2. Cyber Safety
• Cyber safety refers to safe and responsible
use of Internet, to ensure safety and security
of personal information and not posing
threat to anyone else’s information.
3. Safely Browsing The Web
• These days we must know the threats while
browsing the web. Safe browsing on web needs
you to know many things like:
• What are possible dangers?
• How to avoid these?
• How to virtually conduct yourself while browsing
web
• You must remember, not every site you visit
is safe. Whatever you post or do online is
visible to others. Not everything you see or is
promised online is true.
4. Identity Protection while using
Internet
• We surf internet for a variety of reasons, from using
social media, buying and selling goods, to exchanging
information.
• When we give private data to businesses and other
Internet users (such as while filling online form or
making payment online), we trust them to use that
information for legitimate purposes.
• These information can be used for harmful reasons like
hacking, stalking an identify fraud.
• Identity fraud is when personal details that have been
accessed or stolen are used to commit fraudulent acts
posing as someone else with stolen identity
5. Solution of Identity Fraud
• Most common solution to this is :
• Private Browsing Or
• Anonymous Browsing
Before we understand this, let us talk about
what happens when we browse the internet…
6. Anonymous Browsing
• All the ways discussed earlier of identity leakage is
resolved by either ANONYMOUS OR PRIVATE
BROWSING.
• ANONYMOUS BROWSING : allows users to
view websites without revealing any
personnel information of user like IP
address, machine type, location. An
anonymous browser lets users access websites
anonymously. It can also be as a tool for
government, journalists and everyday
security-conscious surfers.
7. Private Browsing
• There are other ways to use internet
without revealing our search history and
sharing our data :
• Incognito Browsing : opens up a version of the
browser that will not track you activity.
• Its particularly useful if you are entering sensitive
data like bank details into the browser as it can
minimise the risk of our information being saved
to that computer.
• In Google chrome, just press : CTRL + SHIFT + N
to open in incognito mode
8.
9. Private Browsing
• Proxy : act as a middlemen between your
computer and the website you want to access.
Now the tracking website will get the IP address
and information that belongs to the proxy site, so
you are effectively getting the same content from
another source without getting to know your
browsing details.
• Virtual Private Network (VPN) : is a method to add
security and privacy to private and public networks
like Wi-Fi hotspot and the Internet. VPNs are most
often used by corporation to protect sensitive data.
VPN were originally meant for business employees
working offsite to gain access to shared drive.
10. Confidentiality of Information
• Internet is a public platform. The sites you
visit, the products you search, the posts that
you put on social media are all visible to
public. But there must be some information
like Credit Card Details, Bank Details which
you do not want to make public i.e. you
want to keep this information confidential.
• Confidentiality of information ensures that
only authorized users get access to sensitive
and protected data
11. Practices to Ensure
Confidentiality of Information
1. Use Firewall wherever possible : we must
secure our system such that only authentic
users can connect to it. Firewall is one very
good solution for this. Firewall is a
program/hardware that monitors all
communications and traps all
illicit packets. Most OS now comes with
firewall preinstalled. We must install
Firewall that can monitor both incoming
and outgoing communication and traps the
illicit ones.
12. 2. Control browser setting to block tracking :
As we know that website can track our surfing
on their site by IP address, to minimise these
threats we can turn our default settings to
exclude third party cookies since they can be
used to build up detailed profiles of our surfing
pattern over time.
In Google Chrome : Open settings, -> Privacy
and Security -> Content Settings-> Cookies ->
“Enable” Block Third party cookie.
Practices to Ensure
Confidentiality of Information
13. 3.Browse privately wherever possible: to avoid the
tracking as discussed earlier try to browse
anonymously or privately.
4.Be Careful while posting on Internet : When you
post anything to public Internet such as social
networking site like Instagram or Facebook etc.
newgroup, mailing list or chat room you generally
give up rights to the content and any expectation
or privacy or confidentiality is useless. So never
post crucial information like you personal details
such as address, mobile phone numbers, bank
details, credit card details. Etc. on public internet
sites.
Practices to Ensure
Confidentiality of Information
14. 5. Ensure Safe sites while entering crucial
Information : while entering or giving crucial
information like Passwords, Bank Details
always ensure the website is working on https
not on http. https means website is Secure i.e.
Secure Socket Layer. For e.g. (next slide)
Practices to Ensure
Confidentiality of Information
16. 6. Carefully handle emails : while opening emails,
make sure you know the sender. Never open
email of unknown or if by
curiosity/accidentally opened the mail never
click on any link inside it or open any
attachment. It may lead to you fraudulent
site, or trap for you or may be a Trojan, which
will act as a Spy in you computer for sending
information to the sender without your
knowledge.
