SlideShare a Scribd company logo
CYBER SECURITY AWARENESS
Special Session for Tech. and Non Tech. people
And how they prevent their systems, privacy, identity, location
and other activities.
Presented By:- Abhay Kumar Pathak (Ethical Hacking VAPT Certified)
Dept:- Cs & IT
ABHAY
World Wide Web (Internet)ABHAY
Accessible by normal people and
searchable with standard web search
engines.
It’s have 4% of all Internet.
Also called “Visible Web”, “Light Net”,
Indexed Web”.
96% of the Internet
Accessible by Tools
or Software
Accessible with special
software, having
encrypted data.
Not indexed for search
engines.
Restricted for special
browser,
Large scale illegal activitiesABHAY
Surface Web
The surface web also called Visible Web , Lightnet,
Indexed Web. This is the portion of the World
Wide Web, that is readily available to the general
public and searchable with standard Web Search
Engines.
4% of Internet
Indexable on Web Search Engines
Google’s Index contains 14.4B pages on Surface
Web
Opposite of Deep Web
ABHAY
Deep Web
Accessible by password, encryption or through
gateway software
Not Indexed for the search engines
Little illegal activities in this web.
The crimes huge in size and growing exponentially
ABHAY
Dark Net/Dark Web
Restricted for the browsers
Not Indexed for Search Engines
Large scale illegal activities
Unmeasured due to nature
Use for Transfer Virtual Currency(Like Bit coin)
ABHAY
How to acces Dark Web
Here some special tools given below for access the
Dark Web
TOR(The Onion Routing)
12P
VPN(Virtual Private Network)
Proxy(Use another server IP and Port No.)
These networks called Overlay Network, and also
use for Anonymous Surfing.
ABHAY
Security and Privacy Issues
We are in that type of world where we don’t know how transfers, processes and
execute the virtual things. We have some limited information of the Digital World.
And here we trying to find the Perfection in our Digital System.
We talk about privacy issues with these type accounts given below
 Yahoo.com
 Google.com
 Hotmail.com
 Indiatimes.com
 Reddif.com
Here each company have more than 120M Users(Google.com not consider)
And even all mail send by it’s user scanned by some special keywords
ABHAY
Google.com
If you using Google
 Everything you type ,Google record it as like he collects the IP
address of your personal computer
Prevention:-Use the another google portal “DUCK DUCK GO”
Here no privacy issues because duck duck go have no database to
record your activities
Another Issue with using Antivirus
 First, Company makes the Virus and spread it all the internet
 And second they give us paid softwares for prevent our system
Prevention :-
Use Online scanning
ABHAY
Windows and Mac
A error message of Windows
When you click report to windows then your
whole configuration of system send to
Mircosoft
Prevention
Use Linux
Free and secure
ABHAY
Issues with Using Android Phone
Google Location
The Google is track your Location 24/7 with
your android phone
If you want to know where was you before 2
years than your Google map have each and
every information about you for that day
:-Disable the button of location and maintain
your privacy
ABHAY
Anonymous Surfing
In the scenario where no one can hide over the internet then
anonymous surfing is the best way to prevent yourself
Prevention:-
Use TOR(for windows and linux)
Free and open source
For Android Users OR ORBOT
With using TOR, You hide your IP, location and identity with
using Random Servers
ABHAY
Secure Communication
When we trying to find the solution for secure
communication then I look,
What the terrorist are nowadays using,
A lot of report that the ISIS has been using
secure communication app using like VIKER
TELEGRAM and REDPHONE
These are the similar apps like whatsup and snapchat but
there are only difference they apps use MILITRY GRADE
encryption and using a separate OTP confirmation
channel.
ABHAY
ATM Threats
ATM have two layers of security machenism
Magnetic Strip(having whole information of account)
4 Digits PIN numbers
The hackers can put the additional reading
device and read all data and your account
details
The device look like this:-
ABHAY
The Case Discussion of Mumbai
ABHAY
Issues with ATM Machines
ABHAY
Keep your PINs secure and secret
Another factor is spyware or using external keyboard who looks
like original keyboard of ATM, who looks like this:-
ABHAY

