brother
10.XPCspy
ACTUAL SPY
SOFTWARE
ACTUAL SPY
 This Software is used for spying this software
can record :
1. Keyboard strokes
2. Screenshots
3. Application
4. Visited Websites Etc.
 It create a log file of the activities recorded
and send it to the third party.
SAFETY
SPYING PROTECTION SOFTWARE'S
1.Windows Defender
2.Spybot Search and Destroy
3.Ad-aware
4.Malwarbytes Anti malware
5.Spyware Blaster
6.Antimalware suites
SAFETY
 Do not share any of your personal details
with anyone.
 Do not keep the name or your birthday or
your mobile number as your password.
 Before visiting the sites do confirm.
SAFETY IS IN YOUR
HAND HOW TO GET IT
DEPENDS ON
YOU…….IT BELONGS TO
YOU AND YOUR FAMILY
SO DO NOT TAKE IT
THE END
THANK U

Cyber attack

  • 1.
  • 2.
    INTRODUCTION  Cyber crimeis an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 3.
    TYPES OF CYBERCRIMES  Hacking  Child Pornography  Virus Dissminition  Denial Of Service Attack  Computer Vandalism  Software Piracy  Cyber Terrorism  Salami Attacks
  • 4.
    SAFETY TIPS  Useantivirus Software  Insert Firewalls  Uninstall unnecessary software  Maintain backup  Check security settings
  • 5.
    CYBER TERRORISM  Ituses computer as weapon for  Credit card fraud  Email Fraud  Fake Websites Pages  Fake IDs on Social Networking Sites  Spying
  • 6.
  • 7.
    EMAIL FRAUD  E-Mailknown as Electronic Mail.  Websites For Email are  Yahoo  Gmail  Rediff  Hotmail
  • 8.
    EMAIL FRAUD  Withthe help of fake email generator Websites
  • 12.
    HOW TO CHECK WHETHERTHE MAIL IS REAL OR FAKE..
  • 13.
    STEP 1 :- Onthe right side of the email there is a arrow pointing down next to reply
  • 15.
  • 16.
    STEP 3 After clickingon it a tray with different options is appeared and we need to select option “SHOW ORIGINAL”..
  • 18.
    STEP 4 After clickingon it a new window with lots of coding will be opened..
  • 20.
    STEP 5 On thistab of coding search “RECEIVED FROM”….
  • 21.
  • 22.
  • 23.
    STEP 6 In Receivedfrom it is written “EMKEI.CZ” so copy this link and paste it in Google to confirm whether this mail is fake or real…
  • 24.
  • 25.
    FAKE WEBPAGE Fake Webpagealso known as duplicate webpage. In which duplicates of WebPages are made for cyber crime……
  • 26.
  • 27.
    STEPS Before using anybanking sites confirm whether the site we are accessing is real or not and for that we need to take few steps : 1. On the address bar of the explorer on the left side address bar a “CLOSED LOCK” with green color is observed….that means we are accessing a real site.
  • 29.
    STEP 2 This securityis only given to a single name bank sites or any other authorized sites.
  • 31.
    STEP 3 The sitescan be created once with one name and after making a fake webpage of it there will be a misspelling in the fake WebPages.
  • 34.
  • 35.
    SPYING It is theactivity of recording peoples Credit card number, ATM pins, Email IDs and Passwords or any Confidential data's by means of Spying Software's.
  • 36.
    SPYING SOFTWARE'S FORMOBILES 1. Mspy 2. Flexispy 3. TeenSafe 4. Mobile Spy 5. Mobi Stealth 6. Spyera 7. iSpyoo 8. TheOneSpy 9. TheTruthSPY 10. SpyBubble
  • 37.
    SPYING SOFTWARE'S FORPC 1.Spy Agent 2. Web Watcher 3.Pc Pandora 7 4.Specter Pro 7 5.Elite Keylogger 6.Refog Personal Monitor 7 7.eBlaster7 8.Sniperspy7 9.Iam big brother 10.XPCspy
  • 38.
  • 39.
    ACTUAL SPY  ThisSoftware is used for spying this software can record : 1. Keyboard strokes 2. Screenshots 3. Application 4. Visited Websites Etc.  It create a log file of the activities recorded and send it to the third party.
  • 43.
  • 44.
    SPYING PROTECTION SOFTWARE'S 1.WindowsDefender 2.Spybot Search and Destroy 3.Ad-aware 4.Malwarbytes Anti malware 5.Spyware Blaster 6.Antimalware suites
  • 45.
    SAFETY  Do notshare any of your personal details with anyone.  Do not keep the name or your birthday or your mobile number as your password.  Before visiting the sites do confirm.
  • 46.
    SAFETY IS INYOUR HAND HOW TO GET IT DEPENDS ON YOU…….IT BELONGS TO YOU AND YOUR FAMILY SO DO NOT TAKE IT
  • 47.
  • 48.