Cyber attack

48
CYBER ATTACKS BY AVINASH FULBARIA

Transcript of Cyber attack

Page 1: Cyber attack

CYBER

ATTACKSBY

AVINASH FULBARIA

Page 2: Cyber attack

INTRODUCTION Cyber crime is an activity done using computers

and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.

Page 3: Cyber attack

TYPES OF CYBER CRIMES Hacking Child Pornography Virus Dissminition Denial Of Service Attack Computer Vandalism Software Piracy Cyber Terrorism Salami Attacks

Page 4: Cyber attack

SAFETY TIPS Use antivirus Software Insert Firewalls Uninstall unnecessary software Maintain backup Check security settings

Page 5: Cyber attack

CYBER TERRORISM It uses computer as weapon for Credit card fraud Email Fraud Fake Websites Pages Fake IDs on Social Networking Sites Spying

Page 6: Cyber attack

EMAIL FRAU

D

Page 7: Cyber attack

EMAIL FRAUD E-Mail known as Electronic Mail. Websites For Email are Yahoo Gmail Rediff Hotmail

Page 8: Cyber attack

EMAIL FRAUD With the help of

fake email generator Websites

Page 9: Cyber attack
Page 10: Cyber attack
Page 11: Cyber attack
Page 12: Cyber attack

HOW TO CHECK WHETHER THE MAIL IS REAL

OR FAKE..

Page 13: Cyber attack

STEP 1 :-

On the right side of the email there is a arrow pointing down next to reply symbol.

Page 14: Cyber attack
Page 15: Cyber attack

STEP 2

Click on it….

Page 16: Cyber attack

STEP 3

After clicking on it a tray with different options is appeared and we need to select option

“SHOW ORIGINAL”..

Page 17: Cyber attack
Page 18: Cyber attack

STEP 4

After clicking on it a new window with lots of coding will be opened..

Page 19: Cyber attack
Page 20: Cyber attack

STEP 5

On this tab of coding search “RECEIVED FROM”….

Page 21: Cyber attack

FAKE MAIL

Page 22: Cyber attack

ORIGINAL MAIL

Page 23: Cyber attack

STEP 6

In Received from it is written “EMKEI.CZ” so copy this link and paste it in Google to confirm whether this mail is fake or real…

Page 24: Cyber attack

FAKE WEBPAG

E

Page 25: Cyber attack

FAKE WEBPAGE

Fake Webpage also known as duplicate webpage.

In which duplicates of WebPages are made for cyber crime……

Page 26: Cyber attack

HOW TO IDENTIFY THE

WEBPAGE WHETHER IT IS FAKE OR REAL…

Page 27: Cyber attack

STEPS Before using any banking sites confirm

whether the site we are accessing is real or not and for that we need to take few steps :

1. On the address bar of the explorer on the left side address bar a “CLOSED LOCK” with green color is observed….that means we are accessing a real site.

Page 28: Cyber attack
Page 29: Cyber attack

STEP 2

This security is only given to a single name bank sites or any other authorized sites.

Page 30: Cyber attack
Page 31: Cyber attack

STEP 3

The sites can be created once with one name and after making a fake webpage of it there will be a misspelling in the fake WebPages.

Page 32: Cyber attack
Page 33: Cyber attack
Page 34: Cyber attack

SPYING

Page 35: Cyber attack

SPYING

It is the activity of recording peoples Credit card number, ATM pins, Email IDs and Passwords or any Confidential data's by means of Spying Software's.

Page 36: Cyber attack

SPYING SOFTWARE'S FOR MOBILES1. Mspy2. Flexispy3. TeenSafe4. Mobile Spy5. Mobi Stealth6. Spyera7. iSpyoo8. TheOneSpy9. TheTruthSPY10. SpyBubble

Page 37: Cyber attack

SPYING SOFTWARE'S FOR PC 1.Spy Agent 2. Web Watcher3.Pc Pandora 74.Specter Pro 75.Elite Keylogger6.Refog Personal Monitor 77.eBlaster78.Sniperspy79.Iam big brother10.XPCspy

Page 38: Cyber attack

ACTUAL SPY SOFTWARE

Page 39: Cyber attack

ACTUAL SPY This Software is used for spying this

software can record :1. Keyboard strokes2. Screenshots3. Application 4. Visited Websites Etc. It create a log file of the activities

recorded and send it to the third party.

Page 40: Cyber attack
Page 41: Cyber attack
Page 42: Cyber attack
Page 43: Cyber attack

SAFETY

Page 44: Cyber attack

SPYING PROTECTION SOFTWARE'S1.Windows Defender2.Spybot Search and Destroy3.Ad-aware4.Malwarbytes Anti malware5.Spyware Blaster6.Antimalware suites

Page 45: Cyber attack

SAFETY Do not share any of your personal

details with anyone. Do not keep the name or your birthday

or your mobile number as your password.

Before visiting the sites do confirm.

Page 46: Cyber attack

SAFETY IS IN YOUR HAND HOW TO GET

IT DEPENDS ON YOU…….IT

BELONGS TO YOU AND YOUR FAMILY

SO DO NOT TAKE IT LIBERALLY..

Page 47: Cyber attack

THE END

Page 48: Cyber attack

THANK U