Download as odp, pdf, or txt
Download as odp, pdf, or txt
You are on page 1of 23

Shafaqat Ali 15137058

Adeel Sarwar 15137038


Cyber Security Hamza Ali
Faisal Hayat
15137022
15137057
Cyber Security
Protection of
● Internet-connected systems
● Hardware
● Software
● Data
from cyber attacks.
Information Security
● Chunks of Data
● Secure Information
● Organization Information
Types of Cyber Security threats
● Spoofing
● Spam
● Phishing
● Malware
● Foot printing
● Social Engineering
Spoofing
● Spoofing is an act of impersonation. A hacker will
pretend to be a person or company known to
and trusted by the recipient.
● Spoofing is used to gain access to the sensitive
data.
Spoofing
Examples:
● Bank Fake Calls (Account no/pin)
● Fake Emails (Qatar Airways)
Spoofing
Email(Qatar Airways)
Spam
● Spam refers to the use of electronic messaging
systems to send out unrequested or unwanted
messages in bulk e.g
● Email Spam
● Message Spam
Spam
Phishing
● Fraudulent practice of sending emails purporting
to be from reputable companies in order to
induce individuals to reveal personal
information, such as passwords and credit card
numbers.
Phishing
Facebook
● www.facebook.com
● www.facebook.com
● www.facebook.com
Phishing
Malware
● Software that is specifically designed to disrupt,
damage, or gain unauthorized access to a
computer system.
● Ransomware
● Adware
Ransomware Malware
Ransomware is a subset of malware in which
the data on a victim's computer is locked,
typically by encryption, and payment is
demanded before the ransomed data is
encrypted.
Ransomware Malware
Adware Malware
● Adware Malware is tool that create Unwanted
advertisements to the user of a computer.
Foot Printing
● Footprinting is a part of reconnaissance process
which is used for gathering possible information
about a target computer system or network.
● Employee information
● Phone numbers
● E-mails
● Job Information
Social Engineering

● Psychological manipulation of people into


performing actions.
● WiFi Password hack
● Dictionary
How to be Secure
● USB/Hard Drive
● Login into other devices
● Selling Cellphone/Devices
● Unwanted things
● Unwanted Access
How we can Report

FIA
Tools/ToDo
● Anti viruses
● Task Manager
● Running Apps
● Strong Password(ABC123abc#$%676)
Mobile Hacking Demo
Thank You

You might also like