SlideShare una empresa de Scribd logo
1 de 14
“

THE REAL OPPORTUNITY FOR
SUCCESS LIES W
ITHIN THE
PERSON AND NOT IN HIS
PERSONALITY.
~ Akshay Jain

”
CYBER SECURITY
What is Ethical Hacking and How can we save ourselves
knowing about Cyber Security?

Akshay Jain
BCA Semester 4th Second Shift
36
TABLE OF CONTENTS
• What is Ethical Hacking?
• Ways of Invasion in your Personal Space?
• What is Cyber Security?
• How to be safe from hacking?
• How to deal if you are victimized?
• Q&A Session
WHO AM I REALLY?
I am Akshay Jain currently pursuing B.C.A. from JIMS, Rohini Sector 5,
Delhi. Apart from this I am a Internet Marketer. I speak in many Web
Seminars and Bloggers Meet also.
In history, I was experienced White Hat Hacker (Level 1) and Professional
Blogger too. I still run a Blogging Network of more than 5 Blogs privately
and Yeah, It’s really doing well.
I wish May God Bless You and Me for Future Ventures.

@MrFriendism

AkshayJain.me
WHAT IS ETHICAL HACKING?
Not Hacking Facebook Accounts, Then What?
Hacking is an unauthorized access to the Digital Property listed as follows
•Statistical Reports
•Your Work Plan
•Documentations
•Your Money
•Your Loving Computer, Laptops and Smartphones
SOME MYTHS TO BE FIXED
Most Unsecured Personalities on the Internet
•Government & Military Officials.
•Industrialist or Belongs to Corporate Sector.
•Celebrities and Religion Speakers.
•Common User (You, Me and All of us)
Most Secured Personalities on the Internet
•Hackers
•No One
•YOU. If you follow this presentation.
WAYS OF INVASION
• You: You are the one who invites them.
• Viruses: Turn your System more vulnerable to Trojans.
• Backdoor Trojans & Malwares: Destroys your control over the System.
• Key loggers and Spywares: Starts Sending information to the Attacker.
• Phishing: Just another way of hacking.
• Re-Victomization: Way of Victimizing a Victim Again. (Targeting Kids, Women,
Oldies and Non-Techy People)
WHAT IS CYBER SECURITY?
• Not a Rocket Science.
• Very Easy to Perform.
• Your Security lies in your Hands.
SAVE YOURSELF FROM INVASION
• Use HTTPS
• Check URL
• Use Incognito Browsers
• Avoid Public Wi-Fi
• Use Anti-Viruses with Internet Security
• Keep System Updated (Update Anti-Virus, OS, Drivers & Software Regularly)
• Don’t Just Download Everything for no Reason.
ARE YOU VICTIMIZED? DON’T WORRY
• Download Free Anti-Virus or Purchase Premium AV Packages.
• Delete un-necessary files.
• Remove External Devices (HDD, Webcams, Printers and Smartphones) .
• If Possible: Reformat your system completely.
DID YOU KNOW?
1. Microsoft makes the most vulnerable Software. (Internet Explorer and Windows
XP)
2. Android Phones, iPhones and MacBook are the most Secured Devices.
3. Kim Dotcom is the Richest Hacker & Going to Compete Elections in New Zealand.
4. Most of the Anti-Virus Companies makes their own Viruses.
5. Best AV Software: Kaspersky or ESET NOD 32 .
WON’T TAKE YOUR MORE TIME
• Ethical Hacking: Unauthorized access to your Digital Property.
• Govt., Mil., & Celebs are unsecured including us. Hackers are most secured.
• Virus, Trojans, Phishing or Re-Victimization can harm you.
• Cyber Security is Easy and lies in your hands.
• Use Anti-Virus, HTTPs and Try to be familiar with Incognito.
• Install Anti-Virus, Delete Files, Re-formant System.
Q & A SESSION
Ask Questions related to this presentations and I will clear your doubts in no-time.
THANK YOU
• I thank you all for sparing your time in listening to my esteemed presentation. I
personally thanks the lecturer for giving me this opportunity.
• I hope you liked my presentation.
• Don’t Forget to leave feedbacks.

