際際滷shows by User: Deepakniit14 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: Deepakniit14 / Fri, 20 Aug 2021 22:36:37 GMT 際際滷Share feed for 際際滷shows by User: Deepakniit14 Dark Web Forensics /slideshow/dark-web-forensics/250019800 darkwebforensics-210820223638
The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content. ]]>

The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content. ]]>
Fri, 20 Aug 2021 22:36:37 GMT /slideshow/dark-web-forensics/250019800 Deepakniit14@slideshare.net(Deepakniit14) Dark Web Forensics Deepakniit14 The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/darkwebforensics-210820223638-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the &quot;Evil Twin of the Internet&quot; since more than 57 percent of its area is occupied with unlawful content.
Dark Web Forensics from Deepak Kumar (D3)
]]>
1469 0 https://cdn.slidesharecdn.com/ss_thumbnails/darkwebforensics-210820223638-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Threat Intel : Overview /Deepakniit14/cyber-threat-intel-overview cyberthreatintelfinal-201028164815
The views / opinions / assumptions expressed in this presentation/resource is for educational & research purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this material, nor anyone else a鍖liated in any way, is liable for your actions. The purpose of this presentation is to share what is happening in cyber and what is possible... ]]>

The views / opinions / assumptions expressed in this presentation/resource is for educational & research purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this material, nor anyone else a鍖liated in any way, is liable for your actions. The purpose of this presentation is to share what is happening in cyber and what is possible... ]]>
Wed, 28 Oct 2020 16:48:15 GMT /Deepakniit14/cyber-threat-intel-overview Deepakniit14@slideshare.net(Deepakniit14) Cyber Threat Intel : Overview Deepakniit14 The views / opinions / assumptions expressed in this presentation/resource is for educational & research purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this material, nor anyone else a鍖liated in any way, is liable for your actions. The purpose of this presentation is to share what is happening in cyber and what is possible... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberthreatintelfinal-201028164815-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The views / opinions / assumptions expressed in this presentation/resource is for educational &amp; research purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this material, nor anyone else a鍖liated in any way, is liable for your actions. The purpose of this presentation is to share what is happening in cyber and what is possible...
Cyber Threat Intel : Overview from Deepak Kumar (D3)
]]>
577 0 https://cdn.slidesharecdn.com/ss_thumbnails/cyberthreatintelfinal-201028164815-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber of things 2.0 /slideshow/cyber-of-things-20/238901678 cyberofthings2-201017130107
If you know the enemy and know yourself, you need not fear the result of a hundred battles- Sun Tzu Sharing some pointers wrt some trends and tactics in the cyber domain and threat intel. Thanks to CRCIDF team. ]]>

If you know the enemy and know yourself, you need not fear the result of a hundred battles- Sun Tzu Sharing some pointers wrt some trends and tactics in the cyber domain and threat intel. Thanks to CRCIDF team. ]]>
Sat, 17 Oct 2020 13:01:07 GMT /slideshow/cyber-of-things-20/238901678 Deepakniit14@slideshare.net(Deepakniit14) Cyber of things 2.0 Deepakniit14 If you know the enemy and know yourself, you need not fear the result of a hundred battles- Sun Tzu Sharing some pointers wrt some trends and tactics in the cyber domain and threat intel. Thanks to CRCIDF team. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberofthings2-201017130107-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> If you know the enemy and know yourself, you need not fear the result of a hundred battles- Sun Tzu Sharing some pointers wrt some trends and tactics in the cyber domain and threat intel. Thanks to CRCIDF team.
Cyber of things 2.0 from Deepak Kumar (D3)
]]>
504 0 https://cdn.slidesharecdn.com/ss_thumbnails/cyberofthings2-201017130107-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Forensics /slideshow/cyber-forensics-182376087/182376087 cyberforensics-191015121915
DIGITAL FORENSICS IS A BRANCH OF FORENSIC SCIENCE FOCUSING ON THE RECOVERY AND INVESTIGATION OF RAW DATA RESIDING IN ELECTRONIC OR DIGITAL DEVICES. THE GOAL OF THE PROCESS IS TO EXTRACT AND RECOVER ANY INFORMATION FROM A DIGITAL DEVICE WITHOUT ALTERING THE DATA PRESENT ON THE DEVICE. --D3 For more; https://d3pakblog.wordpress.com]]>

