ONLINE SEFTY AND AWARNESS
OF OPERATION AND SECURITY
OF DIGITAL DEVICES
MEHEDI HASAN
JOB EXPERIENCE: 16 YEAR
Adviser CCA foundation
LOGIK EYE FORENSICS
Indonesia
Malaysia
Vietnam
Singapore
India
Thailand
Nepal
China
Jakarta, Bali, Sumatra (3)
Kualalampur (2)
Ho chi min, Hanoi (2)
Singapore City (3)
Delhi, Agra, Kolkata, Chennai
Bangkok, Pataya, Puket
Kathmandu
Shanghai, Beijing
Sri Lanka Colombo
A Business man lives in
Dhaka. Used to social
media for business and
relation.
He receive a phone
call from an unknown
number.
Biggest cyber crime
involving privacy
invasion in the world!
CASE STUDY
WE CAN START NOW
CYBER CRIME
INTRODUCTION
Topic of the section Cyber
crime, Cyber Attacks,
Hacker, Hacking etc.
TYPES OF CYBER ATTACKS
Topic of the section,
Malware, Virus, Trojan,
Steps of hacking etc
IMPACT OF INTERNET
Topic of the section, Positive
and negative impact of
internet.
01
02
03
04
05
06
SOCILA ENGINEERING
ATTACKS
Steganography, Data hiding
technology, Encryption,
Decryption, Spoofing, etc
DIGITAL FORENSICs
ATTACKS
Evidence collection, Types of
forensics, different types
of technique, Anti-
Forensics, tips of analysis.
SECURITY AND SEFTY
Strong password, Device
security, Smartphone
security, malware
detecting, cleaning etc
HACKING: Unauthorized access in a system
জালিযালি এবং আলথিক অপরাধ
সাইবার সন্ত্রাস ও চাাঁদাবালজ, হযরালি ও হুমলক ধামলক
পিিগ্রাফী ধারি, সংরক্ষণ, লবিরি, সহাযিা
সাইবার যুদ্ধ
অিিাইি জুযা
অিিাইনি কাউনক আঘাি করা অপদস্থ করা
ফফক আইলি / ছদ্দনবশ ধারণ
Phishing Attack
Man-in-the-Middle Attack
SQL Injection Attack
Denial-of-Service, Brute-Force and Dictionary attacks
XSS Attacks
Ransomware Attacks
Malware Attack
Session Hijacking
Zero-Day - Attack
TYPE ATTACKS
WEB BASED
DEVICE BASED
WEB-BASED ATTACKS
INJECTION ATTACK
DENIAL OF SERVICE (DOS)
BRUTE FORCE
PHISHING ATTACKS
WEB-BASED ATTACKS
SYSTEM-BASED ATTACKS
CYBER ATTACKS AND CRIME
STEPS OF CYBER CRIME
STEP 1: IDENTIFY THE VICTIM
STEP 2: INFORMATION GATHERING.
STEP 3: IDENTIFY LOOPHOLE.
STEP 4: ACTUAL HACK.
STEP 5: ESCAPE WITHOUT TRACE.
Hacking into computer, is just like breaking into a house
WWW.ANONYMIZER.IN/FAKE-MAILER/
Email Spoofing is the art of sending a spoofed email from somebody else’s email account.
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
PHISHING ATTACKS
Phishing is the attempt to acquire sensitive
information, often for malicious reasons, by
masquerading as a trustworthy entity in an electronic
communication
PHISHING USING WEBSITE
SET (SOCIAL ENGINEERING TOOLKIT)
HTML/JAVA SCRIPT VIHSING
APK TERMUX
PHISHING ATTACKS
SET (SOCIAL ENGINEERING TOOLKIT)
PHISHING ATTACKS
Phishing java script code
PHISHING ATTACKS
www.virustotal.com
Viruses
Trojans
Rootkits
Worms
Spyware
Crimeware
Adware
MITM attack is a general term for when a perpetrator
positions himself in a conversation between a user and an
application—making it appear as if a normal exchange of
information is underway.
INTERCEPTOT
Hardware Keylogger
INVESTIGATIONS
FORCE STOP THE APPS
ROOT THE DEVICE
EXTRACT SYSTEM
https://youtu.be/ZF6dc6nt25U
USE UPDATED ANTIVIRUS
SCAN YOUR SYSTEM REGULARLY
SCAN FLASH MEDIA/DRIVE
BEFORE USE.
IMPACT OF INTERNET
IMPACT OF INTERNET
IMPACT OF INTERNET
NEGATIVE IMPACT
POSITIVE IMPACT
IMPACT OF INTERNET
লিন াসি
NEGATIVE IMPACT
লশশু পণিগ্রালফ
মাদনকর প্রসার িারী ও লশশু পাচার
শারীলরক গঠি ও মািলসক লবকানস অপলরপক্কিা
উগ্রবাদী মনিা াব ও গাঁজব
মািহালি ও মািহালিকর িথয প্রচার
IMPACT OF INTERNET
Addiction
IMPACT OF INTERNET
Personality
IMPACT OF INTERNET
িথয প্রালি ও সংরক্ষণ
POSITIVE IMPACT
ফযাগানযাগ
অিিাইি লশক্ষা
অিিাইি বযাবসা বালণনজযর প্রসার
অিিাইনি লচলকৎসা ফসবা
লশশু লশক্ষা ও লবনিাদি
SOCIAL ENGINEERING ATTACKS
Deepfake is an artificial intelligence-based human image
synthesis technique
• Mobile phones were used.
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
DIGITAL FORENSICs & INVESTIGATIONS
Forensics is the application of science to solve a
legal problem
Digital Forensics is a part of forensic science (in
relation to computer crime) focusing on the
recovery and investigation of material (essentially
data) found in digital devices.
In a word, It is recovery Science
DELETED FILES
LOGS
SPECIAL SYSTEM FILES (REGISTRY ETC.)
EMAIL ARCHVES, PRINTER SPOOLS
ADMINIRTRATIVE SETTING
INTERNET HISTORY
CHAT ARCHIVES
ENCRYPTED FIELS /PASSWORD PROTECTED
FILES
A talented young boy
of 14/15 years who was
studying late went out
of the house to take
the exam and left his
bag and notebook in a
nearby shop and
disappeared.
The boy's parents filed
a complaint with the
law enforcement
agencies.
ATTACKS
Deleted SMS recovery by forensics
General Forensic Investigations
JTAG Forensic Investigations
CHIP-OFF Forensic Investigations
GPS INVESTIGATION
https://myactivity.google.com/more-activity
GPS INVESTIGATION
GPS INVESTIGATION
https://www.google.com/maps/timeline?pb=!1m2!1m1!1s2018-06-22
ARTIFICIAL INTELLIGENCE
ChatGPT
ChatSonic
Bard
CoPilot
The New Bing (Bing AI)
Character Certificate
Statement of Certificate
40%
10%
2%
8%
10%
12%
2% 3%
8%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
Character Chart
2019
This is to certify that
RAHIM son/daughter
of…YYYY…………is well
known to FACEBOOK
Ind. Since last
…2011….years and…..
month. To the best of our
knowledge and belief he/she
bearing following character.
Note : Pother pacali, রঙ্গমঞ্চ, গরুঠাকুর megh-Balika also known as Rahim that’s fake ID
ANTI FORENSICS
Anti forensics (sometimes counter
forensics) is a general term for a set
of techniques used as
countermeasures to forensic analysis.
DELETED FILES
LOGS
SPECIAL SYSTEM FILES (REGISTRY ETC.)
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
PASSWORD CHANGING POLICY.
DON’T USE SIMPLE PASSWORD. (APNI123, 123456, 098765, 0171300056,
APNI00056)
DON’T CLICK ON UN TRUSTED LINK.
SPOOFING EMAIL (LOTTERY, GIRLFRIEND/BOYFRIEND, JOB)
REMOVE UNKNOWN FRIEND SOCIAL MEDIA.
USE STRONG PASSWORD.
DO NOT GIVE YOUR DEVICE TO UN TRUSTED PEOPLE.
.
https://facebook.com/mehedi0001
+880-1973000056
Be with
someone who
will warning
you about
cyber attack

