Digital Transformation and Security Threats PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: Digital Transformation and Security Threats


1
DIGITAL TRANSFORMATION AND SECURITY THREATS
1
3
4
7
5
2
6
  • Internet-connected devices, each of which is
    running one or
  • Cybercriminals are individuals or teams of
    people who use technology to commit
  • Computer program that replicates itself in order
    to spread to other computers. It often uses a
    computer network to spread itself, relying on
    security failures on the target computer to
    access it.
  • Fraudulent attempt to obtain sensitive
    information such as usernames, passwords and
    credit card details by disguising oneself as a
    trustworthy entity in an electronic
    communication.
  • Aims to gather information about a person or
    organization, without their knowledge, and send
    such information to hack another entity without
    the consumer's consent.
  • Computer program that, when executed, replicates
    itself by modifying other computer programs and
    inserting its own code.

more bots. It can be used to perform distributed
denial-of- service attack , steal data, send
spam, and allows the attacker to access the
device and its connection.
  • Software programs designed to damage or do other
    unwanted actions on a computer system.

malicious activities on digital
systems or networks with the intention of
stealing sensitive information .
MALWARE
CYBER CRIMINALS
BOTNET
PHISHING
SPYWARE
VIRUS
WORM
HACKERS
INFORMATION
DATA
TRUST
SAFETY
LEAK
SECURITY
TECHNOLOGIES, TOOLS AND METHODS ENABLING DIGITAL
TRANSFORMATION
Web-Tech
INTERNET OF THINGS
BIG DATA
ROBOTICS
AR/VR
CLOUD
ARTIFICIAL INTELLIGENCE
MACHINE LEARNING
Mobile-Tech
ADDITIVE MANUFACTURING
Write a Comment
User Comments (0)
About PowerShow.com