DIGITAL FORENSICS IS A BRANCH OF FORENSIC SCIENCE FOCUSING ON THE RECOVERY AND INVESTIGATION OF RAW DATA RESIDING IN ELECTRONIC OR DIGITAL DEVICES. THE GOAL OF THE PROCESS IS TO EXTRACT AND RECOVER ANY INFORMATION FROM A DIGITAL DEVICE WITHOUT ALTERING THE DATA PRESENT ON THE DEVICE. --D3 For more; https://d3pakblog.wordpress.com]]>
Tue, 15 Oct 2019 12:19:15 GMT /slideshow/cyber-forensics-182376087/182376087 Deepakniit14@slideshare.net(Deepakniit14) Cyber Forensics Deepakniit14 DIGITAL FORENSICS IS A BRANCH OF FORENSIC SCIENCE FOCUSING ON THE RECOVERY AND INVESTIGATION OF RAW DATA RESIDING IN ELECTRONIC OR DIGITAL DEVICES. THE GOAL OF THE PROCESS IS TO EXTRACT AND RECOVER ANY INFORMATION FROM A DIGITAL DEVICE WITHOUT ALTERING THE DATA PRESENT ON THE DEVICE. --D3 For more; https://d3pakblog.wordpress.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberforensics-191015121915-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DIGITAL FORENSICS IS A BRANCH OF FORENSIC SCIENCE FOCUSING ON THE RECOVERY AND INVESTIGATION OF RAW DATA RESIDING IN ELECTRONIC OR DIGITAL DEVICES. THE GOAL OF THE PROCESS IS TO EXTRACT AND RECOVER ANY INFORMATION FROM A DIGITAL DEVICE WITHOUT ALTERING THE DATA PRESENT ON THE DEVICE. --D3 For more; https://d3pakblog.wordpress.com
Cyber Forensics from Deepak Kumar (D3)
]]>
942 4 https://cdn.slidesharecdn.com/ss_thumbnails/cyberforensics-191015121915-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Threat Intelligence /slideshow/threat-intelligence-174665398/174665398 threatintelligence-190922030452
Threat intelligence is information that informs enterprise defenders of adversarial elements to stop them. It is information that is relevant to the organization, has business value, and is actionable. If you having all data and feeds then data alone isnt intelligence. #Threat #Intelligence #Forensics #ELK #Forensics #VAPT #SOC #SIEM #Incident #D3pak]]>

Threat intelligence is information that informs enterprise defenders of adversarial elements to stop them. It is information that is relevant to the organization, has business value, and is actionable. If you having all data and feeds then data alone isnt intelligence. #Threat #Intelligence #Forensics #ELK #Forensics #VAPT #SOC #SIEM #Incident #D3pak]]>
Sun, 22 Sep 2019 03:04:52 GMT /slideshow/threat-intelligence-174665398/174665398 Deepakniit14@slideshare.net(Deepakniit14) Threat Intelligence Deepakniit14 Threat intelligence is information that informs enterprise defenders of adversarial elements to stop them. It is information that is relevant to the organization, has business value, and is actionable. If you having all data and feeds then data alone isnt intelligence. #Threat #Intelligence #Forensics #ELK #Forensics #VAPT #SOC #SIEM #Incident #D3pak <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/threatintelligence-190922030452-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Threat intelligence is information that informs enterprise defenders of adversarial elements to stop them. It is information that is relevant to the organization, has business value, and is actionable. If you having all data and feeds then data alone isnt intelligence. #Threat #Intelligence #Forensics #ELK #Forensics #VAPT #SOC #SIEM #Incident #D3pak
Threat Intelligence from Deepak Kumar (D3)
]]>
5117 5 https://cdn.slidesharecdn.com/ss_thumbnails/threatintelligence-190922030452-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
THINK /slideshow/think-b4-yu-send/85844162 think-180108071415
Cyber safety netiquettes. So be smart & creative in cyber world. #D3pak]]>