More Related Content

PPT
It security &_ethical_hacking
PPTX
Ethical hacking
PPTX
Parag presentation on ethical hacking
PPTX
Cyber crime
PPT
Bright talk intrusion prevention are we joking - henshaw july 2010 a
PPSX
Unit 2
PPSX
Unit 2
DOCX
Information Technology, cybersecurity and protection.docx
It security &_ethical_hacking
Ethical hacking
Parag presentation on ethical hacking
Cyber crime
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Unit 2
Unit 2
Information Technology, cybersecurity and protection.docx

Similar to ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES (20)

PPT
Cyber Crime
PPTX
unit-1.pptx
PDF
An overview study on cyber crimes in internet
PDF
Secureview 2q 2011
PPTX
cyber security and its importance .pptx
PPTX
Cyber Crime and Security
PDF
ccs12-18022310494mghmgmyy3 (1).pdf
PPT
Cyber Crime.ppt
PDF
E security and payment 2013-1
PPT
Cyber Crime & Security
PPTX
Cyber Crime
PPTX
First Lecture- Cyber Security-Bangladesh.pptx
PDF
Iaetsd cyber crimeand
PPTX
Lessons v on fraud awareness (digital forensics)
PPTX
Lessons v on fraud awareness (digital forensics) [autosaved]
PPT
cyber crime technology
PDF
Ethical Hacking
PPSX
Cyber crime and cyber security
PDF
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Cyber Crime
unit-1.pptx
An overview study on cyber crimes in internet
Secureview 2q 2011
cyber security and its importance .pptx
Cyber Crime and Security
ccs12-18022310494mghmgmyy3 (1).pdf
Cyber Crime.ppt
E security and payment 2013-1
Cyber Crime & Security
Cyber Crime
First Lecture- Cyber Security-Bangladesh.pptx
Iaetsd cyber crimeand
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness (digital forensics) [autosaved]
cyber crime technology
Ethical Hacking
Cyber crime and cyber security
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Ad

