Cyber attack

Preview:

Citation preview

CYBER

ATTACKSBY

AVINASH FULBARIA

INTRODUCTION Cyber crime is an activity done using computers

and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.

TYPES OF CYBER CRIMES Hacking Child Pornography Virus Dissminition Denial Of Service Attack Computer Vandalism Software Piracy Cyber Terrorism Salami Attacks

SAFETY TIPS Use antivirus Software Insert Firewalls Uninstall unnecessary software Maintain backup Check security settings

CYBER TERRORISM It uses computer as weapon for Credit card fraud Email Fraud Fake Websites Pages Fake IDs on Social Networking Sites Spying

EMAIL FRAU

D

EMAIL FRAUD E-Mail known as Electronic Mail. Websites For Email are Yahoo Gmail Rediff Hotmail

EMAIL FRAUD With the help of

fake email generator Websites

HOW TO CHECK WHETHER THE MAIL IS REAL

OR FAKE..

STEP 1 :-

On the right side of the email there is a arrow pointing down next to reply symbol.

STEP 2

Click on it….

STEP 3

After clicking on it a tray with different options is appeared and we need to select option

“SHOW ORIGINAL”..

STEP 4

After clicking on it a new window with lots of coding will be opened..

STEP 5

On this tab of coding search “RECEIVED FROM”….

FAKE MAIL

ORIGINAL MAIL

STEP 6

In Received from it is written “EMKEI.CZ” so copy this link and paste it in Google to confirm whether this mail is fake or real…

FAKE WEBPAG

E

FAKE WEBPAGE

Fake Webpage also known as duplicate webpage.

In which duplicates of WebPages are made for cyber crime……

HOW TO IDENTIFY THE

WEBPAGE WHETHER IT IS FAKE OR REAL…

STEPS Before using any banking sites confirm

whether the site we are accessing is real or not and for that we need to take few steps :

1. On the address bar of the explorer on the left side address bar a “CLOSED LOCK” with green color is observed….that means we are accessing a real site.

STEP 2

This security is only given to a single name bank sites or any other authorized sites.

STEP 3

The sites can be created once with one name and after making a fake webpage of it there will be a misspelling in the fake WebPages.

SPYING

SPYING

It is the activity of recording peoples Credit card number, ATM pins, Email IDs and Passwords or any Confidential data's by means of Spying Software's.

SPYING SOFTWARE'S FOR MOBILES1. Mspy2. Flexispy3. TeenSafe4. Mobile Spy5. Mobi Stealth6. Spyera7. iSpyoo8. TheOneSpy9. TheTruthSPY10. SpyBubble

SPYING SOFTWARE'S FOR PC 1.Spy Agent 2. Web Watcher3.Pc Pandora 74.Specter Pro 75.Elite Keylogger6.Refog Personal Monitor 77.eBlaster78.Sniperspy79.Iam big brother10.XPCspy

ACTUAL SPY SOFTWARE

ACTUAL SPY This Software is used for spying this

software can record :1. Keyboard strokes2. Screenshots3. Application 4. Visited Websites Etc. It create a log file of the activities

recorded and send it to the third party.

SAFETY

SPYING PROTECTION SOFTWARE'S1.Windows Defender2.Spybot Search and Destroy3.Ad-aware4.Malwarbytes Anti malware5.Spyware Blaster6.Antimalware suites

SAFETY Do not share any of your personal

details with anyone. Do not keep the name or your birthday

or your mobile number as your password.

Before visiting the sites do confirm.

SAFETY IS IN YOUR HAND HOW TO GET

IT DEPENDS ON YOU…….IT

BELONGS TO YOU AND YOUR FAMILY

SO DO NOT TAKE IT LIBERALLY..

THE END

THANK U

Recommended