Cyber safety netiquettes. So be smart & creative in cyber world. #D3pak]]>
Mon, 08 Jan 2018 07:14:15 GMT /slideshow/think-b4-yu-send/85844162 Deepakniit14@slideshare.net(Deepakniit14) THINK Deepakniit14 Cyber safety netiquettes. So be smart & creative in cyber world. #D3pak <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/think-180108071415-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber safety netiquettes. So be smart &amp; creative in cyber world. #D3pak
THINK from Deepak Kumar (D3)
]]>
367 1 https://cdn.slidesharecdn.com/ss_thumbnails/think-180108071415-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security Tips /slideshow/cyber-security-tips/85103280 cybersafety-171227164757
Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.]]>

Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.]]>
Wed, 27 Dec 2017 16:47:57 GMT /slideshow/cyber-security-tips/85103280 Deepakniit14@slideshare.net(Deepakniit14) Cyber Security Tips Deepakniit14 Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersafety-171227164757-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.
Cyber Security Tips from Deepak Kumar (D3)
]]>
1222 1 https://cdn.slidesharecdn.com/ss_thumbnails/cybersafety-171227164757-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CISSP INFORGRAPH MINDMAP /slideshow/cissp-inforgraph-mindmap/80529753 cisspinfofraphmindmap-171006125014
CISSP: Certified Information Systems Security Professional. Most prestigious vendor-neutral certification. The mind maps are in sync with CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide ,7th Edition by James M. Stewart, Mike Chapple, Darril Gibson ]]>

CISSP: Certified Information Systems Security Professional. Most prestigious vendor-neutral certification. The mind maps are in sync with CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide ,7th Edition by James M. Stewart, Mike Chapple, Darril Gibson ]]>
Fri, 06 Oct 2017 12:50:14 GMT /slideshow/cissp-inforgraph-mindmap/80529753 Deepakniit14@slideshare.net(Deepakniit14) CISSP INFORGRAPH MINDMAP Deepakniit14 CISSP: Certified Information Systems Security Professional. Most prestigious vendor-neutral certification. The mind maps are in sync with CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide ,7th Edition by James M. Stewart, Mike Chapple, Darril Gibson <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cisspinfofraphmindmap-171006125014-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> CISSP: Certified Information Systems Security Professional. Most prestigious vendor-neutral certification. The mind maps are in sync with CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide ,7th Edition by James M. Stewart, Mike Chapple, Darril Gibson
CISSP INFORGRAPH MINDMAP from Deepak Kumar (D3)
]]>
2152 3 https://cdn.slidesharecdn.com/ss_thumbnails/cisspinfofraphmindmap-171006125014-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Forensics & Challenges /slideshow/cyber-forensics-challenges/80227242 cyberforensicschallenges-170927181730
Introductory of Cyber Forensics, Standards and Challenges. About chain of custody and forensics trends. ]]>

Introductory of Cyber Forensics, Standards and Challenges. About chain of custody and forensics trends. ]]>
Wed, 27 Sep 2017 18:17:29 GMT /slideshow/cyber-forensics-challenges/80227242 Deepakniit14@slideshare.net(Deepakniit14) Cyber Forensics & Challenges Deepakniit14 Introductory of Cyber Forensics, Standards and Challenges. About chain of custody and forensics trends. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberforensicschallenges-170927181730-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Introductory of Cyber Forensics, Standards and Challenges. About chain of custody and forensics trends.
Cyber Forensics & Challenges from Deepak Kumar (D3)
]]>
4628 5 https://cdn.slidesharecdn.com/ss_thumbnails/cyberforensicschallenges-170927181730-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Crime Types & Tips /slideshow/cyber-crime-types-tips/79317195 cybercrimetypestips-170831101508
Cybercrime is a type of crime done by the help of computer and internet. Brief about types of cyber crimes, Case studies and Cyber hygiene from cyber threats. Be smart & creative in cyber world. #D3]]>

