SlideShare une entreprise Scribd logo
1  sur  56
INTRODUCTION
Cyberethics is the philosophic study of ethics pertaining to computers,
encompassing user behavior and what computers are programmed to do,
and how this affects individuals and society. For years, various governments
have enacted regulations while organizations have defined policies about
TIPS TO SAFE BROWSING
1. Install and use antivirus software.
2. Use a firewall.
3. Strong passwords are your friend.
4. Update your security software.
5. Be wary of clicking links in email or instant messages.
6. In fact, be wary of clicking links, period.
7. Bookmark important sites.
IDENTITY PROTECTION WHILE USING INTERNET
WAYS ,WEBSITES TRACK YOU
WAYS ,WEBSITES TRACK YOU
IP Addresses
The most basic way of identifying you is by your IP
address. Your IP address identifies you on the
Internet. These days, it’s likely that your computer
shares an IP address with the other networked
devices in your house or office. From your IP
address, a website can determine your rough
geographical location – not down to street level, but
generally your city or area. If you’ve ever seen a
spammy ad that tries to look legitimate by
mentioning your location, this is how the ad does it.
WAYS ,WEBSITES TRACK YOU
HTTP Referrer
When you click a link, your browser loads the web page you clicked and tells the
website where you came from. For example, if you clicked a link to an outside
website on How-To Geek, the outside website would see the address of the
How-To Geek article you came from. This information is contained in the
HTTP referrer header.
The HTTP referrer is also sent when loading content on a web page. For
example, if a web page includes an ad or tracking script, your browsers tells
the advertiser or tracking network what page you’re viewing.
“Web bugs,” which are tiny, one-by-one pixel, invisible images, take advantage of
the HTTP referrer to track you without appearing on a web page. They’re also
used to track emails you open, assuming your email client loads images.
WAYS ,WEBSITES TRACK YOU
Cookies & Tracking Scripts
Cookies are small pieces of information websites
can store in your browser. They have plenty of
legitimate uses – for example, when you sign
into your online-banking website, a cookie
remembers your login information. When you
change a setting on a website, a cookie stores
that setting so it can persist across page loads
and sessions.
WAYS ,WEBSITES TRACK YOU
Super Cookies
You can clear your browser’s cookies — in fact, we’ve got a guide to clearing
your browser’s cookies. However, clearing your cookies isn’t necessarily a
solution – “super cookies” are increasingly common. One such super cookie
is evercookie. Super cookie solutions like evercookie store cookie data in
multiple places – for example, in Flash cookies, Silverlight storage, your
browsing history, and HTML5 local storage. One particularly clever tracking
method is assigning a unique color value to a few pixels every time a new
user visits a website. The different colors are stored in each user’s browser
cache and can be loaded back – the color value of the pixels is a unique
identifier that identifies the user.
When a website notices that you’ve deleted part of the super cookie, the
information is repopulated from the other location. For example, you might
clear your browser cookies and not your Flash cookies, so the website will
copy the value of the Flash cookie to your browser cookies. Super cookies
are very resilient.
WAYS ,WEBSITES TRACK YOU
User Agent
Your browser also sends a user agent every time you
connect to a website. This tells websites your
browser and operating system, providing another
piece of data that can be stored and used to target
ads. For more information about user agents, check
out our explanation of what a browser user agent
is.
WAYS ,WEBSITES TRACK YOU
Browser Fingerprinting
Browsers are actually pretty unique. Websites
can determine your operating system,
browser version, installed plug-ins and their
versions, your operating system’s screen
resolution, your installed fonts, your time
zone, and other information. If you’ve
disabled cookies entirely, that’s another
piece of data that makes your browser
unique.
WAYS ,WEBSITES TRACK YOU
There are surely other ways that
websites can track you. There’s big
money in it, and people are
brainstorming new ways to track
every day – just see evercookie
above for evidence of that.
HOW TYPES OF COMPUTER COOKIES AFFECT
YOUR ONLINE PRIVACY
First-party cookies are created by the host domain – the
domain the user is visiting. These types of cookies are
generally considered good; they help provide a better
user experience and keep the session open. This
basically means the browser is able to remember key
pieces of information, such as which items you add to
shopping carts, your username and passwords, and
language preferences.
First-party cookies are stored by the domain (website)
you are visiting directly. ...
HOW TYPES OF COMPUTER COOKIES AFFECT
YOUR ONLINE PRIVACY
Third-Party Cookies
Third-party cookies, also referred to as tracking cookies, collect
data based on your online behavior. When you visit a
website, third-party cookies collect various types of data that
are then passed on or sold to advertisers by the website that
created the cookie. Tracking your interests, location, age, and
search trends, these cookies collect information so that
marketers can provide you with custom
advertisements. These are the ads that appear on websites
you visit and display content relevant to your interests.
By tracking your habits and providing targeted ads, third-party
cookies serve a useful purpose for marketers but can seem
pesky and intrusive to internet users. That’s why you have
the option to block them.
PRIVATE BROWSING OVERVIEW
As day by day the use of internet browsing
has been increasing, people are getting
aware about their privacy and protecting
personal information. No one wants to
disclose what sites they are browsing
and the local data associated with it,
which can be used to retrieve personal
sensitive information.
PRIVATE BROWSING
Private Browsing:
Private Browsing is a concept of disabling the browser’s history, removing
cookies and not storing the web cache.
Private Browsing doesn’t make you anonymous as your Internet Service Provider
(ISP) will still be able to track you. Also, it is a common myth that it will protect
user from keyloggers or spywares, but it will not.
3 TIPS FOR ANONYMOUS BROWSING
1. Log out from search engines and their
tools
You might not be aware of it, but every time
you log into Gmail or Google’s other free
online tools, your searches are monitored,
and a profile is built specifically for you. This
Google the opportunity to target ads directly
related to your browsing experiences.
2. Use your browser’s privacy mode
All major internet browsers feature optional privacy
