Internet Crimes : Why it is scary & How to avoid it
Before we start …
How Many of you Use Gmail, Yahoo or AOL to send email ?
How Many of you Use Google.com?
How Many of you Use Antivirus?
Just in a few years…
DID YOU KNOW ?
MILLIONS OF CREDIT CARD
INFORMATION HAS BEEN STOLEN
MILLIONS OF Social Number Has been
Compromised
Drones Have been Hijacked
Nuclear Centrifuges That Have Been
Hacked
even
Internet Crimes : Why it is scary & How to avoid it
HOW IS THIS POSSIBLE ?
EXPLOITING
HARDWARE
SOFTWARE
WHO IS
A CYBER
How many are there actually ?
Script kiddies
Political/religious groups Phishers
Scammers
SO HOW DO THEY DO IT ?
WITH HELP OF SOME TOOLS …
Virus/Trojan
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software
DELETING DATA Blocking data Modifying data Copying data
Key logger
HACKERS
CAN TAKE OVER
OF COMPUTERS
WORLDWIDE
Distributed
Denial
Of
Service
Phishing Scam
Tricking people into sharing personal information
Looks real , but it isn’t
Can you tell the difference between this two webpages
1 2
Faceboook.com Facebook.com
Spamming
Another way of Tricking people into sharing personal information
Wow I'm Goanna be rich !
Dark Web/Deep Web
Internet Crimes : Why it is scary & How to avoid it
Internet Crimes : Why it is scary & How to avoid it
Internet Crimes : Why it is scary & How to avoid it
Internet Crimes : Why it is scary & How to avoid it
How do we avoid Internet Crimes ?
Look for the Lock
Check the URL
Only Download From Trustworthy Sources
Install Security Updates
Do NOT Email Private Data
Use Strong Passwords
Enable Two-Factor Authentication
Do NOT Plug In Devices/Accessories From
Strangers
Don’t be a Criminal
OR YOU’LL END UP
LIKE THIS
DSU Admin DSU Admin DSU Admin
THANKS
FOR WATHCING
IMTIAZ Asad ImranAsif

More Related Content

PPTX
Intercepting Dirty Money using Machine Learning - Ashrith Barthur, H2O.ai
PPTX
Internet use issues
PDF
Are You a Hacker's Target?
PPTX
2016 Social Engineering Training
PPTX
Internet issues
PDF
Education is the Key to Fighting Cyber Crime
PDF
PPTX
Phishing and hacking
Intercepting Dirty Money using Machine Learning - Ashrith Barthur, H2O.ai
Internet use issues
Are You a Hacker's Target?
2016 Social Engineering Training
Internet issues
Education is the Key to Fighting Cyber Crime
Phishing and hacking

What's hot (20)

PPTX
Cyber crime
PDF
CDSE Cybsecurity Awareness Posters
PPTX
Does Twitter have a positive impact in the United States?
PPTX
Internet trolls
PPTX
Basic Internet Security
PPTX
Cybercrime
PDF
Social Engineering
PPTX
1. spear phishing (cyber awareness series)
PPTX
Uses of ict in our environment
PPTX
Phishing ppt
PPT
Internet Safety
PDF
Cybersecurity Awareness Infographics
PPTX
Tha security awareness training
PPT
Security At Home
PPTX
Anti phishing presentation
PPTX
Phishing technology
PPTX
Computer Security
PPTX
Dangers in the Internet
PPTX
Cybersecurity Awareness
Cyber crime
CDSE Cybsecurity Awareness Posters
Does Twitter have a positive impact in the United States?
Internet trolls
Basic Internet Security
Cybercrime
Social Engineering
1. spear phishing (cyber awareness series)
Uses of ict in our environment
Phishing ppt
Internet Safety
Cybersecurity Awareness Infographics
Tha security awareness training
Security At Home
Anti phishing presentation
Phishing technology
Computer Security
Dangers in the Internet
Cybersecurity Awareness
Ad

Viewers also liked (18)

PPT
Css positioning
PPT
Imagemaps ultramag titan lidar
DOC
Resultados, clasificaciones y programación
PDF
THE USE OF AIRBORNE EM CONDUCTIVITY TO LOCATE CONTAMINANT FLOW PATHS AT THE S...
DOCX
resume_shwetajoshi
PDF
Promoting of the broader spread of home ownership and growth of the secondary...
DOCX
Enfoques
PPTX
haaaay!
PDF
2012アーバニズム_A3_Pruitt-Igoeはなぜ解体されたのか_田中愛実_11n1085
PPTX
Role Of Technology in Real Estate broking
PPTX
Cytotoxic Therapy. “Radiation Toxins”-possible new class of Anti Cancer Drugs...
PPTX
Ohmic heating
PPT
Ground Geophysical Survey
PDF
Metarhia: Node.js Macht Frei
PPTX
Banking system within Malaysia
PDF
Rúbrica números enteros
PPT
Types of Interviews
Css positioning
Imagemaps ultramag titan lidar
Resultados, clasificaciones y programación
THE USE OF AIRBORNE EM CONDUCTIVITY TO LOCATE CONTAMINANT FLOW PATHS AT THE S...
resume_shwetajoshi
Promoting of the broader spread of home ownership and growth of the secondary...
Enfoques
haaaay!
2012アーバニズム_A3_Pruitt-Igoeはなぜ解体されたのか_田中愛実_11n1085
Role Of Technology in Real Estate broking
Cytotoxic Therapy. “Radiation Toxins”-possible new class of Anti Cancer Drugs...
Ohmic heating
Ground Geophysical Survey
Metarhia: Node.js Macht Frei
Banking system within Malaysia
Rúbrica números enteros
Types of Interviews
Ad

