SlideShare uma empresa Scribd logo
1 de 11
Digital  Enemies CC CL Abdul Lateef Khan Millennium Toastmasters August 28, 2007
Our Goals ,[object Object],[object Object],[object Object],[object Object],[object Object]
Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Serious Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overview
Safety Measures
Safety Measures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 

Mais conteúdo relacionado

Mais procurados (6)

Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Software
SoftwareSoftware
Software
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
Understanding Virus
Understanding VirusUnderstanding Virus
Understanding Virus
 
Virus
VirusVirus
Virus
 

Semelhante a Digital Enemies

Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
Zoaib Mirza
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
Rozell Sneede
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
Raj vardhan
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
Sonali Srivastava
 

Semelhante a Digital Enemies (20)

Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptx
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Reality
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
 
Chapter-2 (1).pptx
Chapter-2 (1).pptxChapter-2 (1).pptx
Chapter-2 (1).pptx
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 

Mais de abdul lateef

Area 23 Governor Candidate
Area 23 Governor CandidateArea 23 Governor Candidate
Area 23 Governor Candidate
abdul lateef
 
Evaluate to Motivate
Evaluate to MotivateEvaluate to Motivate
Evaluate to Motivate
abdul lateef
 
Is Terrorism A Muslim Monopoly
Is Terrorism A Muslim MonopolyIs Terrorism A Muslim Monopoly
Is Terrorism A Muslim Monopoly
abdul lateef
 
Quran And Modern Science
Quran And Modern ScienceQuran And Modern Science
Quran And Modern Science
abdul lateef
 
Going Beyond Our Club
Going Beyond Our ClubGoing Beyond Our Club
Going Beyond Our Club
abdul lateef
 
Answers To Non Muslims Common Questions About Islam
Answers To Non Muslims Common Questions About IslamAnswers To Non Muslims Common Questions About Islam
Answers To Non Muslims Common Questions About Islam
abdul lateef
 
Concept Of God In Major Religions
Concept Of God In Major ReligionsConcept Of God In Major Religions
Concept Of God In Major Religions
abdul lateef
 
Decoding The Cl Manual
Decoding The Cl ManualDecoding The Cl Manual
Decoding The Cl Manual
abdul lateef
 

Mais de abdul lateef (20)

Installing windows 8
Installing windows 8 Installing windows 8
Installing windows 8
 
Vice President Membership
Vice President MembershipVice President Membership
Vice President Membership
 
Club Officers Training - Treasurer
Club Officers Training - TreasurerClub Officers Training - Treasurer
Club Officers Training - Treasurer
 
Area 23 Governor Candidate
Area 23 Governor CandidateArea 23 Governor Candidate
Area 23 Governor Candidate
 
Parenting
ParentingParenting
Parenting
 
Club Officers Training 2009 - VP - Public Relations
Club Officers Training 2009 - VP - Public RelationsClub Officers Training 2009 - VP - Public Relations
Club Officers Training 2009 - VP - Public Relations
 
Water Disaster
Water DisasterWater Disaster
Water Disaster
 
Frozen Thoughts
Frozen ThoughtsFrozen Thoughts
Frozen Thoughts
 
Thirst
ThirstThirst
Thirst
 
Evaluate to Motivate
Evaluate to MotivateEvaluate to Motivate
Evaluate to Motivate
 
Tears
TearsTears
Tears
 
Is Terrorism A Muslim Monopoly
Is Terrorism A Muslim MonopolyIs Terrorism A Muslim Monopoly
Is Terrorism A Muslim Monopoly
 
Quran And Modern Science
Quran And Modern ScienceQuran And Modern Science
Quran And Modern Science
 
Going Beyond Our Club
Going Beyond Our ClubGoing Beyond Our Club
Going Beyond Our Club
 
Islam And Terrorism
Islam And TerrorismIslam And Terrorism
Islam And Terrorism
 
Answers To Non Muslims Common Questions About Islam
Answers To Non Muslims Common Questions About IslamAnswers To Non Muslims Common Questions About Islam
Answers To Non Muslims Common Questions About Islam
 
Concept Of God In Major Religions
Concept Of God In Major ReligionsConcept Of God In Major Religions
Concept Of God In Major Religions
 
Mentoring
MentoringMentoring
Mentoring
 
Decoding The Cl Manual
Decoding The Cl ManualDecoding The Cl Manual
Decoding The Cl Manual
 
Moments Of Truth
Moments Of TruthMoments Of Truth
Moments Of Truth
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Digital Enemies