Practices to Ensure
Confidentiality of Information
17. 7. Avoid using Public Computer : Always try not to
use the public computer specially if you have to deal
with your crucial data. But if it is an urgency then
do remember:
Browse privately
Never save your login information (ID/Password)
Avoid entering sensitive information
Don’t leave computer unattended with sensitive
information on screen
Disable the features that stores passwords
Properly logout before you leave the computer
Erase history and traces of your work i.e. clear
history and cookies
Look for any suspicious device connected to
computer
Practices to Ensure Confidentiality of
Information
18. Cyber Crime
• Is any criminal offense that is facilitated by,
or involves use of electronic communications
of information system including any
electronic device, computer or the Internet.
• It involves the terms like : Phishing, Credit
Card Frauds, illegal downloading, industrial
espionage, child pornography, cyber bullying,
cyber stalking, cyber terrorism, creation and
/or distribution of viruses, spam and so on
19. Cyber Trolls and Bullying
• It refers to a person who purposely post opposing,
sarcastic, demeaning or insulting- comments
about something or someone with an aim of
targeting a person online. The provocative
messages posted this way are also called trolls. It
is a cyber crime and is a form of cyber bullying.
20. Cyber Bullying
• Harassing, demeaning, embarrassing,
defaming, or intimidating someone using
modern technologies like internet, cell
phones, instant messengers, social networks
etc. is called Cyber Bullying.
21. Cyber Stalking
• It is a kind of online harassment wherein the
victim is subjected to barrage of online messages
and emails.
• Typically these stalkers know their victims instead
of resorting to offline stalking, they use the
internet to stalk.
• A cyber stalker relies upon the anonymity
afforded by the Internet to allow to stalk their
victim without being detected
22. Cyber Stalking
• Cyber Stalkers often do this to trouble their
victims:
• They collect all personal information about their
victims
• The stalker may post this information on any obscene
or illegal website posing as if the victim is posting this
information
• People of all kind from nook and corner of the world,
start calling the victim as his/her residence/workplace
for many filthy/obscene reasons
• Some stalker subscribe the email account of victim to
illegal websites because of which victim starts receiving
such kind of unsolicited e-mails.
23. Cyber Stalking
• Cyber Stalkers often do this to trouble their
victims:
• Some stalkers keep on sending repeated e-mails asking
for various kinds of favors or threaten the victim.
• Stalkers follow their victim from board to board.
• Stalkers will almost always make contact with their
victims through email having friendly or threatening
content. The stalker many times uses multiple names
when contacting the victim.
24. Spreading Rumors Online
• People often think that they can make a fake
profile with some different name and do
anything online and will not be caught. Through
such fake profile, people sometimes indulge in
posting false information on social media, or
comment could hurt others or spread rumors
that may trigger panic or hurt religious
sentiments of other people resulting into clashes
and even riots
• Spreading rumors online is a cyber crime and it
may invite a fine with imprisonment extendable
up to three years.
25. Reporting Cyber Crime
• If any cyber crime happens, one must report it
firstly to parents, school authorities and then to
police.
• The local police stations can be approached for filing
complaints just as the cybercrime cells specially
designation with the jurisdiction to register
complaint
• In addition, provisions have now been made for
filing of E-FIR in most of the states
• In addition, the ministry of tfome Affairs is also
launching a website for registering crimes against
women and children online including cybercrimes
26. Common Social Networking Sites
• Facebook : it is a platform where you can share
your ideas in form of posts, share photos, videos
etc.
• Twitter : micro blogging site which allows to
post very small messages up to 280
characters.
• Linkedln : social network for professionals.
Provides features to make profiles look sort of
detailed resumes, with sections for work
experience, education, volunteer work,
certifications, awards etc.
• Instagram : on of the most popular social
networks for online photo sharing. Offer features
like sharing real-time photos and short videos
while on the go.
27. Appropriateusage of SocialNetworks
• Whatever we do online – post something or visit
friends pages or search something etc leaves a
permanent footprints called digital footprints and it
remains for years storing trails of your online
activities.
• We are using this platform for personal reasons and
visible to anyone who looks for it, this might not
cause any problem now BUT sometimes later it can
pose potential problems when it comes to matter like
– taking admissions in higher education or looking for
job or even when looking for a life partner
• These days many universities look for digital
footprints of applicant students before giving them
admissions, similarly employers may look for digital
footprint of candidates and so on.
28. What you should know?
• While using social networking sites, you should
know about what the right online behaviors are
and what is considered a cybercrime
• If anyone thinks by making fake profile he/she
can do such activity without being caught he/she
is certainly mistaken. Modern technology tools
can find anyone online using IP address, locations
etc. So one must not indulge in these activities at
all.