Cybercrime is a type of crime done by the help of computer and internet. Brief about types of cyber crimes, Case studies and Cyber hygiene from cyber threats. Be smart & creative in cyber world. #D3]]>
Thu, 31 Aug 2017 10:15:08 GMT /slideshow/cyber-crime-types-tips/79317195 Deepakniit14@slideshare.net(Deepakniit14) Cyber Crime Types & Tips Deepakniit14 Cybercrime is a type of crime done by the help of computer and internet. Brief about types of cyber crimes, Case studies and Cyber hygiene from cyber threats. Be smart & creative in cyber world. #D3 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybercrimetypestips-170831101508-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cybercrime is a type of crime done by the help of computer and internet. Brief about types of cyber crimes, Case studies and Cyber hygiene from cyber threats. Be smart &amp; creative in cyber world. #D3
Cyber Crime Types & Tips from Deepak Kumar (D3)
]]>
3964 7 https://cdn.slidesharecdn.com/ss_thumbnails/cybercrimetypestips-170831101508-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security India & Cyber Crime /slideshow/cyber-security-india-cyber-crime/79290977 cybersecurityindiacybercrime-170830151534
Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Emphasizing on Cyber Crime and Threats, Cyberwar Terrorism and Countermeasures. Be smart & Creative in Cyber World. #D3]]>

Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Emphasizing on Cyber Crime and Threats, Cyberwar Terrorism and Countermeasures. Be smart & Creative in Cyber World. #D3]]>
Wed, 30 Aug 2017 15:15:33 GMT /slideshow/cyber-security-india-cyber-crime/79290977 Deepakniit14@slideshare.net(Deepakniit14) Cyber Security India & Cyber Crime Deepakniit14 Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Emphasizing on Cyber Crime and Threats, Cyberwar Terrorism and Countermeasures. Be smart & Creative in Cyber World. #D3 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityindiacybercrime-170830151534-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Emphasizing on Cyber Crime and Threats, Cyberwar Terrorism and Countermeasures. Be smart &amp; Creative in Cyber World. #D3
Cyber Security India & Cyber Crime from Deepak Kumar (D3)
]]>
2359 2 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityindiacybercrime-170830151534-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
21st Century Cyber Forensics /Deepakniit14/21st-century-cyber-forensics d3-170815160616
Overview of Cyber forensics scenario's and challenges. For more: d3pakblog.wordpress.com]]>

Overview of Cyber forensics scenario's and challenges. For more: d3pakblog.wordpress.com]]>
Tue, 15 Aug 2017 16:06:15 GMT /Deepakniit14/21st-century-cyber-forensics Deepakniit14@slideshare.net(Deepakniit14) 21st Century Cyber Forensics Deepakniit14 Overview of Cyber forensics scenario's and challenges. For more: d3pakblog.wordpress.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/d3-170815160616-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Overview of Cyber forensics scenario&#39;s and challenges. For more: d3pakblog.wordpress.com
21st Century Cyber Forensics from Deepak Kumar (D3)
]]>
427 2 https://cdn.slidesharecdn.com/ss_thumbnails/d3-170815160616-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Phishing /slideshow/phishing-67779954/67779954 78b07492-42e4-441c-a3d7-0b39d57b051c-161028101957
]]>

]]>
Fri, 28 Oct 2016 10:19:56 GMT /slideshow/phishing-67779954/67779954 Deepakniit14@slideshare.net(Deepakniit14) Phishing Deepakniit14 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/78b07492-42e4-441c-a3d7-0b39d57b051c-161028101957-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Phishing from Deepak Kumar (D3)
]]>
1433 2 https://cdn.slidesharecdn.com/ss_thumbnails/78b07492-42e4-441c-a3d7-0b39d57b051c-161028101957-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IoT /slideshow/iot-52790055/52790055 iot-150915083744-lva1-app6891
Internet of things or Identity of everything IoT, smart devices , impact, threat, Internet of things poses opportunities for cyber-crime, some IoT devices, IoT risks, protection and defense recommendations, incidents..]]>

