SlideShare a Scribd company logo
UNIT 2- Cyber Safety
What is hacking/ hacker
• A hacker is a person skilled in information technology
who uses their technical knowledge to achieve a goal
or overcome an obstacle, within a computerized
system by non-standard means.
• Hacking is the act of compromising digital devices and
networks through unauthorized access to an account
or computer system.
History of Hacking:
First computer hack was in late 1960s when bell labs successfully
hacked and modified a UNIX operating system
Three phases of hacking:
1)Phase 1: the 1960’s and 1970’s
2)Phase 2: period from 1970’s to 1990’s
3)Phase 3: Beginning in the mid 1990’s with growth of the web.
Who were the first hackers?
• John draper
• Kevin Poulsen
• Robert Tappen Morris
QUIZ:
Suppose you want to learn some hacking skills for
good purpose and you start learning by
demonstrating hacking techniques which is
developed by others. Who are you ?
A. Green Hat Hacker
B. Black Hat Hacker
C. White Hat Hacker
D. Red Hat Hacker
QUIZ:
Who are ethical hackers?
A. Green Hat Hacker
B. Black Hat Hacker
C. White Hat Hacker
D. Red Hat Hacker
PHISHING: an email fraud method
PHARMING: Unobvious substitution of the
original website
Whenever you visit a banking or e-commerce website, look for a
“locked padlock” icon somewhere in the window of the browser, and
ensure that the site’s URL begins with “https”. Presence of these two
elements signify that you are on a secured website.
SMISHING: (SMS+PHISHING)
VISHING: (Voice+PHISHING)
QUIZ:
secret redirection of users to third-party
websites?
• In phishing – via e-mail.
• In vishing – by means of a phone call.
• In smishing – via SMS.
• In pharming – secret redirection of users to third-party websites?
How to protect yourself from Phishing, Vishing,
Smishing, Pharming?
•Every time pay attention to the sender and subject of the message. If
they look suspicious, just delete these emails or SMS;
•Do not click the suggested links in emails and messages from an
unknown sender;
•Never reply to messages requesting personal information;
•Watch for mistakes in the text, if you find them, most likely the letter is a
hoax;
•Files attached to an unknown message that have .exe, .msi, .bat, .pif,
.com, .vbs, .reg, and .zip extensions can install malicious software, there
is no point to open them
Types of Phishing
• Spear Phishing
• Whaling
• Deceptive Phishing
• Angler Phishing
Spear phishing involves targeting a specific
organization to try to steal their login credentials.
EXAMPLE :
Threat Group-4127 (Fancy Bear) targeted Hillary
Clinton's campaign with spear phishing attacks on
over 1,800 Google accounts, using the accounts-
google.com domain to threaten targeted users.
Whaling
Whaling : phishing techniques to target
senior executives(CEOs) and other high-
profile individuals with customized
content
Deceptive Phishing: refers to any attack where
the attacker impersonates a legitimate company in
an attempt to steal your personal information or
your login credentials.
Angler Phishing
Angler Phishing:
• Angler phishing is a type of phishing attack that targets social media
users. A hacker creates a fake social media account and pretends to
be a customer service employee working for a company. Next, they
contact customers of that company who have made complaints on
social media.
QUIZ:
You get an email from a bank claiming that your
account has been frozen unless you click on the
link provided and enter your account information.
Which type of Phishing attack is this?
A)Angler
B)whaling
C)Spear
D)Deceptive
QUIZ:
You get an email that’s supposedly from your
CEO saying they need you to wire transfer the
money, Which type of Phishing attack is this?
A)Angler
B)whaling
C)Spear
D)Deceptive
QUIZ:
Between 2013 and 2015, Evaldas Rimasauskas impersonated a
Taiwanese hardware supplier, Quanta computer, whose
services were used by two tech giants, Google and Facebook.
He sent out fake invoices worth $122 million ($99 million and
$23 million to Google and Facebook, respectively) to these
companies for almost three years until he was arrested and
prisoned for 30 years. Which type of Phishing attack is this?
A)Angler
B)whaling
C)Spear
D)Deceptive
So far we learned about
various CYBER CRIME
In Cyber Crime:
Computer is used either as a Target or a
weapon
General Knowledge:
Few other Cyber Crime related Terminologies
• Computer Vandalism
• Software Piracy
• Malware
• Virus
• Trojan Horse
• Worms
• Spyware
• Ransomware
/hardware
Software Piracy
•The use and or distribution of copyrighted
computer software in violation of the
copyright laws or applicable license
restrictions.
•Video on Malware- Differences between Virus,
Worm, Trojan Horse, Ransomware and Spyware.
Quiz time:
1)The malware which needs host program?
A)Worm
B)Virus
Quiz time:
1)The malware which needs host program?
• A)Worm- standalone
• B)Virus- needs host program
Quiz time:
2)The malware which looks legitimate but acts as a backdoor function
for various attacks?
• A)Worm
• B)Virus
• C)Trojan Horse
Quiz time:
2)The malware which acts as a backdoor for various attacks?
• A)Worm
• B)Virus
• C) Trojan Horse
Quiz time:
3)The malware which makes the victim blocked from access unless a
ransom is paid off?
A)Worm
B)Ransomware
C) Spyware
Quiz time:
3)The malware which makes the victim blocked from access unless a
ransom is paid off?
A)Worm
B)Ransomware
C) Spyware
Quiz time:
4) A type of computer program that is secretly installed on a person's
computer or mobile device in order to obtain the owner's private
information, such as lists of websites visited, passwords, and credit
card numbers.
A)Spyware
C) Ransomware
Quiz time:
4) A type of computer program that is secretly installed on a person's
computer or mobile device in order to obtain the owner's private
information, such as lists of websites visited, passwords, and credit
card numbers.
A)Spyware
C) Ransomware
Quiz time:
5)A piece of code that can copy itself and damage the system or
destroy data
A)Worm
B)Virus
Quiz time:
5)A piece of code that can copy itself and damage the system or
destroy data
A)Worm
B)Virus
Quiz time:
5)A piece of code that can copy itself and damage the system or
destroy data
A)Worm
B)Virus
How to be a SMART & SAFE
NETIZEN?
Cyber Crime

