SlideShare a Scribd company logo
1 of 11
Cyber Security
Made By: Praveen Parthiban
grade XI (Computer science)
What is Cyber Security?
Cyber security is the practice of defending computers,
servers, mobile devices, electronic systems, networks, and
data from malicious attacks. It's also known as information
technology security or electronic information security. The
term applies in a variety of contexts, from business to mobile
computing, and can be divided into a few common categories.
Network security: is the practice of securing a computer
network from intruders, whether targeted attackers or
opportunistic malware
Application security: focuses on keeping software and devices
free of threats. A compromised application could provide
access to the data its designed to protect. Successful
security begins in the design stage, well before a program or
device is deployed
Information security: protects the integrity and privacy of data, both in storage
and in transit.
· Operational security: includes the processes and decisions for handling
and protecting data assets. The permissions users have when accessing a
network and the procedures that determine how and where data may be
stored or shared all fall under this umbrella.
· Disaster recovery and business continuity: define how an organization
responds to a cyber-security incident or any other event that causes the loss
of operations or data. Disaster recovery policies dictate how the organization
restores its operations and information to return to the same operating
capacity as before the event. Business continuity is the plan the organization
falls back on while trying to operate without certain resources.
What is cyberbullying?
Cyberbullying is bullying with the use of digital technologies. It can take place on social
media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour,
aimed at scaring, angering or shaming those who are targeted. Examples include:
spreading lies about or posting embarrassing photos or videos of someone on social media
sending hurtful, abusive or threatening messages, images or videos via messaging platforms
impersonating someone and sending mean messages to others on their behalf or through
fake accounts.
Face-to-face bullying and cyberbullying can often happen alongside each other. But
cyberbullying leaves a digital footprint – a record that can prove useful and provide evidence
to help stop the abuse.
If you are worried about your safety or something that has happened to you online, you
can seek help by calling your national helpline. If your country does not have a
helpline, please urgently speak to an adult you trust or seek professional support from
trained and experienced carers.
Child Pornography
Child pornography is a form of child sexual exploitation.
Federal law defines child pornography as any visual depiction of
sexually explicit conduct involving a minor (persons less than 18
years old). Images of child pornography are also referred to as
child sexual abuse images.
Judgements: Any person, who stores or possesses pornographic
material in any form involving a child for commercial purpose shall
be punished on the first conviction with imprisonment of either
description which shall not be less than three years which may
extend to five years, or with fine, or with both and in the event of
second or subsequent conviction, with imprisonment of either
description which shall not be less than five years which may
extend to seven years and shall also be liable to fine.
Cyber Trolls
Cyber bullying is when someone is targeting you
online, doing or saying things that upset you, or
trying to make you look bad to others. This could be
by writing nasty things about you, either in a public
way e.g. commenting on a YouTube video,
@replying on Twitter/tweeting about you, writing
Facebook posts about you/commenting on your
posts, writing a blog about you, etc. Or it could be a
more private bully, who will send you emails,
Facebook PMs, private Twitter messages, and so
on.
IT Act 2000
The Information Technology Act, 2000 was enacted by
the Indian Parliament in 2000. It is the primary law in
India for matters related to cybercrime and e-
commerce. The act was enacted to give legal
sanction to electronic commerce and electronic
transactions, to enable e-governance, and also to
prevent cybercrime.
Cyber Stalking
Cyberstalking is a crime committed when
someone uses the internet and other
technologies to harass or stalk
another person online. Even though
cyberstalking is a broad ter9m for
online harassment, it can include
defamation, false accusations,
teasing, and even extreme threats
Illegal Downloads
● Illegal downloading is a process of getting/downloading
data(like documents, images, videos, audio, etc.) that you
are not allowed to use on the internet. Or, in other words,
illegal downloads are a way in which user/users download
files without having any legal right to download them. The
files which are downloaded are copyrighted.
Thank You

More Related Content

Similar to Cyber security_Praveen Parthiban(grade11)pptx.pptx

Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
vitor94
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
zyleflorence
 

Similar to Cyber security_Praveen Parthiban(grade11)pptx.pptx (20)

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptxGEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Cyber security_Praveen Parthiban(grade11)pptx.pptx

  • 1. Cyber Security Made By: Praveen Parthiban grade XI (Computer science)
  • 2. What is Cyber Security? Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
  • 3. Network security: is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware Application security: focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed
  • 4. Information security: protects the integrity and privacy of data, both in storage and in transit. · Operational security: includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella. · Disaster recovery and business continuity: define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.
  • 5. What is cyberbullying? Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming those who are targeted. Examples include: spreading lies about or posting embarrassing photos or videos of someone on social media sending hurtful, abusive or threatening messages, images or videos via messaging platforms impersonating someone and sending mean messages to others on their behalf or through fake accounts. Face-to-face bullying and cyberbullying can often happen alongside each other. But cyberbullying leaves a digital footprint – a record that can prove useful and provide evidence to help stop the abuse. If you are worried about your safety or something that has happened to you online, you can seek help by calling your national helpline. If your country does not have a helpline, please urgently speak to an adult you trust or seek professional support from trained and experienced carers.
  • 6. Child Pornography Child pornography is a form of child sexual exploitation. Federal law defines child pornography as any visual depiction of sexually explicit conduct involving a minor (persons less than 18 years old). Images of child pornography are also referred to as child sexual abuse images. Judgements: Any person, who stores or possesses pornographic material in any form involving a child for commercial purpose shall be punished on the first conviction with imprisonment of either description which shall not be less than three years which may extend to five years, or with fine, or with both and in the event of second or subsequent conviction, with imprisonment of either description which shall not be less than five years which may extend to seven years and shall also be liable to fine.
  • 7. Cyber Trolls Cyber bullying is when someone is targeting you online, doing or saying things that upset you, or trying to make you look bad to others. This could be by writing nasty things about you, either in a public way e.g. commenting on a YouTube video, @replying on Twitter/tweeting about you, writing Facebook posts about you/commenting on your posts, writing a blog about you, etc. Or it could be a more private bully, who will send you emails, Facebook PMs, private Twitter messages, and so on.
  • 8. IT Act 2000 The Information Technology Act, 2000 was enacted by the Indian Parliament in 2000. It is the primary law in India for matters related to cybercrime and e- commerce. The act was enacted to give legal sanction to electronic commerce and electronic transactions, to enable e-governance, and also to prevent cybercrime.
  • 9. Cyber Stalking Cyberstalking is a crime committed when someone uses the internet and other technologies to harass or stalk another person online. Even though cyberstalking is a broad ter9m for online harassment, it can include defamation, false accusations, teasing, and even extreme threats
  • 10. Illegal Downloads ● Illegal downloading is a process of getting/downloading data(like documents, images, videos, audio, etc.) that you are not allowed to use on the internet. Or, in other words, illegal downloads are a way in which user/users download files without having any legal right to download them. The files which are downloaded are copyrighted.