Internet of things or Identity of everything IoT, smart devices , impact, threat, Internet of things poses opportunities for cyber-crime, some IoT devices, IoT risks, protection and defense recommendations, incidents..]]>
Tue, 15 Sep 2015 08:37:44 GMT /slideshow/iot-52790055/52790055 Deepakniit14@slideshare.net(Deepakniit14) IoT Deepakniit14 Internet of things or Identity of everything IoT, smart devices , impact, threat, Internet of things poses opportunities for cyber-crime, some IoT devices, IoT risks, protection and defense recommendations, incidents.. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iot-150915083744-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Internet of things or Identity of everything IoT, smart devices , impact, threat, Internet of things poses opportunities for cyber-crime, some IoT devices, IoT risks, protection and defense recommendations, incidents..
IoT from Deepak Kumar (D3)
]]>
614 8 https://cdn.slidesharecdn.com/ss_thumbnails/iot-150915083744-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
C3 Cyber /slideshow/c3-11-sep/52738592 c311sep-150914050449-lva1-app6892
Intro of C3 : Cyber-Crime CyberWar Cyber-Terrorism Agenda C3 : Cyber-crime , Cyber-war , Cyber-terrorism , SOME CYBER-ATTACKS COUNTRY WISE , SOME FACTS , TERMINOLOGIES ,EMERGING THREATS, WHERE TO START ,INFORMATION OPERATION TERMINOLOGY ,MOTIVE IN CYBER ERA ,UNDERGROUND CYBER MARKET ,CYBER-CRIME MARKET PRICES , CRITICAL INFORMATION INFRASTRUCTURE , CYBERWAR , CYBER CRIME , CYBER- CRIME : GOAL, PROFILE & TARGETS , SOME BIGGEST DATA BREACHES , CYBER ESPIONAGE ,CYBER-TERRORISM]]>

Intro of C3 : Cyber-Crime CyberWar Cyber-Terrorism Agenda C3 : Cyber-crime , Cyber-war , Cyber-terrorism , SOME CYBER-ATTACKS COUNTRY WISE , SOME FACTS , TERMINOLOGIES ,EMERGING THREATS, WHERE TO START ,INFORMATION OPERATION TERMINOLOGY ,MOTIVE IN CYBER ERA ,UNDERGROUND CYBER MARKET ,CYBER-CRIME MARKET PRICES , CRITICAL INFORMATION INFRASTRUCTURE , CYBERWAR , CYBER CRIME , CYBER- CRIME : GOAL, PROFILE & TARGETS , SOME BIGGEST DATA BREACHES , CYBER ESPIONAGE ,CYBER-TERRORISM]]>
Mon, 14 Sep 2015 05:04:49 GMT /slideshow/c3-11-sep/52738592 Deepakniit14@slideshare.net(Deepakniit14) C3 Cyber Deepakniit14 Intro of C3 : Cyber-Crime CyberWar Cyber-Terrorism Agenda C3 : Cyber-crime , Cyber-war , Cyber-terrorism , SOME CYBER-ATTACKS COUNTRY WISE , SOME FACTS , TERMINOLOGIES ,EMERGING THREATS, WHERE TO START ,INFORMATION OPERATION TERMINOLOGY ,MOTIVE IN CYBER ERA ,UNDERGROUND CYBER MARKET ,CYBER-CRIME MARKET PRICES , CRITICAL INFORMATION INFRASTRUCTURE , CYBERWAR , CYBER CRIME , CYBER- CRIME : GOAL, PROFILE & TARGETS , SOME BIGGEST DATA BREACHES , CYBER ESPIONAGE ,CYBER-TERRORISM <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/c311sep-150914050449-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Intro of C3 : Cyber-Crime CyberWar Cyber-Terrorism Agenda C3 : Cyber-crime , Cyber-war , Cyber-terrorism , SOME CYBER-ATTACKS COUNTRY WISE , SOME FACTS , TERMINOLOGIES ,EMERGING THREATS, WHERE TO START ,INFORMATION OPERATION TERMINOLOGY ,MOTIVE IN CYBER ERA ,UNDERGROUND CYBER MARKET ,CYBER-CRIME MARKET PRICES , CRITICAL INFORMATION INFRASTRUCTURE , CYBERWAR , CYBER CRIME , CYBER- CRIME : GOAL, PROFILE &amp; TARGETS , SOME BIGGEST DATA BREACHES , CYBER ESPIONAGE ,CYBER-TERRORISM
C3 Cyber from Deepak Kumar (D3)
]]>
7065 17 https://cdn.slidesharecdn.com/ss_thumbnails/c311sep-150914050449-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bitcoin /slideshow/bitcoin-52444685/52444685 bitcoin-150905070437-lva1-app6892
Bitcoin India: Its a peer-to-peer, electronic cash system. Bitcoin creation and transfer is based on an open source cryptographic protocol and is not managed by any central authority.]]>

