2
Most read
Security Threats &
Cyber Crimes
M.A.K Dhananjaya
2020/PAS/ICT/M/041
Security
Threats
&
Cyber
Crimes
Malicious Software
Hacking
Spoofing and Sniffing
Denial of Service Attacks (DoS)
Identity Theft
Phishing
Internal Employees
Malicious Software (Malware)
• Virus
• Worms
• Trojan horse
• Spyware
• Adware
• Ransomware
This Photo by Unknown Author is licensed under CC BY-ND
Malware is an umbrella
term for any piece of
software that has malicious
intent.
Hacking & Cyber vandalism
• Hacking is the act of identifying and then
exploiting weaknesses in a computer system
or network, usually to gain unauthorized
access to personal or organizational data.
• Hacking is not always a malicious activity, but
the term has mostly negative connotations
due to its association with cybercrime.
Spoofing & Sniffing
Sniffing
• Sniffing is a process of monitoring
and capturing all data packets
passing through given network.
Sniffers are used by network/system
administrator to monitor and
troubleshoot network traffic.
Spoofing
• Spoofing, as it pertains to
cybersecurity, is when someone or
something pretends to be something
else in attempt to gain our confidence,
get access to our systems, steal data,
steal money, or spread malware.
User Server
Hacker
Denial of Service
Attack
A Denial-of-Service (DoS)
attack is an attack meant to shut
down a machine or network,
making it inaccessible to its
intended users.
DoS attacks accomplish this by
flooding the target with traffic or
sending it information that
triggers a crash.
Identity theft
• Identity theft is the crime of obtaining the
personal or financial information of another
person to use their identity to commit fraud,
such as making unauthorized transactions or
purchases.
Phishing
Phishing is an attempt to steal personal
information or break into online accounts using
deceptive emails, messages, ads, or sites that
look similar sites you already use.
For example, a phishing email might look like
it's from your bank and request private
information about your bank account.
How to Protect from Security Threats
& Cyber Crimes
•Install Antivirus Software
Install
•Use a firewall
Use
•Use Strong Passwords
Use
•Keep Your Software Updated
Keep
•Use Two-factor Authentication
Use
•Finally Use Your Common Sense
Use
Thank You

More Related Content

PPTX
Cyber security detailed ppt and understand
PPTX
Cyber Security - All Over World
PPTX
cyber security
PPTX
Malware attack Social engineering attack
PPTX
week2-cybersecurityOverview of social engineering attacks.pptx
PPTX
types of cyber attack by taufiqurrahman.pptx
PPTX
cyber threats introduction and cyber threats types
PDF
ppt pdf ajay.pdf
Cyber security detailed ppt and understand
Cyber Security - All Over World
cyber security
Malware attack Social engineering attack
week2-cybersecurityOverview of social engineering attacks.pptx
types of cyber attack by taufiqurrahman.pptx
cyber threats introduction and cyber threats types
ppt pdf ajay.pdf

Similar to Security Threats & Cyber Crimes (20)

PPTX
Latest trends in computer networking.pptx
PPTX
Cyber Security Awarenessv2.pptx
PPTX
Cyber security ppt final
PPTX
cyber threats and attacks.pptx
PPTX
Cybersecurity Explained: From Viruses to Ethical Hacking
PPTX
Understanding Cybersecurity: CIA Triad, Viruses & Attack Vectors
PDF
Cyber-Security-Threats-Understanding-the-Landscape.pdf
PPTX
Cyber Security
PPTX
COMPUTER APPLICATIONS Module 4.pptx
PPTX
Ppt on cyber security
PPTX
Cyber Crime.pptx
PDF
Cyber Security
PPTX
Cyber security based on security of cyber
PPTX
Cyber Security, cyber crime and cyber safety all .pptx
DOCX
Cyber Security.docx
PPTX
Cyber crimes and cyber security.pptx filetx
PPTX
Cyber crimes
PPTX
Cyber security
PPTX
Computer security and privacy
PPTX
Cybersecurity Training
Latest trends in computer networking.pptx
Cyber Security Awarenessv2.pptx
Cyber security ppt final
cyber threats and attacks.pptx
Cybersecurity Explained: From Viruses to Ethical Hacking
Understanding Cybersecurity: CIA Triad, Viruses & Attack Vectors
Cyber-Security-Threats-Understanding-the-Landscape.pdf
Cyber Security
COMPUTER APPLICATIONS Module 4.pptx
Ppt on cyber security
Cyber Crime.pptx
Cyber Security
Cyber security based on security of cyber
Cyber Security, cyber crime and cyber safety all .pptx
Cyber Security.docx
Cyber crimes and cyber security.pptx filetx
Cyber crimes
Cyber security
Computer security and privacy
Cybersecurity Training
Ad