modes. These restrict your browser from saving
your web history in its cache while
disabling tracking cookies. Although this is a minor
improvement, your Internet Service Provider, or
ISP, along with governments, can still track your
online activity – to be more specific, every single
website you’re visiting.
3. Use a VPN to hide your IP address and online
presence
When using a VPN, you benefit from a range of
privacy benefits. You can change IP address, route
your Internet activity through a remote third-party
server, conceal your search activity, and make
your traffic completely anonymous so hackers and
governments who’d like to snoop into your online
activities can’t know your identity
4)Proxy
Using a web Proxy server allows you to
access content that may be blocked or
restricted by local governments. You can
use one to gain access to these websites
and content. It also allows you to surf the
web more privately meaning what
your browsing (in that tab only) cannot
be tracked
PRACTICES TO ENSURE CONFIDENTIALITY OF
INFORMATION
Don't leave sensitive information lying around. Documents like credit card
statements and billing invoices, even if they redact some information, can still
be used to obtain sensitive data via social engineering.
Shred documents in a secure way. When you no longer need a document with
confidential information on it, don't throw it away. Shred it. Keep shredded
materials locked up and hire a company to securely transport them away or
use a cross shredder to make sure they cannot be reconstructed.
Use anti-virus software. Installing an anti-virus and an anti-malware solution
can prevent your computer from becoming infected and from infecting other
computers on your network.
Install a firewall. An effective firewall is a staple of business Internet security. It
prevents intrusions into your company's network and, in some cases, can
also stop a malware-infected machine from pushing data out.
Password-protect important files and systems. Any files or systems
containing sensitive information should be password protected. If possible,
each user should have his or her own username and password so if a breach
does occur, your company can pinpoint the source of the breach.
Don't reuse passwords. If a hacker is able to obtain one password, the odds are
good they'll try to use the same password to access other sensitive areas of
your company's infrastructure. Use different passwords for all files and
systems.
Don't email confidential material. Most email systems are not secure. If you
CYBER CRIME
Cybercrime, or computer-oriented
crime, is a crime that involves a
computer and a network. The
computer may have been used in
the commission of a crime, or it
may be the target.
CYBER TROLLS
In Internet slang, a troll is a person
who starts quarrels or upsets
people on the Internet to distract
and sow discord by posting
inflammatory and digressive,
extraneous, or off-topic messages
in an
CYBER BULLYING
CYBER BULLYING
Cyberbullying or cyberharassment is a
form of bullying or harassment using
electronic means. Cyberbullying and
cyberharassment are also known as
online bullying. It has become
increasingly common, especially
among teenagers.
CYBER STALKING
CYBER STALKING
Cyberstalking is the use of the
Internet or other electronic means
to stalk or harass an individual,
group, or organization. It may
include false accusations,
defamation, slander and
The laws for cyber crime protects
citizens from dispensing sensitive
information to a stranger online. Ever
since the introduction to cyber laws
in India happened, IT Act 2000 was
enacted and amended in 2008
covering different types
of crimes under cyber law in India
If you want to report something other
than Cybercrime cases or in case of
an emergency please contact your
local police by dialing 100. Complaints
reported on this portal are dealt by
respective police authorities of States/
UTs based on the information in the
complaints provided by the
complainants.
COMMON SOCIAL NETWORK
COMMON SOCIAL NETWORK
Social Networking App Monthly Active Users
WhatsApp (owned
by Facebook)
1,500,000,000
Messenger (owned
by Facebook)
1,300,000,000
WeChat 989,000,000
Instagram (owned
by Facebook)
800,000,000
op Social Networking Apps
Twitter is an online news and social networking site where
people communicate in short messages called tweets.
Tweeting is posting short messages for anyone who follows
you on Twitter, with the hope that your messages are useful
and interesting to someone in your audience
280 characters
The most common length of a tweet back
when Twitter only allowed
140 characters was 34 characters. Now
that the limit is 280 characters, the most
common length of a tweet is
33 characters. Historically, only 9%
of tweets hit Twitter's 140-character
limit, now it's 1%.
LinkedIn is an American business and
employment-oriented service that operates
via websites and mobile apps. Founded on
December 28, 2002, and launched on May
5, 2003, it is mainly used for professional
networking, including employers posting
jobs and job seekers posting their CVs.
Instagram is a social media app that
allows users to share photos and
videos from their lives, add captions,
edit filters, tweak settings, engage with
others, explore and creep, and so, so
much more — you just have to know
what you're doing so you don't get
overwhelmed!
APPROPRIATE USAGE OF SOCIAL NETWORKS
Here are our top 10 tips to stay safe on social media:
Use a strong password. The longer it is, the more secure it will be.
Use a different password for each of your social media accounts.
Set up your security answers. This option is available for most social media
sites.
If you have social media apps on your phone, be sure to password protect your
device.
Be selective with friend requests. If you don’t know the person, don’t accept their
request. It could be a fake account.
Click links with caution. Social media accounts are regularly hacked. Look out
for language or content that does not sound like something your friend would
post.
Be careful about what you share. Don’t reveal sensitive personal information ie:
home address, financial information, phone number. The more you post the
easier it is to have your identity stolen.
Become familiar with the privacy policies of the social media channels you use
and customize your privacy settings to control who sees what.
Protect your computer by installing antivirus software to safeguard. Also ensure
that your browser, operating system, and software are kept up to date.
DIGITAL FOOTPRINT
DIGITAL FOOTPRINTS
A digital footprint is a trail of data
you create while using the
Internet. It includes the websites
you visit, emails you send, and
information you submit to online
services. A "passive digital
footprint" is a data trail you
unintentionally leave online
DIGITAL FOOTPRINTS
SOCIAL MEDIA RULES
THANK YOU

