SlideShare uma empresa Scribd logo
1 de 14
“

THE REAL OPPORTUNITY FOR
SUCCESS LIES W
ITHIN THE
PERSON AND NOT IN HIS
PERSONALITY.
~ Akshay Jain

”
CYBER SECURITY
What is Ethical Hacking and How can we save ourselves
knowing about Cyber Security?

Akshay Jain
BCA Semester 4th Second Shift
36
TABLE OF CONTENTS
• What is Ethical Hacking?
• Ways of Invasion in your Personal Space?
• What is Cyber Security?
• How to be safe from hacking?
• How to deal if you are victimized?
• Q&A Session
WHO AM I REALLY?
I am Akshay Jain currently pursuing B.C.A. from JIMS, Rohini Sector 5,
Delhi. Apart from this I am a Internet Marketer. I speak in many Web
Seminars and Bloggers Meet also.
In history, I was experienced White Hat Hacker (Level 1) and Professional
Blogger too. I still run a Blogging Network of more than 5 Blogs privately
and Yeah, It’s really doing well.
I wish May God Bless You and Me for Future Ventures.

@MrFriendism

AkshayJain.me
WHAT IS ETHICAL HACKING?
Not Hacking Facebook Accounts, Then What?
Hacking is an unauthorized access to the Digital Property listed as follows
•Statistical Reports
•Your Work Plan
•Documentations
•Your Money
•Your Loving Computer, Laptops and Smartphones
SOME MYTHS TO BE FIXED
Most Unsecured Personalities on the Internet
•Government & Military Officials.
•Industrialist or Belongs to Corporate Sector.
•Celebrities and Religion Speakers.
•Common User (You, Me and All of us)
Most Secured Personalities on the Internet
•Hackers
•No One
•YOU. If you follow this presentation.
WAYS OF INVASION
• You: You are the one who invites them.
• Viruses: Turn your System more vulnerable to Trojans.
• Backdoor Trojans & Malwares: Destroys your control over the System.
• Key loggers and Spywares: Starts Sending information to the Attacker.
• Phishing: Just another way of hacking.
• Re-Victomization: Way of Victimizing a Victim Again. (Targeting Kids, Women,
Oldies and Non-Techy People)
WHAT IS CYBER SECURITY?
• Not a Rocket Science.
• Very Easy to Perform.
• Your Security lies in your Hands.
SAVE YOURSELF FROM INVASION
• Use HTTPS
• Check URL
• Use Incognito Browsers
• Avoid Public Wi-Fi
• Use Anti-Viruses with Internet Security
• Keep System Updated (Update Anti-Virus, OS, Drivers & Software Regularly)
• Don’t Just Download Everything for no Reason.
ARE YOU VICTIMIZED? DON’T WORRY
• Download Free Anti-Virus or Purchase Premium AV Packages.
• Delete un-necessary files.
• Remove External Devices (HDD, Webcams, Printers and Smartphones) .
• If Possible: Reformat your system completely.
DID YOU KNOW?
1. Microsoft makes the most vulnerable Software. (Internet Explorer and Windows
XP)
2. Android Phones, iPhones and MacBook are the most Secured Devices.
3. Kim Dotcom is the Richest Hacker & Going to Compete Elections in New Zealand.
4. Most of the Anti-Virus Companies makes their own Viruses.
5. Best AV Software: Kaspersky or ESET NOD 32 .
WON’T TAKE YOUR MORE TIME
• Ethical Hacking: Unauthorized access to your Digital Property.
• Govt., Mil., & Celebs are unsecured including us. Hackers are most secured.
• Virus, Trojans, Phishing or Re-Victimization can harm you.
• Cyber Security is Easy and lies in your hands.
• Use Anti-Virus, HTTPs and Try to be familiar with Incognito.
• Install Anti-Virus, Delete Files, Re-formant System.
Q & A SESSION
Ask Questions related to this presentations and I will clear your doubts in no-time.
THANK YOU
• I thank you all for sparing your time in listening to my esteemed presentation. I
personally thanks the lecturer for giving me this opportunity.
• I hope you liked my presentation.
• Don’t Forget to leave feedbacks.

