0% found this document useful (0 votes)
212 views12 pages

Cyber Awareness

Uploaded by

ridhibansal213
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
212 views12 pages

Cyber Awareness

Uploaded by

ridhibansal213
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Cyber awareness

By Ridhi
Class 9D
01 Introduction

02 Cybercrime - Upward trends

CONTENTS 03 Cyber Security

04 Advantages of cyber security


SECTION 1
Introduction
Cybercrime is an activity done using computers and internet. We can say that
it is an unlawful acts wherein the computer either a tool or target or both.
SECTION 2
Cyber crime
Upward trends
Cybercrime - upward trends
• Threat agents are the perpetrators of the threat and usually look for the easiest way to gain access into a network, which is often
the human element.

• S o c i a l e n g i n e e r i n g i s w h e n s o m e o n e u s e s a c o m p e l l i n g s t o r y, a u t h o r i t y, o r o t h e r m e a n s t o c o n v i n c e s o m e o n e t o h a n d o v e r s e n s i t i v e
information such as usernames and passwords

• Phishing is a form of social engineering. It is a popular attack that attempts to trick users into clicking a link within an email or on
a website in hopes that they divulge sensitive information. .

• Spear phishing is an email crafted and sent to a specific person to whom it may appear to be legitimate It is a form of phishing, but
it is more convincing and more likely to succeed than traditional phishing emails because it tailors the email to the victim. .

• V i s h i n g t h a t i n v o l v e s c o n t a c t i n g i n d i v i d u a l s v i a t r a d i t i o n a l l a n d l i n e s , t e l e p h o n y ( i . e . , Vo i c e o v e r I P ) , a u t o m a t e d t e x t - t o - s p e e c h
systems, or other forms of voice communications to trick them into divulging sensitive information like credit card data.

• Smishing that leverages SMS or text messages as the vector to trick end users into divulging sensitive information.

• Ta i l g a t i n g i n w h i c h a n u n a u t h o r i z e d i n d i v i d u a l c a n a c c e s s a l o c a t i o n b y f o l l o w i n g a n a u t h o r i z e d u s e r i n t o t h e l o c a t i o n w i t h o u t t h e
authorized user's knowledge.

• Piggybacking in which an unauthorized individual can access a location by following an authorized user into the location with the
authorized user's knowledge.

• Malware is software created and used for malicious intent.

• Ransomware This type of malware encrypts data and holds it for ransom which could paralyze the whole computer system.
SECTION 3
Cyber Security
Cyber Security
• Cyber security is the application of
technologies, processes and controls to
protect systems, networks, programs,
devices and data from cyber attacks. It aims to
reduce the risk of cyber attacks and protect
against the unauthorized exploitation of
systems, networks and technologies.
01 Anti Malware Protection 05 Patching
02 Data protection 06 Safe Web Browsing data
WAYS TO CYBER
SECURE YOURSELF 03 Device Management 07 Social Engineering

04 Password Management
SECTION 4
Advantages of
cyber security
Advantages of cyber security

Improved information security and Improved company credentials with the


business continuity management. correct security controls in place.

Protect networks and data from Improved stakeholder confidence in your


unauthorized access. information security arrangements.

.
Thank you
Efforts from Ridhi

You might also like