SlideShare a Scribd company logo
NAME= VINAY YADAV
ROLLNO. =21165
COURSE & BRANCH= BTECH (CSE) 2ND YEAR
TOPIC OF PRESENTATION= SAMPLE ATTACKS
HONORABLE TEACHER = Er. RAJEEV KUMAR YADAV
NAME OF UNIVERSITY = DR.RAMMANOHAR LOHIA
AWADH UNIVERSITY, AYODHYA
A cyber attack is an assault launched by cybercriminals using one or more
computers against a single or multiple computers or networks. A cyber attack
can maliciously disable computers, steal data, or use a breached computer as a
launch point for other attacks. Cybercriminals use a variety of methods to
launch a cyber attack, including malware, phishing, denial of service, among
other methods.
VARIOUS TYPE OF SAMPLE ATTACKS
 Malware
Malware is considered as software that deliberately developed to disrupt
computers, servers, and other computer networks.
 Blocks access to key components.
 Install harmful software.
 Steal valuable information from your system
 Can damage certain hardware components.
Phishing
Phishing is a form of social engineering commonly used to steal
user data such as credit card numbers and credentials for
logging in.
 Take fraudulent action to cheat users.
 Steal restricted and private information
Man-in-the-middle
In Man-in-the-middle (M I t M), the invader can modify the chats
and dialogues between two individuals who communicate with
each other.
 Interference from the third party.
 Modify chats
Denial-of-service attacks
In Denial-of-service attacks, the offender to attempt to make
digital assets unavailable to its expected users in a denial-of-
service attack.
 Make digital assets inaccessible
 Using different IP addresses
 SQL Injection attack
In the SQL Injection attack, the intruder can access the data and
can easily add, modify, and delete the data from the database.
 Personal data
 Customer information
 Trade secrets, and more.
Password Attack
Passwords are the main gateways to enter into your
personal accounts securely. The passwords are usually
connected to our life's incidents, people, and places that can
easily sniff and gain access to our unencrypted passwords.
 Unencrypted passwords.
 Enter personal accounts
Trojan Horses
Trojans are considered among the most dangerous types of
all malware, as they are often designed to steal financial
information.
 Influence a victim to install it.
 They are specially designed to steal financial information
 Cross-Site Scripting
In Cross-Site Scripting, the intruders sent malicious code to different users by
embedding them into a trusted site, usually as a browser-side script.
 Browser-side script
 Access to personal data
 Drive-By Download Attack
Drive-by-download attack is a commonly used method to spread malicious scripts or
codes on users' systems. These scripts will be automatically installed in the system or
might redirect to a website that is controlled by the attacker.
 Automatically installed
 Spread malicious scripts
 Use Strong Passwords
Use different user ID / password combinations for different accounts and
avoid writing them down. Make the passwords more complicated by
combining letters, numbers, special characters (minimum 10 characters in total)
and change them on a regular basis.
 Secure your computer
 Activate your firewall
Firewalls are the first line of cyber defense; they block connections to
unknown or bogus sites and will keep out some types of viruses and
hackers.
 Use anti-virus/malware software
Prevent viruses from infecting your computer by installing and regularly
updating anti-virus software.
 Block spyware attacks
Prevent spyware from infiltrating your computer by installing and
updating anti-spyware software.
 Be Social-Media Savvy
Make sure your social networking profiles (e.g.
Facebook, Twitter, Youtube , MSN, etc.) are set to
private. Check your security settings. Be careful what
information you post online. Once it is on the Internet,
it is there forever!
 Secure your Mobile Devices
Be aware that your mobile device is vulnerable to
viruses and hackers. Download applications from
trusted sources.
 Install the latest operating system updates
Keep your applications and operating system (e.g.
Windows, Mac, Linux) current with the latest system
updates. Turn on automatic updates to prevent
potential attacks on older software.
 Protect your Data
Use encryption for your most sensitive files such as tax
returns or financial records, make regular back-ups of all
your important data, and store it in another location.
 Secure your wireless network
Wi-Fi (wireless) networks at home are vulnerable to
intrusion if they are not properly secured. Review and
modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are
also vulnerable. Avoid conducting financial or corporate
transactions on these networks.
 Protect your e-identity
Be cautious when giving out personal information such as
your name, address, phone number or financial information
on the Internet. Make sure that websites are secure (e.g.
when making online purchases) or that you’ve enabled
privacy settings (e.g. when accessing/using social
networking sites).
 Avoid being scammed
Always think before you click on a link or file of unknown
origin. Don’t feel pressured by any emails. Check the source
of the message. When in doubt, verify the source. Never
reply to emails that ask you to verify your information or
confirm your user ID or password.
 Call the right person for help
Don’t panic! If you are a victim, if you encounter illegal
Internet content (e.g. child exploitation) or if you suspect a
computer crime, identity theft or a commercial scam, report
this to your local police. If you need help with maintenance
or software installation on your computer, consult with your
service provider or a certified computer technician.
 Prevention is the key to reducing the risk of a data
breach. By investing in cyber security software , using a
VPN and being aware of common attack methods ,
individuals and organizations can deter hackers and keep
their data private
 Attacks are becoming more complex and diverse, with a
different form of attack for each malicious objective.
However, cyber security preventative tactics vary by attack
type, strong security practices, and basic IT hygiene are
generally effective in reducing these threats.
 We have learned such various preventive measures in brief
and also have successfully comprehended attacks and
various types that invoke in breaching the security.
.
SAMPLE ATTACKS PRESENTATION.pdf

