7. Terrorism attacks on
the internet is by
distibuted denial of
service attacks, hate
E-mails, attacks on
service network etc.
8. Cyber security preventing
The different online attack
To sensitive personal and
Business information
Privacy policy :-
Before submitting
Your personal
Information on
Website, look for the
Sites privacy policy.
Keep Software
Up to Date ,
For better
Security from
Hackers
9.
10. Suspicious links can be used to con
users into downloa ding malicious
software that these fraudsters can
use to take over the device or
spy on the person.
Cybercriminals use ransomware to access victims‘
computers, encrypt their data and private files,
and then demand money in return