Слайд 3Objectives
What is Cyber
What is Cyber warfare
Types of Cyber Warfare
How its done
Uses

Слайд 4What is Cyber
It is a common term used computer interaction.
Cyber History
Cyber use

Слайд 6 What is Cyber warfare
It is politically motivated hacking to gain control over systems

and to spy.
Слайд 7Types of cyber warfare
1) Take control
2) Out of control

Слайд 8How it is done!
Interference
Construct code
Pick the required point
Reshape the code
Conquer

Слайд 9Interference
Different ways are adopted most common is through Electromagnetic waves.

Слайд 11Find the required point of code
Chris Domas 30 hours work:
For 15hr it

was just a code image.
Слайд 13Reshape the code
Modify according to performing task for device.

Слайд 15Uses
+ Positive uses
- Negative use

Слайд 16Conclusion
This is a beginning of a new cyber era. What your mode.