More Related Content

Similar to SAMPLE ATTACKS PRESENTATION.pdf

Cyber security
Cyber securityCyber security
Cyber security
Akdu095
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Samuel862293
 
Cyber security
Cyber security Cyber security
Cyber security
ankit yadav
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Tapan Khilar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Mverve1
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
Mverve1
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
KalponikPrem
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
cyberprosocial
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
maryrowling
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
Kanishk Raj
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
Arjunsinh Sindhav
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
HugoReglezRodrguez
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
Sanguine_Eva
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
Tapan Khilar
 

Similar to SAMPLE ATTACKS PRESENTATION.pdf (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
 
Cyber security
Cyber security Cyber security
Cyber security
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Computer security and
Computer security andComputer security and
Computer security and
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 

Recently uploaded

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 

Recently uploaded (20)

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 

SAMPLE ATTACKS PRESENTATION.pdf

  • 1. NAME= VINAY YADAV ROLLNO. =21165 COURSE & BRANCH= BTECH (CSE) 2ND YEAR TOPIC OF PRESENTATION= SAMPLE ATTACKS HONORABLE TEACHER = Er. RAJEEV KUMAR YADAV NAME OF UNIVERSITY = DR.RAMMANOHAR LOHIA AWADH UNIVERSITY, AYODHYA
  • 2.
  • 3. A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks. Cybercriminals use a variety of methods to launch a cyber attack, including malware, phishing, denial of service, among other methods. VARIOUS TYPE OF SAMPLE ATTACKS  Malware Malware is considered as software that deliberately developed to disrupt computers, servers, and other computer networks.  Blocks access to key components.  Install harmful software.  Steal valuable information from your system  Can damage certain hardware components.
  • 4. Phishing Phishing is a form of social engineering commonly used to steal user data such as credit card numbers and credentials for logging in.  Take fraudulent action to cheat users.  Steal restricted and private information Man-in-the-middle In Man-in-the-middle (M I t M), the invader can modify the chats and dialogues between two individuals who communicate with each other.  Interference from the third party.  Modify chats
  • 5. Denial-of-service attacks In Denial-of-service attacks, the offender to attempt to make digital assets unavailable to its expected users in a denial-of- service attack.  Make digital assets inaccessible  Using different IP addresses  SQL Injection attack In the SQL Injection attack, the intruder can access the data and can easily add, modify, and delete the data from the database.  Personal data  Customer information  Trade secrets, and more.
  • 6. Password Attack Passwords are the main gateways to enter into your personal accounts securely. The passwords are usually connected to our life's incidents, people, and places that can easily sniff and gain access to our unencrypted passwords.  Unencrypted passwords.  Enter personal accounts Trojan Horses Trojans are considered among the most dangerous types of all malware, as they are often designed to steal financial information.  Influence a victim to install it.  They are specially designed to steal financial information
  • 7.  Cross-Site Scripting In Cross-Site Scripting, the intruders sent malicious code to different users by embedding them into a trusted site, usually as a browser-side script.  Browser-side script  Access to personal data  Drive-By Download Attack Drive-by-download attack is a commonly used method to spread malicious scripts or codes on users' systems. These scripts will be automatically installed in the system or might redirect to a website that is controlled by the attacker.  Automatically installed  Spread malicious scripts
  • 8.  Use Strong Passwords Use different user ID / password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters (minimum 10 characters in total) and change them on a regular basis.  Secure your computer  Activate your firewall Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers.  Use anti-virus/malware software Prevent viruses from infecting your computer by installing and regularly updating anti-virus software.  Block spyware attacks Prevent spyware from infiltrating your computer by installing and updating anti-spyware software.
  • 9.  Be Social-Media Savvy Make sure your social networking profiles (e.g. Facebook, Twitter, Youtube , MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is there forever!  Secure your Mobile Devices Be aware that your mobile device is vulnerable to viruses and hackers. Download applications from trusted sources.  Install the latest operating system updates Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software.
  • 10.  Protect your Data Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in another location.  Secure your wireless network Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are also vulnerable. Avoid conducting financial or corporate transactions on these networks.  Protect your e-identity Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).
  • 11.  Avoid being scammed Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.  Call the right person for help Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police. If you need help with maintenance or software installation on your computer, consult with your service provider or a certified computer technician.
  • 12.  Prevention is the key to reducing the risk of a data breach. By investing in cyber security software , using a VPN and being aware of common attack methods , individuals and organizations can deter hackers and keep their data private  Attacks are becoming more complex and diverse, with a different form of attack for each malicious objective. However, cyber security preventative tactics vary by attack type, strong security practices, and basic IT hygiene are generally effective in reducing these threats.  We have learned such various preventive measures in brief and also have successfully comprehended attacks and various types that invoke in breaching the security. .