Documente Academic
Documente Profesional
Documente Cultură
•Video game. Many of them allow online billing and payment and
are possible targets for hackers to
intercept the user's bank details.
IOT MALWARE OPENS A BACKDOOR INTO THE HOME
• Consumer electronics continues to grow at a rapid pace. One
area in particular is the consumer element of the Internet of
Things, which is expected to hit roughly 1.8 billion devices by
2019. Known colloquially as “smart home” or “connected home,”
this market includes a number of well established brands and
products, as well as a huge field of smaller companies looking
into the scene.
• Internet abduction of things (cars, refrigerators, televisions,...). A
ransomware virus can block, for example, a security camera and
hackers can request a rescue to unlock it.
Every Internet user is bombarded with information for
making decisions: what to click, what to read, and where
to spend.
These choices fuel a multibillion dollar online economy
and, with that much money on the line, unscrupulous
actors are constantly looking for ways to take advantage of
others.
Reputation is key for many decision makers to feel
confident about their choices; this is the trust that some
people seek to exploit.
Virus
Password
cracking Hacker
Major
security
problems
Trojan Malware
horses
In common a hacker is a person who breaks into
computers, usually by gaining access to
administrative controls.
•Black hat hackers are normally responsible for
creating malware, which is frequently used to
infiltrate computerized networks and systems.
You can’t
catch me
•Also known as “ethical hackers,” they’re often
employed or contracted by companies and
governmental entities, working as security
specialists looking for vulnerabilities. They imply
the same methods as black hat but are given
permissions for the following
CALL ME MR.
GREY HAT
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.
Password attacks are
attacks by hackers
that are able to
determine passwords
or find passwords to
different protected
electronic areas and
social network sites.
ADVANTAGE OF CYBER SECURITY
It will defend from hacks and virus.
The application of cyber security used in our PC
needs update every week.
The security developers will update their database
every week once. Hence the new virus also deleted.
Use antivirus software
Insert firewalls , pop up blocker
Uninstall unnecessary software
Maintain backup
Check security settings
Use secure connection
Open attachments carefully
Use strong passwords , don’t give personal information
unless required
www.wikipedia.com
www.google.com
www.cyber security.com
www.google images.com
www.cyber threats.com