SlideShare a Scribd company logo
1 of 31
The Unsung Hero of the Digital
Age
Made By : Azim Shaikh
Shri Shivaji College , Parbhani
Table Of Contents
1
Introduction
 What Is Cybersecurity?
 What Is Cyber Attack?
 Real Life Examples
2
3
4
Histor
y
Need , Types &
Tools
 Its Need
 Threats And Viruses
 Tools Used In CS
 Inventor
 First Virus
 Antivirus
 How To Be Safe In This
Digital World
 Types Of Security Concerns
Safet
y
Scenario
Secure
Savings
Best Way?
Why Bank ?
 Multi-Factor
Authentication  Data
Encryption
 Regular Security
Updates
CYBERSECURITY
CYBER
 Computer System, Network,
Program or Data
SECURITY
 System security, network
security, Program or data
security
What Is
Cybersecurity?
Cyber Security is the
protection of internet
connected system including
hardware, software and program
or data from cyber attacks.
What Is Cyber Attack
?
A cyberattack is like a digital assault
launched by someone (or something) with
malicious intent. Their goal is to harm,
disrupt, or gain unauthorized access to a
computer system, network, or device.
What Is Cyber Threat
?
A cyberthreat refers to anything that has
the potential to cause serious harm to a
computer system. A cyberthreat is something
that may or may not happen, but has the
potential to cause serious damage.
Cyberthreats can lead to attacks on
computer systems, networks and more
Real Life
Examples
Locking your
phone with a
PIN
Using strong
password for
online accounts
Having Antivirus
s/w on your
computer
Being careful about
clicking suspicious
links
Histor
y
1940 : The time before
cybercrime
 Limited Users & Access in 1940-
43
 Lacked interconnectivity
 John Neumann proposed self-
replicating computer programs
in 1949
Histor
y
The Phone Phreaks
 Not a digital Crime but start
of it
 Phreaks manipulate protocols
and make telecommunication free
of cost.
 Remotely operate on the network
 Application in the development
of apple computers
Histor
y
Birth Of Ethical Hacking
 Emerged in 1960s
 Initial motivation : Fun &
modification
 Technology evolved & hacking
shifted to towards computer
system
 1967 IBM incident
 Ethical hacking defined
ARPANET And The Creeper
 Birth of cybersecurity
 Bob Thomas created the “Creeper
virus” in 1971 (non-malicious
program)
 Replicated across ARPANET
 1972 Reaper (Anti-Virus)
Antivirus Program &
Threats
 1980s witnessed emergence of
first commercial antivirus
program
 Popularization of Trojan,
Computer Virus
Need Of
Cybersecurity
Protect Private &
Intellectual Data
Protect National Security
Protect Banking &
Financial Data
Protect Sensitive Data
Types Of Cyberattacks
MALWARE
Types Of Cyberattacks
SOCIAL ENGINEERING
Types Of Cyberattacks
MITM ATTACK
Types Of Cyberattacks
DDoS Attack
Types Of Cyberattacks
OTHER ATTACKS NEXT
SLIDE
MALWARE
Short for “malicious software”—is
software code written
intentionally to harm a computer
system or its users.
It includes Ransomware, Trojan
Horse, Spyware, Worms
SOCIAL ENGINEERING
social engineering(human
hacking) manipulates targets into
taking actions that expose confidential
information, threaten their own or their
organization’s financial well-being, or
otherwise compromise personal or
organizational security.
Man In The
Middle(MITM)
In a man-in-the-middle attack, a
cybercriminal eavesdrops on a network
connection to intercept and relay
messages between two parties and
steal data. Unsecured Wi-Fi networks
are often happy hunting grounds for
hackers looking to launch MITM
attacks.
Denial-Of-
Service(DDoS)
A denial-of-service attack is a
cyberattack that overwhelms a
website, application, or system
with volumes of fraudulent
traffic, making it too slow to
use or entirely unavailable to
legitimate users
OTHER ATTACKS
 SQL Injection
 Password Attack
 IoT Attack
 Injection Attacks
 And Many More…
HOW TO BE SAFE IN
THIS DIGITAL WORLD
?
Being cautious about
clicking on suspicious
links or opening
attachments in emails,
even if they appear to
be from someone you
know.
Suspicious
Links
Using strong and unique
passwords for every
online account, and
enabling two-factor
authentication (2FA)
whenever possible.
Authenticatio
n
Don’t use common and
general passwords like
starting number series,
phone number, DOB,
nicknames, etc. Use
alphanumeric characters
and symbols
Strong
Password
Regularly backing up
important data on an
external drive or cloud
storage.
Data Backup
Using strong and unique
passwords for every online
account, and enabling two-
factor authentication (2FA)
whenever possible.
Use VPN
(Optional)
THANK YOU
Made By : Azim
Shaikh

More Related Content

Similar to Cybersecurity : The unsung hero of the digital world (PPT)

4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptxNIMMANAGANTI RAMAKRISHNA
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxmalik298381
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfSejalDesai30
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfRahulDasari12
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 

