SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Traditional problems for business ,[object Object],[object Object],[object Object],[object Object],[object Object]
WHERE CAN FRAUDSTERS GET PERSONAL OR BUSINESS DETAILS? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Some facts about a computer ,[object Object],[object Object],[object Object]
WHAT IS A TROJAN? According to Wikipedia7 “a Trojan horse or Trojan is a malicious program that is disguised as   legitimate software … Trojan horse programs  cannot replicate themselves , as do   some other types of malware, like viruses or worms.  A Trojan horse can be deliberately   attached to otherwise useful software by a programmer, or it can be spread by tricking users   into believing that it is a useful program.” A Trojan is simply a delivery mechanism. It contains a payload to be delivered elsewhere. The payload may consist of almost anything such as a piece of spyware, adware, a backdoor,   implanted data or simply a routine contained within a batch file. Additional tools such as   keyloggers, packet generation tools (for denial-of-service attacks) and sniffers may form part   of the payload.  
Technical Challenges • Hardware –hard drive sizes, RAID • Software –free tools to hack and to cover tracks • Operating Systems –built in encryption • Networks –always on –always at risk  • Passwords, Encryption, Steganography • Anonymous Remailers • Spoofing • Ever Changing Technology
 
POPUPS AND SPAM ,[object Object],[object Object]
INTERNET BENEFITS   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DISADVANTAGES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
USEFUL WEBSITES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
bebo
 

Was ist angesagt? (19)

Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Spyware
SpywareSpyware
Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ransomware protection
Ransomware protectionRansomware protection
Ransomware protection
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Computer security
Computer securityComputer security
Computer security
 
Hackers
HackersHackers
Hackers
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
internet security
internet securityinternet security
internet security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Adware
AdwareAdware
Adware
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Firewall
FirewallFirewall
Firewall
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 

Andere mochten auch (16)

Research- Double page spread
Research- Double page spreadResearch- Double page spread
Research- Double page spread
 
Research- Double page spread
Research- Double page spreadResearch- Double page spread
Research- Double page spread
 
Evaluation
EvaluationEvaluation
Evaluation
 
Sinu tervis on sinu enda kätes
Sinu tervis on sinu enda kätesSinu tervis on sinu enda kätes
Sinu tervis on sinu enda kätes
 
Landart3
Landart3Landart3
Landart3
 
Muinastuled
MuinastuledMuinastuled
Muinastuled
 
Viidad
ViidadViidad
Viidad
 
Flotasi
FlotasiFlotasi
Flotasi
 
Drafting for masthead font
Drafting for masthead fontDrafting for masthead font
Drafting for masthead font
 
Preliminary task
Preliminary taskPreliminary task
Preliminary task
 
Media powerpoint final
Media powerpoint finalMedia powerpoint final
Media powerpoint final
 
Research- Double page spread
Research- Double page spreadResearch- Double page spread
Research- Double page spread
 
Folio urbanex
Folio urbanexFolio urbanex
Folio urbanex
 
Prueba
PruebaPrueba
Prueba
 
Preliminary task
Preliminary taskPreliminary task
Preliminary task
 
Pengolahan Bahan Galian
Pengolahan Bahan GalianPengolahan Bahan Galian
Pengolahan Bahan Galian
 

Ähnlich wie ASSIST - Fraud Presentation

4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 
Internet Etiqute
Internet EtiquteInternet Etiqute
Internet Etiqute
Anay Mishra
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prez
Studio Sheen
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
cougarcps
 

Ähnlich wie ASSIST - Fraud Presentation (20)

Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Internet Etiqute
Internet EtiquteInternet Etiqute
Internet Etiqute
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prez
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work Guide
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Information security
Information securityInformation security
Information security
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

ASSIST - Fraud Presentation

  • 1.
  • 2.
  • 3.
  • 4. WHAT IS A TROJAN? According to Wikipedia7 “a Trojan horse or Trojan is a malicious program that is disguised as legitimate software … Trojan horse programs cannot replicate themselves , as do some other types of malware, like viruses or worms. A Trojan horse can be deliberately attached to otherwise useful software by a programmer, or it can be spread by tricking users into believing that it is a useful program.” A Trojan is simply a delivery mechanism. It contains a payload to be delivered elsewhere. The payload may consist of almost anything such as a piece of spyware, adware, a backdoor, implanted data or simply a routine contained within a batch file. Additional tools such as keyloggers, packet generation tools (for denial-of-service attacks) and sniffers may form part of the payload.  
  • 5. Technical Challenges • Hardware –hard drive sizes, RAID • Software –free tools to hack and to cover tracks • Operating Systems –built in encryption • Networks –always on –always at risk • Passwords, Encryption, Steganography • Anonymous Remailers • Spoofing • Ever Changing Technology
  • 6.  
  • 7.
  • 8.
  • 9.
  • 10.