SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Digital Threats From PC to Cell Phone By Dr.Tapan Sengupta
Digital Threats ,[object Object],[object Object],[object Object]
Vulnerabilities ,[object Object],[object Object],[object Object]
Activities Leading to a Threat ,[object Object],[object Object],[object Object],[object Object]
What Are The Common Threats   The basic types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What A The Common Types Of Threats ,[object Object],[object Object],[object Object],[object Object]
What A The Common Types Of Threats ,[object Object],[object Object],[object Object],[object Object]
Misleading Application ,[object Object],[object Object]
Known Misleading Application ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Known Misleading Application ,[object Object],[object Object],[object Object],[object Object],[object Object]
Anatomy Of A Typical Malware Malware Server Keyboard Logger Etc. Infected PC Network Keyboard Logger Etc. Un-infected PC Malware Account number Credit Card Info User Id, password etc. Step-1 Step-2
What Can These Malware Do? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Danger vs. Annoyance ,[object Object],[object Object],[object Object]
What To Do? ,[object Object],[object Object]
What To Do? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What To Do? ,[object Object],[object Object],[object Object]
Personal Security Policy  ,[object Object],[object Object],[object Object]
Personal Security Policy  ,[object Object],[object Object],[object Object]
Personal Security Policy ,[object Object],[object Object],[object Object]
Personal Security Policy ,[object Object],[object Object],[object Object]
LAST BUT NOT THE LEAST ,[object Object]
Security Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless SOHO Network Router Configuration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virus on cell phone ,[object Object],[object Object],[object Object],[object Object],[object Object]
Virus on cell phone What to do ,[object Object],[object Object],[object Object]
[object Object]

Weitere Àhnliche Inhalte

Was ist angesagt?

Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
Amrit Kaur
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
nasya
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
simron2002
 

Was ist angesagt? (20)

Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer viruses and removal techniques
Computer viruses and removal techniquesComputer viruses and removal techniques
Computer viruses and removal techniques
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Sowmya
SowmyaSowmya
Sowmya
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Computer virus
Computer virusComputer virus
Computer virus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
computer virus
computer viruscomputer virus
computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
N U R S Y A H I R A R O S L A N
N U R  S Y A H I R A  R O S L A NN U R  S Y A H I R A  R O S L A N
N U R S Y A H I R A R O S L A N
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 

Andere mochten auch

Gaming2
Gaming2Gaming2
Gaming2
habawi
 
Gaming
GamingGaming
Gaming
habawi
 
041c101952159200894917
041c101952159200894917041c101952159200894917
041c101952159200894917
mllopez
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
CLOCKLESS CHIP BY Saurabh singh
CLOCKLESS CHIP BY Saurabh singhCLOCKLESS CHIP BY Saurabh singh
CLOCKLESS CHIP BY Saurabh singh
Saurabh Singh
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
Manish Sharma
 

Andere mochten auch (18)

Gaming2
Gaming2Gaming2
Gaming2
 
Adobe ACROBAT 9: crea innovazione nella tua azienda!
Adobe ACROBAT 9: crea innovazione nella tua azienda!Adobe ACROBAT 9: crea innovazione nella tua azienda!
Adobe ACROBAT 9: crea innovazione nella tua azienda!
 
Trabajo
TrabajoTrabajo
Trabajo
 
India20080928
India20080928India20080928
India20080928
 
Gaming
GamingGaming
Gaming
 
Banner1
Banner1Banner1
Banner1
 
fun
funfun
fun
 
Trava
TravaTrava
Trava
 
041c101952159200894917
041c101952159200894917041c101952159200894917
041c101952159200894917
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Chap1 chipset
Chap1 chipsetChap1 chipset
Chap1 chipset
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
CLOCKLESS CHIP BY Saurabh singh
CLOCKLESS CHIP BY Saurabh singhCLOCKLESS CHIP BY Saurabh singh
CLOCKLESS CHIP BY Saurabh singh
 
Optical mouse working principle
Optical mouse working principleOptical mouse working principle
Optical mouse working principle
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Ähnlich wie Presented to Compass

Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
Zoaib Mirza
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
backdoor
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
cyber_security
cyber_securitycyber_security
cyber_security
Jana Baxter
 

Ähnlich wie Presented to Compass (20)

091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
M
MM
M
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Information security
Information securityInformation security
Information security
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
C3
C3C3
C3
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
cyber_security
cyber_securitycyber_security
cyber_security
 

KĂŒrzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

KĂŒrzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Presented to Compass

  • 1. Digital Threats From PC to Cell Phone By Dr.Tapan Sengupta
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Anatomy Of A Typical Malware Malware Server Keyboard Logger Etc. Infected PC Network Keyboard Logger Etc. Un-infected PC Malware Account number Credit Card Info User Id, password etc. Step-1 Step-2
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.