More Related Content

Similar to Cyber Crime

Hacking
HackingHacking
Hacking
LutfulM
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
Jose L. Quiñones-Borrero
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
Nalneesh Gaur
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Arnav Chowdhury
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
santhuana sg
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
JatinRajput67
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
hacking
hackinghacking
hacking
mayank1293
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Ratnesh Sharma
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
CUInnovationTeam
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
Parveen Bala
 

Similar to Cyber Crime (20)

Hacking
HackingHacking
Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
hacking
hackinghacking
hacking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Cyber Crime

  • 1. UNIT 2- Cyber Safety
  • 2. What is hacking/ hacker • A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. • Hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system.
  • 3. History of Hacking: First computer hack was in late 1960s when bell labs successfully hacked and modified a UNIX operating system Three phases of hacking: 1)Phase 1: the 1960’s and 1970’s 2)Phase 2: period from 1970’s to 1990’s 3)Phase 3: Beginning in the mid 1990’s with growth of the web.
  • 4.
  • 5.
  • 6. Who were the first hackers? • John draper • Kevin Poulsen • Robert Tappen Morris
  • 7.
  • 8. QUIZ: Suppose you want to learn some hacking skills for good purpose and you start learning by demonstrating hacking techniques which is developed by others. Who are you ? A. Green Hat Hacker B. Black Hat Hacker C. White Hat Hacker D. Red Hat Hacker
  • 9. QUIZ: Who are ethical hackers? A. Green Hat Hacker B. Black Hat Hacker C. White Hat Hacker D. Red Hat Hacker
  • 10. PHISHING: an email fraud method
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. PHARMING: Unobvious substitution of the original website
  • 16.
  • 17.
  • 18. Whenever you visit a banking or e-commerce website, look for a “locked padlock” icon somewhere in the window of the browser, and ensure that the site’s URL begins with “https”. Presence of these two elements signify that you are on a secured website.
  • 20.
  • 21.
  • 23.
  • 24. QUIZ: secret redirection of users to third-party websites?
  • 25.
  • 26. • In phishing – via e-mail. • In vishing – by means of a phone call. • In smishing – via SMS. • In pharming – secret redirection of users to third-party websites?
  • 27.
  • 28. How to protect yourself from Phishing, Vishing, Smishing, Pharming?
  • 29. •Every time pay attention to the sender and subject of the message. If they look suspicious, just delete these emails or SMS; •Do not click the suggested links in emails and messages from an unknown sender; •Never reply to messages requesting personal information; •Watch for mistakes in the text, if you find them, most likely the letter is a hoax; •Files attached to an unknown message that have .exe, .msi, .bat, .pif, .com, .vbs, .reg, and .zip extensions can install malicious software, there is no point to open them
  • 30. Types of Phishing • Spear Phishing • Whaling • Deceptive Phishing • Angler Phishing
  • 31. Spear phishing involves targeting a specific organization to try to steal their login credentials. EXAMPLE : Threat Group-4127 (Fancy Bear) targeted Hillary Clinton's campaign with spear phishing attacks on over 1,800 Google accounts, using the accounts- google.com domain to threaten targeted users.
  • 33. Whaling : phishing techniques to target senior executives(CEOs) and other high- profile individuals with customized content