@MrFriendism

AkshayJain.me

Mais conteúdo relacionado

Destaque

PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
Symantec
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
Tughral Yamin
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
A Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating PerspectiveA Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating Perspective
Der Chao CHEN
 

Destaque (18)

PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
A Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating PerspectiveA Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating Perspective
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital strategy - security
Digital strategy - securityDigital strategy - security
Digital strategy - security
 
Funny miss la sen hand sketching
Funny miss la sen hand sketchingFunny miss la sen hand sketching
Funny miss la sen hand sketching
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 
Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Cyber Security Presentation - PDS Fourth Semester

  • 1. “ THE REAL OPPORTUNITY FOR SUCCESS LIES W ITHIN THE PERSON AND NOT IN HIS PERSONALITY. ~ Akshay Jain ”
  • 2. CYBER SECURITY What is Ethical Hacking and How can we save ourselves knowing about Cyber Security? Akshay Jain BCA Semester 4th Second Shift 36
  • 3. TABLE OF CONTENTS • What is Ethical Hacking? • Ways of Invasion in your Personal Space? • What is Cyber Security? • How to be safe from hacking? • How to deal if you are victimized? • Q&A Session
  • 4. WHO AM I REALLY? I am Akshay Jain currently pursuing B.C.A. from JIMS, Rohini Sector 5, Delhi. Apart from this I am a Internet Marketer. I speak in many Web Seminars and Bloggers Meet also. In history, I was experienced White Hat Hacker (Level 1) and Professional Blogger too. I still run a Blogging Network of more than 5 Blogs privately and Yeah, It’s really doing well. I wish May God Bless You and Me for Future Ventures. @MrFriendism AkshayJain.me
  • 5. WHAT IS ETHICAL HACKING? Not Hacking Facebook Accounts, Then What? Hacking is an unauthorized access to the Digital Property listed as follows •Statistical Reports •Your Work Plan •Documentations •Your Money •Your Loving Computer, Laptops and Smartphones
  • 6. SOME MYTHS TO BE FIXED Most Unsecured Personalities on the Internet •Government & Military Officials. •Industrialist or Belongs to Corporate Sector. •Celebrities and Religion Speakers. •Common User (You, Me and All of us) Most Secured Personalities on the Internet •Hackers •No One •YOU. If you follow this presentation.
  • 7. WAYS OF INVASION • You: You are the one who invites them. • Viruses: Turn your System more vulnerable to Trojans. • Backdoor Trojans & Malwares: Destroys your control over the System. • Key loggers and Spywares: Starts Sending information to the Attacker. • Phishing: Just another way of hacking. • Re-Victomization: Way of Victimizing a Victim Again. (Targeting Kids, Women, Oldies and Non-Techy People)
  • 8. WHAT IS CYBER SECURITY? • Not a Rocket Science. • Very Easy to Perform. • Your Security lies in your Hands.
  • 9. SAVE YOURSELF FROM INVASION • Use HTTPS • Check URL • Use Incognito Browsers • Avoid Public Wi-Fi • Use Anti-Viruses with Internet Security • Keep System Updated (Update Anti-Virus, OS, Drivers & Software Regularly) • Don’t Just Download Everything for no Reason.
  • 10. ARE YOU VICTIMIZED? DON’T WORRY • Download Free Anti-Virus or Purchase Premium AV Packages. • Delete un-necessary files. • Remove External Devices (HDD, Webcams, Printers and Smartphones) . • If Possible: Reformat your system completely.
  • 11. DID YOU KNOW? 1. Microsoft makes the most vulnerable Software. (Internet Explorer and Windows XP) 2. Android Phones, iPhones and MacBook are the most Secured Devices. 3. Kim Dotcom is the Richest Hacker & Going to Compete Elections in New Zealand. 4. Most of the Anti-Virus Companies makes their own Viruses. 5. Best AV Software: Kaspersky or ESET NOD 32 .
  • 12. WON’T TAKE YOUR MORE TIME • Ethical Hacking: Unauthorized access to your Digital Property. • Govt., Mil., & Celebs are unsecured including us. Hackers are most secured. • Virus, Trojans, Phishing or Re-Victimization can harm you. • Cyber Security is Easy and lies in your hands. • Use Anti-Virus, HTTPs and Try to be familiar with Incognito. • Install Anti-Virus, Delete Files, Re-formant System.
  • 13. Q & A SESSION Ask Questions related to this presentations and I will clear your doubts in no-time.
  • 14. THANK YOU • I thank you all for sparing your time in listening to my esteemed presentation. I personally thanks the lecturer for giving me this opportunity. • I hope you liked my presentation. • Don’t Forget to leave feedbacks. @MrFriendism AkshayJain.me