CELL: THE UNIT OF LIFE
BS ZOOLOGY
Spring 2022
COURSE TITLE: INDUSTRIAL MICROBIOLOGY
INSTRUCTOR : MAJID SAJEEL
PRESENTATION GRADING
Name Roll No. Confidence Physical General Body Contents / Answer Total
/ Voice and Appearance / Movement / Relevance of Question
Volume Facial Eye Contact Data Section/Class
Expressions Response
Department of Zoology
International Institute of Science, Arts and Technology (IISAT),
Gujranwala
Introduction:
Our Presentation will the
different cover types
attacks of cyber real world
example of their impact,
and the evolving by cyber
criminals Strategies used
by cyber criminals.
Cyber
Security:
is the practice of
protecting systems,
Networks, and
Programs from
digital attacks.
These cyber attacks
are usually aimed at
accessing changing
or destroying
sensitive
information
extorting money
from users via
ransomeware; on
interrupting normal
business process.
Cybercrime:
Cybercrime is any
criminal activity
that involves a
computer, network
or network device
DIFFERENCE
Cyber:
Cybercrime targets
online
interconnected
system, digital assets
and sensitive
personal information
Crime:
Conventonal crime tend to target individuals or physical assets
suchas offices relatives and hones.
Phishing:
Phishing is a type of online
scam where attackers
pretend to be a
trustworthy entity, like a
bank or a familiar website,
to trick people into giving
away sensitive information
such as passwords, credit
card numbers, or personal
details. This is often done
through fake emails.
Malware:
Malware, short for
malicious software,
refers to any intrusive
software developed by
cybercriminals (often
called hackers) to steal
data and damage or
destroy computers and
computer systems
Types of Malware:
*virus
*bugs
*worm
*Trojan horses
*Ransomware
Hacking:
Hacking is the act of finding
and exploiting weaknesses in
a computer system or
network to gain
unauthorized access to data
or disrupt operations.
Types of Hacking:
1. White Hat Hackers: Good
guys who help fix security
problems. 2. Black Hat
Hackers: Bad guys who break
into systems to steal or cause
damage.
3. Gray Hat Hackers: In-
between hackers who find
issues without permission but
don't usually harm.
Dark Web:
The Dark Web is a hidden
part of the internet you can
only access with special
software. It's used for
anonymous activities, and
while it can be a place for
illegal things, it's also used
for privacy and free speech.
Dark Web Uses:
Illegal uses of the darknet
include buying and selling
stolen information like user
login credentials, sensitive
personal information like
social security numbers,
payment card information;
selling and buying of drugs;
and child pornography.
Data Protection:
1. Use Strong Passwords: Make
your passwords hard to guess and
use different ones for different
accounts.
2. Enable Two-Factor
Authentication: Add an extra step
to log in, like a code sent to your
phone.
3. Keep Everything Updated:
Update your apps and software
regularly.
4. Backup Your Data: Save copies of
important files in a different place.
5. Be Careful with Emails: Don't
click on strange links or open
unknown attachments.
6. Secure Your Wi-Fi: Use a strong
password for your home network
and avoid public Wi-Fi for sensitive
tasks. 7. Stay Informed: Learn
THANK YOU
SO MUCH