SlideShare a Scribd company logo
1 of 17
Name : Aman
Class : 11
Subject : Computer Science
Topic : Cyber Crime And Cyber Safety
Roll Number : 38
School : Kendriya Vidyalaya No. 1(Army)
Jodhpur, Rajasthan
Cyber Crime
Hacking, Eavesdropping, Phishing and Fraud Emails,
Ransomware, Preventing cyber crime
Cyber Crime
• A cybercrime is a crime that involves a computer or a computer network.
The computer may have been used in committing the crime, or it may be the
target. Cybercrime may harm someone's security or finances.
• Most Common Cyber Crime :- The most common cyber crime are email
frauds, social media frauds, banking frauds, ransomware attacks, cyber
espionage, identity theft, clickjacking, spyware, etc.
Hacking
• Hacking is the unauthorized use of or access into computers or networks by
using security vulnerabilities or bypassing usual security steps to gain access.
Criminals may hack systems or networks to steal money or information, or
simply to disrupt businesses.
• Types of Hacking :-
• Black hat hackers
• White hat hackers
• Gray hat hackers
Black Hat Hackers
• Black hat hackers are malicious hackers, sometimes called crackers. Black hats
lack ethics, sometimes violate laws, and break into computer systems with
malicious intent, and they may violate the confidentiality, integrity, or
availability of an organization's systems and data.
• Black hat hackers use phishing, malware, or other forms of attacks to steal
data or penetrate systems with malicious intent. Their motives can vary from
financial to political, or they can simply be showing off their own skills.
White Hat Hackers
• A white hat hacker or ethical hacker is an individual who uses hacking skills
to identify security vulnerabilities in hardware, software or networks.
However, unlike black hat hackers or malicious hackers white hat hackers
respect the rule of law as it applies to hacking.
• A White Hat hacker tests systems and networks by trying to break into them.
They are hackers, but their talents are being used to improve Cyber Security.
Gray Hat Hacker
• Gray hat hackers enact a blend of both black hat and white hat activities.
Gray hat hackers often look for vulnerabilities in a system without the
owner's permission or knowledge. If issues are found, they report them to
the owner, sometimes requesting a small fee to fix the problem.
• White-Hat Hackers works for the organizations and government. Black -Hat
Hackers are criminals who violate computer security for their owner's
personal gain. Gray-Hat Hackers find issues in a system without the owner's
permission.
Eavesdropping
• An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of
information as it is transmitted over a network by a computer, smartphone, or another
connected device. The attack takes advantage of unsecured network communications to
access data as it is being sent or received by its user.
• Phishing attacks, weak password security, application-layer loopholes, etc., are all ways for a
hacker to gain access to sensitive information inconspicuously. At this point, the hacker can
listen in on various communication channels, steal data, and much more.
• There are two types of eavesdropping attacks; passive eavesdropping and active
eavesdropping. With passive eavesdropping, the hacker simply “listens” to data that is
passing through the network. With active eavesdropping, hackers disguise themselves.
Phishing And Fraud Emails
• Phishing attacks are the practice of sending fraudulent communications that
appear to come from a reputable source. It is usually done through email.
The goal is to steal sensitive data like credit card and login information, or to
install malware on the victim's machine.
• Example :- An email from PayPal arrives telling the victim that their account
has been compromised and will be deactivated unless they confirm their
credit card details. The link in the phishing email takes the victim to a fake
PayPal website and the stolen credit card information is used to commit
further crimes.
Ransomware
• Ransomware is a form of malware that encrypts a victim's files. The attacker
then demands a ransom from the victim to restore access to the data upon
payment. Users are shown instructions for how to pay a fee to get the
decryption key.
• Although there are countless strains of ransomware, they mainly fall into two
main types of ransomware. These are crypto-ransomware and locker
ransomware.
Preventing Cyber Crime
• Using anti-virus or a comprehensive internet security solution is a smart way
to protect your system from attacks. Anti-virus software allows you to scan,
detect and remove threats before they become a problem.
• Prevention is the key to reducing the risk of a data breach. By investing in
cybersecurity software, using a VPN, and being aware of common attack
methods, individuals and organizations can deter hackers and keep their data
private.
Cyber Safety
Safely browsing the web, Identity protection, Confidentiality,
Cyber Trolls and Bullying.
Cyber Safety
• Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks. It's
also known as information technology security or electronic information
security.
• The 3 major types of cyber security are network security, cloud security, and
physical security. Your operating systems and network architecture make up
your network security. It can include network protocols, firewalls, wireless
access points, hosts, and servers.
Safely Browsing The Web
Secure browsing involves the use of special security architecture to allow for
Web browsing that is more protected from various kinds of cyberattacks.
Secure browsing is a phenomenon supported by different types of tools
offered by the makers of Web browsers and other technology companies.
Identity Protection
Never share your password or account numbers over an e-mail or instant
message. Do not follow links from e-mails when conducting financial
transactions; instead, enter the URL yourself. Be wary of callers, pop-ups,
websites, or e-mails asking for personal information.
Confidentiality
Confidentiality means respecting someone's privacy, and abstaining from
sharing personal or potentially sensitive information about an individual,
especially if that information has been shared in confidence.
Cyber Trolls And Bullying
An internet troll, or online bully, deliberately tries to offend, cause trouble or
directly attack people by posting derogatory comments on Facebook posts,
blogs, under YouTube videos, on forums and other social media, such as
Twitter and Instagram.