Contenu connexe

Tendances

Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
shannonmf
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 

Tendances (20)

An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
WWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINEWWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINE
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Internet ppt
Internet  ppt Internet  ppt
Internet ppt
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer Application
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
First step to internet
First step to internet First step to internet
First step to internet
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
 
advantages and disadvantages of using internet
advantages and disadvantages of using internetadvantages and disadvantages of using internet
advantages and disadvantages of using internet
 
World wide web An Introduction
World wide web An IntroductionWorld wide web An Introduction
World wide web An Introduction
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
The internet
The internetThe internet
The internet
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Internet
InternetInternet
Internet
 
History of internet
History of internetHistory of internet
History of internet
 

Similaire à Cyber ethics cbse class xi

online spying tools
online spying toolsonline spying tools
online spying tools
Deepa Jacob
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
lilyanariz
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos Beretas
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business
J_waut14
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
sliders12
 

Similaire à Cyber ethics cbse class xi (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 
Do not track me
Do not track meDo not track me
Do not track me
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet Cookies
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
 
GDPR Cookies Policy
GDPR Cookies PolicyGDPR Cookies Policy
GDPR Cookies Policy
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Cookie management
Cookie managementCookie management
Cookie management
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
Cookies
CookiesCookies
Cookies
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies Tracking
 

Plus de Archana Dwivedi

Plus de Archana Dwivedi (20)

