SlideShare une entreprise Scribd logo
1  sur  18
DAV PUBLIC SCHOOL, UNIT-VIII, BHUBANESWAR
SEMINAR FOR STUDENTS OF CLASS XI & XII
SUBJECT - COMPUTER SCIENCE
DATE - 02 SEPTEMBER 2021
TOPIC - CYBER SOCIETY, LAW AND ETHICS
SUB TOPIC - CYBER SAFETY
Presented By-
Mr. ASIM SOURAV RATH
Class – XI, Section - C
Department of Computer Science, DAV Public School, Unit-VIII 01
 The knowledge of maximizing user's personal safety and security risks on private
information and property associated with using the internet.
 Safe and responsible use of the internet to ensure safety and security of personal
information, and not posing threat to anyone else’s information.
 Self-protection from cyber crime in general.
What is Cyber Safety?
Why Cyber Safety? Whom to protect from?
Who is he?
Department of Computer Science, DAV Public School, Unit-VIII
Department of Computer Science, DAV Public School, Unit-VIII
 Consists of the policies adopted to prevent and monitor authorized access, misuse,
modification, or denial of a computer network and network-accessible resources.
 Can be private, such as within a company, and others which might be open to public
access. It does as its title explains: Secures the network, as well as protects and
monitors operations being done.
 Starts with authenticating, commonly with a username and a password. Once
authenticated, a firewall enforces access policies such as what services are allowed to
be accessed by the network users.
 Communication between two hosts using a network may be encrypted to maintain
privacy.
 Security management for networks is different for all kinds of situations.
Network security
02
…And this is
how it works
Department of Computer Science, DAV Public School, Unit-VIII
 The probability that an asset will be unable to resist the actions of a threat agent.
 In computer security, a vulnerability is a weakness which allows an attacker to
reduce a system's information assurance. It is the intersection of three elements: a
system susceptibility or flaw, attacker access to the flaw, and attacker capability to
exploit the flaw.
 Vulnerability management is the cyclical practice of identifying, classifying,
remediating, and mitigating vulnerabilities. This practice generally refers to software
vulnerabilities in computing systems.
 A security risk may be classified as a vulnerability but there are vulnerabilities
without risk.
 Many software tools exist that can aid in the discovery (and sometimes removal) of
vulnerabilities in a computer system. Though these tools can provide an auditor with a
good overview of possible vulnerabilities present, they can not replace human
judgment.
Department of Computer Science, DAV Public School, Unit-VIII
Vulnerability
03
Department of Computer Science, DAV Public School, Unit-VIII
Safely browsing the Web…
04
 You need to know that not every site is safe to visit; whatever you post or do online
is visible to others; not everything that you see or is promised online is true.
 Viruses and malware spread, easily and quickly, through simple actions such as
clicking on links found on web pages or in email.
 Also, safeguarding your computer is very crucial before you go online. There are
some rules you must follow to conduct yourself online and there are other things that
you must know so that you can counter unknown dangers.
Department of Computer Science, DAV Public School, Unit-VIII
A Cookie?
Department of Computer Science, DAV Public School, Unit-VIII
Have a Cookie!!
 An HTTP cookie is a small piece of data sent from a website and stored in the user's
web browser while the user is browsing it.
 Every time the user loads the website, the browser sends the cookie back to the server
to notify the user's previous activity. (Cookies were designed to be a reliable mechanism
for websites to remember stateful information)
 Cookies can also store passwords and form content a user has previously entered, such
as a credit card number or an address. These are first-party cookies.
 The tracking cookies, and especially third-party cookies, are commonly used as ways
to compile long-term records of individuals' browsing histories – a potential privacy
concern.
 The security of an authentication cookie generally depends on the security of the
issuing website and the user's web browser, and on whether the cookie data is encrypted.
Security vulnerabilities may allow a cookie's data to be read by a hacker, used to gain
access to user data.
HTTP Cookie
05
Department of Computer Science, DAV Public School, Unit-VIII
Department of Computer Science, DAV Public School, Unit-VIII
 We give our private data to businesses and other internet
users, for a variety of reasons(e.g.: signing up, buying, selling,
making an account ,etc).
 We trust them to use that information for legitimate
purposes.
 This isn’t always the case though and financial and personal
data can be used for harmful reasons like hacking, stalking and
identity fraud.
• It is a type of fraud that involves using
someone else’s identity to steal money or
gain other benefits.
• Online identity theft refers to an act of
stealing someone’s personal information
such as name, login details etc. and then
posing as that person online.
06
Identity Protection
Department of Computer Science, DAV Public School, Unit-VIII
Common solution for these problems:
 Private browsing / Anonymous browsing
 Using alias or fake names on the net (except for jobs, forms, etc.)
Identity theft
07
Department of Computer Science, DAV Public School, Unit-VIII
 Whenever you visit a website, your web browser may reveal your location via your
device’s IP address. It can also provide your search and browsing history. This way
websites can track you.
 Tracking is generally used by advertising networks to build up detailed profiles to
pinpoint ad-targeting even tracking down users for special purpose such as effecting
their political choices.
 The type of information is compiled through is compiled through your web usage
patterns, and which websites generally use for tracking you.
Many Websites Track You
IP Address:
• IP address is a unique address of your device
when you connect to the Internet.
• Your computer may share your IP address with
the other networked devices in your house or office.
• From your IP address, a website can determine
your rough geographical location.
HTTP Referrer:
• When you click a link, your browser loads the
web page linked to it and tells the website where
you came from.
• This is known as HTTP referrer.
Mind it!!
Department of Computer Science, DAV Public School, Unit-VIII
08
 Digital Footprints
 Records and traces individual’s activities as they use internet.
 Permanently stored and cannot be undone.
 Also referred as “Digital Tattoos”.
 Used to track cyber thefts and hackers.
 Privacy settings
 When you start using social media, you should not go with default privacy settings.
Rather it is always a good idea to set-up privacy settings yourself by using ACCOUNT
SETTINGS. Through privacy settings, you can control:
• Who all can see what you have posted
• Who all can send requests to you
• What all information about you is visible to others, even to your contacts etc.
And there’s more…
Department of Computer Science, DAV Public School, Unit-VIII
09
Tips to Cyber Safety
 Use a strong password, use secure
connection.
 Avoid sending any photograph
online particularly to strangers.
 Never send your credit card
number to any site that is not secured.
 Use antivirus software and keep
them up to date, install firewalls, pop
up blockers.
 Open attachments carefully. Keep
your personal information private.
 Maintain backup.
 Be careful for untrusted third party
sites, always go for trusted official
sites.
Department of Computer Science, DAV Public School, Unit-VIII
10
 The Information Technology Act, 2000:
 The primary source of cyber law in India is the Information Technology Act,
2000 (IT Act) which came into force on 17 October 2000.
 The primary purpose of the Act is to provide legal recognition to electronic
commerce and to facilitate the filling of electronic records with the Government.
 The Information Technology (Amendment) Act, 2008:
 The Government of India has brought major amendments to ITA-2000 in
form of the Information Technology Amendment Act, 2008.
 It has added several new sections on offences including Cyber terrorism and
Data Protection.
 A set of rules relating to Sensitive Personal Information and Reasonable
Security Practices (mentioned in section 43A of the ITAA, 2008) was released in
April 2011.
Department of Computer Science, DAV Public School, Unit-VIII
Cyber Laws in India
Cyber Safety