Similar to Cybersecurity : The unsung hero of the digital world (PPT) (20)

Cyber security
Cyber securityCyber security
Cyber security
 
4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx4247174743543535355-Cyber-Security-Ppt.pptx
4247174743543535355-Cyber-Security-Ppt.pptx
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdfcybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lecture_2.pptx.pdf
Lecture_2.pptx.pdfLecture_2.pptx.pdf
Lecture_2.pptx.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
cybersec sumit (1).pptx
cybersec sumit (1).pptxcybersec sumit (1).pptx
cybersec sumit (1).pptx
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Cybersecurity : The unsung hero of the digital world (PPT)

  • 1. The Unsung Hero of the Digital Age Made By : Azim Shaikh Shri Shivaji College , Parbhani
  • 2. Table Of Contents 1 Introduction  What Is Cybersecurity?  What Is Cyber Attack?  Real Life Examples 2 3 4 Histor y Need , Types & Tools  Its Need  Threats And Viruses  Tools Used In CS  Inventor  First Virus  Antivirus  How To Be Safe In This Digital World  Types Of Security Concerns Safet y
  • 3. Scenario Secure Savings Best Way? Why Bank ?  Multi-Factor Authentication  Data Encryption  Regular Security Updates
  • 4. CYBERSECURITY CYBER  Computer System, Network, Program or Data SECURITY  System security, network security, Program or data security
  • 5. What Is Cybersecurity? Cyber Security is the protection of internet connected system including hardware, software and program or data from cyber attacks.
  • 6. What Is Cyber Attack ? A cyberattack is like a digital assault launched by someone (or something) with malicious intent. Their goal is to harm, disrupt, or gain unauthorized access to a computer system, network, or device.
  • 7. What Is Cyber Threat ? A cyberthreat refers to anything that has the potential to cause serious harm to a computer system. A cyberthreat is something that may or may not happen, but has the potential to cause serious damage. Cyberthreats can lead to attacks on computer systems, networks and more
  • 8. Real Life Examples Locking your phone with a PIN Using strong password for online accounts Having Antivirus s/w on your computer Being careful about clicking suspicious links
  • 9. Histor y 1940 : The time before cybercrime  Limited Users & Access in 1940- 43  Lacked interconnectivity  John Neumann proposed self- replicating computer programs in 1949
  • 10. Histor y The Phone Phreaks  Not a digital Crime but start of it  Phreaks manipulate protocols and make telecommunication free of cost.  Remotely operate on the network  Application in the development of apple computers
  • 11. Histor y Birth Of Ethical Hacking  Emerged in 1960s  Initial motivation : Fun & modification  Technology evolved & hacking shifted to towards computer system  1967 IBM incident  Ethical hacking defined
  • 12. ARPANET And The Creeper  Birth of cybersecurity  Bob Thomas created the “Creeper virus” in 1971 (non-malicious program)  Replicated across ARPANET  1972 Reaper (Anti-Virus)
  • 13. Antivirus Program & Threats  1980s witnessed emergence of first commercial antivirus program  Popularization of Trojan, Computer Virus
  • 14. Need Of Cybersecurity Protect Private & Intellectual Data Protect National Security Protect Banking & Financial Data Protect Sensitive Data
  • 19. Types Of Cyberattacks OTHER ATTACKS NEXT SLIDE
  • 20. MALWARE Short for “malicious software”—is software code written intentionally to harm a computer system or its users. It includes Ransomware, Trojan Horse, Spyware, Worms
  • 21. SOCIAL ENGINEERING social engineering(human hacking) manipulates targets into taking actions that expose confidential information, threaten their own or their organization’s financial well-being, or otherwise compromise personal or organizational security.
  • 22. Man In The Middle(MITM) In a man-in-the-middle attack, a cybercriminal eavesdrops on a network connection to intercept and relay messages between two parties and steal data. Unsecured Wi-Fi networks are often happy hunting grounds for hackers looking to launch MITM attacks.
  • 23. Denial-Of- Service(DDoS) A denial-of-service attack is a cyberattack that overwhelms a website, application, or system with volumes of fraudulent traffic, making it too slow to use or entirely unavailable to legitimate users
  • 24. OTHER ATTACKS  SQL Injection  Password Attack  IoT Attack  Injection Attacks  And Many More…
  • 25. HOW TO BE SAFE IN THIS DIGITAL WORLD ?
  • 26. Being cautious about clicking on suspicious links or opening attachments in emails, even if they appear to be from someone you know. Suspicious Links
  • 27. Using strong and unique passwords for every online account, and enabling two-factor authentication (2FA) whenever possible. Authenticatio n
  • 28. Don’t use common and general passwords like starting number series, phone number, DOB, nicknames, etc. Use alphanumeric characters and symbols Strong Password
  • 29. Regularly backing up important data on an external drive or cloud storage. Data Backup
  • 30. Using strong and unique passwords for every online account, and enabling two- factor authentication (2FA) whenever possible. Use VPN (Optional)
  • 31. THANK YOU Made By : Azim Shaikh