Ix ch 4 operating system types
Ix ch 4 operating system typesIx ch 4 operating system types
Ix ch 4 operating system types
 
Ix ch-4-operating-system ludus ppt
Ix ch-4-operating-system ludus pptIx ch-4-operating-system ludus ppt
Ix ch-4-operating-system ludus ppt
 
Ix calc ii charts
Ix calc ii chartsIx calc ii charts
Ix calc ii charts
 
Ajanta caves heritage walk
Ajanta caves heritage walkAjanta caves heritage walk
Ajanta caves heritage walk
 
Ahmedabad heritage walk
Ahmedabad  heritage walkAhmedabad  heritage walk
Ahmedabad heritage walk
 
Jaipur heritage walk
Jaipur  heritage walkJaipur  heritage walk
Jaipur heritage walk
 
Critical Thinking
Critical ThinkingCritical Thinking
Critical Thinking
 
Critical Thinking
Critical ThinkingCritical Thinking
Critical Thinking
 
Critical Thinking
Critical ThinkingCritical Thinking
Critical Thinking
 
Critical Thinking
Critical ThinkingCritical Thinking
Critical Thinking
 
Career Updates
Career Updates Career Updates
Career Updates
 
Career guidence 2, biology
Career guidence 2, biologyCareer guidence 2, biology
Career guidence 2, biology
 
CBSE class X Computer Applications ch 1 INTERNET
CBSE class X Computer Applications ch 1 INTERNETCBSE class X Computer Applications ch 1 INTERNET
CBSE class X Computer Applications ch 1 INTERNET
 
Ix CBSE Computer Application Ch 2 Types of Hardware
Ix CBSE Computer Application Ch 2 Types of HardwareIx CBSE Computer Application Ch 2 Types of Hardware
Ix CBSE Computer Application Ch 2 Types of Hardware
 
Ix Computer Applications ch 1 Computer System
Ix Computer Applications ch 1 Computer SystemIx Computer Applications ch 1 Computer System
Ix Computer Applications ch 1 Computer System
 
Html Class X
Html Class XHtml Class X
Html Class X
 
Hobbies
HobbiesHobbies
Hobbies
 
Self improvement
Self improvementSelf improvement
Self improvement
 
No discrimination
No discriminationNo discrimination
No discrimination
 
Sportify
SportifySportify
Sportify
 

Dernier

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Dernier (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Cyber ethics cbse class xi