@MrFriendism

AkshayJain.me

Más contenido relacionado

Destacado

PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
A Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating PerspectiveA Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating PerspectiveDer Chao CHEN
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Enrique Martin
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Fakrul Alam
 
Digital strategy - security
Digital strategy - securityDigital strategy - security
Digital strategy - securityNansje
 
Funny miss la sen hand sketching
Funny miss la sen hand sketchingFunny miss la sen hand sketching
Funny miss la sen hand sketchingMiss La Sen house
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC Advisory Group
 
Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?honeywellgf
 

Destacado (18)

PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
A Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating PerspectiveA Discussion on Digital Archives: The Knowledge Creating Perspective
A Discussion on Digital Archives: The Knowledge Creating Perspective
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital strategy - security
Digital strategy - securityDigital strategy - security
Digital strategy - security
 
Funny miss la sen hand sketching
Funny miss la sen hand sketchingFunny miss la sen hand sketching
Funny miss la sen hand sketching
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 
Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Cyber Security Presentation - PDS Fourth Semester

  • 1. “ THE REAL OPPORTUNITY FOR SUCCESS LIES W ITHIN THE PERSON AND NOT IN HIS PERSONALITY. ~ Akshay Jain ”
  • 2. CYBER SECURITY What is Ethical Hacking and How can we save ourselves knowing about Cyber Security? Akshay Jain BCA Semester 4th Second Shift 36
  • 3. TABLE OF CONTENTS • What is Ethical Hacking? • Ways of Invasion in your Personal Space? • What is Cyber Security? • How to be safe from hacking? • How to deal if you are victimized? • Q&A Session
  • 4. WHO AM I REALLY? I am Akshay Jain currently pursuing B.C.A. from JIMS, Rohini Sector 5, Delhi. Apart from this I am a Internet Marketer. I speak in many Web Seminars and Bloggers Meet also. In history, I was experienced White Hat Hacker (Level 1) and Professional Blogger too. I still run a Blogging Network of more than 5 Blogs privately and Yeah, It’s really doing well. I wish May God Bless You and Me for Future Ventures. @MrFriendism AkshayJain.me
  • 5. WHAT IS ETHICAL HACKING? Not Hacking Facebook Accounts, Then What? Hacking is an unauthorized access to the Digital Property listed as follows •Statistical Reports •Your Work Plan •Documentations •Your Money •Your Loving Computer, Laptops and Smartphones
  • 6. SOME MYTHS TO BE FIXED Most Unsecured Personalities on the Internet •Government & Military Officials. •Industrialist or Belongs to Corporate Sector. •Celebrities and Religion Speakers. •Common User (You, Me and All of us) Most Secured Personalities on the Internet •Hackers •No One •YOU. If you follow this presentation.
  • 7. WAYS OF INVASION • You: You are the one who invites them. • Viruses: Turn your System more vulnerable to Trojans. • Backdoor Trojans & Malwares: Destroys your control over the System. • Key loggers and Spywares: Starts Sending information to the Attacker. • Phishing: Just another way of hacking. • Re-Victomization: Way of Victimizing a Victim Again. (Targeting Kids, Women, Oldies and Non-Techy People)
  • 8. WHAT IS CYBER SECURITY? • Not a Rocket Science. • Very Easy to Perform. • Your Security lies in your Hands.
  • 9. SAVE YOURSELF FROM INVASION • Use HTTPS • Check URL • Use Incognito Browsers • Avoid Public Wi-Fi • Use Anti-Viruses with Internet Security • Keep System Updated (Update Anti-Virus, OS, Drivers & Software Regularly) • Don’t Just Download Everything for no Reason.
  • 10. ARE YOU VICTIMIZED? DON’T WORRY • Download Free Anti-Virus or Purchase Premium AV Packages. • Delete un-necessary files. • Remove External Devices (HDD, Webcams, Printers and Smartphones) . • If Possible: Reformat your system completely.
  • 11. DID YOU KNOW? 1. Microsoft makes the most vulnerable Software. (Internet Explorer and Windows XP) 2. Android Phones, iPhones and MacBook are the most Secured Devices. 3. Kim Dotcom is the Richest Hacker & Going to Compete Elections in New Zealand. 4. Most of the Anti-Virus Companies makes their own Viruses. 5. Best AV Software: Kaspersky or ESET NOD 32 .
  • 12. WON’T TAKE YOUR MORE TIME • Ethical Hacking: Unauthorized access to your Digital Property. • Govt., Mil., & Celebs are unsecured including us. Hackers are most secured. • Virus, Trojans, Phishing or Re-Victimization can harm you. • Cyber Security is Easy and lies in your hands. • Use Anti-Virus, HTTPs and Try to be familiar with Incognito. • Install Anti-Virus, Delete Files, Re-formant System.
  • 13. Q & A SESSION Ask Questions related to this presentations and I will clear your doubts in no-time.
  • 14. THANK YOU • I thank you all for sparing your time in listening to my esteemed presentation. I personally thanks the lecturer for giving me this opportunity. • I hope you liked my presentation. • Don’t Forget to leave feedbacks. @MrFriendism AkshayJain.me