0% found this document useful (0 votes)
13 views34 pages

Day 48 Chapter 9

O level Libra Office

Uploaded by

Nielit Kolkata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views34 pages

Day 48 Chapter 9

O level Libra Office

Uploaded by

Nielit Kolkata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

[Unit 1: Introduction

NATIONAL to Web Design]


INSTITUTE Course:
OF ELECTRONICS ANDNIELIT ‘O’ Level (IT)
INFORMATION TECHNOLOGY
Module: M2-R5: Web Designing & Publishing

Overview of Future skills & Cyber


Security
Day48 - Chapter 09
[Unit 1:
Course Introduction
: ‘O’ Level (IT) to Web Design]
Course: NIELIT ‘O’ Level (IT)
Module : IT Tools & Basics of Networks
Chapter :9 Overview of Future Skills & Cyber SecurityModule: M2-R5: Web Designing & Publishing

2 Index

• Cyber World • Password Policies


• Need of Cyber Security • What are Virus, Worm, and
• Understanding CIA TRIAD Malware?
• Goals of Information Security • Introduction to Antivirus software
• Securing an Operating System • Email Security
(Windows 10) • Securing Smartphone
• Updating Windows OS • Tracing mobile phone
• How to Get Updates in Windows
10
[Unit 1:: Introduction
Course ‘O’ Level (IT) to Web Design] Course: NIELIT
Module ‘O’and
:IT Tools Level (IT)Basics [M1]
Network
Module: M2-R5: Web Designing & Publishing
Chapter :9 Overview of Future Skills and Cyber Security

3 Cyber World
• Cyber World is a system in which communication over computer networks occurs.
• The cyber world notion became popular around 1990, when the uses of the Internet,
networking, and digital communication were all increasing.
• In terms of social experience, the users can interact, share and exchange ideas, share
information, provide social support, conduct business, create media, play games, engage in
discussion, and so on, using this global network.
• An online world where users have the mechanisms in place to transact any business or
personal activity as easily and freely as they can transact them in the physical world.
• An environment for sophisticated online computing.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
4 Need of Cyber Security
• The protection of information and information systems against unauthorized access or
modification of information, whether in storage, processing, or transit to authorized users.

• Information security includes those measures necessary to detect, document, and


counter threats to digital and non-digital information.

• Information security processes and policies typically involve physical and digital security
measures to protect data from unauthorized access.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
5 Need of Cyber Security
• Security: can be considered a state of freedom from a danger or risk. For example, a
nation experiences security when it’s military has the strength to protect its citizens.
• Information: is an asset to all individuals and businesses. Information Security refers to
the protection of these assets in order to achieve Confidentiality, Integrity and Availability
(CIA).
• To make the system secure, optimum level of confidentiality, availability and integrity is
to be maintained as it is shown by Data in diagrams.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
6 Understanding CIA TRIAD
• Confidentiality: Protecting information from being disclosed to Unauthorized parties.

• Integrity: Protecting information from being changed by unauthorized parties.

• Availability: To the availability of information to authorized parties only when requested.


[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
7 Goals of Information Security
• Detection: The most important element of this strategy is timely detection and notification
of a compromise. Intrusion detection systems (IDS) are utilized for this purpose.
• Prevention: Security measures must be taken to protect information from unauthorized
modification, destruction, or disclosure whether accidental or intentional.
• Response: Making important decisions or developing policy while under attack is a recipe
for disaster.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
8 Securing an Operating System (Windows 10)
• Personal Computer security is the process of preventing and detecting unauthorized use of
personal computer.
• Prevention measures help user to stop unauthorized users (hackers) from accessing any
part of their computer system.
• Detection helps user to determine whether or not someone attempted to break security into
their system. PC security is considered to be more important for the following reasons—
• To prevent data theft

• To prevent theft or destruction to hardware

• To prevent any software or service getting disrupted


[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
9

• For securing the Personal Computer, use the following Instructions:


• Always use Updated Windows OS.

• Use of Antivirus.

• Use of Secure Network.

• Good Password Policies.

