0% found this document useful (0 votes)
11 views12 pages

CELL

Uploaded by

buttarsubhan046
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views12 pages

CELL

Uploaded by

buttarsubhan046
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

CELL: THE UNIT OF LIFE

BS ZOOLOGY
Spring 2022
COURSE TITLE: INDUSTRIAL MICROBIOLOGY
INSTRUCTOR : MAJID SAJEEL
PRESENTATION GRADING
Name Roll No. Confidence Physical General Body Contents / Answer Total
/ Voice and Appearance / Movement / Relevance of Question
Volume Facial Eye Contact Data Section/Class
Expressions Response

Department of Zoology
International Institute of Science, Arts and Technology (IISAT),
Gujranwala
Introduction:
Our Presentation will the
different cover types
attacks of cyber real world
example of their impact,
and the evolving by cyber
criminals Strategies used
by cyber criminals.
Cyber
Security:
is the practice of
protecting systems,
Networks, and
Programs from
digital attacks.
These cyber attacks
are usually aimed at
accessing changing
or destroying
sensitive
information
extorting money
from users via
ransomeware; on
interrupting normal
business process.
Cybercrime:
Cybercrime is any
criminal activity
that involves a
computer, network
or network device
DIFFERENCE
Cyber:
Cybercrime targets
online
interconnected
system, digital assets
and sensitive
personal information

Crime:
Conventonal crime tend to target individuals or physical assets
suchas offices relatives and hones.
Phishing:
Phishing is a type of online
scam where attackers
pretend to be a
trustworthy entity, like a
bank or a familiar website,
to trick people into giving
away sensitive information
such as passwords, credit
card numbers, or personal
details. This is often done
through fake emails.
Malware:
Malware, short for
malicious software,
refers to any intrusive
software developed by
cybercriminals (often
called hackers) to steal
data and damage or
destroy computers and
computer systems
Types of Malware:
*virus
*bugs
*worm
*Trojan horses
*Ransomware
Hacking:
Hacking is the act of finding
and exploiting weaknesses in
a computer system or
network to gain
unauthorized access to data
or disrupt operations.
Types of Hacking:
1. White Hat Hackers: Good
guys who help fix security
problems. 2. Black Hat
Hackers: Bad guys who break
into systems to steal or cause
damage.
3. Gray Hat Hackers: In-
between hackers who find
issues without permission but
don't usually harm.
Dark Web:
The Dark Web is a hidden
part of the internet you can
only access with special
software. It's used for
anonymous activities, and
while it can be a place for
illegal things, it's also used
for privacy and free speech.

Dark Web Uses:


Illegal uses of the darknet
include buying and selling
stolen information like user
login credentials, sensitive
personal information like
social security numbers,
payment card information;
selling and buying of drugs;
and child pornography.
Data Protection:
1. Use Strong Passwords: Make
your passwords hard to guess and
use different ones for different
accounts.
2. Enable Two-Factor
Authentication: Add an extra step
to log in, like a code sent to your
phone.
3. Keep Everything Updated:
Update your apps and software
regularly.
4. Backup Your Data: Save copies of
important files in a different place.
5. Be Careful with Emails: Don't
click on strange links or open
unknown attachments.
6. Secure Your Wi-Fi: Use a strong
password for your home network
and avoid public Wi-Fi for sensitive
tasks. 7. Stay Informed: Learn
THANK YOU
SO MUCH

You might also like