29. Digital Footprints
• Digital Footprints are the records and
traces individuals leave behind as they use
the Internet.
• Digital Footprints are permanently stored.
• Your interaction on social media, your friend
circle on social media sites, site you visits,
online purchase, location visited through
Facebook check-ins. etc. all make up your
Digital Footprints.
30. Privacy Settings
• When you start social media, you should not
go with default privacy settings. Rather it is
always a good idea to set-up privacy
settings yourself by using Account Settings.
Through privacy settings you can control :
• Who all can see what you have posted
• Who all can send requests to you
• What all information about you is visible to others,
even to you contacts etc.
31. What you should do – Usage Rules
1. Be Authentic : Be honest about your identity
2. Use a Disclaimer : if you are associated with any
institution / organization and you are sharing
you personal views about something, do make it
clear that these are you personal vies and you do
not represent any institution/organization.
3. Don’t Pick Fights Online : don’t pick fight online
if you do not like anyone's comments on your
post.
32. What you should do – Usage Rules
4. Don’t use Fake names or Pseudonyms : never
pretends to be someone else.
5.Protect Your Identity : while you should be
honest about yourself, BUT you should never
provide or post personal information online. These
information can be used to conduct fraud or crime.
6.Does your Information / Post pass the publicity
test ? : if your post is not acceptable for face-to-
face conversation, over the telephone then it is
NOT ACCEPTABLE for a social networking site too.
33. What you should do – Usage Rules
7.Respect you audience : sometimes
school/college students talk in slang or use
some abusive words which they find okay
within their small group. But these things must
not be posted online because it would not be
acceptable in you connected world.
8.Respect other’s Sentiments : you should
always respects others’ privacy and be
considerate for topics that may be considered
sensitive – such as politics and religion.
34. What you should do – Usage Rules
9. Monitor Comments : most people who
maintain social media sites welcome comments
– it builds credibility and community. You
should prefer to review and approve comments
before posting them on you site. This way you
will ensure quality oF comments
35. Online Access and
Computer Security
Introduction
Threats to Computer Security
Solutions to Computer Security
threats
36. Threats to Computer Security
• A threat is potential violation of
security
• When a threat is actually executed,
it becomes attack.
• Those who execute such actions, or
cause them to be executed are called
attackers.
37. Common threats
Viruses (Worms, Trojans)
Spyware
Adware
Spamming
PC Intrusion (Denial of Service, Sweeping, Password Guessing)
Phishing
38. Computer Viruses
• Are the malicious code/programs that cause
damage to data and files on a system.
• It can attack any part of computer system
like boot block, OS, system areas, files and
applications.
• 2 other similar programs also cause virus
like effects :
• Worms
• Trojans
39. Worms
• A worm is a self-replication programs which
eats up the entire disk space or memory. A
Worm keeps on creating its copies until all
the disk space or memory is filled.
• Worms harm to a computer or a computer
network by consuming bandwidth and slow
down the network speed. After the worm
has infected a system, it can propagate to
other systems via internet or while copying
files from one system to another without
user interaction.
40. Trojan Horses
• Is a program that appears harmless (such as text
editor or a utility program) but actually
performs malicious functions such as deleting or
damaging files.
• With help of Trojan, harm that could be done by
hacker on target computer systems are:
• Data theft
• Installation of unwanted softwares
• Keystroke logging
• Downloading or uploading of files. And many more…
41. Damaged Caused by Viruses
• Damage or delete files : some viruses may
delete or damage random documents or
specific files that are crucial to you OS.
• Slow down your Computer
• Invade your email programs : some forms of
viruses may wreak even more havoc by
spreading themselves to the contact in your
address book.
42. Spyware
• Is a software which is installed on your
computer to spy on your activities and
report this data to people willing to pay for
it.
• Spyware mostly get installed on your PC
without your consent. They gets installed
when you visit any illegitimate website or
download music, videos etc.
43. Damage caused by Spyware
• Compromise you data, computing habits and
identity: it can monitor information about your
computing habits like what websites you visit,
record your keystroke (user name, password,
credit card number) which in the end can lead
to identity theft.
• Alter PC Settings: can alter settings like web
browser home page, placement of desktop icons,
which may be annoying
• Slows down you PC: can slows down system and
Internet speed and become big problem when
you are trying to use the programs on your PC,
watch video online downloading large files.