Contenu connexe

Tendances

Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaEMC
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss PreventionSeqrite
 
Real Life Examples of Cybersecurity with Neo4j
 Real Life Examples of Cybersecurity with Neo4j Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4jNeo4j
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...MZERMA Amine
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 

Tendances (20)

Data breach
Data breachData breach
Data breach
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Real Life Examples of Cybersecurity with Neo4j
 Real Life Examples of Cybersecurity with Neo4j Real Life Examples of Cybersecurity with Neo4j
Real Life Examples of Cybersecurity with Neo4j
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
AI in Hacking
AI in HackingAI in Hacking
AI in Hacking
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 

Similaire à Cyber Safety

Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxInfosectrain3
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...IJNSA Journal
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
computer and security
computer and security computer and security
computer and security Sumama Shakir
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfinfosec train
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...IJNSA Journal
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Information security
Information securityInformation security
Information securityIshaRana14
 

Similaire à Cyber Safety (20)

Hamza
HamzaHamza
Hamza
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
PreventingPhishing
PreventingPhishingPreventingPhishing
PreventingPhishing
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
computer and security
computer and security computer and security
computer and security
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Information security
Information securityInformation security
Information security
 

Dernier

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Cyber Safety

  • 1. DAV PUBLIC SCHOOL, UNIT-VIII, BHUBANESWAR SEMINAR FOR STUDENTS OF CLASS XI & XII SUBJECT - COMPUTER SCIENCE DATE - 02 SEPTEMBER 2021 TOPIC - CYBER SOCIETY, LAW AND ETHICS SUB TOPIC - CYBER SAFETY Presented By- Mr. ASIM SOURAV RATH Class – XI, Section - C
  • 2. Department of Computer Science, DAV Public School, Unit-VIII 01  The knowledge of maximizing user's personal safety and security risks on private information and property associated with using the internet.  Safe and responsible use of the internet to ensure safety and security of personal information, and not posing threat to anyone else’s information.  Self-protection from cyber crime in general. What is Cyber Safety? Why Cyber Safety? Whom to protect from?
  • 3. Who is he? Department of Computer Science, DAV Public School, Unit-VIII
  • 4. Department of Computer Science, DAV Public School, Unit-VIII  Consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources.  Can be private, such as within a company, and others which might be open to public access. It does as its title explains: Secures the network, as well as protects and monitors operations being done.  Starts with authenticating, commonly with a username and a password. Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users.  Communication between two hosts using a network may be encrypted to maintain privacy.  Security management for networks is different for all kinds of situations. Network security 02
  • 5. …And this is how it works Department of Computer Science, DAV Public School, Unit-VIII
  • 6.  The probability that an asset will be unable to resist the actions of a threat agent.  In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. It is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.  Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice generally refers to software vulnerabilities in computing systems.  A security risk may be classified as a vulnerability but there are vulnerabilities without risk.  Many software tools exist that can aid in the discovery (and sometimes removal) of vulnerabilities in a computer system. Though these tools can provide an auditor with a good overview of possible vulnerabilities present, they can not replace human judgment. Department of Computer Science, DAV Public School, Unit-VIII Vulnerability 03
  • 7. Department of Computer Science, DAV Public School, Unit-VIII
  • 8. Safely browsing the Web… 04  You need to know that not every site is safe to visit; whatever you post or do online is visible to others; not everything that you see or is promised online is true.  Viruses and malware spread, easily and quickly, through simple actions such as clicking on links found on web pages or in email.  Also, safeguarding your computer is very crucial before you go online. There are some rules you must follow to conduct yourself online and there are other things that you must know so that you can counter unknown dangers. Department of Computer Science, DAV Public School, Unit-VIII
  • 9. A Cookie? Department of Computer Science, DAV Public School, Unit-VIII Have a Cookie!!