More Related Content

PPTX
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
PPT
NewIinternet security
PDF
Internet Safety Glossary of Terms
PPTX
Online safety, security, ethics & etiquette
PPTX
Internet Security
PPTX
Internet security
PPTX
Internet Threats
PPTX
Cyber privacy and password protection
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
NewIinternet security
Internet Safety Glossary of Terms
Online safety, security, ethics & etiquette
Internet Security
Internet security
Internet Threats
Cyber privacy and password protection

What's hot (20)

PPTX
Internet Threats
PPT
internet security
PPT
New internet security
PPTX
Dos and Don'ts of Internet Security
PPTX
Ethical hacking
PPTX
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
PPTX
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
PPT
Internet safety v 4 slides and notes
PDF
Cyber security-awareness-for-social-media-users - Devsena Mishra
PPTX
Online safety and security
PPTX
Spyware
PPT
Rothke Sia 2006
PPTX
Cybersecurity Awareness
PPTX
Cyber safety 101
PPTX
Hacking
PPT
Tutorial 09 - Security on the Internet and the Web
 
PPTX
Parag presentation on ethical hacking
PPT
Internet threats and defence mechanism
 
PPTX
Online safety and malwares
Internet Threats
internet security
New internet security
Dos and Don'ts of Internet Security
Ethical hacking
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
Internet safety v 4 slides and notes
Cyber security-awareness-for-social-media-users - Devsena Mishra
Online safety and security
Spyware
Rothke Sia 2006
Cybersecurity Awareness
Cyber safety 101
Hacking
Tutorial 09 - Security on the Internet and the Web
 
Parag presentation on ethical hacking
Internet threats and defence mechanism
 
Online safety and malwares

Similar to security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine (20)

PPTX
Hacking and Cyber Security.
PDF
Spyware
PPTX
Cyber Security Awareness Program.pptx
PPTX
unit-1.pptx
PDF
Ipsec And Ssl Protocols ( Vpn )
PPTX
Hacking Presentation v2 By Raffi
PDF
Cyber security awareness presentation nepal
DOCX
Cyber crime
PPTX
Cyber security awareness for end users
PPTX
cybersecurity understanding in simple way
PPT
Spyware (1).ppt
PPTX
Lecture about network and host security to NII students
PPTX
Cyber_Security_Seminar_PPTs_to Upload.pptx
PPT
Spyware
PPT
Chapter008.Protecting People and Information: Threats and Safeguards
PPTX
Cyber Security
PPTX
Spyware presentation by mangesh wadibhasme
PPTX
The use of internet web 120
PPTX
Cyber Security Seminar
PPTX
Spyware-A online threat to privacy
Hacking and Cyber Security.
Spyware
Cyber Security Awareness Program.pptx
unit-1.pptx
Ipsec And Ssl Protocols ( Vpn )
Hacking Presentation v2 By Raffi
Cyber security awareness presentation nepal
Cyber crime
Cyber security awareness for end users
cybersecurity understanding in simple way
Spyware (1).ppt
Lecture about network and host security to NII students
Cyber_Security_Seminar_PPTs_to Upload.pptx
Spyware
Chapter008.Protecting People and Information: Threats and Safeguards
Cyber Security
Spyware presentation by mangesh wadibhasme
The use of internet web 120
Cyber Security Seminar
Spyware-A online threat to privacy

Recently uploaded (20)

PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
DOCX
573137875-Attendance-Management-System-original
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPT
Project quality management in manufacturing
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Welding lecture in detail for understanding
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Well-logging-methods_new................
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Foundation to blockchain - A guide to Blockchain Tech
Operating System & Kernel Study Guide-1 - converted.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
573137875-Attendance-Management-System-original
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Project quality management in manufacturing
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Construction Project Organization Group 2.pptx
additive manufacturing of ss316l using mig welding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CYBER-CRIMES AND SECURITY A guide to understanding
Welding lecture in detail for understanding
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Well-logging-methods_new................
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Mechanical Engineering MATERIALS Selection
Foundation to blockchain - A guide to Blockchain Tech