• Use of firewall.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
10 Updating Windows OS
• Windows Update is a free Microsoft service that's used to provide updates like service
packs and patches for the Windows operating system and other Microsoft software.
• Windows Update can also be used to update drivers for popular hardware devices.
• Windows Update is used to keep Microsoft Windows and several other Microsoft
programs updated.
• Updates often include feature enhancements and security updates to protect Windows from
malware and malicious attacks.
• Windows Update's gives a number of important information:
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
11 Updating Windows OS
• Important Updates: Normally these are fixes for security issues, or to fix a problem that
could cause system instability. They should be installed immediately.

• Recommended Updates: These are often additional new features or functionality. It's a
good idea, but not a necessity, to install them.

• Optional Updates: These are often take-or-leave updates. They can be driver updates to
help some devices work better with Windows or they could be trial software from
Microsoft.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
12 How to Get Updates in Windows 10
• Click the Start menu and type “Updates” in the search bar and click “Check for updates”
button.
• If there are updates to install, they will be installed automatically.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
13 Password Policies
• In many operating systems, the most common method to authenticate a user's identity is to use a
secret passphrase or password. A secure network environment requires all users to use strong
passwords, which have at least eight characters and include a combination of letters, numbers, and
symbols.
• Windows supports fine-grained password policies. This feature provides organizations with a way
to define different password and account lockout policies for different sets of users in a domain.
• Enforce password history

• Maximum password age

• Minimum password age

• Minimum password length

• Password must meet complexity requirements

• Store passwords using reversible encryption


[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
14 User Account Policies
• A user account policy is a document which outlines the requirements for requesting and
maintaining an account on computer systems or networks, typically within an organization.
It is very important for large sites where users typically have accounts on many systems.
Some sites have users read and sign an account policy as part of the account request
process.
• Account Policies contains three subsets:
• Password Policy. These policy settings are used for domain or local user accounts.
They determine settings for passwords, such as enforcement and lifetimes.
• Account Lockout Policy. These policy settings are used for domain or local user
accounts. They determine the circumstances and length of time that an account will be
locked out of the system.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
15 Create Multiple Users in Windows 10 (Hands-On Approach)
• Windows operating system gives the facility to create multi user, called “Guest user”. The
benefit of this service is giving only limited rights to the guest user by the administrator to
access their computer as well as files and resources.
• To create a new user in Windows, please make sure logging in with an account that has
administrator privileges, go to the Windows 10 Start Screen and type Add User, the search
results appear click on the Settings category as shown in figure.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
16

• Now click on the option Give other users access to this computer, which would open the
User Settings screen, Scroll down and click on the Add User option.
• Screen prompting to enter the user's email address would be appearing. By default, the
above screen prompts to enter an email so that create a Microsoft account.
• If user wishes to create a Microsoft account, enter email address and click on the Next
button.
• If user does not wish to use a Microsoft account, it should instead click on the Sign in
without a Microsoft account option in the screen above.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
17 What are Virus, Worm, and Malware?
• Virus –
• A piece of code that is capable of copying itself and typically has a detrimental effect,
such as corrupting a system or destroying data on an individual computer.
• Virus is designed to spread from host to host and has the ability to replicate itself.
• A computer virus operates by inserting or attaching itself to a legitimate program or
document that supports macros in order to execute its code. It also known as Threat.
• How does a computer virus attack?
• Once a virus has successfully attached to a program, file, or document, it will lie
dormant until circumstances cause the computer or device to execute its code. In order
for a virus to infect computer, user have to run the infected program, which in turn
causes the virus code to be executed. However, once the virus infects computer, the
virus can infect other computers on the same network.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
18 Worms
• Worm –
• A computer worm is a standalone malware computer program that replicates itself and
spread to other computers. Often, it simply clones itself over and over again and
spreads via a network (say, the Internet, a local area network at home, or a company’s
intranet) to other systems where it continues to replicate itself.
• How does a computer Worm Spread-
• One of the most common ways for worms to spread is via email spam. Worms could
hide in the main text of an email, but as modern email clients caught on and began
blocking, Operating system vulnerabilities are also cause for spreading worm, every
operating system has its vulnerabilities and some worms are specifically coded to take
advantage of these weak points.
• Worms can take on similarly deceptive forms in instant messaging software and take
advantage of users who are probably not on high alert when using such services.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
19 Malware-
• Malware” is short for “malicious software” and used as a single term to refer to virus, spy
ware, worm etc.

