SlideShare une entreprise Scribd logo
1  sur  16
Cyber Safety
Done By:A.Afsheen Abdul&
K.S.Vishal
Class: XI - A
Cyber safety
Cyber safety refers to the safe and responsible use of internet to ensure safety
and security of personal information. It also includes not creating threat for
anyone else’s information.
Safely browsing the web
We can safely browse the web by keeping following
things in mind:
Try to avoid opening websites which are not secure
(without HTTPS).
Don’t provide your email, contact number , credit
card/debit card information , address and other such
information on websites/apps you are not fully sure
of.
Don’t download softwares or other files from every
website.
Identity theft
It is the process of stealing someone else’s identity to steal
money or gain other benefits. Identity theft may include using
name, photograph, email id or login details of someone else
without his/her consent.
Identity protection while using internet
There are two methods to protect identity on internet.
•Anonymous Browsing: Users can view websites without providing
any personal information like IP address and location of user.
•Private Browsing: There are different methods of private browsing.
Most common methods of private browsing are:
•Incognito Browsing: It opens web browser in such a way that it will
not track your activities on internet. Most of the modern web browsers
like Mozilla Firefox, Google Chrome provide this feature.
•Proxy: It is a computer on a network that acts as computer middle man
between your computer and the website. So your IP address and other
information is never shared. Information about Proxy is only shared.
•VPN (Virtual Private Network): It is a technique to add security
and privacy to your network. It never shares IP address, location and
other details of your computer.
Confidentiality of Information
• Internet is a public platform. The sites you visit, the products you search, the
posts that you put on social media are all visible to public.
• Confidentiality of information ensures that only authorized users get access to
sensitive and protected data
Practices to Ensure Confidentiality of Information:
1. Use Firewall wherever possible.
2. Control browser setting to block tracking
3. Browse privately wherever possible:
4. Be Careful while posting on Internet
5. Ensure Safe sites while entering crucial Information
6. Carefully handle emails
7. Do not give sensitive information on wireless networks
8. Avoid public computers
Cybercrime
Cybercrime is a crime that involves a computer and
a network. The computer may have been used to commit the
crime and in many cases, it is also the target. Cybercrime may
threaten a person or a nation’s security and financial health.
Cyber trolls & Cyber bullying
Cyber trolling is internet slang for a person who intentionally
starts arguments or upsets others by posting inflammatory
remarks. The sole purpose of trolling is angering people.
Purpose – to entertain, to argue, to upset victim, to get
attention
Cyber bullying: Saying and/or doing mean things to the person online. It is a
harm inflicted through using the Internet, ICT devices, Or mobile phones.
Purpose – to get revenge , To harass & threat, to humiliate
Cyber stalking: Doing research on every aspect of the person’s life.
Cyber harassment: Continuously contacting the person online, even though they
don’t want you to.
Computer Security Threats
Spreading rumours: (fake information) using internet is a
cyber crime.
Online fraud-
Online fraud refers to fraudulent activities such as identity
theft and financial frauds that are committed by using the
Internet.
•Non-delivered goods
•Non-Existent companies
•Stealing information
•Fraudulent payments
Information theft
It is the process of stealing someone else's identity to steal money or
gain other benefits. Identity theft may include using name, photograph, email
id or login details of someone else without his/her consent.
Scams
A scam is a deceptive scheme or trick used to
cheat someone out of something, especially
money. Scam is also a verb meaning to cheat
someone in such a way. Example: Banks will
never call you asking for your credit card
number or social security number over the
phone.
Illegal downloads
Illegal downloading is a process of getting/downloading data(like
documents, images, videos, audio, etc.) that you are not allowed to use
on the internet. Or, in other words, illegal downloads are a way in which
user/users download files without having any legal right to download
them.
Child Pornography
child pornography, in criminal law, any visual depiction of a minor (a person
who has not reached the age of consent) engaging in sexually explicit activity.
In the federal criminal code of the United states, child pornography is partly
defined as “any photograph, film, video, picture, or computer or computer-
generated image” that depicts actual or simulated sexually explicit activity by
a minor—where, in the latter case, the simulation is indistinguishable from
actual sexually explicit activity.
Reporting Cyber Crime
• File complaint to the local police station
•Provisions are made for filing of ‘E-FIR’ in most of the states
•The Ministry of Home Affairs launched a website for registering crimes
against women and children
Various common social networking sites
Most popular social networking sites are :
Facebook: It is a platform where we can share posts. These
posts may contain text, pictures, videos and links to websites.
We can also view, like and post comment for posts of our
friends and groups.
Twitter: It is a microblogging websites to post small
messages with maximum limit of 280 characters.
Linkedin: It is platform where you can create resumes and
share work related information.
Instagram: It is a platform for sharing pictures and videos
Cyber Law
•Cyber law, also known as cybercrime law, is legislation focused on the acceptable
behavorial use of technology including computer hardware and software, the
internet, and networks.
•Cyber law helps protect users from harm by enabling the investigation and
prosecution of online criminal activity.
•It applies to the actions of individuals, groups, the public, government, and
private organizations.
Overview of Indian IT ACT
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is
an Act of the Indian Parliament notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce.
A major amendment was made in 2008 and now it is called the IT (Amendment)
Act 2008.
Social Media etiquettes
1. Be Authentic
2. Be secure
3. Be reliable
4. Don’t pick fights online
5. Don’t use fake names or pseudonyms
6. Protect your Identity
7. Respect your audience
8. Respect other’s Sentiments
9. Monitor Comments

Contenu connexe

Tendances (20)

Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Erasmus+ group 2
Erasmus+ group 2Erasmus+ group 2
Erasmus+ group 2
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
WWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINEWWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINE
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
E commerce payment systems
E commerce payment systems E commerce payment systems
E commerce payment systems
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 

