SlideShare a Scribd company logo
1 of 16
Subject:Cyber Security
Topic:Hacking
 Introduction
 Types of Hacking
1) Spoofing
2) Phishing
3) Computer viruses & Trojan
Horses
4) Credit card froud
5) Internet farming
• Guidelines for adults,
children and teenagers.
• How to protect yourself
 Hacking means an illegal interference into a computer
network or our personal email id.
 The intention can range from financial gains such as
stealing credit card information, transferring money from
various bank accounts to their own account followed by
withdrawal of money.
 It could also be for revenge or a desire to access illegal
information.
 Thus if anyone secures access to a computer without the
consent of the owner shall be legally responsible to pay
compensation of 1 crore rupees under Information
Technology Act ,2000.
 Spoofing refers to an online process which involves sending an
e-mail using a fake name or e-mail id so as to make it appear that
the e-mail has come from someone else other than the real person
who has send.
 Spoofing is done simply faking an identity, such as username.
 Spoofing can take place in the net in many ways. One common
way is by e-mail. E-mail spoofing involves sending messages
using a fake e-mail id or faking the e-mail address of other user.
 Second way of spoofing takes place in the Internet through IP
spoofing. This involves masking the IP address of a computer
system. By hiding(or) faking a system’s IP address, it is difficult
for other systems to find out where the system is transmitting
data from.
 By means of e-mail messages which completely resembles
the original mail messages of consumers, hackers can ask
for confirmation of certain information, like account
information or passwords etc.
 Here consumer might not know the fact that the e-mail
messages are deceiving and would fail to make out the
originality of the messages, this results in huge financial
loss when the hackers use that information for deceitful acts
like withdrawing money from consumers account without
their knowledge
 Phone Phishing – It is done by use of in-voice messages by
the hackers where the consumers are asked to tell their
account identification, and passwords to file a complaint for
any problems concerning their bank accounts etc.
 Viruses are used by Hackers to infect the user’s PC and destroy
the data saved in the system using “payload” in viruses which
carries damaging code.
 Trojan horses, which are attached to other codes, are the main
cause of all illegal access. When a anyone downloads and
installs a Trojan horse, the hacked software kicks off a virus,
password detector, or remote-control switch that gives the
hacker a regulation of the PC.
 This kind of deceit results in Enormous loss to the victim.
This is done by means of publishing bogus digital
signatures.
 Many people lose their credit cards on the way of delivery
to the recipient or its damaged or defective, misrepresented
etc.
 Banks and other financial institutions are vulnerable to the
revolutionary groups to use their sensitive information
resulting in serious loss. There are different ways used by
hackers to gain illegal access to the systems despite using
viruses like Trojans and worms etc.
• Here hacker aims at redirecting the website used by the
client to another fake website by hijacking the user’s
DNS server and altering his I.P address to bogus
website by manipulating the DNS server.
• This redirects user’s original website to a false
deceptive website to achieve illegal information.
 Do not give out personal information such as name,
house address or telephone number in a chat with
strangers.
 Do not send your photos to any one on the Internet
 Do not react to messages which are menacing.
 Never arrange a meeting without informing your
parents.
 keep in mind that people online may not be who they
appear to be.
 Make sure that your passwords comprise of both letters
and numbers, and are no less than eight characters .keep
away from common words. Hackers use programs which
can try each word in the dictionary.
 Don't use your own information,for your login name or
adjoining keys on the keyboard as passwords
 Don't share your account information online or on the
phone
 Protect your system from viruses by anti-virus software
and updating it regularly
 Use diverse passwords for different websites.
 Send credit card information no more than to secure sites
Cyber Security (Hacking)

More Related Content

What's hot

Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and PhishingMason Bird
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Web spoofing (1)
Web spoofing (1)Web spoofing (1)
Web spoofing (1)
 
Phishing
PhishingPhishing
Phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 

Similar to Cyber Security (Hacking)

Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Alexandru Turcu
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAvnish Jain
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfjainutkarsh078
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 

Similar to Cyber Security (Hacking) (20)

Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 

More from Dhrumit Patel

Renewable energy engineering
Renewable energy engineeringRenewable energy engineering
Renewable energy engineeringDhrumit Patel
 
Power Plant Engineering
Power Plant EngineeringPower Plant Engineering
Power Plant EngineeringDhrumit Patel
 
Introduction & Design of Bevel Gears
Introduction & Design of Bevel GearsIntroduction & Design of Bevel Gears
Introduction & Design of Bevel GearsDhrumit Patel
 
Complex Variables and Numerical Methods
Complex Variables and Numerical MethodsComplex Variables and Numerical Methods
Complex Variables and Numerical MethodsDhrumit Patel
 
Pollutants from SI Engine
Pollutants from SI EnginePollutants from SI Engine
Pollutants from SI EngineDhrumit Patel
 
Duct Design & Air distribution
Duct Design & Air distributionDuct Design & Air distribution
Duct Design & Air distributionDhrumit Patel
 
Engineering Economics and Management
Engineering Economics and ManagementEngineering Economics and Management
Engineering Economics and ManagementDhrumit Patel
 
Dynamics Of Machinery
Dynamics Of MachineryDynamics Of Machinery
Dynamics Of MachineryDhrumit Patel
 
Machine Design and Industrial Drafting
Machine Design and Industrial DraftingMachine Design and Industrial Drafting
Machine Design and Industrial DraftingDhrumit Patel
 
Manufacturing Processes (Arc Welding)
Manufacturing Processes (Arc Welding)Manufacturing Processes (Arc Welding)
Manufacturing Processes (Arc Welding)Dhrumit Patel
 
Fluid Power Engineering
Fluid Power EngineeringFluid Power Engineering
Fluid Power EngineeringDhrumit Patel
 
