100%(1)100% fanden dieses Dokument nützlich (1 Abstimmung)
206 Ansichten23 Seiten
This document defines various cyber security threats and concepts. It discusses spoofing, spam, phishing, malware including ransomware and adware, footprinting, and social engineering. It also provides examples of these threats and outlines steps individuals can take to report issues and strengthen security, such as using antivirus software, strong passwords, and monitoring running applications. The document concludes with a note about a mobile hacking demonstration.
Originalbeschreibung:
Presentation About Cyber Security and How we can Secure from Hacker Attack.
This document defines various cyber security threats and concepts. It discusses spoofing, spam, phishing, malware including ransomware and adware, footprinting, and social engineering. It also provides examples of these threats and outlines steps individuals can take to report issues and strengthen security, such as using antivirus software, strong passwords, and monitoring running applications. The document concludes with a note about a mobile hacking demonstration.
This document defines various cyber security threats and concepts. It discusses spoofing, spam, phishing, malware including ransomware and adware, footprinting, and social engineering. It also provides examples of these threats and outlines steps individuals can take to report issues and strengthen security, such as using antivirus software, strong passwords, and monitoring running applications. The document concludes with a note about a mobile hacking demonstration.
Cyber Security Hamza Ali Faisal Hayat 15137022 15137057 Cyber Security Protection of ● Internet-connected systems ● Hardware ● Software ● Data from cyber attacks. Information Security ● Chunks of Data ● Secure Information ● Organization Information Types of Cyber Security threats ● Spoofing ● Spam ● Phishing ● Malware ● Foot printing ● Social Engineering Spoofing ● Spoofing is an act of impersonation. A hacker will pretend to be a person or company known to and trusted by the recipient. ● Spoofing is used to gain access to the sensitive data. Spoofing Examples: ● Bank Fake Calls (Account no/pin) ● Fake Emails (Qatar Airways) Spoofing Email(Qatar Airways) Spam ● Spam refers to the use of electronic messaging systems to send out unrequested or unwanted messages in bulk e.g ● Email Spam ● Message Spam Spam Phishing ● Fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. Phishing Facebook ● www.facebook.com ● www.facebook.com ● www.facebook.com Phishing Malware ● Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. ● Ransomware ● Adware Ransomware Malware Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is encrypted. Ransomware Malware Adware Malware ● Adware Malware is tool that create Unwanted advertisements to the user of a computer. Foot Printing ● Footprinting is a part of reconnaissance process which is used for gathering possible information about a target computer system or network. ● Employee information ● Phone numbers ● E-mails ● Job Information Social Engineering
● Psychological manipulation of people into
performing actions. ● WiFi Password hack ● Dictionary How to be Secure ● USB/Hard Drive ● Login into other devices ● Selling Cellphone/Devices ● Unwanted things ● Unwanted Access How we can Report
FIA Tools/ToDo ● Anti viruses ● Task Manager ● Running Apps ● Strong Password(ABC123abc#$%676) Mobile Hacking Demo Thank You