SlideShare une entreprise Scribd logo
1  sur  24
Cyber
Safety
What is Cyber Safety?
•The act of protecting networks, computers,
servers, mobile devices, electronic systems, and
data against malicious attacks is known as cyber
safety.
•It is the mindful and secure use of the internet to
protect the privacy of personal data.
Identity Theft:- It occurs when someone impersonates
another using their personal information to commit
fraud.
Identity
Theft
Financial
Identity used
for getting
financial gain
Criminal
Identity used
to commit
crimes freely
Medical
Identity used
to obtain
medical
drugs
Ways in which websites track us
•IP address:- An IP address is a unique address which
identifies a device on the internet or a local network.
These are available to websites we visit and also
contain information about our rough location.
•Cookies:- They are small pieces of information stored
in the browser, which track, personalize, and save
information about each user’s session. Websites use
cookies to streamline your web experiences.
HTTP referrer:- It contains the address of the previous
web page from which a link to the currently requested
page was followed.
Super cookie:- They are a type of cookie which are
more persistent. These cookies are stored often in
multiple locations and are repopulated through
other locations when deleted from a particular
part. They are harder to get rid of.
User agent:- It tells the websites we visit about our
browser and operating system.
How to protect ourselves:- Anonymous and
Private browsing
• Anonymous browsers:- They are used by journalists governments etc.
which let the user access the internet without revealing personal
information such as IP address. For e.g. Tor browser
Private Browsing can be achieved through the following ways:-
Incognito Browsing
Proxy
VPNs
• Incognito browsing:- This is a version of the browser which
simply keeps your browsing activity private. It does not,
however, keep your ISP from seeing the sites you visit. For
e.g. Incognito mode in Chrome, private browsing in Firefox.
• Proxy:- A proxy site serves as an intermediate between the
user and the desired website. Instead of the user, the
trackers receive data about the proxy site.
• VPN:- A virtual private network, or VPN, is an encrypted
connection via internet from a device to a network. It can be
installed as a plugin too. It tunnels your connection through
a private server.
Need for confidentiality
The internet is a necessary tool in our day to day life.
There are multiple ways in which our data can be used
against us.
In order to avoid these mishappenings, there are a few
measures we need to take while browsing the
internet:-
Use a firewall whenever possible:-
A firewall is a barrier which
monitors and filters incoming and
outgoing network traffic based on
given guidelines. It keeps
unauthorized traffic out.
Control browser settings:-
Browsers track user data and share
information with websites you
might not approve of. Disable 3rd
party cookies to prevent tracking.
Use private browsing:- Using
methods such as the ones
mentioned previously, keep your
personal information and browsing
data safe.
Be careful with url:- It is better to
type it in yourself instead of
clicking on a link and making sure
that the connection is secure with
https and a padlock sign.
Be careful about what you’re
posting on the internet:- While
posting on social media sites like
Facebook, it should be ensured
that no personal information like
residential addresses are divulged.
Handle emails with care:- Be
cautious with how much you trust
emails, especially ones from
illegitimate looking sources. Do not
open attachments in this case, nor
click on any links.
Avoid dealing with sensitive
information while using public
connections:- Public WIFI's are
often unencrypted and are thus
easy to gain access to which can be
used to commit fraudulent
activities.
Avoid using public computers:-
Ensure your login information and
passwords are not getting saved.
Avoid putting sensitive data in and
make sure the computer is not left
unattended if you do. Delete
cookies and log out when you are
done.
THANK YOU
Submitted To: Er Anupam Sharma
Subm,itted by Swara Patil
Cyber Crime
And computer forensics
What is a Cybercrime?
Cybercrime is any criminal offense that
is facilitated by or involves electronic
communications or information systems,
including any electronic device, computer,
or the internet.
It is a general term that covers
crimes like phishing, credit card fraud,
illegal downloading, child pornography,
cyberbullying, and so on.
Common Cybercrimes
1. Cyber Trolls- A person who purposely posts
sarcastic, demeaning, or insulting comments
about someone.
2. Cyber Bullying- When someone uses the
internet, any electronic device, and social media
network to harass, embarrass or intimidate
someone else.
• Criminal charges such as harassment, libel,
assault, and even terrorism can be charged on
the criminal.
• According to the civil lawsuit they may be asked
