cyber attack
TRANSCRIPT
![Page 1: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/1.jpg)
CYBER
ATTACKSBY
AVINASH FULBARIA
![Page 2: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/2.jpg)
INTRODUCTION Cyber crime is an activity done using computers
and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
![Page 3: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/3.jpg)
TYPES OF CYBER CRIMES Hacking Child Pornography Virus Dissminition Denial Of Service Attack Computer Vandalism Software Piracy Cyber Terrorism Salami Attacks
![Page 4: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/4.jpg)
SAFETY TIPS Use antivirus Software Insert Firewalls Uninstall unnecessary software Maintain backup Check security settings
![Page 5: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/5.jpg)
CYBER TERRORISM It uses computer as weapon for Credit card fraud Email Fraud Fake Websites Pages Fake IDs on Social Networking Sites Spying
![Page 6: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/6.jpg)
EMAIL FRAU
D
![Page 7: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/7.jpg)
EMAIL FRAUD E-Mail known as Electronic Mail. Websites For Email are Yahoo Gmail Rediff Hotmail
![Page 8: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/8.jpg)
EMAIL FRAUD With the help of
fake email generator Websites
![Page 9: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/9.jpg)
![Page 10: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/10.jpg)
![Page 11: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/11.jpg)
![Page 12: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/12.jpg)
HOW TO CHECK WHETHER THE MAIL IS REAL
OR FAKE..
![Page 13: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/13.jpg)
STEP 1 :-
On the right side of the email there is a arrow pointing down next to reply symbol.
![Page 14: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/14.jpg)
![Page 15: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/15.jpg)
STEP 2
Click on it….
![Page 16: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/16.jpg)
STEP 3
After clicking on it a tray with different options is appeared and we need to select option
“SHOW ORIGINAL”..
![Page 17: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/17.jpg)
![Page 18: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/18.jpg)
STEP 4
After clicking on it a new window with lots of coding will be opened..
![Page 19: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/19.jpg)
![Page 20: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/20.jpg)
STEP 5
On this tab of coding search “RECEIVED FROM”….
![Page 21: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/21.jpg)
FAKE MAIL
![Page 22: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/22.jpg)
ORIGINAL MAIL
![Page 23: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/23.jpg)
STEP 6
In Received from it is written “EMKEI.CZ” so copy this link and paste it in Google to confirm whether this mail is fake or real…
![Page 24: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/24.jpg)
FAKE WEBPAG
E
![Page 25: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/25.jpg)
FAKE WEBPAGE
Fake Webpage also known as duplicate webpage.
In which duplicates of WebPages are made for cyber crime……
![Page 26: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/26.jpg)
HOW TO IDENTIFY THE
WEBPAGE WHETHER IT IS FAKE OR REAL…
![Page 27: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/27.jpg)
STEPS Before using any banking sites confirm
whether the site we are accessing is real or not and for that we need to take few steps :
1. On the address bar of the explorer on the left side address bar a “CLOSED LOCK” with green color is observed….that means we are accessing a real site.
![Page 28: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/28.jpg)
![Page 29: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/29.jpg)
STEP 2
This security is only given to a single name bank sites or any other authorized sites.
![Page 30: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/30.jpg)
![Page 31: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/31.jpg)
STEP 3
The sites can be created once with one name and after making a fake webpage of it there will be a misspelling in the fake WebPages.
![Page 32: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/32.jpg)
![Page 33: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/33.jpg)
![Page 34: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/34.jpg)
SPYING
![Page 35: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/35.jpg)
SPYING
It is the activity of recording peoples Credit card number, ATM pins, Email IDs and Passwords or any Confidential data's by means of Spying Software's.
![Page 36: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/36.jpg)
SPYING SOFTWARE'S FOR MOBILES1. Mspy2. Flexispy3. TeenSafe4. Mobile Spy5. Mobi Stealth6. Spyera7. iSpyoo8. TheOneSpy9. TheTruthSPY10. SpyBubble
![Page 37: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/37.jpg)
SPYING SOFTWARE'S FOR PC 1.Spy Agent 2. Web Watcher3.Pc Pandora 74.Specter Pro 75.Elite Keylogger6.Refog Personal Monitor 77.eBlaster78.Sniperspy79.Iam big brother10.XPCspy
![Page 38: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/38.jpg)
ACTUAL SPY SOFTWARE
![Page 39: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/39.jpg)
ACTUAL SPY This Software is used for spying this
software can record :1. Keyboard strokes2. Screenshots3. Application 4. Visited Websites Etc. It create a log file of the activities
recorded and send it to the third party.
![Page 40: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/40.jpg)
![Page 41: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/41.jpg)
![Page 42: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/42.jpg)
![Page 43: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/43.jpg)
SAFETY
![Page 44: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/44.jpg)
SPYING PROTECTION SOFTWARE'S1.Windows Defender2.Spybot Search and Destroy3.Ad-aware4.Malwarbytes Anti malware5.Spyware Blaster6.Antimalware suites
![Page 45: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/45.jpg)
SAFETY Do not share any of your personal
details with anyone. Do not keep the name or your birthday
or your mobile number as your password.
Before visiting the sites do confirm.
![Page 46: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/46.jpg)
SAFETY IS IN YOUR HAND HOW TO GET
IT DEPENDS ON YOU…….IT
BELONGS TO YOU AND YOUR FAMILY
SO DO NOT TAKE IT LIBERALLY..
![Page 47: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/47.jpg)
THE END
![Page 48: Cyber attack](https://reader034.vdocuments.mx/reader034/viewer/2022042722/58a4eaca1a28abd8548b541d/html5/thumbnails/48.jpg)
THANK U