Cyber Awareness
Cyber Awareness
By Ridhi
Class 9D
01 Introduction
• S o c i a l e n g i n e e r i n g i s w h e n s o m e o n e u s e s a c o m p e l l i n g s t o r y, a u t h o r i t y, o r o t h e r m e a n s t o c o n v i n c e s o m e o n e t o h a n d o v e r s e n s i t i v e
information such as usernames and passwords
• Phishing is a form of social engineering. It is a popular attack that attempts to trick users into clicking a link within an email or on
a website in hopes that they divulge sensitive information. .
• Spear phishing is an email crafted and sent to a specific person to whom it may appear to be legitimate It is a form of phishing, but
it is more convincing and more likely to succeed than traditional phishing emails because it tailors the email to the victim. .
• V i s h i n g t h a t i n v o l v e s c o n t a c t i n g i n d i v i d u a l s v i a t r a d i t i o n a l l a n d l i n e s , t e l e p h o n y ( i . e . , Vo i c e o v e r I P ) , a u t o m a t e d t e x t - t o - s p e e c h
systems, or other forms of voice communications to trick them into divulging sensitive information like credit card data.
• Smishing that leverages SMS or text messages as the vector to trick end users into divulging sensitive information.
• Ta i l g a t i n g i n w h i c h a n u n a u t h o r i z e d i n d i v i d u a l c a n a c c e s s a l o c a t i o n b y f o l l o w i n g a n a u t h o r i z e d u s e r i n t o t h e l o c a t i o n w i t h o u t t h e
authorized user's knowledge.
• Piggybacking in which an unauthorized individual can access a location by following an authorized user into the location with the
authorized user's knowledge.
• Ransomware This type of malware encrypts data and holds it for ransom which could paralyze the whole computer system.
SECTION 3
Cyber Security
Cyber Security
• Cyber security is the application of
technologies, processes and controls to
protect systems, networks, programs,
devices and data from cyber attacks. It aims to
reduce the risk of cyber attacks and protect
against the unauthorized exploitation of
systems, networks and technologies.
01 Anti Malware Protection 05 Patching
02 Data protection 06 Safe Web Browsing data
WAYS TO CYBER
SECURE YOURSELF 03 Device Management 07 Social Engineering
04 Password Management
SECTION 4
Advantages of
cyber security
Advantages of cyber security
.
Thank you
Efforts from Ridhi