SlideShare a Scribd company logo
1 of 6
Download to read offline
CYBER SECURITY
FUNDAMENTALS
Trojan
Trojan can attack financial companies easily. They can break through any
antivirus systems without getting noticed. They are very harmful to any
financial company as they can steal financial information at banks,
insurance companies, and so on. It is hard to protect the data against this
software.
Virus
This is the most basic term of
cybersecurity. It is a harmful software
that damages the system and the
documents. This program multiplies in
number and spreads through infected
files. It does not need a system that is
infected already.
Worms
This program does not cause
any harm, but it multiplies on
its own. It is also harmful
because it can multiply
continuously. So, it eventually
takes up more than half of the
space on the hard disk.
Spyware
Attackers use this software to
spy on a targeted system or
network. If the attacker is
successful at injecting the
spyware, then monitoring every
activity becomes easy for the
attacker.
Scareware
It is a program that is created to scare
any person and make them buy an
anti-virus. After it is installed, they
get a number of messages on the
screen. These messages read that
your system is undergoing an attack
and makes them go into a panic mode.
Like if you love
our slide
For more queries mail us : Support@Sprintzeal.com

More Related Content

Similar to Cybersecurity Fundamentals Explained

Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
himeag
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
ainmz
 

Similar to Cybersecurity Fundamentals Explained (20)

Computervirus
ComputervirusComputervirus
Computervirus
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Computervirus
Computervirus Computervirus
Computervirus
 
Security protection
Security protectionSecurity protection
Security protection
 
Computer malware
Computer malware Computer malware
Computer malware
 
Malware
Malware Malware
Malware
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses
VirusesViruses
Viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 

More from Sprintzeal

Understanding Financial Risk slideshare.pdf
Understanding Financial Risk slideshare.pdfUnderstanding Financial Risk slideshare.pdf
Understanding Financial Risk slideshare.pdf
Sprintzeal
 
Quality Management Interview Questions 2022
Quality Management Interview Questions 2022Quality Management Interview Questions 2022
Quality Management Interview Questions 2022
Sprintzeal
 
Kafka Interview Questions And Answers 2022
Kafka Interview Questions And Answers 2022Kafka Interview Questions And Answers 2022
Kafka Interview Questions And Answers 2022
Sprintzeal
 

More from Sprintzeal (20)

Understanding Financial Risk slideshare.pdf
Understanding Financial Risk slideshare.pdfUnderstanding Financial Risk slideshare.pdf
Understanding Financial Risk slideshare.pdf
 
Gantt Chart Tool presentation.pdf
Gantt Chart Tool presentation.pdfGantt Chart Tool presentation.pdf
Gantt Chart Tool presentation.pdf
 
Quality Management Interview Questions 2022
Quality Management Interview Questions 2022Quality Management Interview Questions 2022
Quality Management Interview Questions 2022
 
Network Analyst Interview Questions and Answers.pdf
Network Analyst Interview Questions and Answers.pdfNetwork Analyst Interview Questions and Answers.pdf
Network Analyst Interview Questions and Answers.pdf
 
Kafka Interview Questions And Answers 2022
Kafka Interview Questions And Answers 2022Kafka Interview Questions And Answers 2022
Kafka Interview Questions And Answers 2022
 
Project Deliverables In Project Management
Project Deliverables In Project ManagementProject Deliverables In Project Management
Project Deliverables In Project Management
 
Data Structures Interview Questions
Data Structures Interview QuestionsData Structures Interview Questions
Data Structures Interview Questions
 
Scrum Interview Questions And Answers 2022
Scrum Interview Questions And Answers 2022Scrum Interview Questions And Answers 2022
Scrum Interview Questions And Answers 2022
 
Most Trending Programming Languages In 2022
Most Trending Programming Languages In 2022Most Trending Programming Languages In 2022
Most Trending Programming Languages In 2022
 
Data Analyst Interview Questions And Answers 2022
Data Analyst Interview Questions And Answers 2022Data Analyst Interview Questions And Answers 2022
Data Analyst Interview Questions And Answers 2022
 
Project Cost Management Guide 2022
Project Cost Management Guide 2022Project Cost Management Guide 2022
Project Cost Management Guide 2022
 
HTML 5 Interview Questions And Answers 2022.pdf
HTML 5 Interview Questions And Answers 2022.pdfHTML 5 Interview Questions And Answers 2022.pdf
HTML 5 Interview Questions And Answers 2022.pdf
 
Future Of Cloud Computing
Future Of Cloud ComputingFuture Of Cloud Computing
Future Of Cloud Computing
 
JIRA Software – Uses, Purpose And Applications
JIRA Software – Uses, Purpose And ApplicationsJIRA Software – Uses, Purpose And Applications
JIRA Software – Uses, Purpose And Applications
 
What Is Data Encryption - Types, Algorithms, Techniques & Methods
What Is Data Encryption - Types, Algorithms, Techniques & MethodsWhat Is Data Encryption - Types, Algorithms, Techniques & Methods
What Is Data Encryption - Types, Algorithms, Techniques & Methods
 
What Is ITIL - Jobs And Certification Benefits
What Is ITIL - Jobs And Certification BenefitsWhat Is ITIL - Jobs And Certification Benefits
What Is ITIL - Jobs And Certification Benefits
 
What Is Pass Percentage For The CAPM Exam?
What Is Pass Percentage For The CAPM Exam?What Is Pass Percentage For The CAPM Exam?
What Is Pass Percentage For The CAPM Exam?
 
DevOps Career Guide 2022
DevOps Career Guide 2022DevOps Career Guide 2022
DevOps Career Guide 2022
 
Top Kubernetes Tools In 2022
Top Kubernetes Tools In 2022Top Kubernetes Tools In 2022
Top Kubernetes Tools In 2022
 
Top Digital Marketing Tools 2022
Top Digital Marketing Tools 2022Top Digital Marketing Tools 2022
Top Digital Marketing Tools 2022
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Cybersecurity Fundamentals Explained

  • 2. Trojan Trojan can attack financial companies easily. They can break through any antivirus systems without getting noticed. They are very harmful to any financial company as they can steal financial information at banks, insurance companies, and so on. It is hard to protect the data against this software.
  • 3. Virus This is the most basic term of cybersecurity. It is a harmful software that damages the system and the documents. This program multiplies in number and spreads through infected files. It does not need a system that is infected already.
  • 4. Worms This program does not cause any harm, but it multiplies on its own. It is also harmful because it can multiply continuously. So, it eventually takes up more than half of the space on the hard disk. Spyware Attackers use this software to spy on a targeted system or network. If the attacker is successful at injecting the spyware, then monitoring every activity becomes easy for the attacker.
  • 5. Scareware It is a program that is created to scare any person and make them buy an anti-virus. After it is installed, they get a number of messages on the screen. These messages read that your system is undergoing an attack and makes them go into a panic mode.
  • 6. Like if you love our slide For more queries mail us : Support@Sprintzeal.com