SlideShare a Scribd company logo
| By Rahul Sah
Agenda
1.Introduction
2.Threats
3.Prevention
1
Computer security has been a topic of great
importance since the emergence of second generation
main frame computers (early 1960's).
More than one dishonest programmer developed
software which would accumulate the inaccuracy of
each account transaction into a single account.
The losses were not noticed on individual accounts,
but were later noticed at the institutional level.
Threats2
Internet emerged to the world in the early 21st
century(1990s). It started with a few group of
peoples and now it is a community of billions
people.
Like the faces of a coin, Internet has also got its
demerit. It is the most suitable platform for
Hijackers, attackers, to spread their threats.
The threats can be in the form of Virus, Malwares,
Trojans, etc.
Add Text, an Image, or Both
Spyware refers to programs that surreptitiously monitor
activity on a computer system and report that information
to others without the user's consent.
Malware, short for malicious
software, is any software
used to disrupt computer
operation, gather sensitive
information, or gain access to
private computer systems.
Computer Viruses are programs
that can replicate their
structures or effects by infecting
other files or structures on a
computer. The common use of a
virus is to take over a computer
to steal data.
A Trojan horse, commonly known as a Trojan, is a general term
for malicious software that pretends to be harmless, so that a user
willingly allows it to be downloaded onto the computer.
Ransomware is a type of malware which restricts access
to the computer system that it infects, and demands a
ransom paid to the creator(s) of the malware in order for the
restriction to be removed.
KeyLogger, Keystroke logging, often referred to
as key logging or keyboard capturing, is the action of
recording (logging) the keys struck on a keyboard.
Prevention3
“Prevention
is
better than Cure . ”
Avoid exposure to unauthenticated access,
unnecessary access to employees or users.
Install tools like anti malware, anti phishing
for scanning to detect vulnerabilities.
Install updated version of antivirus tool.
Guard the walls of the server with updated
firewalls.
Do not click blindly on the hyperlinks appearing in the
e-mail that came from the unknown sources.
Always look for the “https:” before trusting the
website especially, before providing credit card
information and personal information.
Be very much careful before downloading any content
from the suspicious or even from the unsecured
website.
Ignore clicking on the ad links as these behaviours
are marked by the spywares and further leads to
unknown threats.
Beware of downloading applications, files (mp3,
mp4, gif, etc) from the sites and also from the
attachments of the e-mails.
Use/buy certified and secured products from
the vendors.
Keep a habit of regularly scanning the system
also keep updating the virus scanning
tools/software.
STATISTICS
General Trends of 2017
1. In Quarter 3, 2016 alone, 18 million new malware
samples were captured.
(Source: Panda Labs)
2. More than 4,000 ransomware attacks have occurred every
day since the beginning of 2016.
(Source: Computer Crime and Intellectual Property Section
(CCIPS))
3. The amount of phishing emails containing a form of
ransomware grew to
97.25% during Q3 2016, up from 92% in Q1 2016.
(Source: PhishMe 2016 Q3 Malware Review)
4. 78% of people claim to be aware of the risks of unknown links in
emails. And yet they click anyway.
(Source: Friedrich-Alexander University (FAU))
5. 52% of organizations that
suffered successful cyber
attacks in 2016 aren't making
any changes to their security in
2017
(Source: Barkly, December 2016,
Security Confidence Headed Into
2017)
References :
1. https://blog.barkly.com/cyber-security-statistics-
2017
2. https://www.clickssl.net/blog/types-of-internet-
security-threats-and-preventions/
3.
• https://h30657.www3.hp.com/t5/BusinessBlog-
en/35-cyber-security-statistics-every-CIO-should-
know-in-2017/ba-p/8278
• https://resource.elq.symantec.com/LP=3980?cid=70
138000001BjppAAC&mc=202671&ot=wp&tt=sw&ini
d=symc_threat-
report_regular_to_leadgen_form_LP-3980_ISTR22-
report-main
THANK YOU!

