-By Pragnesh
ICT Project
             What’s the Plan
              for this PPT?
Slide        Slide         Slide         Slide
  1             2             3              4
                                            Social
Malware      Defamatio     Keylogger     Engineerin
Malicious        n
               Harms           Steal          g
                                         Psychological
  things     reputations    important         ly
Like Virus    Of things    information   Manipulating
   etc.                         like       people
                            passwords
               Malware includes viruses, worms, and trojan horses. For example, a virus
What is        can make your computer sick, like a cold, while a trojan horse might
               pretend to be something helpful but actually steals your information
Malware?   •
               secretly. You can get by :-
               Email Attachments
           •   Downloads
           •   Ads in websites
           •   Removable Media
What's
Defamation?
Defamation is when someone says or writes false
and harmful things about another person that
damages their reputation. Like, imagine you have
a favorite game, and someone starts telling
everyone that you spreading at it, even though
you don't. It's like spreading rumors online that
aren't true and can make people think badly
about you. It harms the reputation of a person,
religion, government or a product.
What's a
Keylogger
program?
A keylogger program is a type of software that
records or logs every keystroke made on a computer
or mobile device. This includes keystrokes typed into
applications, websites, or messaging platforms.
Keyloggers can operate in stealth mode, making
them difficult to detect, and they can be used for
various purposes. They can also be used maliciously
by cybercriminals to steal sensitive information
without the user's knowledge. Like stealing credit
card's pins and use it for their own good.
    Social
    Engineering
•
    Social engineering is a technique used by
    hackers and cybercriminals to manipulate
    people into revealing confidential
    information, providing access to restricted
    systems, or performing actions that
    compromise security. It involves exploiting
    human psychology rather than relying solely
    on technical vulnerabilities. These are the
    ways hackers do this
•   Phishing
•   Pretexting
•   Baiting
•   Impersonation
                              PHISHING:-SENDING THINGS APPEAR TO BE FROM
                               R E A L S O U RC E S , S U C H A S B A N K S O R , T O T R I C K
                                   INDIVIDUALS INTO PROVIDING SENSITIVE