• Malware is designed to cause damage to a standalone computer or a networked computer.


Malware includes computer viruses, worms, Trojan horses and spyware.

• These malicious programs can perform a variety of functions, including stealing,


encrypting or deleting sensitive data, altering or hijacking core computing functions and
monitoring users' computer activity without their permission.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
20 Ransomware -
• Ransom malware, or ransomware, is a type of malware program that infects locks or takes
control of a system, prevents users from accessing their system or personal files and
demands ransom payment in order to regain access.
• The earliest variants of ransomware were developed in the late 1980s, and payment was to
be sent via snail mail. Today, ransomware authors order that payment be sent via crypto
currency or credit card.
• How does malware works-
• Malicious programs can be delivered physically to a system through a USB drive or
other means.
• Malware can often spread via the internet which automatically downloads malicious
programs to users' systems without their approval or knowledge.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
21 Symptoms of an Infected Computer
• Symptoms for unprotected devices are given as following:
• Run slower than normal.

• Slower Internet and Processing

• Show popups both online and/or offline.

• Have programs that do not open, run slow or close unexpectedly.

• Have browser(s) that do not display some or any website at all.

• Show a blue screen with the error code.

• Sudden Freezes & Crashes

• Missing or Extra Files


[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
22 Introduction to Antivirus software
• Antivirus software was originally developed to detect and remove computer viruses.
• In particular, modern antivirus software can protect from, malicious browser helper objects
(BHOs), browser hijackers, ransomware, key loggers, backdoors, rootkits, Trojan horses,
worms, malicious LSPs, dialers, fraud tools, adware and spyware.
• Some software also include protection from other computer threats, such as infected and
malicious URLs, spam, scam and phishing attacks, online identity (privacy), online
banking attacks, social engineering techniques, advanced persistent threat (APT) and
botnet DDoS attacks.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
23 How does Antivirus Software Work?
• Antivirus software will scans the file on computer programs and comparing specific bits of
code against information in its database and if it finds a pattern duplicating one in the
database, it is considered a virus, and it will quarantine or delete that particular file It will
also scan computer for behaviors that may signal the presence of a new, unknown
malware.
• Antivirus Software Scanning Detection Processes
• Antivirus software uses different scanning detection processes:

• Signature-based detection –
• Uses key aspects of an examined file to create a static fingerprint of known malware.
The signature could represent a series of bytes in the file. It could also be a
cryptographic hash of the file or its sections. This is most common in traditional method
that checks all the .EXE files and validates it with the known list of viruses and other
types of malware.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
24 How does Antivirus Software Work?
• Behavioral-based detection –
• This type of detection is used in Intrusion Detection mechanism. This concentrates
more in detecting the characteristics of the malware during execution. This mechanism
detects malware only while the malware performs malware actions.
• Heuristic Detection –
• This process scans for previously unknown viruses by looking for known suspicious
behavior or file structures. This is mostly used in combination with signature-based
detection.
• Data mining techniques –
• This is of the latest trends in detecting a malware. With a set of program features, Data
mining helps to find if the program is malicious or not.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
25 Different Types of Antivirus Software
S.No Antivirus Platform