Design Of Machine Elements
Design Of Machine ElementsDesign Of Machine Elements
Design Of Machine ElementsDhrumit Patel
 

More from Dhrumit Patel (18)

Renewable energy engineering
Renewable energy engineeringRenewable energy engineering
Renewable energy engineering
 
Entrepreneurship
EntrepreneurshipEntrepreneurship
Entrepreneurship
 
Power Plant Engineering
Power Plant EngineeringPower Plant Engineering
Power Plant Engineering
 
Introduction & Design of Bevel Gears
Introduction & Design of Bevel GearsIntroduction & Design of Bevel Gears
Introduction & Design of Bevel Gears
 
Hydraulic Motors
Hydraulic MotorsHydraulic Motors
Hydraulic Motors
 
Complex Variables and Numerical Methods
Complex Variables and Numerical MethodsComplex Variables and Numerical Methods
Complex Variables and Numerical Methods
 
Pollutants from SI Engine
Pollutants from SI EnginePollutants from SI Engine
Pollutants from SI Engine
 
Duct Design & Air distribution
Duct Design & Air distributionDuct Design & Air distribution
Duct Design & Air distribution
 
Engineering Economics and Management
Engineering Economics and ManagementEngineering Economics and Management
Engineering Economics and Management
 
Dynamics Of Machinery
Dynamics Of MachineryDynamics Of Machinery
Dynamics Of Machinery
 
Fluid Mechanics
Fluid MechanicsFluid Mechanics
Fluid Mechanics
 
Machine Design and Industrial Drafting
Machine Design and Industrial DraftingMachine Design and Industrial Drafting
Machine Design and Industrial Drafting
 
Manufacturing Processes (Arc Welding)
Manufacturing Processes (Arc Welding)Manufacturing Processes (Arc Welding)
Manufacturing Processes (Arc Welding)
 
Fluid Power Engineering
Fluid Power EngineeringFluid Power Engineering
Fluid Power Engineering
 
Heat Transfer
Heat TransferHeat Transfer
Heat Transfer
 
Design Of Machine Elements
Design Of Machine ElementsDesign Of Machine Elements
Design Of Machine Elements
 
Theory Of Machines
Theory Of MachinesTheory Of Machines
Theory Of Machines
 
Hydraulic Motors
Hydraulic MotorsHydraulic Motors
Hydraulic Motors
 

Recently uploaded

VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 

Cyber Security (Hacking)

  • 2.  Introduction  Types of Hacking 1) Spoofing 2) Phishing 3) Computer viruses & Trojan Horses 4) Credit card froud 5) Internet farming • Guidelines for adults, children and teenagers. • How to protect yourself
  • 3.  Hacking means an illegal interference into a computer network or our personal email id.  The intention can range from financial gains such as stealing credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money.  It could also be for revenge or a desire to access illegal information.  Thus if anyone secures access to a computer without the consent of the owner shall be legally responsible to pay compensation of 1 crore rupees under Information Technology Act ,2000.
  • 4.  Spoofing refers to an online process which involves sending an e-mail using a fake name or e-mail id so as to make it appear that the e-mail has come from someone else other than the real person who has send.  Spoofing is done simply faking an identity, such as username.  Spoofing can take place in the net in many ways. One common way is by e-mail. E-mail spoofing involves sending messages using a fake e-mail id or faking the e-mail address of other user.  Second way of spoofing takes place in the Internet through IP spoofing. This involves masking the IP address of a computer system. By hiding(or) faking a system’s IP address, it is difficult for other systems to find out where the system is transmitting data from.
  • 5.
  • 6.  By means of e-mail messages which completely resembles the original mail messages of consumers, hackers can ask for confirmation of certain information, like account information or passwords etc.  Here consumer might not know the fact that the e-mail messages are deceiving and would fail to make out the originality of the messages, this results in huge financial loss when the hackers use that information for deceitful acts like withdrawing money from consumers account without their knowledge  Phone Phishing – It is done by use of in-voice messages by the hackers where the consumers are asked to tell their account identification, and passwords to file a complaint for any problems concerning their bank accounts etc.
  • 7.
  • 8.  Viruses are used by Hackers to infect the user’s PC and destroy the data saved in the system using “payload” in viruses which carries damaging code.  Trojan horses, which are attached to other codes, are the main cause of all illegal access. When a anyone downloads and installs a Trojan horse, the hacked software kicks off a virus, password detector, or remote-control switch that gives the hacker a regulation of the PC.
  • 9.
  • 10.  This kind of deceit results in Enormous loss to the victim. This is done by means of publishing bogus digital signatures.  Many people lose their credit cards on the way of delivery to the recipient or its damaged or defective, misrepresented etc.  Banks and other financial institutions are vulnerable to the revolutionary groups to use their sensitive information resulting in serious loss. There are different ways used by hackers to gain illegal access to the systems despite using viruses like Trojans and worms etc.
  • 11.
  • 12. • Here hacker aims at redirecting the website used by the client to another fake website by hijacking the user’s DNS server and altering his I.P address to bogus website by manipulating the DNS server. • This redirects user’s original website to a false deceptive website to achieve illegal information.
  • 13.
  • 14.  Do not give out personal information such as name, house address or telephone number in a chat with strangers.  Do not send your photos to any one on the Internet  Do not react to messages which are menacing.  Never arrange a meeting without informing your parents.  keep in mind that people online may not be who they appear to be.
  • 15.  Make sure that your passwords comprise of both letters and numbers, and are no less than eight characters .keep away from common words. Hackers use programs which can try each word in the dictionary.  Don't use your own information,for your login name or adjoining keys on the keyboard as passwords  Don't share your account information online or on the phone  Protect your system from viruses by anti-virus software and updating it regularly  Use diverse passwords for different websites.  Send credit card information no more than to secure sites