Cyber Security
Cyber Security
Fonts To view this template correctly in PowerPoint, download and install the fonts we
used
Used and alternative An assortment of graphic resources that are suitable for use in this
resources presentation
Thanks slide You must keep it so that proper credits for our design are given
Infographic resources These can be used in the template, and their size and color can be edited
Customizable icons They are sorted by theme so you can use them in all kinds of presentations
01 02
Packet
sniffer
interceptin
g data
Cyber Attacks
d) This occurs when a malicious code redirects a user’s browser to fake websites
without the knowledge of the user. ……………………..
……………………..
……………………..
4) Multiple Choice
b) Fingerprint, retina, face, and voice recognition are use for user
identification.
A. Proxy Server B. Biometrics C.
Authenticity
c) enhances security by requiring two authentication methods to confirm a
user's identity.