Similar to Internet Crimes : Why it is scary & How to avoid it (20)

PDF
Information security
DOCX
trojon horse Seminar report
PPTX
Living in the IT Era - Lesson 6.pptx
PPT
Safety Plano Library June 4 Main
PPTX
Cyber Security.pptx
PPT
Cyber-Security-20211013105857 (1).ppt
PPTX
Cyber Crime
PPT
Cyber-Security-20211013105857.ppt
PPTX
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
PPTX
Cyber security
PPTX
Torjan horse virus
PDF
cybersecurity-140713064844-phpapp01.pdf
PDF
cybersecurity-140713064844-phpapp01.pdf
PPT
PPTX
cybersecurity.pptx
PPT
Trojan Backdoors
PDF
cyber security.pdf
PPT
Cyber-Security-20211013105857.ppt
PDF
Cybersecurity 140713064844-phpapp01 (1)-converted
PPT
Cyber-Security-20211013105857.ppt
Information security
trojon horse Seminar report
Living in the IT Era - Lesson 6.pptx
Safety Plano Library June 4 Main
Cyber Security.pptx
Cyber-Security-20211013105857 (1).ppt
Cyber Crime
Cyber-Security-20211013105857.ppt
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
Cyber security
Torjan horse virus
cybersecurity-140713064844-phpapp01.pdf
cybersecurity-140713064844-phpapp01.pdf
cybersecurity.pptx
Trojan Backdoors
cyber security.pdf
Cyber-Security-20211013105857.ppt
Cybersecurity 140713064844-phpapp01 (1)-converted
Cyber-Security-20211013105857.ppt

More from Imtiaz alam (15)

PDF
Pwk 2019 - Team Stark
PDF
Career Opportunity of Operation and SupplyChain Management
PDF
PWK Wizkids Presentation 2017
PDF
PRAN-RFL Group Presentaion by Imtiaz x
PDF
Report on PRAN-RFL group
PDF
An Infographic on Motivating Employees and it's Importance
PDF
Why Motivating Employee is important and how to Motivate them ( Compensation...
PDF
Icebreaking how to break the ice and give an awesome presentation
PDF
The Problem of Dhaka
PDF
A Business plan on Bentley
PDF
Food additives and unhealthiness
PDF
How trump won The Election and Became POTUS
PDF
Money monster Movie Analysis : What we learned from this movie
PDF
Internet influence young people to do good behavoiur
PDF
Difference between Mass & Personal COMMUNICATION
Pwk 2019 - Team Stark
Career Opportunity of Operation and SupplyChain Management
PWK Wizkids Presentation 2017
PRAN-RFL Group Presentaion by Imtiaz x
Report on PRAN-RFL group
An Infographic on Motivating Employees and it's Importance
Why Motivating Employee is important and how to Motivate them ( Compensation...
Icebreaking how to break the ice and give an awesome presentation
The Problem of Dhaka
A Business plan on Bentley
Food additives and unhealthiness
How trump won The Election and Became POTUS
Money monster Movie Analysis : What we learned from this movie
Internet influence young people to do good behavoiur
Difference between Mass & Personal COMMUNICATION

Recently uploaded (20)

PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
The Evolution of Traditional to New Media .pdf
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
t_and_OpenAI_Combined_two_pressentations
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
Internet Safety for Seniors presentation
PPTX
TITLE DEFENSE entitle the impact of social media on education
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
Cyber Hygine IN organizations in MSME or
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Reading as a good Form of Recreation
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
The Evolution of Traditional to New Media .pdf
Introduction to cybersecurity and digital nettiquette
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
Alethe Consulting Corporate Profile and Solution Aproach
t_and_OpenAI_Combined_two_pressentations
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
artificialintelligenceai1-copy-210604123353.pptx
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Exploring VPS Hosting Trends for SMBs in 2025
simpleintnettestmetiaerl for the simple testint
Internet Safety for Seniors presentation
TITLE DEFENSE entitle the impact of social media on education
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Cyber Hygine IN organizations in MSME or
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Mathew Digital SEO Checklist Guidlines 2025
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Reading as a good Form of Recreation

Internet Crimes : Why it is scary & How to avoid it