Вы находитесь на странице: 1из 23

Shafaqat Ali 15137058

Adeel Sarwar 15137038


Cyber Security Hamza Ali
Faisal Hayat
15137022
15137057
Cyber Security
Protection of
● Internet-connected systems
● Hardware
● Software
● Data
from cyber attacks.
Information Security
● Chunks of Data
● Secure Information
● Organization Information
Types of Cyber Security threats
● Spoofing
● Spam
● Phishing
● Malware
● Foot printing
● Social Engineering
Spoofing
● Spoofing is an act of impersonation. A hacker will
pretend to be a person or company known to
and trusted by the recipient.
● Spoofing is used to gain access to the sensitive
data.
Spoofing
Examples:
● Bank Fake Calls (Account no/pin)
● Fake Emails (Qatar Airways)
Spoofing
Email(Qatar Airways)
Spam
● Spam refers to the use of electronic messaging
systems to send out unrequested or unwanted
messages in bulk e.g
● Email Spam
● Message Spam
Spam
Phishing
● Fraudulent practice of sending emails purporting
to be from reputable companies in order to
induce individuals to reveal personal
information, such as passwords and credit card
numbers.
Phishing
Facebook
● www.facebook.com
● www.facebook.com
● www.facebook.com
Phishing
Malware
● Software that is specifically designed to disrupt,
damage, or gain unauthorized access to a
computer system.
● Ransomware
● Adware
Ransomware Malware
Ransomware is a subset of malware in which
the data on a victim's computer is locked,
typically by encryption, and payment is
demanded before the ransomed data is
encrypted.
Ransomware Malware
Adware Malware
● Adware Malware is tool that create Unwanted
advertisements to the user of a computer.
Foot Printing
● Footprinting is a part of reconnaissance process
which is used for gathering possible information
about a target computer system or network.
● Employee information
● Phone numbers
● E-mails
● Job Information
Social Engineering

● Psychological manipulation of people into


performing actions.
● WiFi Password hack
● Dictionary
How to be Secure
● USB/Hard Drive
● Login into other devices
● Selling Cellphone/Devices
● Unwanted things
● Unwanted Access
How we can Report

FIA
Tools/ToDo
● Anti viruses
● Task Manager
● Running Apps
● Strong Password(ABC123abc#$%676)
Mobile Hacking Demo
Thank You

Вам также может понравиться