SlideShare a Scribd company logo
1 of 19
Ms.Ambreen
Introduction to ICT
Course Code: IT-311
Date: 18-06-2020
LECTURE#09
Ms.Ambreen
Internet Security
Staying safe
online
OutLine
 Introduction.
 Internet Security: What it is, and why we need it.
 Hackers: Who is he, Classes, Hacking Phases.
 Attacks exemples.
 What should I do to be safe online ?
 Conclusion
2
Introduction:
 While the internet offers enormous advantages and opportunities, it also presents
various security risks.
 It’s where we access our banking records, credit card statements, tax returns and other
highly sensitive personal information.
 Banks take extensive steps to protect the information transmitted andprocessed
when banking online.
 But with all the good things the Internet offers us, it also opens the door toserious,
potentially devastating threats.
3
 Generally, Internet security include browser security, the security of data
entered through a Web form, and overall authentication and protection of data
sent via Internet Protocol.
 We must secure our computers with technology in the same way that we
secure the doors to our offices  Security
 We must act in ways that protect us against the risks and threats that come with
Internet use  Safety
Internet Security:
What it is
4
- Installed in your computer.
- watches and records everything
you do online.
- leaving your passwords.
- and other personal and
sensitive information vulnerable
Internet Security:
Why you need it.
-Identifies your computer
-Where it is located
Request
Response
carries with it unwanted hidden software
5
Hackers:
Who is a Hacker ?
A hacker is an
individual who uses
computer.
The term hacker
may refer to
anyone with.
technical skills, but
it often refers to a
person who uses
his or her abilities
to gain
unauthorized
access
to systems or
networks in order to
commit crimes
6
Hackers
Hacker Classes :
Black Hats BLACK HATS BLACK HATS
The term “black hat”
originated from Western
movies, where the bad guys
wore black hats and the good
guys wore white hats.[1]
They try to inflict damage by
compromising security
systems, altering functions of
websites and networks, or
shutting down systems. They
often do so to steal or gain
access to passwords,
financial information, and
other personal data.
A black-hat hacker is an
individual who attempts to
gain unauthorized entry into
a system or network to
exploit them for malicious
reasons. The black-hat
hacker does not have any
permission or authority to
compromise their targets.
7
Hackers
Hacker Classes :
Grey Hats Grey Hats Grey Hats
A grey hat hacker is
someone who may
violate ethical
standards or
principles, but
without the
malicious intent
If issues are found,
they will report them
to the owner,
sometimes
requesting a small
fee to fix the issue.
grey hat
hackers will look
for vulnerabilities in
a system without
the owner's
permission or
knowledge.
8
Hackers
Hacker Classes :
White Hats White Hats White Hats
A white hat hacker
is a computer
security specialist
white hat hackers
have permission to
employ them
against the
organization that
has hired them.
who breaks into
protected systems
and networks to
test and asses their
security.
9
Attacks exemples.
Phishing
Phishing is a type of social engineering
attack often used to steal user data,
including login credentials and credit card
numbers.
10
Attacks exemples.
Phishing
11
What should I do to be safe online ?.
12
What should I do to be safe online ?.
 To protect your self
 Keep you
passwords private
and create ones
too strong that are
hard to “crack”
 If you have received an
Email encounters, you
may have been the
target of a common
scam called ‘phishing’.
13
What should I do to be safe online ?.
 To protect your self
 Be wary of publishing any
information that identifies
you, such as your phone
number, photos of your
home, your address, date
of birth or full name.  If you make purchases
or do your banking
online, make sure you
protect your financial
information
 Use ‘https://’
14
What should I do to be safe online ?.
 To protect your Computer
Use Anti-virus Software:
Anti-virus software can
detect and destroy
computer viruses before
they cause damage
Use Anti-spyware Software:
Use anti-spyware software so
unknown people cannot
lurk on your computer and
potentially
steal your information
15
Conclusion
 Whenever using internet or an online financial system, ensure that your
system is still under your control and not a spoofed puppet.
 Protecting your self from internet threats.
 Being aware of the dangers of the internet and taking the rightsteps to
avoid them means you can enjoy the internet safely.
16
Thank you !!!
17