  • 34.
  • 35.
  • 36.
  • 37. Deceptive Phishing: refers to any attack where the attacker impersonates a legitimate company in an attempt to steal your personal information or your login credentials.
  • 38.
  • 39.
  • 41.
  • 42.
  • 43. Angler Phishing: • Angler phishing is a type of phishing attack that targets social media users. A hacker creates a fake social media account and pretends to be a customer service employee working for a company. Next, they contact customers of that company who have made complaints on social media.
  • 44. QUIZ: You get an email from a bank claiming that your account has been frozen unless you click on the link provided and enter your account information. Which type of Phishing attack is this? A)Angler B)whaling C)Spear D)Deceptive
  • 45. QUIZ: You get an email that’s supposedly from your CEO saying they need you to wire transfer the money, Which type of Phishing attack is this? A)Angler B)whaling C)Spear D)Deceptive
  • 46. QUIZ: Between 2013 and 2015, Evaldas Rimasauskas impersonated a Taiwanese hardware supplier, Quanta computer, whose services were used by two tech giants, Google and Facebook. He sent out fake invoices worth $122 million ($99 million and $23 million to Google and Facebook, respectively) to these companies for almost three years until he was arrested and prisoned for 30 years. Which type of Phishing attack is this? A)Angler B)whaling C)Spear D)Deceptive
  • 47.
  • 48. So far we learned about various CYBER CRIME
  • 49. In Cyber Crime: Computer is used either as a Target or a weapon
  • 50. General Knowledge: Few other Cyber Crime related Terminologies • Computer Vandalism • Software Piracy • Malware • Virus • Trojan Horse • Worms • Spyware • Ransomware
  • 51.
  • 53.
  • 54. Software Piracy •The use and or distribution of copyrighted computer software in violation of the copyright laws or applicable license restrictions.
  • 55. •Video on Malware- Differences between Virus, Worm, Trojan Horse, Ransomware and Spyware.
  • 56. Quiz time: 1)The malware which needs host program? A)Worm B)Virus
  • 57. Quiz time: 1)The malware which needs host program? • A)Worm- standalone • B)Virus- needs host program
  • 58. Quiz time: 2)The malware which looks legitimate but acts as a backdoor function for various attacks? • A)Worm • B)Virus • C)Trojan Horse
  • 59. Quiz time: 2)The malware which acts as a backdoor for various attacks? • A)Worm • B)Virus • C) Trojan Horse
  • 60. Quiz time: 3)The malware which makes the victim blocked from access unless a ransom is paid off? A)Worm B)Ransomware C) Spyware
  • 61. Quiz time: 3)The malware which makes the victim blocked from access unless a ransom is paid off? A)Worm B)Ransomware C) Spyware
  • 62. Quiz time: 4) A type of computer program that is secretly installed on a person's computer or mobile device in order to obtain the owner's private information, such as lists of websites visited, passwords, and credit card numbers. A)Spyware C) Ransomware
  • 63. Quiz time: 4) A type of computer program that is secretly installed on a person's computer or mobile device in order to obtain the owner's private information, such as lists of websites visited, passwords, and credit card numbers. A)Spyware C) Ransomware
  • 64. Quiz time: 5)A piece of code that can copy itself and damage the system or destroy data A)Worm B)Virus
  • 65. Quiz time: 5)A piece of code that can copy itself and damage the system or destroy data A)Worm B)Virus
  • 66. Quiz time: 5)A piece of code that can copy itself and damage the system or destroy data A)Worm B)Virus
  • 67.
  • 68. How to be a SMART & SAFE NETIZEN?