SlideShare a Scribd company logo
Welcome To Our Group Presentation
Topic : Cyber Crime And Security
Our Group Member List
• S M Shams Qamar • AF22LNB0167
• Muhammad Ehtasham • AF22LNB0169
• Abdul Rehman • AF22LNB0483
• Muhammad Naeem • AF22LNB0179
• Faraz Hassan • AF22LNB0194
S M Shams Qamar
I’m Shams &
My topics is
that’s
1
• Impact of Technology
2
• Introduction Of Topic
3
• Major Topics
Impact of Technology?
Safety Access
Healthcare Socialiazation
Impact
Definition Cyber Security & Cyber Crime?
Major Topics
Topics Malware
Virus
Trojan Horses
Hacking
Password Cracking
Muhammad Ehtasham
I’m Muhammad
Ehtasham
& My Topic is
Virus
Virus
Introduction
Solution
Viruses and Worms
Virus
worms
Solution?
Antivirus software
Protect your network
Operating system up to date
Abdul Rehman
I’m Abdul
Rehman &
My topics Is
That’s
Topics
Malware
Introduction
Solution
Trojan Horses
Introduction
Solution
Malware
Malware
About Solution
About Malware
About
Definition
Way of
Attacks
Effect's
Way of Attacks
Infected Files
Email Attachments
Malicious Websites
Effacts Of Malware
Steal Sensitive Info
Disrupting Normal
Operations
Taking Control
To Stop Malware
Use anti-malware
software
Use a firewall
Educate yourself
Trojan Horses
Trojan Horses
About Solution
About Trojan Horses
About
Definition Effect's
Effact’s
Stealing Passwords
Deleting or Modifying
Files
Installing Additional
SF
Solution?
Use reputable anti-
virus
Use a firewall
Educate yourself
Muhammad Naeem
I’m Muhammad
Naeem & My
topics is that’s
Topics
Hacking
Introduction
Solution
Password
Cracking
Introduction
Method
Securing
Hacking?
Hacking
About Solution
How To prevent hacking?
Use strong passwords
Use two-factor authentication
Use secure connections
Password Cracking
Password Cracking
About Method Securing
Methods for cracking passwords
Brute-force attack
Dictionary attack
Hybrid attack
Securing Password
Store passwords securely
Regularly change passwords
Use strong and unique passwords
Thanks To All

More Related Content

Similar to our ppt.pptx

SecArmour Security Group
SecArmour Security GroupSecArmour Security Group
SecArmour Security Group
Sec Armour
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
ankit gandharkar
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
Arun Velayudhan
 
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
RiyaNair19
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
Phương Anh Pađi
 
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Cyber Security
 
Infosec
InfosecInfosec
Infosec
InfosecInfosec
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurity
Tonex
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
AlienVault
 
A Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdfA Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdf
NeilStark1
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
srikmhh
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
licservernoida
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
yusifagalar
 
Bescherm jezelf tegen ransomware
Bescherm jezelf tegen ransomwareBescherm jezelf tegen ransomware
Bescherm jezelf tegen ransomware
Sophos Benelux
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Core Security
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
BilalMehmood44
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
RavirajChavan10
 

Similar to our ppt.pptx (20)

SecArmour Security Group
SecArmour Security GroupSecArmour Security Group
SecArmour Security Group
 
Ethical hacking & cyber security
Ethical hacking & cyber securityEthical hacking & cyber security
Ethical hacking & cyber security
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdf
 
Infosec
InfosecInfosec
Infosec
 
Infosec
InfosecInfosec
Infosec
 
Cyber security
Cyber securityCyber security
Cyber security
 
Fundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurityFundamentals of threats and risk management course, cybersecurity
Fundamentals of threats and risk management course, cybersecurity
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
A Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdfA Comprehensive Guide to Network Security All You Need to Know.pdf
A Comprehensive Guide to Network Security All You Need to Know.pdf
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Bescherm jezelf tegen ransomware
Bescherm jezelf tegen ransomwareBescherm jezelf tegen ransomware
Bescherm jezelf tegen ransomware
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 

More from AbdulRehman703897

thightly.pptx
thightly.pptxthightly.pptx
thightly.pptx
AbdulRehman703897
 
Being Sensitive to Your Audience’s Needs.pptx
Being Sensitive to Your Audience’s Needs.pptxBeing Sensitive to Your Audience’s Needs.pptx
Being Sensitive to Your Audience’s Needs.pptx
AbdulRehman703897
 
Creating Effective Sentences.pptx
Creating Effective Sentences.pptxCreating Effective Sentences.pptx
Creating Effective Sentences.pptx
AbdulRehman703897
 
