Вы находитесь на странице: 1из 12

आप में से कोई ऐसा है जिसने आि तक

इं टरनेट या स्माटट फोन कभी USE ना


जकया हो
?????
Anywhere
Anytime
Anyone
 Hacking
Hacking is the practice of modifying the feature of a
system, in order to accomplish a goal outside of the
creator’s original purpose.

 Hackers
 Brilliant Programmer .
 Continuously working on one task .
 Details Knowledge of net and user Behavior
 Ransom ware is a type of malware that involves an attacker locking the
victim's computer system files typically through encryption and
demanding a payment to decrypt and unlock them.

 Malware is any file or program used to harm a computer user, such as


worms, computer viruses, Trojan horses and spyware.

 Social engineering is an attack that relies on human interaction to trick


users into breaking security procedures in order to gain sensitive
information that is typically protected.

 Phishing is a form of fraud where fraudulent emails are sent that resemble
emails from reputable sources; however, the intention of these emails is to
steal sensitive data, such as credit card or login information.
 The use of cyber security can help prevent cyber attacks, data breaches
and identity theft and can aid in risk management.

 When an organization has a strong sense of network security and an


effective incident response plan, it is better able to prevent and mitigate
these attacks. For example, end user protection defends information and
guards against loss or theft while also scanning computers for malicious
code.
 Not install Unwanted app in Your Smart phone.

 Entrusted app in not give the permission at installation time such as contacts, call
Information, device id, SMS, photo/Media file, Storage, location, Networks, sensor,
voice etc.

 If You any app give the permission than your data(call log , SMS, location etc) are
upload the app server so these data can misused.
Example: True caller, face book
1. आपके ही ले नदे न SMS को आपको दु बारा भेि कर आपसे खाता खोलने को प्रेररत करते है |
2. आपके ही दोस्ों के फोन से डाटा जनकल कर आपको दे दे ता है
3. आपकी लोकेशन के अनुसार आपको ऑफर जदया िाता है |(आपकी लोकेशन को रे गुलर टर े स कर के आपको नुकसान
भी पहुचा सकते हैं िे से चोरी, जकडनैप, आजद | )
4. आपके फोन से फोटो, फोननंबर , लोकेशन , फाइल , सेवड पासवडट आजद|
5. Face book theft the your friend location and provide you for nearest friends.

 Whatsapp in receive any sensitive link don’t open in browser and not registered it .

 Now a days configure email something all Smart phones so hacker send email in suspected link .
When receive the e-Mail in your smart phone than pop-up or notification and you without any
thinking Open It than you are hack some time.
 Spam emails pose a threat to consumers because they're commonly laden
with malware or, in many cases, they lead victims to malicious websites
designed to scam individuals.

 Typical spam messages include off-shore pharmaceutical ads, pump-and-


dump stock schemes and general unsolicited advertising.

 These emails lead the unwary to fake sites, which then usually include
"notifications" about their accounts being at risk or needing updates.

 A simple click on these notifications will compromise your computer's


security.
Normal : 123india
Good : 123@india
Better : 123&InDIa.NanDurbar
Best : NanDurBar#$%789_..01

Security Questions Q.
Favorite teacher?
A. K.Pathak (insecure)
A. 123*pathak (secure)
 Not use open wireless network and don’t used
it , for banking or payments.
 Many network seems like Wi-Fi but when
connected than open New browser required
registration and valuable information(hackers
try to knows behavior of password).
 Don’t response miscall
+92; #90 or #09 etc.(international no.)
Example +92 4526897854
 Sexual Material
 Nudity
 Violence
 Games
 Drugs
 Virus

Вам также может понравиться