Bitcoin India: Its a peer-to-peer, electronic cash system. Bitcoin creation and transfer is based on an open source cryptographic protocol and is not managed by any central authority.]]>
Sat, 05 Sep 2015 07:04:37 GMT /slideshow/bitcoin-52444685/52444685 Deepakniit14@slideshare.net(Deepakniit14) Bitcoin Deepakniit14 Bitcoin India: Its a peer-to-peer, electronic cash system. Bitcoin creation and transfer is based on an open source cryptographic protocol and is not managed by any central authority. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bitcoin-150905070437-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Bitcoin India: Its a peer-to-peer, electronic cash system. Bitcoin creation and transfer is based on an open source cryptographic protocol and is not managed by any central authority.
Bitcoin from Deepak Kumar (D3)
]]>
498 9 https://cdn.slidesharecdn.com/ss_thumbnails/bitcoin-150905070437-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ransomware /slideshow/ransomware-46071966/46071966 uyjdeobsasrhpf3wiihf-signature-fae3621e3895e621957a65f1d93464547c8dbed0e17c230d0c149d7be6d61d8e-poli-150320033921-conversion-gate01
Ransomware type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed. It deliberately locks you out of your computer or your files, and then demands money to let you back in. Basic information how, why, where etc.]]>

Ransomware type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed. It deliberately locks you out of your computer or your files, and then demands money to let you back in. Basic information how, why, where etc.]]>
Fri, 20 Mar 2015 03:39:21 GMT /slideshow/ransomware-46071966/46071966 Deepakniit14@slideshare.net(Deepakniit14) Ransomware Deepakniit14 Ransomware type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed. It deliberately locks you out of your computer or your files, and then demands money to let you back in. Basic information how, why, where etc. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/uyjdeobsasrhpf3wiihf-signature-fae3621e3895e621957a65f1d93464547c8dbed0e17c230d0c149d7be6d61d8e-poli-150320033921-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ransomware type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed. It deliberately locks you out of your computer or your files, and then demands money to let you back in. Basic information how, why, where etc.
Ransomware from Deepak Kumar (D3)
]]>
1287 1 https://cdn.slidesharecdn.com/ss_thumbnails/uyjdeobsasrhpf3wiihf-signature-fae3621e3895e621957a65f1d93464547c8dbed0e17c230d0c149d7be6d61d8e-poli-150320033921-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Success Mantra /slideshow/success-mantra-44424712/44424712 vxdexxkqhkodmhavjxlp-signature-2eca1da6c968ed30e5a8098d1aebbeda0ddda4a0386501a1af9c30f9f360e83e-poli-150208235222-conversion-gate02
Success mantra : the good or bad outcome of an undertaking.]]>