Week 2 Boolean Algebra.pptx
Week 2 Boolean Algebra.pptxWeek 2 Boolean Algebra.pptx
Week 2 Boolean Algebra.pptx
AbdulRehman703897
 
Presentation (1).pdf
Presentation (1).pdfPresentation (1).pdf
Presentation (1).pdf
AbdulRehman703897
 
cybercrimeandsecurity-181031153257 (1).pdf
cybercrimeandsecurity-181031153257 (1).pdfcybercrimeandsecurity-181031153257 (1).pdf
cybercrimeandsecurity-181031153257 (1).pdf
AbdulRehman703897
 
google.pptx
google.pptxgoogle.pptx
google.pptx
AbdulRehman703897
 
presentationongoogle.pdf
presentationongoogle.pdfpresentationongoogle.pdf
presentationongoogle.pdf
AbdulRehman703897
 
Principle of Computer Operation.ppt
Principle of Computer Operation.pptPrinciple of Computer Operation.ppt
Principle of Computer Operation.ppt
AbdulRehman703897
 
Introduction to Html and Css.pdf
Introduction to Html and Css.pdfIntroduction to Html and Css.pdf
Introduction to Html and Css.pdf
AbdulRehman703897
 

More from AbdulRehman703897 (10)

thightly.pptx
thightly.pptxthightly.pptx
thightly.pptx
 
Being Sensitive to Your Audience’s Needs.pptx
Being Sensitive to Your Audience’s Needs.pptxBeing Sensitive to Your Audience’s Needs.pptx
Being Sensitive to Your Audience’s Needs.pptx
 
Creating Effective Sentences.pptx
Creating Effective Sentences.pptxCreating Effective Sentences.pptx
Creating Effective Sentences.pptx
 
Week 2 Boolean Algebra.pptx
Week 2 Boolean Algebra.pptxWeek 2 Boolean Algebra.pptx
Week 2 Boolean Algebra.pptx
 
Presentation (1).pdf
Presentation (1).pdfPresentation (1).pdf
Presentation (1).pdf
 
cybercrimeandsecurity-181031153257 (1).pdf
cybercrimeandsecurity-181031153257 (1).pdfcybercrimeandsecurity-181031153257 (1).pdf
cybercrimeandsecurity-181031153257 (1).pdf
 
google.pptx
google.pptxgoogle.pptx
google.pptx
 
presentationongoogle.pdf
presentationongoogle.pdfpresentationongoogle.pdf
presentationongoogle.pdf
 
Principle of Computer Operation.ppt
Principle of Computer Operation.pptPrinciple of Computer Operation.ppt
Principle of Computer Operation.ppt
 
Introduction to Html and Css.pdf
Introduction to Html and Css.pdfIntroduction to Html and Css.pdf
Introduction to Html and Css.pdf
 

Recently uploaded

快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 

Recently uploaded (12)

快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 

our ppt.pptx

Editor's Notes

  1.  transport efficiency and safety to access to food and healthcare, socialization and productivity.
  2. Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device.
  3. A virus is a type of malware that infects a host computer by inserting its code into other programs or files on the system A worm, on the other hand, is a standalone program that replicates itself and spreads across networks and systems without the need for a host program.
  4. Install and update anti-virus and anti-malware software Keep software and operating systems up-to-date Use a firewall Be cautious with emails and attachments Use strong passwords Use virtual private networks (VPNs) Back up important data:
  5. Malware is a type of software designed to cause harm, damage, or disruption to computer systems or networks.
  6. Malware is a type of software designed to cause harm, damage, or disruption to computer systems or networks.
  7. Emotet 2014, so-called
  8. Next-Generation Antivirus (NGAV) Solution Malwarebytes
  9. A Trojan horse is a type of malware that disguises itself as legitimate software or files, it can give remote attackers unauthorized access to a computer system or steal sensitive information
  10. Keyloggers
  11. McAfee, Norton, Trend Micro
  12. Hacking refers to the act of using technical expertise and knowledge of computer systems and networks to gain unauthorized access to computer systems, networks, or data. Hacking can involve a variety of techniques, such as exploiting software vulnerabilities, social engineering, or phishing attacks.
  13. Use strong passwords Use two-factor authentication Use secure connections Keep software up-to-date Use anti-virus software Be cautious with emails and attachments Use a firewall Limit access Educate yourself
  14. Password cracking is the process of recovering or guessing passwords from data that has been stored or transmitted in an encrypted form.
  15. Brute-force attack Dictionary attack Hybrid attack
  16. Store passwords securely Regularly change passwords Use two-factor authentication Use strong and unique passwords