SlideShare una empresa de Scribd logo
1 de 56
ONLINE SEFTY AND AWARNESS
OF OPERATION AND SECURITY
OF DIGITAL DEVICES
MEHEDI HASAN
JOB EXPERIENCE: 16 YEAR
Adviser CCA foundation
LOGIK EYE FORENSICS
Indonesia
Malaysia
Vietnam
Singapore
India
Thailand
Nepal
China
Jakarta, Bali, Sumatra (3)
Kualalampur (2)
Ho chi min, Hanoi (2)
Singapore City (3)
Delhi, Agra, Kolkata, Chennai
Bangkok, Pataya, Puket
Kathmandu
Shanghai, Beijing
Sri Lanka Colombo
A Business man lives in
Dhaka. Used to social
media for business and
relation.
He receive a phone
call from an unknown
number.
Biggest cyber crime
involving privacy
invasion in the world!
CASE STUDY
WE CAN START NOW
CYBER CRIME
INTRODUCTION
Topic of the section Cyber
crime, Cyber Attacks,
Hacker, Hacking etc.
TYPES OF CYBER ATTACKS
Topic of the section,
Malware, Virus, Trojan,
Steps of hacking etc
IMPACT OF INTERNET
Topic of the section, Positive
and negative impact of
internet.
01
02
03
04
05
06
SOCILA ENGINEERING
ATTACKS
Steganography, Data hiding
technology, Encryption,
Decryption, Spoofing, etc
DIGITAL FORENSICs
ATTACKS
Evidence collection, Types of
forensics, different types
of technique, Anti-
Forensics, tips of analysis.
SECURITY AND SEFTY
Strong password, Device
security, Smartphone
security, malware
detecting, cleaning etc
HACKING: Unauthorized access in a system
জালিযালি এবং আলথিক অপরাধ
সাইবার সন্ত্রাস ও চাাঁদাবালজ, হযরালি ও হুমলক ধামলক
পিিগ্রাফী ধারি, সংরক্ষণ, লবিরি, সহাযিা
সাইবার যুদ্ধ
অিিাইি জুযা
অিিাইনি কাউনক আঘাি করা অপদস্থ করা
ফফক আইলি / ছদ্দনবশ ধারণ
Phishing Attack
Man-in-the-Middle Attack
SQL Injection Attack
Denial-of-Service, Brute-Force and Dictionary attacks
XSS Attacks
Ransomware Attacks
Malware Attack
Session Hijacking
Zero-Day - Attack
TYPE ATTACKS
WEB BASED
DEVICE BASED
WEB-BASED ATTACKS
INJECTION ATTACK
DENIAL OF SERVICE (DOS)
BRUTE FORCE
PHISHING ATTACKS
WEB-BASED ATTACKS
SYSTEM-BASED ATTACKS
CYBER ATTACKS AND CRIME
STEPS OF CYBER CRIME
STEP 1: IDENTIFY THE VICTIM
STEP 2: INFORMATION GATHERING.
STEP 3: IDENTIFY LOOPHOLE.
STEP 4: ACTUAL HACK.
STEP 5: ESCAPE WITHOUT TRACE.
Hacking into computer, is just like breaking into a house
WWW.ANONYMIZER.IN/FAKE-MAILER/
Email Spoofing is the art of sending a spoofed email from somebody else’s email account.
PHISHING ATTACKS
Phishing is the attempt to acquire sensitive
information, often for malicious reasons, by
masquerading as a trustworthy entity in an electronic
communication
PHISHING USING WEBSITE
SET (SOCIAL ENGINEERING TOOLKIT)
HTML/JAVA SCRIPT VIHSING
APK TERMUX
PHISHING ATTACKS
SET (SOCIAL ENGINEERING TOOLKIT)
PHISHING ATTACKS
Phishing java script code
PHISHING ATTACKS
www.virustotal.com
Viruses
Trojans
Rootkits
Worms
Spyware
Crimeware
Adware
MITM attack is a general term for when a perpetrator
positions himself in a conversation between a user and an
application—making it appear as if a normal exchange of
information is underway.
INTERCEPTOT
Hardware Keylogger
