Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

CYBER SAFETY.pptx

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Prochain SlideShare
Power point cybercrime
Power point cybercrime
Chargement dans…3
×

Consultez-les par la suite

1 sur 14 Publicité

Plus De Contenu Connexe

Plus récents (20)

Publicité

CYBER SAFETY.pptx

  1. 1. FABRIKAM 15.6 CYBER CRIME C Y B E R S A F E T Y
  2. 2. FABRIKAM CYBER TROLLS AND BULLYING B U L L Y I N G T H R O U G H S O C I A L M E D I A 2
  3. 3. FABRIKAM CYBER TROLLS I N T E R N E T T R O L L An individual who posts false accusations or inflammatory remarks on social media to promote a cause or to harass someone. The anonymity of such venues enables people to say things they would not say in person, and they often like to ratchet up emotions to generate strong reactions. 3
  4. 4. FABRIKAM CYBER BULLYING B U L L Y I N G T H R O U G H I N T E R N E T Cyberbullying is bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior. 4
  5. 5. FABRIKAM 5 The most common places where cyberbullying occurs are: •Social Media, such as Facebook, Instagram, Snapchat, and Tik Tok •Text messaging and messaging apps on mobile or tablet devices •Instant messaging, direct messaging, and online chatting over the internet •Online forums, chat rooms, and message boards, such as Reddit •Email •Online gaming communities
  6. 6. FABRIKAM H A R A S S M E N T T H R O U G H I N T E R N E T Cyberstalkingrefersto the useof the internetandother technologies to harassor stalkanother person online, andis potentially a crimeinthe UnitedStates. This online harassment,which is an extension of cyberbullying andin- person stalking,cantakethe form of e-mails,text messages,social mediaposts, andmoreandis often methodical,deliberate,andpersistent. 6 CYBER STALKING
  7. 7. FABRIKAM 7 SPREADING RUMORS ONLINE People often think that they can make a fake profile with some different name and do anything online and will not be caught. Through such fake profiles, people sometimes indulge in posting false information on social media, or comments that could hurt others or spread rumours that may trigger panic or hurt religious sentiments of other people resulting into clashes and even riots etc.
  8. 8. FABRIKAM 8 ONLINE FRAUDS Internet fraud involves using online services and software with access to the internet to defraud or take advantage of victims. The term "internet fraud" generally covers cybercrime activity that takes place over the internet or on email, including crimes like identity theft, phishing, and other hacking activities designed to scam people out of money. States like California also have anti-phishing, credit card fraud, unauthorized computer access, and identity theft laws. These laws also prohibit eliciting personally identifiable information (PII) via the internet by pretending to be a company under the Anti-Phishing Act of 2005.
  9. 9. FABRIKAM 9 INFORMATION THEFT Identity theft occurs when someone steals your personal information—such as your Social Security Number, bank account number, and credit card information. Identity theft can be committed in many different ways. Some identity thieves sift through trash bins looking for bank account and credit card statements. More high-tech methods involve accessing corporate databases to steal lists of customer information. Once identity thieves have the information they are looking for, they can ruin a person's credit rating and the standing of other personal information.
  10. 10. FABRIKAM 10 SCAMS Scams are fraudulent schemes that are designed to deceive people for financial gain. Scams often involve falsely claiming to be from a legitimate company or using false identities to obtain money or personal information. Examples of scams include phishing emails, online auction fraud, identity theft, pyramid schemes, and "advance fee" fraud. Scammers often use social engineering techniques to manipulate victims into providing confidential information or money
  11. 11. FABRIKAM 11 ILLEGAL DOWNLOADS Illegal downloading is a process of getting/downloading data(like documents, images, videos, audio, etc.) that you are not allowed to use on the internet. Or, in other words, illegal downloads are a way in which user/users download files without having any legal right to download them. The files which are downloaded are copyrighted. As we know, a lot of data present on the internet is free i.e., you don’t need any license for downloading, distribution, etc. but some files/data have copyright laws intact with them, which prevents a common user to download or distribute it if he doesn’t have any license. These laws exist to prevent digital piracy of data on the internet. Copyright is a law that protects the original work of authorship. Copyright law covers literary, artistic, musical, architectural works and computer software, etc.
  12. 12. FABRIKAM 12 CHILD PORNOGRAPHY Child pornography is a form of child sexual exploitation. Federal law defines child pornography as any visual depiction of sexually explicit conduct involving a minor (persons less than 18 years old). Images of child pornography are also referred to as child sexual abuse images. Federal law prohibits the production, distribution, importation, reception, or possession of any image of child pornography. A violation of federal child pornography laws is a serious crime, and convicted offenders face fines severe statutory penalties (For more information, see Citizen's Guide to Federal Law on Child Pornography).
  13. 13. FABRIKAM National police helpline number is 112. National women helpline number is 181 and Cyber Crime Helpline is 1930. REPORTING CYBERCRIMES
  14. 14. FABRIKAM THANK YOU B Y S H I V A N S R I R A M R O S H A N K I S H O R E CYBER CRIME DEPARTMENT 1930 info@cybercert.in

×