  • 10.  An HTTP cookie is a small piece of data sent from a website and stored in the user's web browser while the user is browsing it.  Every time the user loads the website, the browser sends the cookie back to the server to notify the user's previous activity. (Cookies were designed to be a reliable mechanism for websites to remember stateful information)  Cookies can also store passwords and form content a user has previously entered, such as a credit card number or an address. These are first-party cookies.  The tracking cookies, and especially third-party cookies, are commonly used as ways to compile long-term records of individuals' browsing histories – a potential privacy concern.  The security of an authentication cookie generally depends on the security of the issuing website and the user's web browser, and on whether the cookie data is encrypted. Security vulnerabilities may allow a cookie's data to be read by a hacker, used to gain access to user data. HTTP Cookie 05 Department of Computer Science, DAV Public School, Unit-VIII
  • 11. Department of Computer Science, DAV Public School, Unit-VIII
  • 12.  We give our private data to businesses and other internet users, for a variety of reasons(e.g.: signing up, buying, selling, making an account ,etc).  We trust them to use that information for legitimate purposes.  This isn’t always the case though and financial and personal data can be used for harmful reasons like hacking, stalking and identity fraud. • It is a type of fraud that involves using someone else’s identity to steal money or gain other benefits. • Online identity theft refers to an act of stealing someone’s personal information such as name, login details etc. and then posing as that person online. 06 Identity Protection Department of Computer Science, DAV Public School, Unit-VIII Common solution for these problems:  Private browsing / Anonymous browsing  Using alias or fake names on the net (except for jobs, forms, etc.) Identity theft
  • 13. 07 Department of Computer Science, DAV Public School, Unit-VIII  Whenever you visit a website, your web browser may reveal your location via your device’s IP address. It can also provide your search and browsing history. This way websites can track you.  Tracking is generally used by advertising networks to build up detailed profiles to pinpoint ad-targeting even tracking down users for special purpose such as effecting their political choices.  The type of information is compiled through is compiled through your web usage patterns, and which websites generally use for tracking you. Many Websites Track You IP Address: • IP address is a unique address of your device when you connect to the Internet. • Your computer may share your IP address with the other networked devices in your house or office. • From your IP address, a website can determine your rough geographical location. HTTP Referrer: • When you click a link, your browser loads the web page linked to it and tells the website where you came from. • This is known as HTTP referrer.
  • 14. Mind it!! Department of Computer Science, DAV Public School, Unit-VIII
  • 15. 08  Digital Footprints  Records and traces individual’s activities as they use internet.  Permanently stored and cannot be undone.  Also referred as “Digital Tattoos”.  Used to track cyber thefts and hackers.  Privacy settings  When you start using social media, you should not go with default privacy settings. Rather it is always a good idea to set-up privacy settings yourself by using ACCOUNT SETTINGS. Through privacy settings, you can control: • Who all can see what you have posted • Who all can send requests to you • What all information about you is visible to others, even to your contacts etc. And there’s more… Department of Computer Science, DAV Public School, Unit-VIII
  • 16. 09 Tips to Cyber Safety  Use a strong password, use secure connection.  Avoid sending any photograph online particularly to strangers.  Never send your credit card number to any site that is not secured.  Use antivirus software and keep them up to date, install firewalls, pop up blockers.  Open attachments carefully. Keep your personal information private.  Maintain backup.  Be careful for untrusted third party sites, always go for trusted official sites. Department of Computer Science, DAV Public School, Unit-VIII
  • 17. 10  The Information Technology Act, 2000:  The primary source of cyber law in India is the Information Technology Act, 2000 (IT Act) which came into force on 17 October 2000.  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate the filling of electronic records with the Government.  The Information Technology (Amendment) Act, 2008:  The Government of India has brought major amendments to ITA-2000 in form of the Information Technology Amendment Act, 2008.  It has added several new sections on offences including Cyber terrorism and Data Protection.  A set of rules relating to Sensitive Personal Information and Reasonable Security Practices (mentioned in section 43A of the ITAA, 2008) was released in April 2011. Department of Computer Science, DAV Public School, Unit-VIII Cyber Laws in India