0% found this document useful (0 votes)
14 views12 pages

Presentation !

Uploaded by

buttarsubhan046
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views12 pages

Presentation !

Uploaded by

buttarsubhan046
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

CYBER SECURITY

ADP-ITM
Spring 2024
COURSE TITLE: ICT
INSTRUCTOR : SIR Luqman
NAMERDFGDF
NAME ROLL NUMBER

EMAN 1240200029
SUBHAN 1240200138
REHAN 1240200072
SARMAD 1240200020
MEERAB 1240200189

Department of ADP-ITM
International Institute of Science, Arts and Technology (IISAT),
Gujranwala
Introduction:
Our Presentation will the
different cover types
attacks of cyber real world
example of their impact,
and the evolving by cyber
criminals Strategies used
We will also explore the
best Practies and
technolog available to
Protect overst and
cur organization from
the
Cyber Security:
Cyber security refers
to the practice of
protecting systems,
Networks, and
Programs from
digital attacks.

These cyber attacks are


usually aimed at
accessing ,changing
destroying sensitive
information , extorting
money from user or
interrupting normal
business processes
Cybercrime:
• Cybercrime is any criminal activity that
involves a computer, network or network
device.

• These activities can range from stealing data


and spreading malware to hacking system
and committing fraud.

• Cyber crime targets individuals businesses


and government institutions.
Difference b/w Cybercrime and Crime

Cybercrime: Crime:
Cybercrime targets Conventional crime tend to
online target
interconnected individuals or
system, digital assets and physical assets such as offices
sensitive personal relatives and homes
information
Cyber Attacks:
A cyberattack is an attempt by hackers to damage or
disrupt a computer system, network, or device.

This can involve stealing, changing, or destroying


data, spreading malware (like viruses), or using
systems for unauthorized purposes.

In simple terms, it's when someone tries to break


into or harm computer systems using digital means.
Malware:
Malware, short for malicious software,
refers to any intrusive software developed by
cybercriminals (often called hackers) to steal data
and damage or destroy computers and computer
systems

Types of Malware:
• virus
• bugs
• worm
• Trojan horses
• Ransomware
Hacking

Hacking is the act of


finding and exploiting
weaknesses in a computer
system or network to gain
unauthorized access to
data or disrupt
operations.
Dark Web:
The Dark Web is a hidden part
of the internet you can only
access with special software. It's
used for anonymous activities,
and while it can be a place for
illegal things, it's also used for
privacy and free speech.

Dark Web Uses:


Illegal uses of the darknet
include buying and selling
stolen information like user
login credentials, sensitive
personal information like social
security numbers, payment
card information; selling and
buying.
Data Protection:
• Enable Two-Factor Authentication:
Add an extra step
to log in, like a code sent to your
phone.
• Keep Everything Updated:
Update your apps and software
regularly.
• Backup Your Data:
Save copies of important files in a
different place.
• Be Careful with Emails: Don't
click on strange links or open
unknown attachments.
• Secure Your Wi-Fi:
Use a strong password for your home
network and avoid public Wi-Fi for
sensitive
• Use Strong Passwords:
Make your passwords hard to guess and
use different ones for different accounts.
THANK
YOU

You might also like