Cyber Crime.pptx
Document Details
Uploaded by SubsidizedPlot
Tags
Full Transcript
4 Hey Raju, nothing much just Hey Tina, Let me see… browsing Internet & I came across this i...
4 Hey Raju, nothing much just Hey Tina, Let me see… browsing Internet & I came across this interesting ad. Whenever I move 3 mouse over the link a popup appears… 5 6 What’s that? Ohh Tina!! Thank god you didn’t click it. It’s a click Ohh God!! Thank you jacking attack… Raju. You just saved me from clicking on that link. 8 2 It’s a type of attack where, when you click on the link it 7 gets diverted to another web runner. And the attacker collects all the information & your PC gets compromised. 1 In the above scenario, How do some people click on any website without even knowing about it? It could be quite 2 risky. Let’s explore this together. 3 1 Cyber Security Awareness Learning Objectives Introduction What is Cyber Security? Why is Cyber Security Important? Types of Cyber Security Threats Advantages and Disadvantages Introduction The term cyber security is used to refer to the security offered through on-line services to protect your online information. With an increasing amount of people getting connected to internet, the security threats that cause massive harm are increasing also. The objectives of cyber security is to establish rules and measure to use against attacks over the internet. What is Cyber Security? Why is Cyber Security Important? Cyber Security is Cyber security attacks protecting systems and can result in everything networks, changing or from identity theft, to destroying sensitive extortion attempts, to information; extorting the loss of important money from users; or data like family photos, interrupting normal etc business processes. Securing these and other Cyber Security approach organizations is essential has multiple layers of to keeping our society protection spread across functioning. the computers, networks, programs or data that one intends to keep safe. Click the question to know more. Types of Cyber Security Malware Phishing Attacks Denial-of- Service (DDoS) Attacks Data Breaches 1 Phishing 3 8 What is Phishing? 2 4 How Phishing attacks? 5 Examples 6 Prevention Methods 7 Click each box to understand them in detail. Always ensure 1 that you’re using 9 Phishing Phishing is a a secure Website fraudulent 5 when submitting 2 3 attempt, the credit card or usually made other sensitive What is Phishing? through email, information via to steal your your Web Browser To ensure you’re personal 4 information. on a secure Web How Phishing Phishing is the server, check the attacks? attempt to get beginning of the sensitive Web address bar – information 7 it should be 6 such as “https:// “rather Examples username, than “ http:// “. Regularly log into password, and credit card your online details, often accounts. Don’t 8 leave them for a Prevention for malicious reasons long period of Methods time. through an If anything is electronic communication suspicious, contact your bank 1 Malware 3 8 What is Malware? 2 4 How Malware attacks? 5 Examples 6 Prevention Methods 7 Click each box to understand them in detail. 1 This software 9 Malware A Malware is a must be installed on your 3 set of 5 computer:- 2 instructions Antivirus What is Malware? that run on Software – An your computer antivirus software and make your on your computer system do is an absolute 4 How Malware something that prerequisite to an attacker protect yourself attacks? wants it to do. against viruses & Malware gets worms. 7 Firewall – The installed in 6 your device firewall is the Examples and performs “protective unwanted barrier” of tasks. unwanted access 8 Mainly to your computer Prevention designed to via internet. Methods transmit Install an Ad information Blocker on your about your web web browser. This browsing habits protects against 1 Denial-of-service(DDoS) 3 8 What is Denial-of-service? 2 4 How Denial-of-service attacks? 5 Examples 6 Prevention Methods 7 Click each box to understand them in detail. 1 Denial-of-service(DDoS) A Denial of Attack surface 3 Service attack reduction: 9 2 (DDoS) is an 5 attack through Limiting attack What is Denial-of-service? which a person surface can render a exposure can system help minimize 4 unusable, or the effect of How Denial-of-service significantly DDoS attack. Caching: A attacks? slow it down for cache stires legitimate users, by copies of 6 requested overloading its content so that Examples resources. requested are DDoS is one such fearful serviced by 8 attack which origin servers. Rate limiting: targets mainly Prevention Methods those Rate limiting companies or restricts the institutions 7 volume of which uses network traffic online services over a specific 1 Data Breaches 7 3 2 What is Data Breaches? 4 How Data Breaches attacks? 5 Prevention Methods 6 Click each box to understand them in detail. 1 Data Breaches Use strong 7 The 5 password & 3unauthorized multi-factor 2 access or theft authentication. of sensitive What is Data Breaches? Regularly information, update software such as & security personal data, 4 patches. financial How Data Breaches records or Provide employee attacks? trade secrets. training on Data breaches cyber security 6 can occur via awareness. cyber attacks, Implement data hacking, Prevention Methods encryption & malware, access controls. insider threats Have an & physical theft incident of devices or response plan in documents. place.