Date post: | 16-Feb-2017 |
Category: |
Engineering |
Upload: | avinash-navin |
View: | 148 times |
Download: | 3 times |
CYBER
ATTACKSBY
AVINASH FULBARIA
INTRODUCTION Cyber crime is an activity done using computers
and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
TYPES OF CYBER CRIMES Hacking Child Pornography Virus Dissminition Denial Of Service Attack Computer Vandalism Software Piracy Cyber Terrorism Salami Attacks
SAFETY TIPS Use antivirus Software Insert Firewalls Uninstall unnecessary software Maintain backup Check security settings
CYBER TERRORISM It uses computer as weapon for Credit card fraud Email Fraud Fake Websites Pages Fake IDs on Social Networking Sites Spying
EMAIL FRAU
D
EMAIL FRAUD E-Mail known as Electronic Mail. Websites For Email are Yahoo Gmail Rediff Hotmail
EMAIL FRAUD With the help of
fake email generator Websites
HOW TO CHECK WHETHER THE MAIL IS REAL
OR FAKE..
STEP 1 :-
On the right side of the email there is a arrow pointing down next to reply symbol.
STEP 2
Click on it….
STEP 3
After clicking on it a tray with different options is appeared and we need to select option
“SHOW ORIGINAL”..
STEP 4
After clicking on it a new window with lots of coding will be opened..
STEP 5
On this tab of coding search “RECEIVED FROM”….
FAKE MAIL
ORIGINAL MAIL
STEP 6
In Received from it is written “EMKEI.CZ” so copy this link and paste it in Google to confirm whether this mail is fake or real…
FAKE WEBPAG
E
FAKE WEBPAGE
Fake Webpage also known as duplicate webpage.
In which duplicates of WebPages are made for cyber crime……
HOW TO IDENTIFY THE
WEBPAGE WHETHER IT IS FAKE OR REAL…
STEPS Before using any banking sites confirm
whether the site we are accessing is real or not and for that we need to take few steps :
1. On the address bar of the explorer on the left side address bar a “CLOSED LOCK” with green color is observed….that means we are accessing a real site.
STEP 2
This security is only given to a single name bank sites or any other authorized sites.
STEP 3
The sites can be created once with one name and after making a fake webpage of it there will be a misspelling in the fake WebPages.
SPYING
SPYING
It is the activity of recording peoples Credit card number, ATM pins, Email IDs and Passwords or any Confidential data's by means of Spying Software's.
SPYING SOFTWARE'S FOR MOBILES1. Mspy2. Flexispy3. TeenSafe4. Mobile Spy5. Mobi Stealth6. Spyera7. iSpyoo8. TheOneSpy9. TheTruthSPY10. SpyBubble
SPYING SOFTWARE'S FOR PC 1.Spy Agent 2. Web Watcher3.Pc Pandora 74.Specter Pro 75.Elite Keylogger6.Refog Personal Monitor 77.eBlaster78.Sniperspy79.Iam big brother10.XPCspy
ACTUAL SPY SOFTWARE
ACTUAL SPY This Software is used for spying this
software can record :1. Keyboard strokes2. Screenshots3. Application 4. Visited Websites Etc. It create a log file of the activities
recorded and send it to the third party.
SAFETY
SPYING PROTECTION SOFTWARE'S1.Windows Defender2.Spybot Search and Destroy3.Ad-aware4.Malwarbytes Anti malware5.Spyware Blaster6.Antimalware suites
SAFETY Do not share any of your personal
details with anyone. Do not keep the name or your birthday
or your mobile number as your password.
Before visiting the sites do confirm.
SAFETY IS IN YOUR HAND HOW TO GET
IT DEPENDS ON YOU…….IT
BELONGS TO YOU AND YOUR FAMILY
SO DO NOT TAKE IT LIBERALLY..
THE END
THANK U