to compensate for the damage caused.
3. Cyber Stalking- This is a kind of online harassment wherein the victim
is subjected to a barrage of online messages and emails.
• They collect all personal information.
• They may post the information online on any filthy/obscene sites
posing as if the victim is posting this information.
• People of all kinds, from all over the world, who come across this
information, start calling the victim at his/her residence for many
filthy/obscene reasons.
• Some stalkers subscribe the e-mail account of the victim to
innumerable obscene or illegal sites because of which the victim
starts receiving unsolicited e-mails.
• Some stalkers send repeated e-mails to ask for favours or threaten
them.
4. Spreading rumors online- When people
indulge in posting false information on social
media, or comments that could hurt or
spread rumors that could hurt others, may
trigger panic, or hurt the religious sentiments
of people resulting in clashes or even riots.
• As per the Information Technology Act of
India, publishing/circulation of rumors,
especially hurting religious sentiments is a
cybercrime and it may invite a fine with
imprisonment extendable upto 3 years.
5. Information Theft- Stealing of personal
information through ways such as-
• Phishing- It is a practice of attempting to
acquire sensitive information from
individuals over the internet, by means
of deception.
• Social engineering/pretexting- posing as
a legitimate business or government
official to obtain personal information.
6. Online Fraud- Fraud committed using the internet is called Online
Fraud.
7. Scam- Fraudulent business practice that extracts money.
Measures-
• Never enter any financial information on unsecure websites.
• Never answer e-mails from any unreliable source.
• Never click on links received in emails rather type the URL yourself.
• Never respond to an e-mail claiming you won something.
Non-delivered goods Non- existent companies
Stealing information Fraudulent Payments
Ways in which
it may occur
Strong
security
mechanism
Measures
8. Illegal Downloads- Illegal downloading refers to obtaining files for
which we don’t have the right to use on download from the internet. It
is downloading a paid item, without making any payment.
9. Child Pornography- Child Pornography is defined as any visual or
written representation that depicts or advocates the sexual activity of
anyone under the age of 18.
• The law also includes some child nudity, simulated sex involving
children, and any material that is computer-doctored to look like
child porn.
• Information Technology Act, 2000 & Indian Penal Code, 1860
provides protection from child pornography to a child below the age
of 18.
• According to the amended Information Technology Bill, Section 67
has been amended that not only creating and transmitting obscene
material in electronic form but also browsing such sites is an
offense.
Reporting Cybercrime
If any cyber crime happens, one must report it firstly to parents, school
authorities, and then to the police.
To report a cybercrime:
The Information technology Act provides that a cybercrime may be
reported in the Cyber Crime Units of any city, irrespective of the place
where the crime is committed.
The local police could be
approached for filing
complaints
Provisions have now
been made to file ‘E-FIR’
Complains can also be
filed on a website for
registering crimes against
women and children.
Computer Forensics
• Digital Forensics or computer forensics refers to methods used for
the interpretation of computer media for digital evidence.
Data
identification
Project
Planning
Data capture
Data
processing
Data analysis Data display
Data
processing
Important Practices of Computer Forensics:
• Acquire the evidence without damaging or altering the original.
• Authenticate that your recovered evidence is the same as the
originally seized data.
• Analyze the data without modifying it.
Cyber Law and IT Act
• Cyber law is a generic term that refers to
all legal and regulatory aspects of the
Internet and the World Wide Web.
• Cyber law is important because it touches
almost all aspects of transactions and
activities on and concerning the Internet,
the World Wide Web and Cyberspace.
India’s IT act and IT (Amendment) Act, 2008
• In India Cyber Laws are enforced through Information Technology
Act, 2000 (IT Act 2000).
• IT ACT 2000’s prime purpose was to provide legal recognition to
electronic commerce.
• IT (Amendment) Act, 2008 added several new sections of offenses
including Cyber Terrorism and Data Protection.
• Major amendments of IT ACT (2008)-
Digital Signatures
• Authentication of
electronic records
Electronic Governance
• E-Documents get legal
recognition
• Legal documents can be
supplied in electronic
form
Offences and Penalties
• Penalty upto INR 1
crore
Amendments to other
laws
• Indian Penal Code, 1860
• The Indian Evidence
Act, 1872
• The Banker’s book
evidence Act, 1891 and
many more
Submitted To: Er Anupam Sharma
Submitted