security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine

  • 1. CYBER SECURITY AWARENESS Special Session for Tech. and Non Tech. people And how they prevent their systems, privacy, identity, location and other activities. Presented By:- Abhay Kumar Pathak (Ethical Hacking VAPT Certified) Dept:- Cs & IT ABHAY
  • 2. World Wide Web (Internet)ABHAY
  • 3. Accessible by normal people and searchable with standard web search engines. It’s have 4% of all Internet. Also called “Visible Web”, “Light Net”, Indexed Web”. 96% of the Internet Accessible by Tools or Software Accessible with special software, having encrypted data. Not indexed for search engines. Restricted for special browser, Large scale illegal activitiesABHAY
  • 4. Surface Web The surface web also called Visible Web , Lightnet, Indexed Web. This is the portion of the World Wide Web, that is readily available to the general public and searchable with standard Web Search Engines. 4% of Internet Indexable on Web Search Engines Google’s Index contains 14.4B pages on Surface Web Opposite of Deep Web ABHAY
  • 5. Deep Web Accessible by password, encryption or through gateway software Not Indexed for the search engines Little illegal activities in this web. The crimes huge in size and growing exponentially ABHAY
  • 6. Dark Net/Dark Web Restricted for the browsers Not Indexed for Search Engines Large scale illegal activities Unmeasured due to nature Use for Transfer Virtual Currency(Like Bit coin) ABHAY
  • 7. How to acces Dark Web Here some special tools given below for access the Dark Web TOR(The Onion Routing) 12P VPN(Virtual Private Network) Proxy(Use another server IP and Port No.) These networks called Overlay Network, and also use for Anonymous Surfing. ABHAY
  • 8. Security and Privacy Issues We are in that type of world where we don’t know how transfers, processes and execute the virtual things. We have some limited information of the Digital World. And here we trying to find the Perfection in our Digital System. We talk about privacy issues with these type accounts given below  Yahoo.com  Google.com  Hotmail.com  Indiatimes.com  Reddif.com Here each company have more than 120M Users(Google.com not consider) And even all mail send by it’s user scanned by some special keywords ABHAY
  • 9. Google.com If you using Google  Everything you type ,Google record it as like he collects the IP address of your personal computer Prevention:-Use the another google portal “DUCK DUCK GO” Here no privacy issues because duck duck go have no database to record your activities Another Issue with using Antivirus  First, Company makes the Virus and spread it all the internet  And second they give us paid softwares for prevent our system Prevention :- Use Online scanning ABHAY
  • 10. Windows and Mac A error message of Windows When you click report to windows then your whole configuration of system send to Mircosoft Prevention Use Linux Free and secure ABHAY
  • 11. Issues with Using Android Phone Google Location The Google is track your Location 24/7 with your android phone If you want to know where was you before 2 years than your Google map have each and every information about you for that day :-Disable the button of location and maintain your privacy ABHAY
  • 12. Anonymous Surfing In the scenario where no one can hide over the internet then anonymous surfing is the best way to prevent yourself Prevention:- Use TOR(for windows and linux) Free and open source For Android Users OR ORBOT With using TOR, You hide your IP, location and identity with using Random Servers ABHAY
  • 13. Secure Communication When we trying to find the solution for secure communication then I look, What the terrorist are nowadays using, A lot of report that the ISIS has been using secure communication app using like VIKER TELEGRAM and REDPHONE These are the similar apps like whatsup and snapchat but there are only difference they apps use MILITRY GRADE encryption and using a separate OTP confirmation channel. ABHAY
  • 14. ATM Threats ATM have two layers of security machenism Magnetic Strip(having whole information of account) 4 Digits PIN numbers The hackers can put the additional reading device and read all data and your account details The device look like this:- ABHAY
  • 15. The Case Discussion of Mumbai ABHAY
  • 16. Issues with ATM Machines ABHAY
  • 17. Keep your PINs secure and secret Another factor is spyware or using external keyboard who looks like original keyboard of ATM, who looks like this:- ABHAY