More Related Content

What's hot

Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
chauhankapil
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Eryk Budi Pratama
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
Abou Bakr Ashraf
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
mfaheemakhtar
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
FCA - Future Chartered Accountants
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
SHERALI445
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Antivirus
AntivirusAntivirus
Antivirusyuvan80
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
Imran Khan
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
Raj vardhan
 
Computer Security
Computer SecurityComputer Security
Computer Security
Vaibhavi Patel
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
100701982
 

What's hot (20)

Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
system Security
system Security system Security
system Security
 
Antivirus
AntivirusAntivirus
Antivirus
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

Similar to Seminar on Internet security

Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
Diane M. Metcalf
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
Heidi Maestas
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
ArindamGhosal6
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
Jessica Howard
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Information security
Information securityInformation security
Information security
Appin Faridabad
 
Malware
MalwareMalware
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
Bhavesh soni
 
185
185185
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
HabeebUllah10
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
Dickmaster
DickmasterDickmaster
Dickmaster
DickMaster1
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
Infosectrain3
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
NihanthReddyBalaiahg
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 

Similar to Seminar on Internet security (20)

Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Information security
Information securityInformation security
Information security
 
Malware
MalwareMalware
Malware
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
185
185185
185
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
MALWARE
MALWAREMALWARE
MALWARE
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Seminar on Internet security

  • 3. 1
  • 4. Computer security has been a topic of great importance since the emergence of second generation main frame computers (early 1960's). More than one dishonest programmer developed software which would accumulate the inaccuracy of each account transaction into a single account. The losses were not noticed on individual accounts, but were later noticed at the institutional level.
  • 6. Internet emerged to the world in the early 21st century(1990s). It started with a few group of peoples and now it is a community of billions people. Like the faces of a coin, Internet has also got its demerit. It is the most suitable platform for Hijackers, attackers, to spread their threats. The threats can be in the form of Virus, Malwares, Trojans, etc.
  • 7. Add Text, an Image, or Both
  • 8. Spyware refers to programs that surreptitiously monitor activity on a computer system and report that information to others without the user's consent.
  • 9. Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
  • 10. Computer Viruses are programs that can replicate their structures or effects by infecting other files or structures on a computer. The common use of a virus is to take over a computer to steal data.
  • 11. A Trojan horse, commonly known as a Trojan, is a general term for malicious software that pretends to be harmless, so that a user willingly allows it to be downloaded onto the computer.
  • 12. Ransomware is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
  • 13. KeyLogger, Keystroke logging, often referred to as key logging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard.
  • 16. Avoid exposure to unauthenticated access, unnecessary access to employees or users. Install tools like anti malware, anti phishing for scanning to detect vulnerabilities. Install updated version of antivirus tool. Guard the walls of the server with updated firewalls.
  • 17. Do not click blindly on the hyperlinks appearing in the e-mail that came from the unknown sources. Always look for the “https:” before trusting the website especially, before providing credit card information and personal information. Be very much careful before downloading any content from the suspicious or even from the unsecured website. Ignore clicking on the ad links as these behaviours are marked by the spywares and further leads to unknown threats.
  • 18. Beware of downloading applications, files (mp3, mp4, gif, etc) from the sites and also from the attachments of the e-mails. Use/buy certified and secured products from the vendors. Keep a habit of regularly scanning the system also keep updating the virus scanning tools/software.
  • 20. 1. In Quarter 3, 2016 alone, 18 million new malware samples were captured. (Source: Panda Labs) 2. More than 4,000 ransomware attacks have occurred every day since the beginning of 2016. (Source: Computer Crime and Intellectual Property Section (CCIPS)) 3. The amount of phishing emails containing a form of ransomware grew to 97.25% during Q3 2016, up from 92% in Q1 2016. (Source: PhishMe 2016 Q3 Malware Review)
  • 21. 4. 78% of people claim to be aware of the risks of unknown links in emails. And yet they click anyway. (Source: Friedrich-Alexander University (FAU)) 5. 52% of organizations that suffered successful cyber attacks in 2016 aren't making any changes to their security in 2017 (Source: Barkly, December 2016, Security Confidence Headed Into 2017)
  • 22. References : 1. https://blog.barkly.com/cyber-security-statistics- 2017 2. https://www.clickssl.net/blog/types-of-internet- security-threats-and-preventions/ 3. • https://h30657.www3.hp.com/t5/BusinessBlog- en/35-cyber-security-statistics-every-CIO-should- know-in-2017/ba-p/8278 • https://resource.elq.symantec.com/LP=3980?cid=70 138000001BjppAAC&mc=202671&ot=wp&tt=sw&ini d=symc_threat- report_regular_to_leadgen_form_LP-3980_ISTR22- report-main