Contenu connexe

Tendances

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 

Tendances (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

Similaire à Cyber Safety ppt.pptx

Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxTejasSingh70
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxJoelGautham
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 

Similaire à Cyber Safety ppt.pptx (20)

Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Plus de CGC Technical campus,Mohali

Plus de CGC Technical campus,Mohali (20)

Gender Issues CS.pptx
Gender Issues CS.pptxGender Issues CS.pptx
Gender Issues CS.pptx
 
Intellectual Property Rights.pptx
Intellectual Property Rights.pptxIntellectual Property Rights.pptx
Intellectual Property Rights.pptx
 
Python Modules .pptx
Python Modules .pptxPython Modules .pptx
Python Modules .pptx
 
Dynamic allocation
Dynamic allocationDynamic allocation
Dynamic allocation
 
Arrays in c
Arrays in cArrays in c
Arrays in c
 
Control statments in c
Control statments in cControl statments in c
Control statments in c
 
Operators in c by anupam
Operators in c by anupamOperators in c by anupam
Operators in c by anupam
 
Datatypes in c
Datatypes in cDatatypes in c
Datatypes in c
 
Fundamentals of-computer
Fundamentals of-computerFundamentals of-computer
Fundamentals of-computer
 
Searching
Searching Searching
Searching
 
File handling-c
File handling-cFile handling-c
File handling-c
 
Structure in C language
Structure in C languageStructure in C language
Structure in C language
 
Intro
IntroIntro
Intro
 
Function in c program
Function in c programFunction in c program
Function in c program
 
Function in c
Function in cFunction in c
Function in c
 
string in C
string in Cstring in C
string in C
 
C arrays
C arraysC arrays
C arrays
 
Data processing and Report writing in Research(Section E)
Data processing and Report writing in Research(Section E)Data processing and Report writing in Research(Section E)
Data processing and Report writing in Research(Section E)
 
data analysis and report wring in research (Section d)
data analysis and report wring  in research (Section d)data analysis and report wring  in research (Section d)
data analysis and report wring in research (Section d)
 
Section C(Analytical and descriptive surveys... )
Section C(Analytical and descriptive surveys... )Section C(Analytical and descriptive surveys... )
Section C(Analytical and descriptive surveys... )
 

Dernier

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Dernier (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Cyber Safety ppt.pptx