Similaire à cyber safety_grade11cse_afsheen,vishal.pptx

Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxTejasSingh70
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)Abhinav Pathak
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPTpriya785691
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 

Similaire à cyber safety_grade11cse_afsheen,vishal.pptx (20)

Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 

Dernier

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Dernier (20)

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

cyber safety_grade11cse_afsheen,vishal.pptx

  • 1. Cyber Safety Done By:A.Afsheen Abdul& K.S.Vishal Class: XI - A
  • 2. Cyber safety Cyber safety refers to the safe and responsible use of internet to ensure safety and security of personal information. It also includes not creating threat for anyone else’s information. Safely browsing the web We can safely browse the web by keeping following things in mind: Try to avoid opening websites which are not secure (without HTTPS). Don’t provide your email, contact number , credit card/debit card information , address and other such information on websites/apps you are not fully sure of. Don’t download softwares or other files from every website.
  • 3. Identity theft It is the process of stealing someone else’s identity to steal money or gain other benefits. Identity theft may include using name, photograph, email id or login details of someone else without his/her consent.
  • 4. Identity protection while using internet There are two methods to protect identity on internet. •Anonymous Browsing: Users can view websites without providing any personal information like IP address and location of user. •Private Browsing: There are different methods of private browsing. Most common methods of private browsing are: •Incognito Browsing: It opens web browser in such a way that it will not track your activities on internet. Most of the modern web browsers like Mozilla Firefox, Google Chrome provide this feature. •Proxy: It is a computer on a network that acts as computer middle man between your computer and the website. So your IP address and other information is never shared. Information about Proxy is only shared. •VPN (Virtual Private Network): It is a technique to add security and privacy to your network. It never shares IP address, location and other details of your computer.
  • 5. Confidentiality of Information • Internet is a public platform. The sites you visit, the products you search, the posts that you put on social media are all visible to public. • Confidentiality of information ensures that only authorized users get access to sensitive and protected data Practices to Ensure Confidentiality of Information: 1. Use Firewall wherever possible. 2. Control browser setting to block tracking 3. Browse privately wherever possible: 4. Be Careful while posting on Internet 5. Ensure Safe sites while entering crucial Information 6. Carefully handle emails 7. Do not give sensitive information on wireless networks 8. Avoid public computers
  • 6. Cybercrime Cybercrime is a crime that involves a computer and a network. The computer may have been used to commit the crime and in many cases, it is also the target. Cybercrime may threaten a person or a nation’s security and financial health.
  • 7. Cyber trolls & Cyber bullying Cyber trolling is internet slang for a person who intentionally starts arguments or upsets others by posting inflammatory remarks. The sole purpose of trolling is angering people. Purpose – to entertain, to argue, to upset victim, to get attention
  • 8. Cyber bullying: Saying and/or doing mean things to the person online. It is a harm inflicted through using the Internet, ICT devices, Or mobile phones. Purpose – to get revenge , To harass & threat, to humiliate Cyber stalking: Doing research on every aspect of the person’s life. Cyber harassment: Continuously contacting the person online, even though they don’t want you to.
  • 10. Spreading rumours: (fake information) using internet is a cyber crime. Online fraud- Online fraud refers to fraudulent activities such as identity theft and financial frauds that are committed by using the Internet. •Non-delivered goods •Non-Existent companies •Stealing information •Fraudulent payments
  • 11. Information theft It is the process of stealing someone else's identity to steal money or gain other benefits. Identity theft may include using name, photograph, email id or login details of someone else without his/her consent. Scams A scam is a deceptive scheme or trick used to cheat someone out of something, especially money. Scam is also a verb meaning to cheat someone in such a way. Example: Banks will never call you asking for your credit card number or social security number over the phone.
  • 12. Illegal downloads Illegal downloading is a process of getting/downloading data(like documents, images, videos, audio, etc.) that you are not allowed to use on the internet. Or, in other words, illegal downloads are a way in which user/users download files without having any legal right to download them. Child Pornography child pornography, in criminal law, any visual depiction of a minor (a person who has not reached the age of consent) engaging in sexually explicit activity. In the federal criminal code of the United states, child pornography is partly defined as “any photograph, film, video, picture, or computer or computer- generated image” that depicts actual or simulated sexually explicit activity by a minor—where, in the latter case, the simulation is indistinguishable from actual sexually explicit activity.
  • 13. Reporting Cyber Crime • File complaint to the local police station •Provisions are made for filing of ‘E-FIR’ in most of the states •The Ministry of Home Affairs launched a website for registering crimes against women and children
  • 14. Various common social networking sites Most popular social networking sites are : Facebook: It is a platform where we can share posts. These posts may contain text, pictures, videos and links to websites. We can also view, like and post comment for posts of our friends and groups. Twitter: It is a microblogging websites to post small messages with maximum limit of 280 characters. Linkedin: It is platform where you can create resumes and share work related information. Instagram: It is a platform for sharing pictures and videos
  • 15. Cyber Law •Cyber law, also known as cybercrime law, is legislation focused on the acceptable behavorial use of technology including computer hardware and software, the internet, and networks. •Cyber law helps protect users from harm by enabling the investigation and prosecution of online criminal activity. •It applies to the actions of individuals, groups, the public, government, and private organizations. Overview of Indian IT ACT The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. A major amendment was made in 2008 and now it is called the IT (Amendment) Act 2008.
  • 16. Social Media etiquettes 1. Be Authentic 2. Be secure 3. Be reliable 4. Don’t pick fights online 5. Don’t use fake names or pseudonyms 6. Protect your Identity 7. Respect your audience 8. Respect other’s Sentiments 9. Monitor Comments