More from Kushan Dananjaya (6)

PDF
Problems related to computers Presentation
PPTX
Problems Related to Computers Presentation
PPTX
Internet of Things
PPTX
Computer related environmental issues (e-waste)
PPTX
Programming Language Evolution
PPTX
Great Philosopher Plato
Problems related to computers Presentation
Problems Related to Computers Presentation
Internet of Things
Computer related environmental issues (e-waste)
Programming Language Evolution
Great Philosopher Plato
Ad

Recently uploaded (20)

PDF
E-Commerce Website Development Companyin india
PDF
Practical Indispensable Project Management Tips for Delivering Successful Exp...
DOC
UTEP毕业证学历认证,宾夕法尼亚克拉里恩大学毕业证未毕业
PPTX
CNN LeNet5 Architecture: Neural Networks
PPTX
Full-Stack Developer Courses That Actually Land You Jobs
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
Introduction to Ragic - #1 No Code Tool For Digitalizing Your Business Proces...
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PDF
Type Class Derivation in Scala 3 - Jose Luis Pintado Barbero
PPTX
Cybersecurity: Protecting the Digital World
PPTX
Airline CRS | Airline CRS Systems | CRS System
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PDF
Workplace Software and Skills - OpenStax
PDF
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
PPTX
Trending Python Topics for Data Visualization in 2025
PDF
Guide to Food Delivery App Development.pdf
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PDF
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...
E-Commerce Website Development Companyin india
Practical Indispensable Project Management Tips for Delivering Successful Exp...
UTEP毕业证学历认证,宾夕法尼亚克拉里恩大学毕业证未毕业
CNN LeNet5 Architecture: Neural Networks
Full-Stack Developer Courses That Actually Land You Jobs
iTop VPN Crack Latest Version Full Key 2025
Introduction to Ragic - #1 No Code Tool For Digitalizing Your Business Proces...
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
Type Class Derivation in Scala 3 - Jose Luis Pintado Barbero
Cybersecurity: Protecting the Digital World
Airline CRS | Airline CRS Systems | CRS System
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
Workplace Software and Skills - OpenStax
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
Trending Python Topics for Data Visualization in 2025
Guide to Food Delivery App Development.pdf
DNT Brochure 2025 – ISV Solutions @ D365
Wondershare Recoverit Full Crack New Version (Latest 2025)
The Dynamic Duo Transforming Financial Accounting Systems Through Modern Expe...

Security Threats & Cyber Crimes

  • 1. Security Threats & Cyber Crimes M.A.K Dhananjaya 2020/PAS/ICT/M/041
  • 2. Security Threats & Cyber Crimes Malicious Software Hacking Spoofing and Sniffing Denial of Service Attacks (DoS) Identity Theft Phishing Internal Employees
  • 3. Malicious Software (Malware) • Virus • Worms • Trojan horse • Spyware • Adware • Ransomware This Photo by Unknown Author is licensed under CC BY-ND Malware is an umbrella term for any piece of software that has malicious intent.
  • 4. Hacking & Cyber vandalism • Hacking is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data. • Hacking is not always a malicious activity, but the term has mostly negative connotations due to its association with cybercrime.
  • 5. Spoofing & Sniffing Sniffing • Sniffing is a process of monitoring and capturing all data packets passing through given network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic. Spoofing • Spoofing, as it pertains to cybersecurity, is when someone or something pretends to be something else in attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware. User Server Hacker
  • 6. Denial of Service Attack A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash.
  • 7. Identity theft • Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases.
  • 8. Phishing Phishing is an attempt to steal personal information or break into online accounts using deceptive emails, messages, ads, or sites that look similar sites you already use. For example, a phishing email might look like it's from your bank and request private information about your bank account.
  • 9. How to Protect from Security Threats & Cyber Crimes •Install Antivirus Software Install •Use a firewall Use •Use Strong Passwords Use •Keep Your Software Updated Keep •Use Two-factor Authentication Use •Finally Use Your Common Sense Use