  • 2. What is Cyber Safety? •The act of protecting networks, computers, servers, mobile devices, electronic systems, and data against malicious attacks is known as cyber safety. •It is the mindful and secure use of the internet to protect the privacy of personal data.
  • 3. Identity Theft:- It occurs when someone impersonates another using their personal information to commit fraud. Identity Theft Financial Identity used for getting financial gain Criminal Identity used to commit crimes freely Medical Identity used to obtain medical drugs
  • 4. Ways in which websites track us •IP address:- An IP address is a unique address which identifies a device on the internet or a local network. These are available to websites we visit and also contain information about our rough location. •Cookies:- They are small pieces of information stored in the browser, which track, personalize, and save information about each user’s session. Websites use cookies to streamline your web experiences.
  • 5. HTTP referrer:- It contains the address of the previous web page from which a link to the currently requested page was followed. Super cookie:- They are a type of cookie which are more persistent. These cookies are stored often in multiple locations and are repopulated through other locations when deleted from a particular part. They are harder to get rid of. User agent:- It tells the websites we visit about our browser and operating system.
  • 6. How to protect ourselves:- Anonymous and Private browsing • Anonymous browsers:- They are used by journalists governments etc. which let the user access the internet without revealing personal information such as IP address. For e.g. Tor browser Private Browsing can be achieved through the following ways:- Incognito Browsing Proxy VPNs
  • 7. • Incognito browsing:- This is a version of the browser which simply keeps your browsing activity private. It does not, however, keep your ISP from seeing the sites you visit. For e.g. Incognito mode in Chrome, private browsing in Firefox. • Proxy:- A proxy site serves as an intermediate between the user and the desired website. Instead of the user, the trackers receive data about the proxy site. • VPN:- A virtual private network, or VPN, is an encrypted connection via internet from a device to a network. It can be installed as a plugin too. It tunnels your connection through a private server.
  • 8. Need for confidentiality The internet is a necessary tool in our day to day life. There are multiple ways in which our data can be used against us. In order to avoid these mishappenings, there are a few measures we need to take while browsing the internet:-
  • 9. Use a firewall whenever possible:- A firewall is a barrier which monitors and filters incoming and outgoing network traffic based on given guidelines. It keeps unauthorized traffic out. Control browser settings:- Browsers track user data and share information with websites you might not approve of. Disable 3rd party cookies to prevent tracking. Use private browsing:- Using methods such as the ones mentioned previously, keep your personal information and browsing data safe. Be careful with url:- It is better to type it in yourself instead of clicking on a link and making sure that the connection is secure with https and a padlock sign.
  • 10. Be careful about what you’re posting on the internet:- While posting on social media sites like Facebook, it should be ensured that no personal information like residential addresses are divulged. Handle emails with care:- Be cautious with how much you trust emails, especially ones from illegitimate looking sources. Do not open attachments in this case, nor click on any links. Avoid dealing with sensitive information while using public connections:- Public WIFI's are often unencrypted and are thus easy to gain access to which can be used to commit fraudulent activities. Avoid using public computers:- Ensure your login information and passwords are not getting saved. Avoid putting sensitive data in and make sure the computer is not left unattended if you do. Delete cookies and log out when you are done.
  • 11. THANK YOU Submitted To: Er Anupam Sharma Subm,itted by Swara Patil
  • 13. What is a Cybercrime? Cybercrime is any criminal offense that is facilitated by or involves electronic communications or information systems, including any electronic device, computer, or the internet. It is a general term that covers crimes like phishing, credit card fraud, illegal downloading, child pornography, cyberbullying, and so on.
  • 14. Common Cybercrimes 1. Cyber Trolls- A person who purposely posts sarcastic, demeaning, or insulting comments about someone. 2. Cyber Bullying- When someone uses the internet, any electronic device, and social media network to harass, embarrass or intimidate someone else. • Criminal charges such as harassment, libel, assault, and even terrorism can be charged on the criminal. • According to the civil lawsuit they may be asked to compensate for the damage caused.
  • 15. 3. Cyber Stalking- This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. • They collect all personal information. • They may post the information online on any filthy/obscene sites posing as if the victim is posting this information. • People of all kinds, from all over the world, who come across this information, start calling the victim at his/her residence for many filthy/obscene reasons. • Some stalkers subscribe the e-mail account of the victim to innumerable obscene or illegal sites because of which the victim starts receiving unsolicited e-mails. • Some stalkers send repeated e-mails to ask for favours or threaten them.
  • 16. 4. Spreading rumors online- When people indulge in posting false information on social media, or comments that could hurt or spread rumors that could hurt others, may trigger panic, or hurt the religious sentiments of people resulting in clashes or even riots. • As per the Information Technology Act of India, publishing/circulation of rumors, especially hurting religious sentiments is a cybercrime and it may invite a fine with imprisonment extendable upto 3 years.
  • 17. 5. Information Theft- Stealing of personal information through ways such as- • Phishing- It is a practice of attempting to acquire sensitive information from individuals over the internet, by means of deception. • Social engineering/pretexting- posing as a legitimate business or government official to obtain personal information.
  • 18. 6. Online Fraud- Fraud committed using the internet is called Online Fraud. 7. Scam- Fraudulent business practice that extracts money. Measures- • Never enter any financial information on unsecure websites. • Never answer e-mails from any unreliable source. • Never click on links received in emails rather type the URL yourself. • Never respond to an e-mail claiming you won something. Non-delivered goods Non- existent companies Stealing information Fraudulent Payments Ways in which it may occur Strong security mechanism Measures
  • 19. 8. Illegal Downloads- Illegal downloading refers to obtaining files for which we don’t have the right to use on download from the internet. It is downloading a paid item, without making any payment. 9. Child Pornography- Child Pornography is defined as any visual or written representation that depicts or advocates the sexual activity of anyone under the age of 18. • The law also includes some child nudity, simulated sex involving children, and any material that is computer-doctored to look like child porn. • Information Technology Act, 2000 & Indian Penal Code, 1860 provides protection from child pornography to a child below the age of 18. • According to the amended Information Technology Bill, Section 67 has been amended that not only creating and transmitting obscene material in electronic form but also browsing such sites is an offense.
  • 20. Reporting Cybercrime If any cyber crime happens, one must report it firstly to parents, school authorities, and then to the police. To report a cybercrime: The Information technology Act provides that a cybercrime may be reported in the Cyber Crime Units of any city, irrespective of the place where the crime is committed. The local police could be approached for filing complaints Provisions have now been made to file ‘E-FIR’ Complains can also be filed on a website for registering crimes against women and children.
  • 21. Computer Forensics • Digital Forensics or computer forensics refers to methods used for the interpretation of computer media for digital evidence. Data identification Project Planning Data capture Data processing Data analysis Data display Data processing Important Practices of Computer Forensics: • Acquire the evidence without damaging or altering the original. • Authenticate that your recovered evidence is the same as the originally seized data. • Analyze the data without modifying it.
  • 22. Cyber Law and IT Act • Cyber law is a generic term that refers to all legal and regulatory aspects of the Internet and the World Wide Web. • Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace.
  • 23. India’s IT act and IT (Amendment) Act, 2008 • In India Cyber Laws are enforced through Information Technology Act, 2000 (IT Act 2000). • IT ACT 2000’s prime purpose was to provide legal recognition to electronic commerce. • IT (Amendment) Act, 2008 added several new sections of offenses including Cyber Terrorism and Data Protection. • Major amendments of IT ACT (2008)- Digital Signatures • Authentication of electronic records Electronic Governance • E-Documents get legal recognition • Legal documents can be supplied in electronic form Offences and Penalties • Penalty upto INR 1 crore Amendments to other laws • Indian Penal Code, 1860 • The Indian Evidence Act, 1872 • The Banker’s book evidence Act, 1891 and many more
  • 24. Submitted To: Er Anupam Sharma Submitted