  • 1.
  • 2. INTRODUCTION Cyberethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society. For years, various governments have enacted regulations while organizations have defined policies about
  • 3.
  • 4. TIPS TO SAFE BROWSING 1. Install and use antivirus software. 2. Use a firewall. 3. Strong passwords are your friend. 4. Update your security software. 5. Be wary of clicking links in email or instant messages. 6. In fact, be wary of clicking links, period. 7. Bookmark important sites.
  • 5. IDENTITY PROTECTION WHILE USING INTERNET
  • 6.
  • 7.
  • 9. WAYS ,WEBSITES TRACK YOU IP Addresses The most basic way of identifying you is by your IP address. Your IP address identifies you on the Internet. These days, it’s likely that your computer shares an IP address with the other networked devices in your house or office. From your IP address, a website can determine your rough geographical location – not down to street level, but generally your city or area. If you’ve ever seen a spammy ad that tries to look legitimate by mentioning your location, this is how the ad does it.
  • 10. WAYS ,WEBSITES TRACK YOU HTTP Referrer When you click a link, your browser loads the web page you clicked and tells the website where you came from. For example, if you clicked a link to an outside website on How-To Geek, the outside website would see the address of the How-To Geek article you came from. This information is contained in the HTTP referrer header. The HTTP referrer is also sent when loading content on a web page. For example, if a web page includes an ad or tracking script, your browsers tells the advertiser or tracking network what page you’re viewing. “Web bugs,” which are tiny, one-by-one pixel, invisible images, take advantage of the HTTP referrer to track you without appearing on a web page. They’re also used to track emails you open, assuming your email client loads images.
  • 11. WAYS ,WEBSITES TRACK YOU Cookies & Tracking Scripts Cookies are small pieces of information websites can store in your browser. They have plenty of legitimate uses – for example, when you sign into your online-banking website, a cookie remembers your login information. When you change a setting on a website, a cookie stores that setting so it can persist across page loads and sessions.
  • 12. WAYS ,WEBSITES TRACK YOU Super Cookies You can clear your browser’s cookies — in fact, we’ve got a guide to clearing your browser’s cookies. However, clearing your cookies isn’t necessarily a solution – “super cookies” are increasingly common. One such super cookie is evercookie. Super cookie solutions like evercookie store cookie data in multiple places – for example, in Flash cookies, Silverlight storage, your browsing history, and HTML5 local storage. One particularly clever tracking method is assigning a unique color value to a few pixels every time a new user visits a website. The different colors are stored in each user’s browser cache and can be loaded back – the color value of the pixels is a unique identifier that identifies the user. When a website notices that you’ve deleted part of the super cookie, the information is repopulated from the other location. For example, you might clear your browser cookies and not your Flash cookies, so the website will copy the value of the Flash cookie to your browser cookies. Super cookies are very resilient.
  • 13. WAYS ,WEBSITES TRACK YOU User Agent Your browser also sends a user agent every time you connect to a website. This tells websites your browser and operating system, providing another piece of data that can be stored and used to target ads. For more information about user agents, check out our explanation of what a browser user agent is.
  • 14. WAYS ,WEBSITES TRACK YOU Browser Fingerprinting Browsers are actually pretty unique. Websites can determine your operating system, browser version, installed plug-ins and their versions, your operating system’s screen resolution, your installed fonts, your time zone, and other information. If you’ve disabled cookies entirely, that’s another piece of data that makes your browser unique.
  • 15. WAYS ,WEBSITES TRACK YOU There are surely other ways that websites can track you. There’s big money in it, and people are brainstorming new ways to track every day – just see evercookie above for evidence of that.
  • 16. HOW TYPES OF COMPUTER COOKIES AFFECT YOUR ONLINE PRIVACY First-party cookies are created by the host domain – the domain the user is visiting. These types of cookies are generally considered good; they help provide a better user experience and keep the session open. This basically means the browser is able to remember key pieces of information, such as which items you add to shopping carts, your username and passwords, and language preferences. First-party cookies are stored by the domain (website) you are visiting directly. ...
  • 17. HOW TYPES OF COMPUTER COOKIES AFFECT YOUR ONLINE PRIVACY Third-Party Cookies Third-party cookies, also referred to as tracking cookies, collect data based on your online behavior. When you visit a website, third-party cookies collect various types of data that are then passed on or sold to advertisers by the website that created the cookie. Tracking your interests, location, age, and search trends, these cookies collect information so that marketers can provide you with custom advertisements. These are the ads that appear on websites you visit and display content relevant to your interests. By tracking your habits and providing targeted ads, third-party cookies serve a useful purpose for marketers but can seem pesky and intrusive to internet users. That’s why you have the option to block them.
  • 18.
  • 19. PRIVATE BROWSING OVERVIEW As day by day the use of internet browsing has been increasing, people are getting aware about their privacy and protecting personal information. No one wants to disclose what sites they are browsing and the local data associated with it, which can be used to retrieve personal sensitive information.
  • 20. PRIVATE BROWSING Private Browsing: Private Browsing is a concept of disabling the browser’s history, removing cookies and not storing the web cache. Private Browsing doesn’t make you anonymous as your Internet Service Provider (ISP) will still be able to track you. Also, it is a common myth that it will protect user from keyloggers or spywares, but it will not.
  • 21. 3 TIPS FOR ANONYMOUS BROWSING 1. Log out from search engines and their tools You might not be aware of it, but every time you log into Gmail or Google’s other free online tools, your searches are monitored, and a profile is built specifically for you. This Google the opportunity to target ads directly related to your browsing experiences.