INVESTIGATIONS
FORCE STOP THE APPS
ROOT THE DEVICE
EXTRACT SYSTEM
https://youtu.be/ZF6dc6nt25U
USE UPDATED ANTIVIRUS
SCAN YOUR SYSTEM REGULARLY
SCAN FLASH MEDIA/DRIVE
BEFORE USE.
IMPACT OF INTERNET
IMPACT OF INTERNET
IMPACT OF INTERNET
NEGATIVE IMPACT
POSITIVE IMPACT
IMPACT OF INTERNET
লিন াসি
NEGATIVE IMPACT
লশশু পণিগ্রালফ
মাদনকর প্রসার িারী ও লশশু পাচার
শারীলরক গঠি ও মািলসক লবকানস অপলরপক্কিা
উগ্রবাদী মনিা াব ও গাঁজব
মািহালি ও মািহালিকর িথয প্রচার
IMPACT OF INTERNET
Addiction
IMPACT OF INTERNET
Personality
IMPACT OF INTERNET
িথয প্রালি ও সংরক্ষণ
POSITIVE IMPACT
ফযাগানযাগ
অিিাইি লশক্ষা
অিিাইি বযাবসা বালণনজযর প্রসার
অিিাইনি লচলকৎসা ফসবা
লশশু লশক্ষা ও লবনিাদি
SOCIAL ENGINEERING ATTACKS
Deepfake is an artificial intelligence-based human image
synthesis technique
• Mobile phones were used.
DIGITAL FORENSICs & INVESTIGATIONS
Forensics is the application of science to solve a
legal problem
Digital Forensics is a part of forensic science (in
relation to computer crime) focusing on the
recovery and investigation of material (essentially
data) found in digital devices.
In a word, It is recovery Science
DELETED FILES
LOGS
SPECIAL SYSTEM FILES (REGISTRY ETC.)
EMAIL ARCHVES, PRINTER SPOOLS
ADMINIRTRATIVE SETTING
INTERNET HISTORY
CHAT ARCHIVES
ENCRYPTED FIELS /PASSWORD PROTECTED
FILES
A talented young boy
of 14/15 years who was
studying late went out
of the house to take
the exam and left his
bag and notebook in a
nearby shop and
disappeared.
The boy's parents filed
a complaint with the
law enforcement
agencies.
ATTACKS
Deleted SMS recovery by forensics
General Forensic Investigations
JTAG Forensic Investigations
CHIP-OFF Forensic Investigations
GPS INVESTIGATION
https://myactivity.google.com/more-activity
GPS INVESTIGATION
GPS INVESTIGATION
https://www.google.com/maps/timeline?pb=!1m2!1m1!1s2018-06-22
ARTIFICIAL INTELLIGENCE
ChatGPT
ChatSonic
Bard
CoPilot
The New Bing (Bing AI)
Character Certificate
Statement of Certificate
40%
10%
2%
8%
10%
12%
2% 3%
8%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
Character Chart
2019
This is to certify that
RAHIM son/daughter
of…YYYY…………is well
known to FACEBOOK
Ind. Since last
…2011….years and…..
month. To the best of our
knowledge and belief he/she
bearing following character.
Note : Pother pacali, রঙ্গমঞ্চ, গরুঠাকুর megh-Balika also known as Rahim that’s fake ID
ANTI FORENSICS
Anti forensics (sometimes counter
forensics) is a general term for a set
of techniques used as
countermeasures to forensic analysis.
DELETED FILES
LOGS
SPECIAL SYSTEM FILES (REGISTRY ETC.)
PASSWORD CHANGING POLICY.
DON’T USE SIMPLE PASSWORD. (APNI123, 123456, 098765, 0171300056,
APNI00056)
DON’T CLICK ON UN TRUSTED LINK.
SPOOFING EMAIL (LOTTERY, GIRLFRIEND/BOYFRIEND, JOB)
REMOVE UNKNOWN FRIEND SOCIAL MEDIA.
USE STRONG PASSWORD.
DO NOT GIVE YOUR DEVICE TO UN TRUSTED PEOPLE.
.
https://facebook.com/mehedi0001
+880-1973000056
Be with
someone who
will warning
you about
cyber attack

