Presentation 10 a very nice one haa.pptx

bazukagaming6 18 views 9 slides Jul 02, 2024
Slide 1
Slide 1 of 9
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9

About This Presentation

be cybersafe ahhh


Slide Content

CYBER SAFETY BY – MANAN AZAD AND MANRAJ SINGH CLASS – 10 DIAMOND ROLL NO. - 20 AND 21 RESPECTIVELY

CYBER SAFETY MEANS TO BE SECURE ONLINE. THE INTERNET IS FLOODED WITH THREATS TO THE SAFETY AND SECURITY OF OUR DEVICES. IT HELPS TO AVOID THOSE RISKS BUT ALSO HELPS TO PROTECT AGAINST THERE CONSEQUENCES. Presentation title 2 INTRODUCTION This Photo by Unknown author is licensed under CC BY-SA-NC . This Photo by Unknown author is licensed under CC BY .

CYBER CRIMES A CYBER CRIME IS A CRIME THAT INVOLVES A COMPUTER AND A NETWORK. THE COMPUTER IS BEEN USED FOR COMMISION OF CRIME. EXAMPLES OF CYBER CRIMES – HACKING, PHISHING, IDENTITY THEFT, COMPUTER VANDALISM AND RANSOMWARE.  Presentation title 3 This Photo by Unknown author is licensed under CC BY-SA-NC .

HACKING Presentation title 4 HACKING IS THE PROCESS OF DOING CRIMINAL ACTIVITIES ON COMPUTERS AND ON THE INTERNET, SOME HACKERS DO THIS FOR LIVING WHILE OTHERS DO IT FOR  A PERSONAL GAIN. THEY ARE CALLED BLACK HAT HACKERS AND WHITE HAT HACKERS RESPECTIVELY.  This Photo by Unknown author is licensed under CC BY-NC .

TYPES OF HACKERS . WHITE HAT HACKERS ONLY TEST THE SECURITY OF THEIR CLIENT DEVICES. . GREY HAT HACKERS CHECK FOR THE PROBLEMS IN THE SYSTEM WITH OWNERS PERMISSION. . BLACK HAT HACKERS CREATE PROBLEMS FOR THE COMPANIES BECAUSE THEY DO HACKING FOR STEALING MONEY, INORMATION ETC. Presentation title 5

PHISHING PHISHING IS A TYPE OF SOCIAL ENGINEERING ATTACK OFTEN USED TO STEAL THE USERS DATA, SUCH AS PASSWORDS AND CREDIT CARS INFORMATION.

IDENTITY THEFT

CYBER OBSCENITY   CYBER OBSCENITY IS THE USE OF MEDIA SUCH AS WEBSITES TO DOWNLOAD AND TRANSMIT PORNOGRAPHIC PICTURES, PHOTOS AND WRITINGS. THE PHOTOS OF WOMENS ARE USED MORPHED AND DISTRIBUTED AMONG THE INTERNET. Presentation title 8

COMPUTER VANDALISM COMPUTER VANDALISM IS A PROCESS WHERE IN THERE IS A PROGRAM THAT PERFORMS MALICIOUS FUNCTIONS SUCH AS EXTRACTING THE USERS PASSWORD OR OTHER DATA OR ERASING THE HARD DISK. THIS IS DIFFERENT FROM A VIRUS, WHICH ATTACHES ITSELF TO AN EXISTING  EXECUTABLE PROGRAM. Presentation title 9
Tags