  • 22. 2. Use your browser’s privacy mode All major internet browsers feature optional privacy modes. These restrict your browser from saving your web history in its cache while disabling tracking cookies. Although this is a minor improvement, your Internet Service Provider, or ISP, along with governments, can still track your online activity – to be more specific, every single website you’re visiting.
  • 23. 3. Use a VPN to hide your IP address and online presence When using a VPN, you benefit from a range of privacy benefits. You can change IP address, route your Internet activity through a remote third-party server, conceal your search activity, and make your traffic completely anonymous so hackers and governments who’d like to snoop into your online activities can’t know your identity
  • 24. 4)Proxy Using a web Proxy server allows you to access content that may be blocked or restricted by local governments. You can use one to gain access to these websites and content. It also allows you to surf the web more privately meaning what your browsing (in that tab only) cannot be tracked
  • 25. PRACTICES TO ENSURE CONFIDENTIALITY OF INFORMATION Don't leave sensitive information lying around. Documents like credit card statements and billing invoices, even if they redact some information, can still be used to obtain sensitive data via social engineering. Shred documents in a secure way. When you no longer need a document with confidential information on it, don't throw it away. Shred it. Keep shredded materials locked up and hire a company to securely transport them away or use a cross shredder to make sure they cannot be reconstructed. Use anti-virus software. Installing an anti-virus and an anti-malware solution can prevent your computer from becoming infected and from infecting other computers on your network. Install a firewall. An effective firewall is a staple of business Internet security. It prevents intrusions into your company's network and, in some cases, can also stop a malware-infected machine from pushing data out. Password-protect important files and systems. Any files or systems containing sensitive information should be password protected. If possible, each user should have his or her own username and password so if a breach does occur, your company can pinpoint the source of the breach. Don't reuse passwords. If a hacker is able to obtain one password, the odds are good they'll try to use the same password to access other sensitive areas of your company's infrastructure. Use different passwords for all files and systems. Don't email confidential material. Most email systems are not secure. If you
  • 27. Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 29. In Internet slang, a troll is a person who starts quarrels or upsets people on the Internet to distract and sow discord by posting inflammatory and digressive, extraneous, or off-topic messages in an
  • 31. CYBER BULLYING Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers.
  • 33. CYBER STALKING Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and
  • 34.
  • 35.
  • 36. The laws for cyber crime protects citizens from dispensing sensitive information to a stranger online. Ever since the introduction to cyber laws in India happened, IT Act 2000 was enacted and amended in 2008 covering different types of crimes under cyber law in India
  • 37.
  • 38. If you want to report something other than Cybercrime cases or in case of an emergency please contact your local police by dialing 100. Complaints reported on this portal are dealt by respective police authorities of States/ UTs based on the information in the complaints provided by the complainants.
  • 40. COMMON SOCIAL NETWORK Social Networking App Monthly Active Users WhatsApp (owned by Facebook) 1,500,000,000 Messenger (owned by Facebook) 1,300,000,000 WeChat 989,000,000 Instagram (owned by Facebook) 800,000,000 op Social Networking Apps
  • 41.
  • 42. Twitter is an online news and social networking site where people communicate in short messages called tweets. Tweeting is posting short messages for anyone who follows you on Twitter, with the hope that your messages are useful and interesting to someone in your audience
  • 43. 280 characters The most common length of a tweet back when Twitter only allowed 140 characters was 34 characters. Now that the limit is 280 characters, the most common length of a tweet is 33 characters. Historically, only 9% of tweets hit Twitter's 140-character limit, now it's 1%.
  • 44.
  • 45.
  • 46. LinkedIn is an American business and employment-oriented service that operates via websites and mobile apps. Founded on December 28, 2002, and launched on May 5, 2003, it is mainly used for professional networking, including employers posting jobs and job seekers posting their CVs.
  • 47.
  • 48. Instagram is a social media app that allows users to share photos and videos from their lives, add captions, edit filters, tweak settings, engage with others, explore and creep, and so, so much more — you just have to know what you're doing so you don't get overwhelmed!
  • 49. APPROPRIATE USAGE OF SOCIAL NETWORKS
  • 50. Here are our top 10 tips to stay safe on social media: Use a strong password. The longer it is, the more secure it will be. Use a different password for each of your social media accounts. Set up your security answers. This option is available for most social media sites. If you have social media apps on your phone, be sure to password protect your device. Be selective with friend requests. If you don’t know the person, don’t accept their request. It could be a fake account. Click links with caution. Social media accounts are regularly hacked. Look out for language or content that does not sound like something your friend would post. Be careful about what you share. Don’t reveal sensitive personal information ie: home address, financial information, phone number. The more you post the easier it is to have your identity stolen. Become familiar with the privacy policies of the social media channels you use and customize your privacy settings to control who sees what. Protect your computer by installing antivirus software to safeguard. Also ensure that your browser, operating system, and software are kept up to date.
  • 52. DIGITAL FOOTPRINTS A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services. A "passive digital footprint" is a data trail you unintentionally leave online
  • 55.