0% found this document useful (0 votes)
10 views8 pages

Ict 9th Chapter

The document outlines various cybersecurity threats including malware, defamation, keyloggers, and social engineering. It explains how malware can harm computers, defamation can damage reputations, keyloggers can steal sensitive information, and social engineering manipulates individuals into revealing confidential data. The document also highlights techniques used by hackers such as phishing and impersonation.

Uploaded by

toteefruitw.pr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views8 pages

Ict 9th Chapter

The document outlines various cybersecurity threats including malware, defamation, keyloggers, and social engineering. It explains how malware can harm computers, defamation can damage reputations, keyloggers can steal sensitive information, and social engineering manipulates individuals into revealing confidential data. The document also highlights techniques used by hackers such as phishing and impersonation.

Uploaded by

toteefruitw.pr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

-By Pragnesh

ICT Project
What’s the Plan
for this PPT?

Slide Slide Slide Slide


1 2 3 4
Social
Malware Defamatio Keylogger Engineerin
Malicious n
Harms Steal g
Psychological
things reputations important ly
Like Virus Of things information Manipulating
etc. like people
passwords
Malware includes viruses, worms, and trojan horses. For example, a virus
What is can make your computer sick, like a cold, while a trojan horse might
pretend to be something helpful but actually steals your information

Malware? •
secretly. You can get by :-
Email Attachments
• Downloads
• Ads in websites
• Removable Media
What's
Defamation?

Defamation is when someone says or writes false


and harmful things about another person that
damages their reputation. Like, imagine you have
a favorite game, and someone starts telling
everyone that you spreading at it, even though
you don't. It's like spreading rumors online that
aren't true and can make people think badly
about you. It harms the reputation of a person,
religion, government or a product.
What's a
Keylogger
program?
A keylogger program is a type of software that
records or logs every keystroke made on a computer
or mobile device. This includes keystrokes typed into
applications, websites, or messaging platforms.
Keyloggers can operate in stealth mode, making
them difficult to detect, and they can be used for
various purposes. They can also be used maliciously
by cybercriminals to steal sensitive information
without the user's knowledge. Like stealing credit
card's pins and use it for their own good.
Social
Engineering

Social engineering is a technique used by
hackers and cybercriminals to manipulate
people into revealing confidential
information, providing access to restricted
systems, or performing actions that
compromise security. It involves exploiting
human psychology rather than relying solely
on technical vulnerabilities. These are the
ways hackers do this
• Phishing
• Pretexting
• Baiting
• Impersonation
PHISHING:-SENDING THINGS APPEAR TO BE FROM
R E A L S O U RC E S , S U C H A S B A N K S O R , T O T R I C K
INDIVIDUALS INTO PROVIDING SENSITIVE

You might also like