SlideShare a Scribd company logo
1 of 12
Cyber Crime
By:
Locksmith In Miami
You Are Not Safe Online
• Every year, many people become victim of cyber crime. And the deep dark
web is dragging everyday many teenagers unknowingly to the world of cyber
crime.
• Bullying, email account hacking, posting some data on internet which may
harm some individual, or sending a virus top someone’s computer to delete
their data or to hack into their PC. Everything is Cyber Crime.
Let’s talk about some facts about the Cyber Crime Facts
“BRAIN”
The First Ever Computer Virus
• “BRAIN” was made in 1986.
• It was designed by two Brothers in
Lahore, Pakistan.
• They were Amjad Farooq Alvi and
Basit Farooq Alvi.
First Computer Virus
• Was designed in 1982.
• It was named “Elk Cloner”.
• Was designed by Richard Skrenta.
• It attached itself to Apple DOS 3.3
OS and spread via Floppy Disk.
99% Of The Computers Are Venerable to
Virus attack
Social Networking Sites are More Preferred For
Making Cyber Attacks
Updating Your Anti-Virus
Software is Must
Longer Is The Password, Longer Time Will be Required To
Hack The Account. A 6 character password can be cracked
In Just 10 Mins But A 7 Character Alphanumeric Password
Both Upper Case & Lower Case will take 3 Years to get
Hacked
Few Things You Can Do To Avoid Being
Hacked
• Don’t reply to any suspicious mail with subject “Claim your prize worth
$10,000” or any other mail not ending with gmail, yahoo, outlook or any
other registered Website.
• Keep your Antivirus Updated.
• Use web browsers on “Incognito Mode” on public PC’s.
• Keep changing your antivirus every 50 days.
• Always use longer Alpha-numeric Passwords with Uppercase and Lower
Case Letters.
Thanks For Watching
Use Antivirus For Your PC
And
Call Locksmith For Your Home Security
By:
Locksmith In Miami
https://www.locksmithinmiami24hr.com/
305-224-1980
Use Anti-Virus For Your PC
And
Strong Security System For Your Home

More Related Content

What's hot

WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 

What's hot (20)

Powerpoint fp
Powerpoint fpPowerpoint fp
Powerpoint fp
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Avoid the Hack
Avoid the HackAvoid the Hack
Avoid the Hack
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Hacking
HackingHacking
Hacking
 
Hacker
HackerHacker
Hacker
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 

Viewers also liked

Ensayo acerca del sobreendeudamiento
Ensayo acerca del sobreendeudamientoEnsayo acerca del sobreendeudamiento
Ensayo acerca del sobreendeudamiento
Vladimir Rosario
 

Viewers also liked (12)

Educación especial
Educación especialEducación especial
Educación especial
 
Ensayo acerca del sobreendeudamiento
Ensayo acerca del sobreendeudamientoEnsayo acerca del sobreendeudamiento
Ensayo acerca del sobreendeudamiento
 
(Transformar) Aspectos Jurídicos 2
(Transformar) Aspectos Jurídicos 2(Transformar) Aspectos Jurídicos 2
(Transformar) Aspectos Jurídicos 2
 
Your Story: The Bedrock of Customer Experience.
Your Story: The Bedrock of Customer Experience.Your Story: The Bedrock of Customer Experience.
Your Story: The Bedrock of Customer Experience.
 
Elizbel medina
Elizbel medinaElizbel medina
Elizbel medina
 
Electroterapia
ElectroterapiaElectroterapia
Electroterapia
 
(Transformar 16) sessão 5
(Transformar 16) sessão 5(Transformar 16) sessão 5
(Transformar 16) sessão 5
 
(Transformar) Gestão Financeira-dia1
(Transformar) Gestão Financeira-dia1(Transformar) Gestão Financeira-dia1
(Transformar) Gestão Financeira-dia1
 
Trimetazidine 5011-34-7-api
Trimetazidine 5011-34-7-apiTrimetazidine 5011-34-7-api
Trimetazidine 5011-34-7-api
 
Servicios de Educación Especial
Servicios de Educación EspecialServicios de Educación Especial
Servicios de Educación Especial
 
Sistema Nervioso Autónomo - Neuropsicologia
Sistema Nervioso Autónomo - NeuropsicologiaSistema Nervioso Autónomo - Neuropsicologia
Sistema Nervioso Autónomo - Neuropsicologia
 
Estrategias y Adaptaciones en el salón de clase para estudiantes con DDAH - E...
Estrategias y Adaptaciones en el salón de clase para estudiantes con DDAH - E...Estrategias y Adaptaciones en el salón de clase para estudiantes con DDAH - E...
Estrategias y Adaptaciones en el salón de clase para estudiantes con DDAH - E...
 

Similar to Cyber crime

Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
Radiant Minds
 

Similar to Cyber crime (20)

Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
cyber crime
cyber crimecyber crime
cyber crime
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
ICT Security is Everyone's Business
ICT Security is Everyone's BusinessICT Security is Everyone's Business
ICT Security is Everyone's Business
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Recently uploaded

PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
PoojaGadiya1
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
SS A
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
E LSS
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
SS A
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
anilsa9823
 

Recently uploaded (20)

Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 

Cyber crime

  • 2. You Are Not Safe Online • Every year, many people become victim of cyber crime. And the deep dark web is dragging everyday many teenagers unknowingly to the world of cyber crime. • Bullying, email account hacking, posting some data on internet which may harm some individual, or sending a virus top someone’s computer to delete their data or to hack into their PC. Everything is Cyber Crime.
  • 3. Let’s talk about some facts about the Cyber Crime Facts
  • 4. “BRAIN” The First Ever Computer Virus • “BRAIN” was made in 1986. • It was designed by two Brothers in Lahore, Pakistan. • They were Amjad Farooq Alvi and Basit Farooq Alvi.
  • 5. First Computer Virus • Was designed in 1982. • It was named “Elk Cloner”. • Was designed by Richard Skrenta. • It attached itself to Apple DOS 3.3 OS and spread via Floppy Disk.
  • 6. 99% Of The Computers Are Venerable to Virus attack
  • 7. Social Networking Sites are More Preferred For Making Cyber Attacks
  • 9. Longer Is The Password, Longer Time Will be Required To Hack The Account. A 6 character password can be cracked In Just 10 Mins But A 7 Character Alphanumeric Password Both Upper Case & Lower Case will take 3 Years to get Hacked
  • 10. Few Things You Can Do To Avoid Being Hacked • Don’t reply to any suspicious mail with subject “Claim your prize worth $10,000” or any other mail not ending with gmail, yahoo, outlook or any other registered Website. • Keep your Antivirus Updated. • Use web browsers on “Incognito Mode” on public PC’s. • Keep changing your antivirus every 50 days. • Always use longer Alpha-numeric Passwords with Uppercase and Lower Case Letters.
  • 11. Thanks For Watching Use Antivirus For Your PC And Call Locksmith For Your Home Security
  • 12. By: Locksmith In Miami https://www.locksmithinmiami24hr.com/ 305-224-1980 Use Anti-Virus For Your PC And Strong Security System For Your Home