狠狠撸

狠狠撸Share a Scribd company logo
e-security
Y?ld?r?m TAM
WHAT WILL WE SEE IN THIS LECTURE
?Structure of Network System
?Threats and Type of Attacks
?Cryptography
?Analysis of e-security
E securty
OSI
(OPEN SYSTEMS INTERCONNECTION)
LAYERS
Physical
Media,Signal and Binary Transmission
Data Link
Mac and LLC (Phyiscal addressing)
Network
Path Determination and TCP/IP (Logical
addressing)
Transport
End to End Connections and Reliability
Session
Interhost Communication
Presentation
Data Representation
and Encryption
Application
Network Process to Application
E securty
TCP VS UDP
E securty
FINALLY PROCESS
FIREWALL
E securty
FIREWALL - HARDWARE
FIREWALL - SOFTWARE
TYPE OF ATTACKS
?Passive Attack
?Active Attack
?Insider Attack
?Close-in Attack
?Phishing Attack
?Buffer overflow
?Exploit attack
?Password attack
PASSIVE ATTACK
USER PCs
HACKER
UNWITTING
HOST
“ZOMBIE”
OTHER
NETWORK
COMPUTERS
VICTIM’S
SERVER
ACTIVE ATTACK (EXAMPLE: DOS ATTACK)
INSIDER ATTACK
CLOSE – IN – ATTACK (EXAMPLE :SOCIAL ENGINEERING ATTACK)
PHISHING ATTACK
BUFFER ATTACK
EXPLOID ATTACK
PASSWORD ATTACK (EXAMPLE:SQL INJECTION)
CRYPTOLOGY
WHAT IS THE CRYPTOLOGY?
?Cryptography
?Cryptanalysis
HISTORY OF CRYPTOLOGY
ENIGMA
BASIC ELEMENTS OF CRYPTOGRAPHY
WHAT PROVIDES CRYPTOGRAPHY?
?Confidentiality
?Message Integrity
?Authentication
?Non-repudiation
ALGORITHM OF CRYPTOLOGY
Known Symmetrical Algorithms
?Data Encryption Standard (DES)
?56 bit key
?Triple DES, DESX, GDES, RDES
?168 bit key
?RC2, RC4, RC5
?variable length up to 2048 bits
?IDEA - basis of PGP
?128 bit key
?Blowfish
?variable length up to 448 bits
CRYPTOGRAPHIC SERVICES ALLOW
?Digital Signatures
?Certificates (Digital Ids)
?Secure Channels
DIGITAL SIGNATURES
SECURE SOCKETS LAYER
TYPES OF MALWARE
root@root:~# Exploit
root@root:~# WORM
root@root:~# Rootkit
root@root:~# Trojan
root@root:~# Adware
root@root:~# Spyware
EXPLO?T
exp@root:~# Vulnerability
exp@root :~# System
exp@root :~# Unauthorized
exp@root :~# Spread Out Spam
exp@root :~# Java,Html,Js
EXPLO?T
WORM
wrm@root:~# Auto Clone
wrm@root :~# Spread
wrm@root :~# Not need attach
wrm@root :~# Consume
wrm@root :~# Any action user
wrm@root :~# Backdoor P2P
WORM
WORM
#STORM
wrm@root :~# 2007
wrm@root :~# attach mail
wrm@root :~# wincom32.exe
wrm@root :~# services.exe
wrm@root :~# P2P
#CONF?CKER
wrm@root :~# 2008
wrm@root :~# Windows
wrm@root :~# Buffer
wrm@root :~# 9 billion
wrm@root :~# Services
#CODERED
wrm@root :~# Servers
wrm@root :~# 2001
wrm@root :~# IIS
wrm@root :~# 359,000
wrm@root :~# Whitehouse
ROOTK?T
root@root:~# System -Hide
root@root:~# Response
root@root:~# Not -alone
root@root:~# Remote
root@root:~# Crack -Keygen
root@root:~# Use you -Pri
ROOTK?T
#SONY CD
root@root:~# 2005
root@root:~# copy -protect
root@root:~# Access
root@root:~# ‘$sys$’
root@root:~# Lawsuit
#Greek Wiretapping
root@root:~# 2004
root@root:~# Govern tapping
root@root:~# Ericsson
root@root:~# Tel Central
root@root:~# deActive log
SPAM
wrm@root:~# junk email
wrm@root :~# Phishing
wrm@root :~# script or.exe
wrm@root :~# Botnets
wrm@root :~# Collect
wrm@root :~# Pharmacy %81
TROJAN
trj@root:~# Backdoor-exploit-rk
trj@root :~# left data
trj@root :~# Unauthorized
trj@root :~# carries out
ADWARE
adw@root :~# Freeware
adw@root :~# keylogger
adw@root :~# Pop -up
adw@root :~# Tracks
adw@root :~# Related
adw@root :~# Consume
SPYWARE
spy@root :~# system monitors,
trojans, adware, and tracking
cookies
spy@root :~# not knowledge
spy@root :~# not spread-itself
spy@root :~# ie ,Windows
spy@root :~# usage -commercial
spy@root :~# identity theft
SPYWARE
spy@root :~# -CoolWebSearch
spy@root :~# -huntbar
spy@root :~# -movieland
spy@root :~# -kazaa
E securty
?THREAT INTELLIGENCE
?SECURITY CAPABILITIES
?GEOPOLITICAL AND
INDUSTRY
?USER AND CORPORATE
E securty
E securty
E securty
E securty
E securty
E securty
E securty
E securty
E securty
E securty
Ad

More Related Content

Viewers also liked (17)

Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threats
rashidalkamdah
?
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
Mahipesh Satija
?
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
?
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
Pavithra renu
?
Network and network security
Network and network securityNetwork and network security
Network and network security
Ruchi Gupta
?
Nymble: Blocking System
Nymble: Blocking SystemNymble: Blocking System
Nymble: Blocking System
Manzeer Fasaludeen
?
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
Nikhil l
?
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
Khoa Nguyen
?
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
Sindhu VL
?
Pgp smime
Pgp smimePgp smime
Pgp smime
Tania Agni
?
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um
?
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal
?
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
Rahulprasad Yadav
?
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
- Mark - Fullbright
?
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
?
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
koolkampus
?
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
Edgar Mwangangi
?
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threats
rashidalkamdah
?
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
Mahipesh Satija
?
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
?
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
Pavithra renu
?
Network and network security
Network and network securityNetwork and network security
Network and network security
Ruchi Gupta
?
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
Nikhil l
?
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
Khoa Nguyen
?
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
Sindhu VL
?
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um
?
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal
?
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
Rahulprasad Yadav
?
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
?
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
koolkampus
?
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
Edgar Mwangangi
?

Similar to E securty (20)

DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
Felipe Prado
?
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
?
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
?
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
CODE BLUE
?
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
Mehdi Poustchi Amin
?
Hacking
HackingHacking
Hacking
SUNY Oneonta
?
Internets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on ServersInternets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on Servers
IRJET Journal
?
Web TEchnology hackers Encryption VPN Firewall Unit 5.doc
Web TEchnology hackers Encryption VPN Firewall Unit 5.docWeb TEchnology hackers Encryption VPN Firewall Unit 5.doc
Web TEchnology hackers Encryption VPN Firewall Unit 5.doc
uthayashangar1
?
Proxy servers-firewalls
Proxy servers-firewallsProxy servers-firewalls
Proxy servers-firewalls
Ali Asgar Patanwala
?
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Akiumi Hasegawa
?
FMS Administration Seminar
FMS Administration SeminarFMS Administration Seminar
FMS Administration Seminar
Yoss Cohen
?
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
Paul Melson
?
Lecture7-8-Network Protocls attack in cyber.ppt
Lecture7-8-Network Protocls attack in cyber.pptLecture7-8-Network Protocls attack in cyber.ppt
Lecture7-8-Network Protocls attack in cyber.ppt
MuhammadSaleemKhan26
?
Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8
guest441c58b71
?
Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia
?
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
eiti panchkula
?
Layer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And HardeningLayer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And Hardening
CA API Management
?
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
SecurityTube.Net
?
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
Greater Noida Institute Of Technology
?
Hacking and Computer Forensics
Hacking and Computer ForensicsHacking and Computer Forensics
Hacking and Computer Forensics
Kristian Arjianto
?
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
Felipe Prado
?
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
?
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
?
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
CODE BLUE
?
Internets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on ServersInternets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on Servers
IRJET Journal
?
Web TEchnology hackers Encryption VPN Firewall Unit 5.doc
Web TEchnology hackers Encryption VPN Firewall Unit 5.docWeb TEchnology hackers Encryption VPN Firewall Unit 5.doc
Web TEchnology hackers Encryption VPN Firewall Unit 5.doc
uthayashangar1
?
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Akiumi Hasegawa
?
FMS Administration Seminar
FMS Administration SeminarFMS Administration Seminar
FMS Administration Seminar
Yoss Cohen
?
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
Paul Melson
?
Lecture7-8-Network Protocls attack in cyber.ppt
Lecture7-8-Network Protocls attack in cyber.pptLecture7-8-Network Protocls attack in cyber.ppt
Lecture7-8-Network Protocls attack in cyber.ppt
MuhammadSaleemKhan26
?
Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8
guest441c58b71
?
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
eiti panchkula
?
Layer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And HardeningLayer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And Hardening
CA API Management
?
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
SecurityTube.Net
?
Ad

Recently uploaded (15)

Cloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptxCloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptx
marketing140789
?
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
werhkr1
?
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and MonitoringPresentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
mdaoudi
?
AG-FIRMA Ai Agent for Agriculture | RAG ..
AG-FIRMA Ai Agent for Agriculture  | RAG ..AG-FIRMA Ai Agent for Agriculture  | RAG ..
AG-FIRMA Ai Agent for Agriculture | RAG ..
Anass Nabil
?
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
emestica1
?
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
?
美国文凭明尼苏达大学莫里斯分校毕业证范本鲍惭惭学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本鲍惭惭学位证书美国文凭明尼苏达大学莫里斯分校毕业证范本鲍惭惭学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本鲍惭惭学位证书
Taqyea
?
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdfGiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
Giacomo Vacca
?
introduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.pptintroduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.ppt
SherifElGohary7
?
Breaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdfBreaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdf
Internet Bundle Now
?
IoT PPT introduction to internet of things
IoT PPT introduction to internet of thingsIoT PPT introduction to internet of things
IoT PPT introduction to internet of things
VaishnaviPatil3995
?
学生卡英国搁颁础毕业证皇家艺术学院电子毕业证学历证书
学生卡英国搁颁础毕业证皇家艺术学院电子毕业证学历证书学生卡英国搁颁础毕业证皇家艺术学院电子毕业证学历证书
学生卡英国搁颁础毕业证皇家艺术学院电子毕业证学历证书
Taqyea
?
Paper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdfPaper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdf
Steven McGee
?
ProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptxProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptx
OlenaKotovska
?
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness GuideThe Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
russellpeter1995
?
Cloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptxCloud-to-cloud Migration presentation.pptx
Cloud-to-cloud Migration presentation.pptx
marketing140789
?
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
DEF CON 25 - Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the...
werhkr1
?
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and MonitoringPresentation Mehdi Monitorama 2022 Cancer and Monitoring
Presentation Mehdi Monitorama 2022 Cancer and Monitoring
mdaoudi
?
AG-FIRMA Ai Agent for Agriculture | RAG ..
AG-FIRMA Ai Agent for Agriculture  | RAG ..AG-FIRMA Ai Agent for Agriculture  | RAG ..
AG-FIRMA Ai Agent for Agriculture | RAG ..
Anass Nabil
?
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
CompTIA-Security-Study-Guide-with-over-500-Practice-Test-Questions-Exam-SY0-7...
emestica1
?
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
?
美国文凭明尼苏达大学莫里斯分校毕业证范本鲍惭惭学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本鲍惭惭学位证书美国文凭明尼苏达大学莫里斯分校毕业证范本鲍惭惭学位证书
美国文凭明尼苏达大学莫里斯分校毕业证范本鲍惭惭学位证书
Taqyea
?
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdfGiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
GiacomoVacca - WebRTC - troubleshooting media negotiation.pdf
Giacomo Vacca
?
introduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.pptintroduction to html and cssIntroHTML.ppt
introduction to html and cssIntroHTML.ppt
SherifElGohary7
?
Breaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdfBreaking Down the Latest Spectrum Internet Plans.pdf
Breaking Down the Latest Spectrum Internet Plans.pdf
Internet Bundle Now
?
IoT PPT introduction to internet of things
IoT PPT introduction to internet of thingsIoT PPT introduction to internet of things
IoT PPT introduction to internet of things
VaishnaviPatil3995
?
学生卡英国搁颁础毕业证皇家艺术学院电子毕业证学历证书
学生卡英国搁颁础毕业证皇家艺术学院电子毕业证学历证书学生卡英国搁颁础毕业证皇家艺术学院电子毕业证学历证书
学生卡英国搁颁础毕业证皇家艺术学院电子毕业证学历证书
Taqyea
?
Paper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdfPaper: World Game (s) Great Redesign.pdf
Paper: World Game (s) Great Redesign.pdf
Steven McGee
?
ProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptxProjectArtificial Intelligence Good or Evil.pptx
ProjectArtificial Intelligence Good or Evil.pptx
OlenaKotovska
?
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness GuideThe Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
The Hidden Risks of Hiring Hackers to Change Grades: An Awareness Guide
russellpeter1995
?
Ad

E securty