SlideShare ist ein Scribd-Unternehmen logo
1 von 55
CYBER SAFETY
CHAPTER 15
Cyber Safety
• Cyber safety refers to safe and responsible
use of Internet, to ensure safety and security
of personal information and not posing
threat to anyone else’s information.
Safely Browsing The Web
• These days we must know the threats while
browsing the web. Safe browsing on web needs
you to know many things like:
• What are possible dangers?
• How to avoid these?
• How to virtually conduct yourself while browsing
web
• You must remember, not every site you visit
is safe. Whatever you post or do online is
visible to others. Not everything you see or is
promised online is true.
Identity Protection while using
Internet
• We surf internet for a variety of reasons, from using
social media, buying and selling goods, to exchanging
information.
• When we give private data to businesses and other
Internet users (such as while filling online form or
making payment online), we trust them to use that
information for legitimate purposes.
• These information can be used for harmful reasons like
hacking, stalking an identify fraud.
• Identity fraud is when personal details that have been
accessed or stolen are used to commit fraudulent acts
posing as someone else with stolen identity
Solution of Identity Fraud
• Most common solution to this is :
• Private Browsing Or
• Anonymous Browsing
Before we understand this, let us talk about
what happens when we browse the internet…
Anonymous Browsing
• All the ways discussed earlier of identity leakage is
resolved by either ANONYMOUS OR PRIVATE
BROWSING.
• ANONYMOUS BROWSING : allows users to
view websites without revealing any
personnel information of user like IP
address, machine type, location. An
anonymous browser lets users access websites
anonymously. It can also be as a tool for
government, journalists and everyday
security-conscious surfers.
Private Browsing
• There are other ways to use internet
without revealing our search history and
sharing our data :
• Incognito Browsing : opens up a version of the
browser that will not track you activity.
• Its particularly useful if you are entering sensitive
data like bank details into the browser as it can
minimise the risk of our information being saved
to that computer.
• In Google chrome, just press : CTRL + SHIFT + N
to open in incognito mode
Private Browsing
• Proxy : act as a middlemen between your
computer and the website you want to access.
Now the tracking website will get the IP address
and information that belongs to the proxy site, so
you are effectively getting the same content from
another source without getting to know your
browsing details.
• Virtual Private Network (VPN) : is a method to add
security and privacy to private and public networks
like Wi-Fi hotspot and the Internet. VPNs are most
often used by corporation to protect sensitive data.
VPN were originally meant for business employees
working offsite to gain access to shared drive.
Confidentiality of Information
• Internet is a public platform. The sites you
visit, the products you search, the posts that
you put on social media are all visible to
public. But there must be some information
like Credit Card Details, Bank Details which
you do not want to make public i.e. you
want to keep this information confidential.
• Confidentiality of information ensures that
only authorized users get access to sensitive
and protected data
Practices to Ensure
Confidentiality of Information
1. Use Firewall wherever possible : we must
secure our system such that only authentic
users can connect to it. Firewall is one very
good solution for this. Firewall is a
program/hardware that monitors all
communications and traps all
illicit packets. Most OS now comes with
firewall preinstalled. We must install
Firewall that can monitor both incoming
and outgoing communication and traps the
illicit ones.
2. Control browser setting to block tracking :
As we know that website can track our surfing
on their site by IP address, to minimise these
threats we can turn our default settings to
exclude third party cookies since they can be
used to build up detailed profiles of our surfing
pattern over time.
In Google Chrome : Open settings, -> Privacy
and Security -> Content Settings-> Cookies ->
“Enable” Block Third party cookie.
Practices to Ensure
Confidentiality of Information
3.Browse privately wherever possible: to avoid the
tracking as discussed earlier try to browse
anonymously or privately.
4.Be Careful while posting on Internet : When you
post anything to public Internet such as social
networking site like Instagram or Facebook etc.
newgroup, mailing list or chat room you generally
give up rights to the content and any expectation
or privacy or confidentiality is useless. So never
post crucial information like you personal details
such as address, mobile phone numbers, bank
details, credit card details. Etc. on public internet
sites.
Practices to Ensure
Confidentiality of Information
5. Ensure Safe sites while entering crucial
Information : while entering or giving crucial
information like Passwords, Bank Details
always ensure the website is working on https
not on http. https means website is Secure i.e.
Secure Socket Layer. For e.g. (next slide)
Practices to Ensure
Confidentiality of Information
Closed Lock Pad (Secure Connection)
6. Carefully handle emails : while opening emails,
make sure you know the sender. Never open
email of unknown or if by
curiosity/accidentally opened the mail never
click on any link inside it or open any
attachment. It may lead to you fraudulent
site, or trap for you or may be a Trojan, which
will act as a Spy in you computer for sending
information to the sender without your
knowledge.
Practices to Ensure
Confidentiality of Information
7. Avoid using Public Computer : Always try not to
use the public computer specially if you have to deal
with your crucial data. But if it is an urgency then
do remember:
 Browse privately
 Never save your login information (ID/Password)
 Avoid entering sensitive information
 Don’t leave computer unattended with sensitive
information on screen
 Disable the features that stores passwords
 Properly logout before you leave the computer
 Erase history and traces of your work i.e. clear
history and cookies
 Look for any suspicious device connected to
computer
Practices to Ensure Confidentiality of
Information
Cyber Crime
• Is any criminal offense that is facilitated by,
or involves use of electronic communications
of information system including any
electronic device, computer or the Internet.
• It involves the terms like : Phishing, Credit
Card Frauds, illegal downloading, industrial
espionage, child pornography, cyber bullying,
cyber stalking, cyber terrorism, creation and
/or distribution of viruses, spam and so on
Cyber Trolls and Bullying
• It refers to a person who purposely post opposing,
sarcastic, demeaning or insulting- comments
about something or someone with an aim of
targeting a person online. The provocative
messages posted this way are also called trolls. It
is a cyber crime and is a form of cyber bullying.
Cyber Bullying
• Harassing, demeaning, embarrassing,
defaming, or intimidating someone using
modern technologies like internet, cell
phones, instant messengers, social networks
etc. is called Cyber Bullying.
Cyber Stalking
• It is a kind of online harassment wherein the
victim is subjected to barrage of online messages
and emails.
• Typically these stalkers know their victims instead
of resorting to offline stalking, they use the
internet to stalk.
• A cyber stalker relies upon the anonymity
afforded by the Internet to allow to stalk their
victim without being detected
Cyber Stalking
• Cyber Stalkers often do this to trouble their
victims:
• They collect all personal information about their
victims
• The stalker may post this information on any obscene
or illegal website posing as if the victim is posting this
information
• People of all kind from nook and corner of the world,
start calling the victim as his/her residence/workplace
for many filthy/obscene reasons
• Some stalker subscribe the email account of victim to
illegal websites because of which victim starts receiving
such kind of unsolicited e-mails.
Cyber Stalking
• Cyber Stalkers often do this to trouble their
victims:
• Some stalkers keep on sending repeated e-mails asking
for various kinds of favors or threaten the victim.
• Stalkers follow their victim from board to board.
• Stalkers will almost always make contact with their
victims through email having friendly or threatening
content. The stalker many times uses multiple names
when contacting the victim.
Spreading Rumors Online
• People often think that they can make a fake
profile with some different name and do
anything online and will not be caught. Through
such fake profile, people sometimes indulge in
posting false information on social media, or
comment could hurt others or spread rumors
that may trigger panic or hurt religious
sentiments of other people resulting into clashes
and even riots
• Spreading rumors online is a cyber crime and it
may invite a fine with imprisonment extendable
up to three years.
Reporting Cyber Crime
• If any cyber crime happens, one must report it
firstly to parents, school authorities and then to
police.
• The local police stations can be approached for filing
complaints just as the cybercrime cells specially
designation with the jurisdiction to register
complaint
• In addition, provisions have now been made for
filing of E-FIR in most of the states
• In addition, the ministry of tfome Affairs is also
launching a website for registering crimes against
women and children online including cybercrimes
Common Social Networking Sites
• Facebook : it is a platform where you can share
your ideas in form of posts, share photos, videos
etc.
• Twitter : micro blogging site which allows to
post very small messages up to 280
characters.
• Linkedln : social network for professionals.
Provides features to make profiles look sort of
detailed resumes, with sections for work
experience, education, volunteer work,
certifications, awards etc.
• Instagram : on of the most popular social
networks for online photo sharing. Offer features
like sharing real-time photos and short videos
while on the go.
Appropriateusage of SocialNetworks
• Whatever we do online – post something or visit
friends pages or search something etc leaves a
permanent footprints called digital footprints and it
remains for years storing trails of your online
activities.
• We are using this platform for personal reasons and
visible to anyone who looks for it, this might not
cause any problem now BUT sometimes later it can
pose potential problems when it comes to matter like
– taking admissions in higher education or looking for
job or even when looking for a life partner
• These days many universities look for digital
footprints of applicant students before giving them
admissions, similarly employers may look for digital
footprint of candidates and so on.
What you should know?
• While using social networking sites, you should
know about what the right online behaviors are
and what is considered a cybercrime
• If anyone thinks by making fake profile he/she
can do such activity without being caught he/she
is certainly mistaken. Modern technology tools
can find anyone online using IP address, locations
etc. So one must not indulge in these activities at
all.
Digital Footprints
• Digital Footprints are the records and
traces individuals leave behind as they use
the Internet.
• Digital Footprints are permanently stored.
• Your interaction on social media, your friend
circle on social media sites, site you visits,
online purchase, location visited through
Facebook check-ins. etc. all make up your
Digital Footprints.
Privacy Settings
• When you start social media, you should not
go with default privacy settings. Rather it is
always a good idea to set-up privacy
settings yourself by using Account Settings.
Through privacy settings you can control :
• Who all can see what you have posted
• Who all can send requests to you
• What all information about you is visible to others,
even to you contacts etc.
What you should do – Usage Rules
1. Be Authentic : Be honest about your identity
2. Use a Disclaimer : if you are associated with any
institution / organization and you are sharing
you personal views about something, do make it
clear that these are you personal vies and you do
not represent any institution/organization.
3. Don’t Pick Fights Online : don’t pick fight online
if you do not like anyone's comments on your
post.
What you should do – Usage Rules
4. Don’t use Fake names or Pseudonyms : never
pretends to be someone else.
5.Protect Your Identity : while you should be
honest about yourself, BUT you should never
provide or post personal information online. These
information can be used to conduct fraud or crime.
6.Does your Information / Post pass the publicity
test ? : if your post is not acceptable for face-to-
face conversation, over the telephone then it is
NOT ACCEPTABLE for a social networking site too.
What you should do – Usage Rules
7.Respect you audience : sometimes
school/college students talk in slang or use
some abusive words which they find okay
within their small group. But these things must
not be posted online because it would not be
acceptable in you connected world.
8.Respect other’s Sentiments : you should
always respects others’ privacy and be
considerate for topics that may be considered
sensitive – such as politics and religion.
What you should do – Usage Rules
9. Monitor Comments : most people who
maintain social media sites welcome comments
– it builds credibility and community. You
should prefer to review and approve comments
before posting them on you site. This way you
will ensure quality oF comments
Online Access and
Computer Security
 Introduction
 Threats to Computer Security
 Solutions to Computer Security
threats
Threats to Computer Security
• A threat is potential violation of
security
• When a threat is actually executed,
it becomes attack.
• Those who execute such actions, or
cause them to be executed are called
attackers.
Common threats
 Viruses (Worms, Trojans)
 Spyware
 Adware
 Spamming
 PC Intrusion (Denial of Service, Sweeping, Password Guessing)
 Phishing
Computer Viruses
• Are the malicious code/programs that cause
damage to data and files on a system.
• It can attack any part of computer system
like boot block, OS, system areas, files and
applications.
• 2 other similar programs also cause virus
like effects :
• Worms
• Trojans
Worms
• A worm is a self-replication programs which
eats up the entire disk space or memory. A
Worm keeps on creating its copies until all
the disk space or memory is filled.
• Worms harm to a computer or a computer
network by consuming bandwidth and slow
down the network speed. After the worm
has infected a system, it can propagate to
other systems via internet or while copying
files from one system to another without
user interaction.
Trojan Horses
• Is a program that appears harmless (such as text
editor or a utility program) but actually
performs malicious functions such as deleting or
damaging files.
• With help of Trojan, harm that could be done by
hacker on target computer systems are:
• Data theft
• Installation of unwanted softwares
• Keystroke logging
• Downloading or uploading of files. And many more…
Damaged Caused by Viruses
• Damage or delete files : some viruses may
delete or damage random documents or
specific files that are crucial to you OS.
• Slow down your Computer
• Invade your email programs : some forms of
viruses may wreak even more havoc by
spreading themselves to the contact in your
address book.
Spyware
• Is a software which is installed on your
computer to spy on your activities and
report this data to people willing to pay for
it.
• Spyware mostly get installed on your PC
without your consent. They gets installed
when you visit any illegitimate website or
download music, videos etc.
Damage caused by Spyware
• Compromise you data, computing habits and
identity: it can monitor information about your
computing habits like what websites you visit,
record your keystroke (user name, password,
credit card number) which in the end can lead
to identity theft.
• Alter PC Settings: can alter settings like web
browser home page, placement of desktop icons,
which may be annoying
• Slows down you PC: can slows down system and
Internet speed and become big problem when
you are trying to use the programs on your PC,
watch video online downloading large files.
Adware
• Programs that deliver unwanted ads to your
computer generally in popups. They consume
bandwidth. Similar to spyware but it may
be installed with your consent. Damages are:
• Adware tracks information like spyware
• Display arrays of annoying advertising
• Slows down you PC
Spamming
• Means sending of bulk-mail by an identified
or unidentified source. In non-malicious
form, bulk advertising mail is sent to many
accounts. In malicious form (email
bombarding) the attackers keeps on sending
bulk mail until the mail-server runs out of
disk space. Damages are:
• Spam reduces productivity: billions of spam messages
circulating across the Internet can disrupt email
delivery, degrade system performance and reduce
overall productivity
Spamming
• Spam eats up your time: deleting spam emails like the
simple solutions, but it eats a significant amount of
productivity
• Spam can lead to worse things: spam messages may
contain offensive, fraudulent material and can even
be used to spreadviruses.
Eavesdropping
• Do you ever find that when you are talking to
someone else, another person is secretly trying to
listen to your talks? What that person is doing is
'eavesdropping'. tfave you ever tried to secretly
listen to the conversation between two teachers
regarding your class? If yes, then what you have
done is 'eavesdropping'.
• In context of network security Eavesdropping
refers to unauthorized access to another person's
or organization's data while the data is on its
way on the network.
Eavesdropping
• This may be done in a number of ways:
• By setting up parallel telephone lines.
• By installing some software (spyware) in the
target computer.
• By installing some receiver which captures the
data while on its way.
Phishing
• It is criminally fraudulent process of
attempting to acquire sensitive information
such as usernames, passwords, credit card
information, CVV number etc. In phishing an
imposter uses an authentic looking email or
web-site to trick recipients into giving out
sensitive personal information. For example
an email asking to update your bank details
by clicking on a link or an email regarding
lucky winner of some amount.
Pharming
• Is an attack in which a hacker attempts to redirect a
website’s traffic to another bogus website. Through
pharming attack, the attacker points you to
malicious and illegitimate website by redirecting the
legitimate URL. Even if the URL is entered correctly, it
can still be redirected to fake website.
Solutions to Computer Security Threats
• There are 2 ways of safeguarding our
computer system:
• Active Protection: installing and properly using an
antivirus software that includes internet security
which include protection against threats such as
viruses, Sypware and PC intrusions – is vital for
proper protection against the hackers, intruders
and wrongdoers
• Preventive Measures: even though security
programs may actively detect and eliminate any
threats your PC encounters, you should always
help to prevent these issues from ever arising.
Solutions to Virus, Adware and
Spyware
Active Protection Preventive measures
• Use Anti-Virus and
Anti- spyware
software
 scan all you system for virus
 disconnect infected
system immediately
from you network
 Restore the infected
system from clean backup
 Notify your antivirus
vendors so it can ensure its
signature database is up-
to-date
• Download updates regularly
• Run frequent full systemscan
• Keep you system up-to-
date Use Caution when
downloading files on the
Internet
• Be Careful with email
 Don’t download or
open unsolicited email
attachments
 Don’t click on link in
email rather type the
URL on address bar
 Check for security alerts
 Disable running of scripts
and cookies
 Disconnect from the internet
when you are away
• Disable cookie if possible
Solutions to Spam, Eavesdropping
Active Protection Preventive measures
Use Anti-Spam Software
(i) Sender Filtering: this method allows
only messages from your approved
sender list to reach you inbox- all
other mail is quarantined for later
review. It is done on the basis of
Digital Certificates ( specially
formatted digital information issued to
website, are used to verify the
identify of message sender) and
Digital Signatures ( are way of
authenticating the identity of
creators or producers of digital
information.
(ii) Key Filtering: this method filters out
email messages that contain certain
keywords or phrases, which are
defined by you or others.
 Keep you emailaddress
private
 Use encrypted connection
always if you have to provide
sensitive information i.e.
HTTPs
 Install personal firewall on
computer connected to the
Internet to check incoming
and outgoing information and
connections
 Avoid online transaction from
public network or public
Wi-Fi
 Install protection software
such as Internet Security
software
Solution to Phishing and Pharming
Active Protection Preventive measures
 Take the computer offline (it
may reduce the probability of
infecting other devices in the
same network with malware)
 Backup all files on the hard
drive
 List the information given to
phishing scammers
(depending on what was
leaked one may need to
change password, block
credit/debit card, BUT
DON’T USE THE SAME
COMPUTER TO CONTACT
AGENCIES)
 Run Antivirus software
Contact Credit agencies to report
any possibilities of identify theft
 Don’t open emails from
unknown sources or click on
links embedded in suspect
messages
 Check security guidelines of
website such as PayPal so that
you can distinguish between
legitimate and bogus emails
 Also rather than clicking on
link you can type general link
on you web browser. If you are
in double DON’T CLICK
Thank you…….

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 

Ähnlich wie Chp-15 Cyber Safety ppt-std 11.pptx

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 

Ähnlich wie Chp-15 Cyber Safety ppt-std 11.pptx (20)

Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Users guide
Users guideUsers guide
Users guide
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Chp-15 Cyber Safety ppt-std 11.pptx

  • 2. Cyber Safety • Cyber safety refers to safe and responsible use of Internet, to ensure safety and security of personal information and not posing threat to anyone else’s information.
  • 3. Safely Browsing The Web • These days we must know the threats while browsing the web. Safe browsing on web needs you to know many things like: • What are possible dangers? • How to avoid these? • How to virtually conduct yourself while browsing web • You must remember, not every site you visit is safe. Whatever you post or do online is visible to others. Not everything you see or is promised online is true.
  • 4. Identity Protection while using Internet • We surf internet for a variety of reasons, from using social media, buying and selling goods, to exchanging information. • When we give private data to businesses and other Internet users (such as while filling online form or making payment online), we trust them to use that information for legitimate purposes. • These information can be used for harmful reasons like hacking, stalking an identify fraud. • Identity fraud is when personal details that have been accessed or stolen are used to commit fraudulent acts posing as someone else with stolen identity
  • 5. Solution of Identity Fraud • Most common solution to this is : • Private Browsing Or • Anonymous Browsing Before we understand this, let us talk about what happens when we browse the internet…
  • 6. Anonymous Browsing • All the ways discussed earlier of identity leakage is resolved by either ANONYMOUS OR PRIVATE BROWSING. • ANONYMOUS BROWSING : allows users to view websites without revealing any personnel information of user like IP address, machine type, location. An anonymous browser lets users access websites anonymously. It can also be as a tool for government, journalists and everyday security-conscious surfers.
  • 7. Private Browsing • There are other ways to use internet without revealing our search history and sharing our data : • Incognito Browsing : opens up a version of the browser that will not track you activity. • Its particularly useful if you are entering sensitive data like bank details into the browser as it can minimise the risk of our information being saved to that computer. • In Google chrome, just press : CTRL + SHIFT + N to open in incognito mode
  • 8.
  • 9. Private Browsing • Proxy : act as a middlemen between your computer and the website you want to access. Now the tracking website will get the IP address and information that belongs to the proxy site, so you are effectively getting the same content from another source without getting to know your browsing details. • Virtual Private Network (VPN) : is a method to add security and privacy to private and public networks like Wi-Fi hotspot and the Internet. VPNs are most often used by corporation to protect sensitive data. VPN were originally meant for business employees working offsite to gain access to shared drive.
  • 10. Confidentiality of Information • Internet is a public platform. The sites you visit, the products you search, the posts that you put on social media are all visible to public. But there must be some information like Credit Card Details, Bank Details which you do not want to make public i.e. you want to keep this information confidential. • Confidentiality of information ensures that only authorized users get access to sensitive and protected data
  • 11. Practices to Ensure Confidentiality of Information 1. Use Firewall wherever possible : we must secure our system such that only authentic users can connect to it. Firewall is one very good solution for this. Firewall is a program/hardware that monitors all communications and traps all illicit packets. Most OS now comes with firewall preinstalled. We must install Firewall that can monitor both incoming and outgoing communication and traps the illicit ones.
  • 12. 2. Control browser setting to block tracking : As we know that website can track our surfing on their site by IP address, to minimise these threats we can turn our default settings to exclude third party cookies since they can be used to build up detailed profiles of our surfing pattern over time. In Google Chrome : Open settings, -> Privacy and Security -> Content Settings-> Cookies -> “Enable” Block Third party cookie. Practices to Ensure Confidentiality of Information
  • 13. 3.Browse privately wherever possible: to avoid the tracking as discussed earlier try to browse anonymously or privately. 4.Be Careful while posting on Internet : When you post anything to public Internet such as social networking site like Instagram or Facebook etc. newgroup, mailing list or chat room you generally give up rights to the content and any expectation or privacy or confidentiality is useless. So never post crucial information like you personal details such as address, mobile phone numbers, bank details, credit card details. Etc. on public internet sites. Practices to Ensure Confidentiality of Information
  • 14. 5. Ensure Safe sites while entering crucial Information : while entering or giving crucial information like Passwords, Bank Details always ensure the website is working on https not on http. https means website is Secure i.e. Secure Socket Layer. For e.g. (next slide) Practices to Ensure Confidentiality of Information
  • 15. Closed Lock Pad (Secure Connection)
  • 16. 6. Carefully handle emails : while opening emails, make sure you know the sender. Never open email of unknown or if by curiosity/accidentally opened the mail never click on any link inside it or open any attachment. It may lead to you fraudulent site, or trap for you or may be a Trojan, which will act as a Spy in you computer for sending information to the sender without your knowledge. Practices to Ensure Confidentiality of Information
  • 17. 7. Avoid using Public Computer : Always try not to use the public computer specially if you have to deal with your crucial data. But if it is an urgency then do remember:  Browse privately  Never save your login information (ID/Password)  Avoid entering sensitive information  Don’t leave computer unattended with sensitive information on screen  Disable the features that stores passwords  Properly logout before you leave the computer  Erase history and traces of your work i.e. clear history and cookies  Look for any suspicious device connected to computer Practices to Ensure Confidentiality of Information
  • 18. Cyber Crime • Is any criminal offense that is facilitated by, or involves use of electronic communications of information system including any electronic device, computer or the Internet. • It involves the terms like : Phishing, Credit Card Frauds, illegal downloading, industrial espionage, child pornography, cyber bullying, cyber stalking, cyber terrorism, creation and /or distribution of viruses, spam and so on
  • 19. Cyber Trolls and Bullying • It refers to a person who purposely post opposing, sarcastic, demeaning or insulting- comments about something or someone with an aim of targeting a person online. The provocative messages posted this way are also called trolls. It is a cyber crime and is a form of cyber bullying.
  • 20. Cyber Bullying • Harassing, demeaning, embarrassing, defaming, or intimidating someone using modern technologies like internet, cell phones, instant messengers, social networks etc. is called Cyber Bullying.
  • 21. Cyber Stalking • It is a kind of online harassment wherein the victim is subjected to barrage of online messages and emails. • Typically these stalkers know their victims instead of resorting to offline stalking, they use the internet to stalk. • A cyber stalker relies upon the anonymity afforded by the Internet to allow to stalk their victim without being detected
  • 22. Cyber Stalking • Cyber Stalkers often do this to trouble their victims: • They collect all personal information about their victims • The stalker may post this information on any obscene or illegal website posing as if the victim is posting this information • People of all kind from nook and corner of the world, start calling the victim as his/her residence/workplace for many filthy/obscene reasons • Some stalker subscribe the email account of victim to illegal websites because of which victim starts receiving such kind of unsolicited e-mails.
  • 23. Cyber Stalking • Cyber Stalkers often do this to trouble their victims: • Some stalkers keep on sending repeated e-mails asking for various kinds of favors or threaten the victim. • Stalkers follow their victim from board to board. • Stalkers will almost always make contact with their victims through email having friendly or threatening content. The stalker many times uses multiple names when contacting the victim.
  • 24. Spreading Rumors Online • People often think that they can make a fake profile with some different name and do anything online and will not be caught. Through such fake profile, people sometimes indulge in posting false information on social media, or comment could hurt others or spread rumors that may trigger panic or hurt religious sentiments of other people resulting into clashes and even riots • Spreading rumors online is a cyber crime and it may invite a fine with imprisonment extendable up to three years.
  • 25. Reporting Cyber Crime • If any cyber crime happens, one must report it firstly to parents, school authorities and then to police. • The local police stations can be approached for filing complaints just as the cybercrime cells specially designation with the jurisdiction to register complaint • In addition, provisions have now been made for filing of E-FIR in most of the states • In addition, the ministry of tfome Affairs is also launching a website for registering crimes against women and children online including cybercrimes
  • 26. Common Social Networking Sites • Facebook : it is a platform where you can share your ideas in form of posts, share photos, videos etc. • Twitter : micro blogging site which allows to post very small messages up to 280 characters. • Linkedln : social network for professionals. Provides features to make profiles look sort of detailed resumes, with sections for work experience, education, volunteer work, certifications, awards etc. • Instagram : on of the most popular social networks for online photo sharing. Offer features like sharing real-time photos and short videos while on the go.
  • 27. Appropriateusage of SocialNetworks • Whatever we do online – post something or visit friends pages or search something etc leaves a permanent footprints called digital footprints and it remains for years storing trails of your online activities. • We are using this platform for personal reasons and visible to anyone who looks for it, this might not cause any problem now BUT sometimes later it can pose potential problems when it comes to matter like – taking admissions in higher education or looking for job or even when looking for a life partner • These days many universities look for digital footprints of applicant students before giving them admissions, similarly employers may look for digital footprint of candidates and so on.
  • 28. What you should know? • While using social networking sites, you should know about what the right online behaviors are and what is considered a cybercrime • If anyone thinks by making fake profile he/she can do such activity without being caught he/she is certainly mistaken. Modern technology tools can find anyone online using IP address, locations etc. So one must not indulge in these activities at all.
  • 29. Digital Footprints • Digital Footprints are the records and traces individuals leave behind as they use the Internet. • Digital Footprints are permanently stored. • Your interaction on social media, your friend circle on social media sites, site you visits, online purchase, location visited through Facebook check-ins. etc. all make up your Digital Footprints.
  • 30. Privacy Settings • When you start social media, you should not go with default privacy settings. Rather it is always a good idea to set-up privacy settings yourself by using Account Settings. Through privacy settings you can control : • Who all can see what you have posted • Who all can send requests to you • What all information about you is visible to others, even to you contacts etc.
  • 31. What you should do – Usage Rules 1. Be Authentic : Be honest about your identity 2. Use a Disclaimer : if you are associated with any institution / organization and you are sharing you personal views about something, do make it clear that these are you personal vies and you do not represent any institution/organization. 3. Don’t Pick Fights Online : don’t pick fight online if you do not like anyone's comments on your post.
  • 32. What you should do – Usage Rules 4. Don’t use Fake names or Pseudonyms : never pretends to be someone else. 5.Protect Your Identity : while you should be honest about yourself, BUT you should never provide or post personal information online. These information can be used to conduct fraud or crime. 6.Does your Information / Post pass the publicity test ? : if your post is not acceptable for face-to- face conversation, over the telephone then it is NOT ACCEPTABLE for a social networking site too.
  • 33. What you should do – Usage Rules 7.Respect you audience : sometimes school/college students talk in slang or use some abusive words which they find okay within their small group. But these things must not be posted online because it would not be acceptable in you connected world. 8.Respect other’s Sentiments : you should always respects others’ privacy and be considerate for topics that may be considered sensitive – such as politics and religion.
  • 34. What you should do – Usage Rules 9. Monitor Comments : most people who maintain social media sites welcome comments – it builds credibility and community. You should prefer to review and approve comments before posting them on you site. This way you will ensure quality oF comments
  • 35. Online Access and Computer Security  Introduction  Threats to Computer Security  Solutions to Computer Security threats
  • 36. Threats to Computer Security • A threat is potential violation of security • When a threat is actually executed, it becomes attack. • Those who execute such actions, or cause them to be executed are called attackers.
  • 37. Common threats  Viruses (Worms, Trojans)  Spyware  Adware  Spamming  PC Intrusion (Denial of Service, Sweeping, Password Guessing)  Phishing
  • 38. Computer Viruses • Are the malicious code/programs that cause damage to data and files on a system. • It can attack any part of computer system like boot block, OS, system areas, files and applications. • 2 other similar programs also cause virus like effects : • Worms • Trojans
  • 39. Worms • A worm is a self-replication programs which eats up the entire disk space or memory. A Worm keeps on creating its copies until all the disk space or memory is filled. • Worms harm to a computer or a computer network by consuming bandwidth and slow down the network speed. After the worm has infected a system, it can propagate to other systems via internet or while copying files from one system to another without user interaction.
  • 40. Trojan Horses • Is a program that appears harmless (such as text editor or a utility program) but actually performs malicious functions such as deleting or damaging files. • With help of Trojan, harm that could be done by hacker on target computer systems are: • Data theft • Installation of unwanted softwares • Keystroke logging • Downloading or uploading of files. And many more…
  • 41. Damaged Caused by Viruses • Damage or delete files : some viruses may delete or damage random documents or specific files that are crucial to you OS. • Slow down your Computer • Invade your email programs : some forms of viruses may wreak even more havoc by spreading themselves to the contact in your address book.
  • 42. Spyware • Is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it. • Spyware mostly get installed on your PC without your consent. They gets installed when you visit any illegitimate website or download music, videos etc.
  • 43. Damage caused by Spyware • Compromise you data, computing habits and identity: it can monitor information about your computing habits like what websites you visit, record your keystroke (user name, password, credit card number) which in the end can lead to identity theft. • Alter PC Settings: can alter settings like web browser home page, placement of desktop icons, which may be annoying • Slows down you PC: can slows down system and Internet speed and become big problem when you are trying to use the programs on your PC, watch video online downloading large files.
  • 44. Adware • Programs that deliver unwanted ads to your computer generally in popups. They consume bandwidth. Similar to spyware but it may be installed with your consent. Damages are: • Adware tracks information like spyware • Display arrays of annoying advertising • Slows down you PC
  • 45. Spamming • Means sending of bulk-mail by an identified or unidentified source. In non-malicious form, bulk advertising mail is sent to many accounts. In malicious form (email bombarding) the attackers keeps on sending bulk mail until the mail-server runs out of disk space. Damages are: • Spam reduces productivity: billions of spam messages circulating across the Internet can disrupt email delivery, degrade system performance and reduce overall productivity
  • 46. Spamming • Spam eats up your time: deleting spam emails like the simple solutions, but it eats a significant amount of productivity • Spam can lead to worse things: spam messages may contain offensive, fraudulent material and can even be used to spreadviruses.
  • 47. Eavesdropping • Do you ever find that when you are talking to someone else, another person is secretly trying to listen to your talks? What that person is doing is 'eavesdropping'. tfave you ever tried to secretly listen to the conversation between two teachers regarding your class? If yes, then what you have done is 'eavesdropping'. • In context of network security Eavesdropping refers to unauthorized access to another person's or organization's data while the data is on its way on the network.
  • 48. Eavesdropping • This may be done in a number of ways: • By setting up parallel telephone lines. • By installing some software (spyware) in the target computer. • By installing some receiver which captures the data while on its way.
  • 49. Phishing • It is criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, credit card information, CVV number etc. In phishing an imposter uses an authentic looking email or web-site to trick recipients into giving out sensitive personal information. For example an email asking to update your bank details by clicking on a link or an email regarding lucky winner of some amount.
  • 50. Pharming • Is an attack in which a hacker attempts to redirect a website’s traffic to another bogus website. Through pharming attack, the attacker points you to malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to fake website.
  • 51. Solutions to Computer Security Threats • There are 2 ways of safeguarding our computer system: • Active Protection: installing and properly using an antivirus software that includes internet security which include protection against threats such as viruses, Sypware and PC intrusions – is vital for proper protection against the hackers, intruders and wrongdoers • Preventive Measures: even though security programs may actively detect and eliminate any threats your PC encounters, you should always help to prevent these issues from ever arising.
  • 52. Solutions to Virus, Adware and Spyware Active Protection Preventive measures • Use Anti-Virus and Anti- spyware software  scan all you system for virus  disconnect infected system immediately from you network  Restore the infected system from clean backup  Notify your antivirus vendors so it can ensure its signature database is up- to-date • Download updates regularly • Run frequent full systemscan • Keep you system up-to- date Use Caution when downloading files on the Internet • Be Careful with email  Don’t download or open unsolicited email attachments  Don’t click on link in email rather type the URL on address bar  Check for security alerts  Disable running of scripts and cookies  Disconnect from the internet when you are away • Disable cookie if possible
  • 53. Solutions to Spam, Eavesdropping Active Protection Preventive measures Use Anti-Spam Software (i) Sender Filtering: this method allows only messages from your approved sender list to reach you inbox- all other mail is quarantined for later review. It is done on the basis of Digital Certificates ( specially formatted digital information issued to website, are used to verify the identify of message sender) and Digital Signatures ( are way of authenticating the identity of creators or producers of digital information. (ii) Key Filtering: this method filters out email messages that contain certain keywords or phrases, which are defined by you or others.  Keep you emailaddress private  Use encrypted connection always if you have to provide sensitive information i.e. HTTPs  Install personal firewall on computer connected to the Internet to check incoming and outgoing information and connections  Avoid online transaction from public network or public Wi-Fi  Install protection software such as Internet Security software
  • 54. Solution to Phishing and Pharming Active Protection Preventive measures  Take the computer offline (it may reduce the probability of infecting other devices in the same network with malware)  Backup all files on the hard drive  List the information given to phishing scammers (depending on what was leaked one may need to change password, block credit/debit card, BUT DON’T USE THE SAME COMPUTER TO CONTACT AGENCIES)  Run Antivirus software Contact Credit agencies to report any possibilities of identify theft  Don’t open emails from unknown sources or click on links embedded in suspect messages  Check security guidelines of website such as PayPal so that you can distinguish between legitimate and bogus emails  Also rather than clicking on link you can type general link on you web browser. If you are in double DON’T CLICK