1 Avira Windows, Mac

2 Avast Windows, Mac

3 AVG Windows

4 Bitdefender Windows, Mac

5 Malwarebytes,Anti-Malware Windows

6 eScan Anti-Virus Toolkit Windows, Mac

7 Lavasoft Ad-Aware Free Windows

8 Trend Micro HouseCall Windows, Mac


[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
26 Email Security
• Use e-mail filtering software to avoid spam so that only messages from authorized users are
received. Most e-Mail providers offer filtering services.
• Do not open attachments coming from strangers, since they may contain a virus along with the
received message.
• Be careful while downloading attachments from e-Mails into hard disk. Scan the attachment with
updated antivirus software before saving it.
• Do not send messages with attachments that contain executable code like Word documents with
macros, .EXE files and ZIPPED files. We can use Rich Text Format instead of the standard .DOC
format. Avoid sending personal information through e-Mails.
• Avoid filling forms that come via e-Mail asking for user personal information. And do not click on
links that come via unknown e-Mail.
• Do not click on the e-Mails that user receive from un trusted users as clicking itself may execute
some malicious code and spread into their system.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
27 Securing Smartphone
• With modern smart phones user can do a wide range of tasks; everything from browsing the
Internet and paying their bills to checking their bank statement and accessing work emails.
Although the smart phones are so advanced still many security issues are present in smart phones.
For Example:
• Device loss or theft: Losing a device to mishap or theft can cause lost productivity, data loss, and
potential liability under data-protection laws.
• Loss of sensitive data: Many mobile devices may contain sensitive or confidential information,
for example, personal photographs and videos, email messages, text messages and files.
• Unauthorized network penetration: Because many mobile devices provide a variety of network
connectivity options, they could potentially be used to attack protected corporate systems.
• Intercepted or corrupted data: With so many business transactions taking place over mobile
devices, there is always a concern that critical data could be intercepted via tapped phone lines or
intercepted microwave transmissions.
• Malicious software: Viruses, Trojan Horses, and Worms are familiar threats to mobile devices it
has become a significant target.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
28 Securing Smart Phone
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
29
• Mobile or Device Screen locks- In the present time every smart phones comes with different
screen lock options
• No lock
• None: this gives any protection.
• Swipe: Swipe finger across screen. This gives no protection, but user can get to their Home screen
quickly.
• Standard locks
• Pattern: Draw a simple pattern with finger.
• PIN: Enter 4 or more numbers. Longer PINs tend to be more secure.
• Password: Enter 4 or more letters or numbers. A strong password is the most secure screen lock
option. For example: S@n#
• Finger print Scanner
• Users can scan their finger on their device then, device is unlocked.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
30 Smart Phone login account
• All smart phones require user account for providing different cloud services like android
phone provide Play store service and IOS devices provide app store service for their
customer.
• Always use own account while logging in for the first time in their smart phone.
• This makes the user secure from theft or loss of the mobile, user could lock their phone
using their account. Also user can find their mobile if they misplace it.
• Always download apps from Play store (Android) or App Store (Apple)
• Always download apps from their service provider like play store or app store. Don’t
install any app in device by using “Unknown Sources”.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
31 Security of Social Networking
• Limit the information put in the social networking sites.
• Don’t put personal information like family details, addresses, personal photographs, video, etc. In
case if user put their personal photographs try to change settings and make visible only for friends.
• Most of the sites and services provide options for privacy settings to prevent attackers to view
information. User can make use of these options to choose/deny who want to allow seeing their
information.
• Be careful if user wants to meet social networking friends in person, sometimes it may not be their
true identity which is posted on the social networking sites.
• Don’t ever click suspicious link while logged into social networking accounts.
• Use Virtual Keyboard, wherever possible to enter password for better security as these cannot be
captured by key-loggers.

[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
32 Tracing mobile phone
• These services provide the service to get the device location while device (android) is
misplaced. Both Android and iPhone come with built-in location tracking utilities, so long
as the location services (GPS) on those phones is enabled, and the owner has provided the
application with permission to share their location. In this lab only take the example of
android device that was login with user Gmail account.
• Follow the following devices:
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
33 Summary
• Future skills involves Internet of Things (IoT),Virtual Reality, Big Data Analytics,3D Printing,
Cloud Computing, Cyber Security, Social and Mobile, Artificial Intelligence, Blockchain
Technology and Robotics Process Automation.
• All industry works with IoT.
• With help of Iot life becomes smarter.
• Maximum companies apply artificial intelligence on their application.
• 3D printer makes real world objects.
• Cyber security is also necessary with all such type of application.
• Security on social media app’s is also necessary.
• Use their own id for logging in any type of devices.
• Use Strong password like combination of Uppercase, lower case and special characters.
• Use firewall in personal computer.

[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
34

Thank You

You might also like