44. Adware
• Programs that deliver unwanted ads to your
computer generally in popups. They consume
bandwidth. Similar to spyware but it may
be installed with your consent. Damages are:
• Adware tracks information like spyware
• Display arrays of annoying advertising
• Slows down you PC
45. Spamming
• Means sending of bulk-mail by an identified
or unidentified source. In non-malicious
form, bulk advertising mail is sent to many
accounts. In malicious form (email
bombarding) the attackers keeps on sending
bulk mail until the mail-server runs out of
disk space. Damages are:
• Spam reduces productivity: billions of spam messages
circulating across the Internet can disrupt email
delivery, degrade system performance and reduce
overall productivity
46. Spamming
• Spam eats up your time: deleting spam emails like the
simple solutions, but it eats a significant amount of
productivity
• Spam can lead to worse things: spam messages may
contain offensive, fraudulent material and can even
be used to spreadviruses.
47. Eavesdropping
• Do you ever find that when you are talking to
someone else, another person is secretly trying to
listen to your talks? What that person is doing is
'eavesdropping'. tfave you ever tried to secretly
listen to the conversation between two teachers
regarding your class? If yes, then what you have
done is 'eavesdropping'.
• In context of network security Eavesdropping
refers to unauthorized access to another person's
or organization's data while the data is on its
way on the network.
48. Eavesdropping
• This may be done in a number of ways:
• By setting up parallel telephone lines.
• By installing some software (spyware) in the
target computer.
• By installing some receiver which captures the
data while on its way.
49. Phishing
• It is criminally fraudulent process of
attempting to acquire sensitive information
such as usernames, passwords, credit card
information, CVV number etc. In phishing an
imposter uses an authentic looking email or
web-site to trick recipients into giving out
sensitive personal information. For example
an email asking to update your bank details
by clicking on a link or an email regarding
lucky winner of some amount.
50. Pharming
• Is an attack in which a hacker attempts to redirect a
website’s traffic to another bogus website. Through
pharming attack, the attacker points you to
malicious and illegitimate website by redirecting the
legitimate URL. Even if the URL is entered correctly, it
can still be redirected to fake website.
51. Solutions to Computer Security Threats
• There are 2 ways of safeguarding our
computer system:
• Active Protection: installing and properly using an
antivirus software that includes internet security
which include protection against threats such as
viruses, Sypware and PC intrusions – is vital for
proper protection against the hackers, intruders
and wrongdoers
• Preventive Measures: even though security
programs may actively detect and eliminate any
threats your PC encounters, you should always
help to prevent these issues from ever arising.
52. Solutions to Virus, Adware and
Spyware
Active Protection Preventive measures
• Use Anti-Virus and
Anti- spyware
software
scan all you system for virus
disconnect infected
system immediately
from you network
Restore the infected
system from clean backup
Notify your antivirus
vendors so it can ensure its
signature database is up-
to-date
• Download updates regularly
• Run frequent full systemscan
• Keep you system up-to-
date Use Caution when
downloading files on the
Internet
• Be Careful with email
Don’t download or
open unsolicited email
attachments
Don’t click on link in
email rather type the
URL on address bar
Check for security alerts
Disable running of scripts
and cookies
Disconnect from the internet
when you are away
• Disable cookie if possible
53. Solutions to Spam, Eavesdropping
Active Protection Preventive measures
Use Anti-Spam Software
(i) Sender Filtering: this method allows
only messages from your approved
sender list to reach you inbox- all
other mail is quarantined for later
review. It is done on the basis of
Digital Certificates ( specially
formatted digital information issued to
website, are used to verify the
identify of message sender) and
Digital Signatures ( are way of
authenticating the identity of
creators or producers of digital
information.
(ii) Key Filtering: this method filters out
email messages that contain certain
keywords or phrases, which are
defined by you or others.
Keep you emailaddress
private
Use encrypted connection
always if you have to provide
sensitive information i.e.
HTTPs
Install personal firewall on
computer connected to the
Internet to check incoming
and outgoing information and
connections
Avoid online transaction from
public network or public
Wi-Fi
Install protection software
such as Internet Security
software
54. Solution to Phishing and Pharming
Active Protection Preventive measures
Take the computer offline (it
may reduce the probability of
infecting other devices in the
same network with malware)
Backup all files on the hard
drive
List the information given to
phishing scammers
(depending on what was
leaked one may need to
change password, block
credit/debit card, BUT
DON’T USE THE SAME
COMPUTER TO CONTACT
AGENCIES)
Run Antivirus software
Contact Credit agencies to report
any possibilities of identify theft
Don’t open emails from
unknown sources or click on
links embedded in suspect
messages
Check security guidelines of
website such as PayPal so that
you can distinguish between
legitimate and bogus emails
Also rather than clicking on
link you can type general link
on you web browser. If you are
in double DON’T CLICK