Más contenido relacionado

Similar a ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES

An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 

Similar a ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES (20)

unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 

Más de Mehedi Hasan

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
Mehedi Hasan
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
Mehedi Hasan
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
Mehedi Hasan
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
Mehedi Hasan
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
Mehedi Hasan
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
Mehedi Hasan
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
Mehedi Hasan
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 

Más de Mehedi Hasan (20)

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
 
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 

Último

AODA Compliance: Accessibility For Everyone
AODA Compliance: Accessibility For EveryoneAODA Compliance: Accessibility For Everyone
AODA Compliance: Accessibility For Everyone
zenjulia64
 
real estate Image editing hdr, flambient
real estate Image editing hdr, flambientreal estate Image editing hdr, flambient
real estate Image editing hdr, flambient
Photography
 
Office Chairs | Highmoon Office Furniture | Best Quality Ergonomic Chairs
Office Chairs | Highmoon Office Furniture | Best Quality Ergonomic ChairsOffice Chairs | Highmoon Office Furniture | Best Quality Ergonomic Chairs
Office Chairs | Highmoon Office Furniture | Best Quality Ergonomic Chairs
akhiladhaneesh5272
 

Último (20)

NevaClad Refresh_Tellerline Slide Deck2.pdf
NevaClad Refresh_Tellerline Slide Deck2.pdfNevaClad Refresh_Tellerline Slide Deck2.pdf
NevaClad Refresh_Tellerline Slide Deck2.pdf
 
Emergency Plumber Services for Repairing and Fitting in Dubai.pdf
Emergency Plumber Services for Repairing and Fitting in Dubai.pdfEmergency Plumber Services for Repairing and Fitting in Dubai.pdf
Emergency Plumber Services for Repairing and Fitting in Dubai.pdf
 
DRAICCHIO slide_Ergonomo_16maggio2024 slides 2.pptx
DRAICCHIO slide_Ergonomo_16maggio2024 slides 2.pptxDRAICCHIO slide_Ergonomo_16maggio2024 slides 2.pptx
DRAICCHIO slide_Ergonomo_16maggio2024 slides 2.pptx
 
AODA Compliance: Accessibility For Everyone
AODA Compliance: Accessibility For EveryoneAODA Compliance: Accessibility For Everyone
AODA Compliance: Accessibility For Everyone
 
Diploma Certificate Attestation Service in UAE
Diploma Certificate Attestation Service in UAEDiploma Certificate Attestation Service in UAE
Diploma Certificate Attestation Service in UAE
 
Rainwater Harvesting System .
Rainwater Harvesting System                        .Rainwater Harvesting System                        .
Rainwater Harvesting System .
 
haash.tech web design and development company.pdf
haash.tech web design and development company.pdfhaash.tech web design and development company.pdf
haash.tech web design and development company.pdf
 
BVI Certificate Attestation Service in UAE
BVI Certificate Attestation Service in UAEBVI Certificate Attestation Service in UAE
BVI Certificate Attestation Service in UAE
 
Plumbing Repair: Ensuring Your Home's Comfort and Safety
Plumbing Repair: Ensuring Your Home's Comfort and SafetyPlumbing Repair: Ensuring Your Home's Comfort and Safety
Plumbing Repair: Ensuring Your Home's Comfort and Safety
 
Lauch Your Texas Business With Help Of The Best Digital Marketing Agency.pdf
Lauch Your Texas Business With Help Of The Best Digital Marketing Agency.pdfLauch Your Texas Business With Help Of The Best Digital Marketing Agency.pdf
Lauch Your Texas Business With Help Of The Best Digital Marketing Agency.pdf
 
real estate Image editing hdr, flambient
real estate Image editing hdr, flambientreal estate Image editing hdr, flambient
real estate Image editing hdr, flambient
 
Waste management idea pitch deck v1.pptx
Waste management idea pitch deck v1.pptxWaste management idea pitch deck v1.pptx
Waste management idea pitch deck v1.pptx
 
Office Chairs | Highmoon Office Furniture | Best Quality Ergonomic Chairs
Office Chairs | Highmoon Office Furniture | Best Quality Ergonomic ChairsOffice Chairs | Highmoon Office Furniture | Best Quality Ergonomic Chairs
Office Chairs | Highmoon Office Furniture | Best Quality Ergonomic Chairs
 
FBI Background Check ! World Class Notary
FBI Background Check ! World Class NotaryFBI Background Check ! World Class Notary
FBI Background Check ! World Class Notary
 
NEWMAT Stretch Ceilings Service Provider in India
NEWMAT Stretch Ceilings Service Provider in IndiaNEWMAT Stretch Ceilings Service Provider in India
NEWMAT Stretch Ceilings Service Provider in India
 
Best Bitcoin Alternative by Simplyfynews
Best Bitcoin Alternative by SimplyfynewsBest Bitcoin Alternative by Simplyfynews
Best Bitcoin Alternative by Simplyfynews
 
NevaClad Refresh_Tellerline Slide Deck.pdf
NevaClad Refresh_Tellerline Slide Deck.pdfNevaClad Refresh_Tellerline Slide Deck.pdf
NevaClad Refresh_Tellerline Slide Deck.pdf
 
4 Reasons Behind the Toilet Blockage.pdf
4 Reasons Behind the Toilet Blockage.pdf4 Reasons Behind the Toilet Blockage.pdf
4 Reasons Behind the Toilet Blockage.pdf
 
Key Pharmaceutical Industry Trends to Watch by 2025
Key Pharmaceutical Industry Trends to Watch by 2025Key Pharmaceutical Industry Trends to Watch by 2025
Key Pharmaceutical Industry Trends to Watch by 2025
 
Is it profitable to open a financial services business.pptx
Is it profitable to open a financial services business.pptxIs it profitable to open a financial services business.pptx
Is it profitable to open a financial services business.pptx
 

ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES