The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Cyber Safety
1. DAV PUBLIC SCHOOL, UNIT-VIII, BHUBANESWAR
SEMINAR FOR STUDENTS OF CLASS XI & XII
SUBJECT - COMPUTER SCIENCE
DATE - 02 SEPTEMBER 2021
TOPIC - CYBER SOCIETY, LAW AND ETHICS
SUB TOPIC - CYBER SAFETY
Presented By-
Mr. ASIM SOURAV RATH
Class – XI, Section - C
2. Department of Computer Science, DAV Public School, Unit-VIII 01
The knowledge of maximizing user's personal safety and security risks on private
information and property associated with using the internet.
Safe and responsible use of the internet to ensure safety and security of personal
information, and not posing threat to anyone else’s information.
Self-protection from cyber crime in general.
What is Cyber Safety?
Why Cyber Safety? Whom to protect from?
4. Department of Computer Science, DAV Public School, Unit-VIII
Consists of the policies adopted to prevent and monitor authorized access, misuse,
modification, or denial of a computer network and network-accessible resources.
Can be private, such as within a company, and others which might be open to public
access. It does as its title explains: Secures the network, as well as protects and
monitors operations being done.
Starts with authenticating, commonly with a username and a password. Once
authenticated, a firewall enforces access policies such as what services are allowed to
be accessed by the network users.
Communication between two hosts using a network may be encrypted to maintain
privacy.
Security management for networks is different for all kinds of situations.
Network security
02
5. …And this is
how it works
Department of Computer Science, DAV Public School, Unit-VIII
6. The probability that an asset will be unable to resist the actions of a threat agent.
In computer security, a vulnerability is a weakness which allows an attacker to
reduce a system's information assurance. It is the intersection of three elements: a
system susceptibility or flaw, attacker access to the flaw, and attacker capability to
exploit the flaw.
Vulnerability management is the cyclical practice of identifying, classifying,
remediating, and mitigating vulnerabilities. This practice generally refers to software
vulnerabilities in computing systems.
A security risk may be classified as a vulnerability but there are vulnerabilities
without risk.
Many software tools exist that can aid in the discovery (and sometimes removal) of
vulnerabilities in a computer system. Though these tools can provide an auditor with a
good overview of possible vulnerabilities present, they can not replace human
judgment.
Department of Computer Science, DAV Public School, Unit-VIII
Vulnerability
03
8. Safely browsing the Web…
04
You need to know that not every site is safe to visit; whatever you post or do online
is visible to others; not everything that you see or is promised online is true.
Viruses and malware spread, easily and quickly, through simple actions such as
clicking on links found on web pages or in email.
Also, safeguarding your computer is very crucial before you go online. There are
some rules you must follow to conduct yourself online and there are other things that
you must know so that you can counter unknown dangers.
Department of Computer Science, DAV Public School, Unit-VIII
10. An HTTP cookie is a small piece of data sent from a website and stored in the user's
web browser while the user is browsing it.
Every time the user loads the website, the browser sends the cookie back to the server
to notify the user's previous activity. (Cookies were designed to be a reliable mechanism
for websites to remember stateful information)
Cookies can also store passwords and form content a user has previously entered, such
as a credit card number or an address. These are first-party cookies.
The tracking cookies, and especially third-party cookies, are commonly used as ways
to compile long-term records of individuals' browsing histories – a potential privacy
concern.
The security of an authentication cookie generally depends on the security of the
issuing website and the user's web browser, and on whether the cookie data is encrypted.
Security vulnerabilities may allow a cookie's data to be read by a hacker, used to gain
access to user data.
HTTP Cookie
05
Department of Computer Science, DAV Public School, Unit-VIII
12. We give our private data to businesses and other internet
users, for a variety of reasons(e.g.: signing up, buying, selling,
making an account ,etc).
We trust them to use that information for legitimate
purposes.
This isn’t always the case though and financial and personal
data can be used for harmful reasons like hacking, stalking and
identity fraud.
• It is a type of fraud that involves using
someone else’s identity to steal money or
gain other benefits.
• Online identity theft refers to an act of
stealing someone’s personal information
such as name, login details etc. and then
posing as that person online.
06
Identity Protection
Department of Computer Science, DAV Public School, Unit-VIII
Common solution for these problems:
Private browsing / Anonymous browsing
Using alias or fake names on the net (except for jobs, forms, etc.)
Identity theft
13. 07
Department of Computer Science, DAV Public School, Unit-VIII
Whenever you visit a website, your web browser may reveal your location via your
device’s IP address. It can also provide your search and browsing history. This way
websites can track you.
Tracking is generally used by advertising networks to build up detailed profiles to
pinpoint ad-targeting even tracking down users for special purpose such as effecting
their political choices.
The type of information is compiled through is compiled through your web usage
patterns, and which websites generally use for tracking you.
Many Websites Track You
IP Address:
• IP address is a unique address of your device
when you connect to the Internet.
• Your computer may share your IP address with
the other networked devices in your house or office.
• From your IP address, a website can determine
your rough geographical location.
HTTP Referrer:
• When you click a link, your browser loads the
web page linked to it and tells the website where
you came from.
• This is known as HTTP referrer.
15. 08
Digital Footprints
Records and traces individual’s activities as they use internet.
Permanently stored and cannot be undone.
Also referred as “Digital Tattoos”.
Used to track cyber thefts and hackers.
Privacy settings
When you start using social media, you should not go with default privacy settings.
Rather it is always a good idea to set-up privacy settings yourself by using ACCOUNT
SETTINGS. Through privacy settings, you can control:
• Who all can see what you have posted
• Who all can send requests to you
• What all information about you is visible to others, even to your contacts etc.
And there’s more…
Department of Computer Science, DAV Public School, Unit-VIII
16. 09
Tips to Cyber Safety
Use a strong password, use secure
connection.
Avoid sending any photograph
online particularly to strangers.
Never send your credit card
number to any site that is not secured.
Use antivirus software and keep
them up to date, install firewalls, pop
up blockers.
Open attachments carefully. Keep
your personal information private.
Maintain backup.
Be careful for untrusted third party
sites, always go for trusted official
sites.
Department of Computer Science, DAV Public School, Unit-VIII
17. 10
The Information Technology Act, 2000:
The primary source of cyber law in India is the Information Technology Act,
2000 (IT Act) which came into force on 17 October 2000.
The primary purpose of the Act is to provide legal recognition to electronic
commerce and to facilitate the filling of electronic records with the Government.
The Information Technology (Amendment) Act, 2008:
The Government of India has brought major amendments to ITA-2000 in
form of the Information Technology Amendment Act, 2008.
It has added several new sections on offences including Cyber terrorism and
Data Protection.
A set of rules relating to Sensitive Personal Information and Reasonable
Security Practices (mentioned in section 43A of the ITAA, 2008) was released in
April 2011.
Department of Computer Science, DAV Public School, Unit-VIII
Cyber Laws in India