SlideShare a Scribd company logo
1 of 13
PRESENTATION ON
DIFFERENT TYPE OF MALICIOUS ATTACK
BY
PRASMITPRADHAN
REGISTRATION NO. A217131523056
M.SC CYBER SECURITY
CONTENT
WHAT IS MALICIOUS ATTACK
TYPES OF MALICIOUS ATTACK
HOW TO PREVENT MALWARE ATTACK
REFERENCES
MALICIOUS ATTACK
• Malicious attack is also known as malware
attack.
• Malware attacks are any type of malicious
software designed to cause harm or
damage to a computer or damage to a
computer, server, or computer network.
• Malicious attack encompass a wide range
of harmful activities carried with ill intent.
TYPES OF MALICIOUS ATTACK
 There are different types of malicious attack such as:-
• Malware
• Phishing
• Cyberstalking
• Insider threats
• Social engineering
MALWARE
• Malware is any software intentionally
designed to cause disruption to a computer,
server, leak information.
• Malware poses serious problems to
individuals and businesses on the internet.
• Researchers tend to classify malware into
one or more subtypes such as viruses,
worms, Trojan horses, ransomware,
adware, rootkit, etc.
PHISHING
• Phishing is the from of social engineering and scam where attackers
deceive people into revealing sensitive information or installing malware
such as ransomware.
• The term phishing was first recorded in 1995 in the cracking toolkit
AOHell, but may have been used earlier in the hacker magazine 2600.
• It is a variation of fishing and refers to the use of lures to “fish” for
sensitive information.
• There are different types of phishing attack including Email phishing,
Spear phishing, Pharming, Vishing, Smishing.
CYBER STALKING
• Cyber stalking is the use of internet or other
electronic means to stalk or harass an individual,
group, or organization.
• It may include false accusations,defamation, slander,
libel, monitoring, threats, vandalism, doxing.
• Cyber stalking is often accompanied by realtime or
offline stalking.
• Cyber stalking mainly occurs in Email, Chatrooms,
Internet sites, New groups.
INSIDER THREATS
• A insider attack refers to a cyber
security risk that originates from
within an organisation.
• It is a malicious action such as
employees stealing data,
compromising security or leaking
information.
SOCIAL ENGINEERING
• Manipulating people into revealing
confidential information or performing
actions they shouldn’t often through
psychological tactics.
• Social engineering involves email or other
communication that invokes urgency, fear,
or similar emotion in the victim, leading the
victim to reveal sensitive information.
HOW TO PREVENT MALICIOUS ATTACK
REFERENCES
• https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/
• https://arcticwolf.com/resources/blog/8-types-of-malware/
• https://www.geeksforgeeks.org/malware-and-its-types/amp/
• https://www.rapid7.com/fundamentals/malware-attacks/
• https://antivirus.comodo.com/security/malware-attack.php
THANK YOU.

More Related Content

Similar to CYBER FORENSIC PRESENTATION and cyber.pptx

Exploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat LandscapeExploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat Landscapecyberprosocial
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt finalSanishShrestha2
 
Cybersecurity Threats | Cyber Attack | Cyber Crime
Cybersecurity Threats | Cyber Attack | Cyber CrimeCybersecurity Threats | Cyber Attack | Cyber Crime
Cybersecurity Threats | Cyber Attack | Cyber CrimeCyber Security Experts
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 

Similar to CYBER FORENSIC PRESENTATION and cyber.pptx (20)

CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Exploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat LandscapeExploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat Landscape
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber security cyber security
cyber security
 
Cybersecurity Threats | Cyber Attack | Cyber Crime
Cybersecurity Threats | Cyber Attack | Cyber CrimeCybersecurity Threats | Cyber Attack | Cyber Crime
Cybersecurity Threats | Cyber Attack | Cyber Crime
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Attack types
Attack typesAttack types
Attack types
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

CYBER FORENSIC PRESENTATION and cyber.pptx

  • 1. PRESENTATION ON DIFFERENT TYPE OF MALICIOUS ATTACK BY PRASMITPRADHAN REGISTRATION NO. A217131523056 M.SC CYBER SECURITY
  • 2. CONTENT WHAT IS MALICIOUS ATTACK TYPES OF MALICIOUS ATTACK HOW TO PREVENT MALWARE ATTACK REFERENCES
  • 3. MALICIOUS ATTACK • Malicious attack is also known as malware attack. • Malware attacks are any type of malicious software designed to cause harm or damage to a computer or damage to a computer, server, or computer network. • Malicious attack encompass a wide range of harmful activities carried with ill intent.
  • 4. TYPES OF MALICIOUS ATTACK  There are different types of malicious attack such as:- • Malware • Phishing • Cyberstalking • Insider threats • Social engineering
  • 5. MALWARE • Malware is any software intentionally designed to cause disruption to a computer, server, leak information. • Malware poses serious problems to individuals and businesses on the internet. • Researchers tend to classify malware into one or more subtypes such as viruses, worms, Trojan horses, ransomware, adware, rootkit, etc.
  • 6. PHISHING • Phishing is the from of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware. • The term phishing was first recorded in 1995 in the cracking toolkit AOHell, but may have been used earlier in the hacker magazine 2600. • It is a variation of fishing and refers to the use of lures to “fish” for sensitive information. • There are different types of phishing attack including Email phishing, Spear phishing, Pharming, Vishing, Smishing.
  • 7.
  • 8. CYBER STALKING • Cyber stalking is the use of internet or other electronic means to stalk or harass an individual, group, or organization. • It may include false accusations,defamation, slander, libel, monitoring, threats, vandalism, doxing. • Cyber stalking is often accompanied by realtime or offline stalking. • Cyber stalking mainly occurs in Email, Chatrooms, Internet sites, New groups.
  • 9. INSIDER THREATS • A insider attack refers to a cyber security risk that originates from within an organisation. • It is a malicious action such as employees stealing data, compromising security or leaking information.
  • 10. SOCIAL ENGINEERING • Manipulating people into revealing confidential information or performing actions they shouldn’t often through psychological tactics. • Social engineering involves email or other communication that invokes urgency, fear, or similar emotion in the victim, leading the victim to reveal sensitive information.
  • 11. HOW TO PREVENT MALICIOUS ATTACK
  • 12. REFERENCES • https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/ • https://arcticwolf.com/resources/blog/8-types-of-malware/ • https://www.geeksforgeeks.org/malware-and-its-types/amp/ • https://www.rapid7.com/fundamentals/malware-attacks/ • https://antivirus.comodo.com/security/malware-attack.php