Blue Futuristic Cyber Security Presentation_20240728_193333_0000.pdf

joyabisha1 40 views 16 slides Aug 07, 2024
Slide 1
Slide 1 of 16
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16

About This Presentation

Cyber security awareness class


Slide Content

Studio Shodwe ContactAbout UsVideoHome
01
CYBER SECURITY

Studio Shodwe ContactAbout UsVideoHome
02
Good morning
Goal- to create awareness about
cyber security
Before get start, let's start from
one qoute
"security is a myth"
Every mobile phone pc have
security batch updates

Studio Shodwe ContactAbout UsVideoHome
02
Per day 1 lahks of fb accounts hacked.
Big industrial company has cyber
security professionals in Google
software security batch update team
called "project zero"

Studio Shodwe ContactAbout UsVideoHome
03
What is cyber
Cyber word meaning
" Things that take place in internet"
( the activities that happen in the internet)
What is cyber Security
practice of protecting system
network a program from
digital attacks

Studio Shodwe ContactAbout UsVideoHome
03
Why is cyber awareness is important
43 % of criminals are aimed small businesses man and
common man becoz they are using low security system
Technology along can't product you from everything
attackers go where security is weakest
Cyber security awareness is for employees, parents, seniors, kids
and everyone
attackers isn't intrest me!

Studio Shodwe ContactAbout UsVideoHome
03
Wrong! You are exactly what an attackers want
Credit card & financial data
Medical data
- prescription, insurance, identity fraud
Computer resources
-cryptomining ,Ransomware, advertising
Ransomware means - unknown apk - pay amount
These are done be hackers

Black hat
White hat
Gray hat
Studio Shodwe ContactAbout UsVideoHome
04
HACKERS :-UNAUTHORIZED ACCESS

Phishing
Studio Shodwe ContactAbout UsVideoHome
04
Fraudulent attempt (using links and say share
this msg for 30 contact, groups
personal information
Email fraudulent calls
Telemarketing scam
Online transaction
Shorten link - Bitly,Tiny url
Link expanders site : urlex.org
Virus totaler- file , apk
Urlscan.io

Studio Shodwe ContactAbout UsVideoHome
05
SOCIAL ENGINEERING
A social engineering attack is a type of cyber attack that manipulates
individuals into revealing sensitive information or performing certain
actions that compromise security. Attackers use psychological tactics to
trick victims into:
1. Revealing passwords, financial information, or personal data.
2. Installing malware or viruses.
3. Granting access to sensitive systems or data.
4. Performing actions that compromise security.

Studio Shodwe ContactAbout UsVideoHome
06
DEEP FAKES
Deepfakes are synthetic media, such as images, videos, or audio recordings, that are manipulated or generated using
artificial intelligence (AI) and machine learning algorithms to create realistic but false content. The term "deepfake" comes
from the deep learning techniques used to create these fake media.
Types of deepfakes:
1. Video deepfakes: Manipulated videos that replace a person's face or body with someone else's.
2. Audio deepfakes: Fake audio recordings that mimic a person's voice.
3. Image deepfakes: Manipulated images that alter a person's appearance or create fake scenes.
Detection and prevention:
1. AI-powered detection tools
2. Digital watermarks
3. Media forensics
4. Critical thinking and skepticism
5. Education and awareness

Studio Shodwe ContactAbout UsVideoHome
06
Hidden danger of using third-party apps?
GB whatsapp
Non playstore apps _ called third-party apps
Children's mod apps
Password- bruteforce
4 sec
char 8 sec need to Kelloggs
writing a password in diary

Studio Shodwe ContactAbout UsVideoHome
06
Types of cyber crime
Identify theft - personnel information
Cyber bulling- spread fake news, ugly, comments
on social media-->leads sucide
Hacking :- unauthorized access
Cyber stacking :- Harass - threads
Phishing : duplication ( http )

Studio Shodwe ContactAbout UsVideoHome
06
spoofing
Spoofing is a type of cyber attack where an attacker disguises themselves as a trusted
source, such as a person, website, or device, to trick victims into revealing sensitive
information or performing certain actions. Spoofing can take many forms, including:
1. Email spoofing: Forging email headers to make messages appear from a legitimate sender.
2. IP spoofing: Faking IP addresses to make traffic appear from a trusted source.
3. DNS spoofing: Manipulating DNS records to redirect users to fake websites.
4. Website spoofing: Creating fake websites that mimic legitimate ones.
5. Phone spoofing: Faking caller ID information to appear as a trusted caller.
6. SMS spoofing: Sending fake text messages that appear from a trusted sender.
girls in social media accepting all friend request in social media

Studio Shodwe ContactAbout UsVideoHome
06
RAT ( Remote access throjen)
downloading Apk
Black shardes , dark comet, NJRAT,CAMPHISH,SPYNOTE,IMMINENT MONITORS,
BANDOOK, SUB7, WEBCAM SPY, REVENGE RAT
Ex:-
Download vlc media player in third parties website
5 phases
Dormant phases- to click link
trigger phase- double click
Propagation phase : run automtic code share 100 IDS
Execution phase - warm ,throjen

Studio Shodwe ContactAbout UsVideoHome
09
PREVENTION TECHNIQUES
Never scan qr code from unknown sources
Using public wifi
exc file in mail
Using filesharddling software to remove files from your
Hard drive
2 factor authentication, multifactor
Creative password
Lock ( automatic lock)

Studio Shodwe ContactAbout UsVideoHome
10
THANK YOU