More Related Content

What's hot

Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
tangytangling
 

What's hot (20)

HACKING
HACKINGHACKING
HACKING
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking
HackingHacking
Hacking
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Hacking
HackingHacking
Hacking
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
 
Hacking
HackingHacking
Hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Hackers
HackersHackers
Hackers
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 

Similar to Ict lec#9

Similar to Ict lec#9 (20)

Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
techalpha07
techalpha07techalpha07
techalpha07
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & Hacking
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from amberkhan59 (7)

Semantic Web
Semantic WebSemantic Web
Semantic Web
 
Semantic Web
Semantic WebSemantic Web
Semantic Web
 
Sorting and Its Types
Sorting and Its TypesSorting and Its Types
Sorting and Its Types
 
Lec#04
Lec#04Lec#04
Lec#04
 
Lec#03
Lec#03Lec#03
Lec#03
 
Lec#02
Lec#02Lec#02
Lec#02
 
Lecture#1
Lecture#1Lecture#1
Lecture#1
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Ict lec#9

  • 4. OutLine  Introduction.  Internet Security: What it is, and why we need it.  Hackers: Who is he, Classes, Hacking Phases.  Attacks exemples.  What should I do to be safe online ?  Conclusion 2
  • 5. Introduction:  While the internet offers enormous advantages and opportunities, it also presents various security risks.  It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information.  Banks take extensive steps to protect the information transmitted andprocessed when banking online.  But with all the good things the Internet offers us, it also opens the door toserious, potentially devastating threats. 3
  • 6.  Generally, Internet security include browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Internet Protocol.  We must secure our computers with technology in the same way that we secure the doors to our offices  Security  We must act in ways that protect us against the risks and threats that come with Internet use  Safety Internet Security: What it is 4
  • 7. - Installed in your computer. - watches and records everything you do online. - leaving your passwords. - and other personal and sensitive information vulnerable Internet Security: Why you need it. -Identifies your computer -Where it is located Request Response carries with it unwanted hidden software 5
  • 8. Hackers: Who is a Hacker ? A hacker is an individual who uses computer. The term hacker may refer to anyone with. technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes 6
  • 9. Hackers Hacker Classes : Black Hats BLACK HATS BLACK HATS The term “black hat” originated from Western movies, where the bad guys wore black hats and the good guys wore white hats.[1] They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data. A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. 7
  • 10. Hackers Hacker Classes : Grey Hats Grey Hats Grey Hats A grey hat hacker is someone who may violate ethical standards or principles, but without the malicious intent If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. grey hat hackers will look for vulnerabilities in a system without the owner's permission or knowledge. 8
  • 11. Hackers Hacker Classes : White Hats White Hats White Hats A white hat hacker is a computer security specialist white hat hackers have permission to employ them against the organization that has hired them. who breaks into protected systems and networks to test and asses their security. 9
  • 12. Attacks exemples. Phishing Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. 10
  • 14. What should I do to be safe online ?. 12
  • 15. What should I do to be safe online ?.  To protect your self  Keep you passwords private and create ones too strong that are hard to “crack”  If you have received an Email encounters, you may have been the target of a common scam called ‘phishing’. 13
  • 16. What should I do to be safe online ?.  To protect your self  Be wary of publishing any information that identifies you, such as your phone number, photos of your home, your address, date of birth or full name.  If you make purchases or do your banking online, make sure you protect your financial information  Use ‘https://’ 14
  • 17. What should I do to be safe online ?.  To protect your Computer Use Anti-virus Software: Anti-virus software can detect and destroy computer viruses before they cause damage Use Anti-spyware Software: Use anti-spyware software so unknown people cannot lurk on your computer and potentially steal your information 15
  • 18. Conclusion  Whenever using internet or an online financial system, ensure that your system is still under your control and not a spoofed puppet.  Protecting your self from internet threats.  Being aware of the dangers of the internet and taking the rightsteps to avoid them means you can enjoy the internet safely. 16