More from Shekh Md Mehedi Hasan (20)

PPTX
Malware analysis Automatic Call Recorder.pptx
PDF
Company profile logikeye.pdf
PPTX
Hackng CPU Code through Security Fuse.pptx
PPTX
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
PDF
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
PDF
Wall Listening Devices.pdf
PDF
Smart voice security system
DOCX
Nuclear Powered Drones A Threat to Biodiversity.docx
PPTX
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
PPTX
Cyber Crime Awareness.pptx
PPT
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
PPTX
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
PDF
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
PPTX
Workshop on Cyber security and investigation
PPT
Remote control system (rcs)
PPTX
Live memory forensics
PPTX
Workshop on Cyber security
PPTX
Cyber security & ethical hacking 10
PPTX
Cyber security and ethical hacking 7
PPTX
Cyber security and ethical hacking 9
Malware analysis Automatic Call Recorder.pptx
Company profile logikeye.pdf
Hackng CPU Code through Security Fuse.pptx
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
Wall Listening Devices.pdf
Smart voice security system
Nuclear Powered Drones A Threat to Biodiversity.docx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Cyber Crime Awareness.pptx
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
Workshop on Cyber security and investigation
Remote control system (rcs)
Live memory forensics
Workshop on Cyber security
Cyber security & ethical hacking 10
Cyber security and ethical hacking 7
Cyber security and ethical hacking 9
Ad

Recently uploaded (20)

PDF
data_center_optimization_playbook_v4_239872_0 (1).pdf
PPTX
Courier-Delivery-App-Development-Unlocking-the-Future-of-Logistics.pptx
PPTX
Comprehensive Plumbing and Piping Engineering
PDF
Pure Tax Investigations presentation at Accountex.pdf
PPTX
Lowell_Stine_Presentation services .pptx
PDF
Professional & Best Facility Management Services in Dehradun (new).pdf
PDF
Payroll Regulations UK 2025: Complete Guide for Employers & Payroll Compliance
PDF
Top 2 Places to Buy Verified Cash App Accounts Online.pdf
PPTX
The Rise of the Agentic Edge Salesforce’s Bold Move with Regrello GetOnCRM.pptx
PDF
The Essential Role of Gutter Guard Mesh in Safeguarding Your Property
PDF
Best IPTV Reseller Program & Best IPTV Reseller Panel 2025
PPTX
How to Choose the Right Moving Boxes for Your Next Move .pptx
PDF
Dean, Jodi: Concept Paper, Park at Stable Acres.pdf
PDF
SAMPA Presenttaion 19 September 2018.pdf
PDF
Employee Movement Tracking System_ 1 SGD Mobile Attendance.pdf
PDF
Website Hosting in Manchester – Secure & Reliable
PDF
The Future of Transport and Logistics in Southeast Asia.pdf
PDF
From Concept to Completion Premium Kitchen Design and Installation Solutions ...
PDF
Digital Marketing Course in North Delhi – Complete Guide.pdf
PDF
Cybersecurity Awareness: Protecting Data, Finance & Digital Identity
data_center_optimization_playbook_v4_239872_0 (1).pdf
Courier-Delivery-App-Development-Unlocking-the-Future-of-Logistics.pptx
Comprehensive Plumbing and Piping Engineering
Pure Tax Investigations presentation at Accountex.pdf
Lowell_Stine_Presentation services .pptx
Professional & Best Facility Management Services in Dehradun (new).pdf
Payroll Regulations UK 2025: Complete Guide for Employers & Payroll Compliance
Top 2 Places to Buy Verified Cash App Accounts Online.pdf
The Rise of the Agentic Edge Salesforce’s Bold Move with Regrello GetOnCRM.pptx
The Essential Role of Gutter Guard Mesh in Safeguarding Your Property
Best IPTV Reseller Program & Best IPTV Reseller Panel 2025
How to Choose the Right Moving Boxes for Your Next Move .pptx
Dean, Jodi: Concept Paper, Park at Stable Acres.pdf
SAMPA Presenttaion 19 September 2018.pdf
Employee Movement Tracking System_ 1 SGD Mobile Attendance.pdf
Website Hosting in Manchester – Secure & Reliable
The Future of Transport and Logistics in Southeast Asia.pdf
From Concept to Completion Premium Kitchen Design and Installation Solutions ...
Digital Marketing Course in North Delhi – Complete Guide.pdf
Cybersecurity Awareness: Protecting Data, Finance & Digital Identity

ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES