You are on page 1of 6

INTRODUCTION TO

CYBER SECURITY
JOHNNY WAS FOLLOWING HIS DAILY ROUTINE

JOHNNY
HACKER

HACKER WAS UPTO SOMETHING


HACKER

JOHHNY

THE HACKER TRY TO STEAL INFORMATION OF THE COMPANY


HACKER

HE TRANSFER FILE INTO HIS OWN COMPUTER


WHAT CAN HAPPEN DUE TO THIS ?

HACKER INDUSTRIAL ESPIONAGE

ASKING COMPANY FOR RANSOM

SELLING THE INFORMATION TO CRIMINALS

You might also like