Welcome To Our Group Presentation
Topic : Cyber Crime And Security
Our Group Member List
• S M Shams Qamar • AF22LNB0167
• Muhammad Ehtasham • AF22LNB0169
• Abdul Rehman • AF22LNB0483
• Muhammad Naeem • AF22LNB0179
• Faraz Hassan • AF22LNB0194
S M Shams Qamar
I’m Shams &
My topics is
that’s
1
• Impact of Technology
2
• Introduction Of Topic
3
• Major Topics
Impact of Technology?
Safety Access
Healthcare Socialiazation
Impact
Definition Cyber Security & Cyber Crime?
Major Topics
Topics Malware
Virus
Trojan Horses
Hacking
Password Cracking
Muhammad Ehtasham
I’m Muhammad
Ehtasham
& My Topic is
Virus
Virus
Introduction
Solution
Viruses and Worms
Virus
worms
Solution?
Antivirus software
Protect your network
Operating system up to date
Abdul Rehman
I’m Abdul
Rehman &
My topics Is
That’s
Topics
Malware
Introduction
Solution
Trojan Horses
Introduction
Solution
Malware
Malware
About Solution
About Malware
About
Definition
Way of
Attacks
Effect's
Way of Attacks
Infected Files
Email Attachments
Malicious Websites
Effacts Of Malware
Steal Sensitive Info
Disrupting Normal
Operations
Taking Control
To Stop Malware
Use anti-malware
software
Use a firewall
Educate yourself
Trojan Horses
Trojan Horses
About Solution
About Trojan Horses
About
Definition Effect's
Effact’s
Stealing Passwords
Deleting or Modifying
Files
Installing Additional
SF
Solution?
Use reputable anti-
virus
Use a firewall
Educate yourself
Muhammad Naeem
I’m Muhammad
Naeem & My
topics is that’s
Topics
Hacking
Introduction
Solution
Password
Cracking
Introduction
Method
Securing
Hacking?
Hacking
About Solution
How To prevent hacking?
Use strong passwords
Use two-factor authentication
Use secure connections
Password Cracking
Password Cracking
About Method Securing
Methods for cracking passwords
Brute-force attack
Dictionary attack
Hybrid attack
Securing Password
Store passwords securely
Regularly change passwords
Use strong and unique passwords
Thanks To All

our ppt.pptx

Editor's Notes

  • #5  transport efficiency and safety to access to food and healthcare, socialization and productivity.
  • #6 Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device.
  • #9 A virus is a type of malware that infects a host computer by inserting its code into other programs or files on the system A worm, on the other hand, is a standalone program that replicates itself and spreads across networks and systems without the need for a host program.
  • #10 Install and update anti-virus and anti-malware software Keep software and operating systems up-to-date Use a firewall Be cautious with emails and attachments Use strong passwords Use virtual private networks (VPNs) Back up important data:
  • #12 Malware is a type of software designed to cause harm, damage, or disruption to computer systems or networks.
  • #13 Malware is a type of software designed to cause harm, damage, or disruption to computer systems or networks.
  • #14 Emotet 2014, so-called
  • #16 Next-Generation Antivirus (NGAV) Solution Malwarebytes
  • #18 A Trojan horse is a type of malware that disguises itself as legitimate software or files, it can give remote attackers unauthorized access to a computer system or steal sensitive information
  • #19 Keyloggers
  • #20 McAfee, Norton, Trend Micro
  • #22 Hacking refers to the act of using technical expertise and knowledge of computer systems and networks to gain unauthorized access to computer systems, networks, or data. Hacking can involve a variety of techniques, such as exploiting software vulnerabilities, social engineering, or phishing attacks.
  • #23 Use strong passwords Use two-factor authentication Use secure connections Keep software up-to-date Use anti-virus software Be cautious with emails and attachments Use a firewall Limit access Educate yourself
  • #24 Password cracking is the process of recovering or guessing passwords from data that has been stored or transmitted in an encrypted form.
  • #25 Brute-force attack Dictionary attack Hybrid attack
  • #26 Store passwords securely Regularly change passwords Use two-factor authentication Use strong and unique passwords