More Related Content

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber security
cyber security cyber security
cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking
HackingHacking
Hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Hacking
HackingHacking
Hacking
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
cyber crime
cyber crimecyber crime
cyber crime
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Cyber security
Cyber securityCyber security
Cyber security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similar to Cyber Crime And Cyber Safety Project.pptx

Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptxAmeyBarbade1
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?RONIKMEHRA
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online SecurityJeanie Arnoco
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptxGigibella4
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 

Similar to Cyber Crime And Cyber Safety Project.pptx (20)

CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Hacking
HackingHacking
Hacking
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Hacking and Online Security
Hacking and Online SecurityHacking and Online Security
Hacking and Online Security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Cyber Crime And Cyber Safety Project.pptx

  • 1. Name : Aman Class : 11 Subject : Computer Science Topic : Cyber Crime And Cyber Safety Roll Number : 38 School : Kendriya Vidyalaya No. 1(Army) Jodhpur, Rajasthan
  • 2. Cyber Crime Hacking, Eavesdropping, Phishing and Fraud Emails, Ransomware, Preventing cyber crime
  • 3. Cyber Crime • A cybercrime is a crime that involves a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances. • Most Common Cyber Crime :- The most common cyber crime are email frauds, social media frauds, banking frauds, ransomware attacks, cyber espionage, identity theft, clickjacking, spyware, etc.
  • 4. Hacking • Hacking is the unauthorized use of or access into computers or networks by using security vulnerabilities or bypassing usual security steps to gain access. Criminals may hack systems or networks to steal money or information, or simply to disrupt businesses. • Types of Hacking :- • Black hat hackers • White hat hackers • Gray hat hackers
  • 5. Black Hat Hackers • Black hat hackers are malicious hackers, sometimes called crackers. Black hats lack ethics, sometimes violate laws, and break into computer systems with malicious intent, and they may violate the confidentiality, integrity, or availability of an organization's systems and data. • Black hat hackers use phishing, malware, or other forms of attacks to steal data or penetrate systems with malicious intent. Their motives can vary from financial to political, or they can simply be showing off their own skills.
  • 6. White Hat Hackers • A white hat hacker or ethical hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers or malicious hackers white hat hackers respect the rule of law as it applies to hacking. • A White Hat hacker tests systems and networks by trying to break into them. They are hackers, but their talents are being used to improve Cyber Security.
  • 7. Gray Hat Hacker • Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem. • White-Hat Hackers works for the organizations and government. Black -Hat Hackers are criminals who violate computer security for their owner's personal gain. Gray-Hat Hackers find issues in a system without the owner's permission.
  • 8. Eavesdropping • An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of information as it is transmitted over a network by a computer, smartphone, or another connected device. The attack takes advantage of unsecured network communications to access data as it is being sent or received by its user. • Phishing attacks, weak password security, application-layer loopholes, etc., are all ways for a hacker to gain access to sensitive information inconspicuously. At this point, the hacker can listen in on various communication channels, steal data, and much more. • There are two types of eavesdropping attacks; passive eavesdropping and active eavesdropping. With passive eavesdropping, the hacker simply “listens” to data that is passing through the network. With active eavesdropping, hackers disguise themselves.
  • 9. Phishing And Fraud Emails • Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim's machine. • Example :- An email from PayPal arrives telling the victim that their account has been compromised and will be deactivated unless they confirm their credit card details. The link in the phishing email takes the victim to a fake PayPal website and the stolen credit card information is used to commit further crimes.
  • 10. Ransomware • Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. Users are shown instructions for how to pay a fee to get the decryption key. • Although there are countless strains of ransomware, they mainly fall into two main types of ransomware. These are crypto-ransomware and locker ransomware.
  • 11. Preventing Cyber Crime • Using anti-virus or a comprehensive internet security solution is a smart way to protect your system from attacks. Anti-virus software allows you to scan, detect and remove threats before they become a problem. • Prevention is the key to reducing the risk of a data breach. By investing in cybersecurity software, using a VPN, and being aware of common attack methods, individuals and organizations can deter hackers and keep their data private.
  • 12. Cyber Safety Safely browsing the web, Identity protection, Confidentiality, Cyber Trolls and Bullying.
  • 13. Cyber Safety • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. • The 3 major types of cyber security are network security, cloud security, and physical security. Your operating systems and network architecture make up your network security. It can include network protocols, firewalls, wireless access points, hosts, and servers.
  • 14. Safely Browsing The Web Secure browsing involves the use of special security architecture to allow for Web browsing that is more protected from various kinds of cyberattacks. Secure browsing is a phenomenon supported by different types of tools offered by the makers of Web browsers and other technology companies.
  • 15. Identity Protection Never share your password or account numbers over an e-mail or instant message. Do not follow links from e-mails when conducting financial transactions; instead, enter the URL yourself. Be wary of callers, pop-ups, websites, or e-mails asking for personal information.
  • 16. Confidentiality Confidentiality means respecting someone's privacy, and abstaining from sharing personal or potentially sensitive information about an individual, especially if that information has been shared in confidence.
  • 17. Cyber Trolls And Bullying An internet troll, or online bully, deliberately tries to offend, cause trouble or directly attack people by posting derogatory comments on Facebook posts, blogs, under YouTube videos, on forums and other social media, such as Twitter and Instagram.