Success mantra : the good or bad outcome of an undertaking.]]>
Sun, 08 Feb 2015 23:52:22 GMT /slideshow/success-mantra-44424712/44424712 Deepakniit14@slideshare.net(Deepakniit14) Success Mantra Deepakniit14 Success mantra : the good or bad outcome of an undertaking. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vxdexxkqhkodmhavjxlp-signature-2eca1da6c968ed30e5a8098d1aebbeda0ddda4a0386501a1af9c30f9f360e83e-poli-150208235222-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Success mantra : the good or bad outcome of an undertaking.
Success Mantra from Deepak Kumar (D3)
]]>
473 49 https://cdn.slidesharecdn.com/ss_thumbnails/vxdexxkqhkodmhavjxlp-signature-2eca1da6c968ed30e5a8098d1aebbeda0ddda4a0386501a1af9c30f9f360e83e-poli-150208235222-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Facebook Security Tips /slideshow/ss-44062682/44062682 tczzdpdhrykbe9u1vojp-signature-20ed09dae7ee74c793e5593173748f6e8caced3c3eadce701142853f37416c1f-poli-150130021748-conversion-gate01
Some security tips for Facebook users (specially girls and newbies) ~~~~~Be Creative and Smart in Cyber World~~~~ #D3]]>

Some security tips for Facebook users (specially girls and newbies) ~~~~~Be Creative and Smart in Cyber World~~~~ #D3]]>
Fri, 30 Jan 2015 02:17:48 GMT /slideshow/ss-44062682/44062682 Deepakniit14@slideshare.net(Deepakniit14) Facebook Security Tips Deepakniit14 Some security tips for Facebook users (specially girls and newbies) ~~~~~Be Creative and Smart in Cyber World~~~~ #D3 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tczzdpdhrykbe9u1vojp-signature-20ed09dae7ee74c793e5593173748f6e8caced3c3eadce701142853f37416c1f-poli-150130021748-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Some security tips for Facebook users (specially girls and newbies) ~~~~~Be Creative and Smart in Cyber World~~~~ #D3
Facebook Security Tips from Deepak Kumar (D3)
]]>
488 1 https://cdn.slidesharecdn.com/ss_thumbnails/tczzdpdhrykbe9u1vojp-signature-20ed09dae7ee74c793e5593173748f6e8caced3c3eadce701142853f37416c1f-poli-150130021748-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DDOS /slideshow/ddos-41692941/41692941 8azrjp9wte66upgugabp-signature-4822b90917469560caabfe2787b45c722b1e42e10a978e264cd57e64ad981fc0-poli-141118040102-conversion-gate01
(DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users]]>

(DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users]]>
Tue, 18 Nov 2014 04:01:01 GMT /slideshow/ddos-41692941/41692941 Deepakniit14@slideshare.net(Deepakniit14) DDOS Deepakniit14 (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/8azrjp9wte66upgugabp-signature-4822b90917469560caabfe2787b45c722b1e42e10a978e264cd57e64ad981fc0-poli-141118040102-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users
DDOS from Deepak Kumar (D3)
]]>
614 48 https://cdn.slidesharecdn.com/ss_thumbnails/8azrjp9wte66upgugabp-signature-4822b90917469560caabfe2787b45c722b1e42e10a978e264cd57e64ad981fc0-poli-141118040102-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Deepakniit14-48x48.jpg?cb=1702401535 d3pakblog.wordpress.com/ https://cdn.slidesharecdn.com/ss_thumbnails/darkwebforensics-210820223638-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/dark-web-forensics/250019800 Dark Web Forensics https://cdn.slidesharecdn.com/ss_thumbnails/cyberthreatintelfinal-201028164815-thumbnail.jpg?width=320&height=320&fit=bounds Deepakniit14/cyber-threat-intel-overview Cyber Threat Intel : O... https://cdn.slidesharecdn.com/ss_thumbnails/cyberofthings2-201017130107-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyber-of-things-20/238901678 Cyber of things 2.0