Más contenido relacionado


Cyber security_Praveen Parthiban(grade11)pptx.pptx

  1. Cyber Security Made By: Praveen Parthiban grade XI (Computer science)
  2. What is Cyber Security? Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
  3. Network security: is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware Application security: focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed
  4. Information security: protects the integrity and privacy of data, both in storage and in transit. · Operational security: includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella. · Disaster recovery and business continuity: define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.
  5. What is cyberbullying? Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming those who are targeted. Examples include: spreading lies about or posting embarrassing photos or videos of someone on social media sending hurtful, abusive or threatening messages, images or videos via messaging platforms impersonating someone and sending mean messages to others on their behalf or through fake accounts. Face-to-face bullying and cyberbullying can often happen alongside each other. But cyberbullying leaves a digital footprint – a record that can prove useful and provide evidence to help stop the abuse. If you are worried about your safety or something that has happened to you online, you can seek help by calling your national helpline. If your country does not have a helpline, please urgently speak to an adult you trust or seek professional support from trained and experienced carers.
  6. Child Pornography Child pornography is a form of child sexual exploitation. Federal law defines child pornography as any visual depiction of sexually explicit conduct involving a minor (persons less than 18 years old). Images of child pornography are also referred to as child sexual abuse images. Judgements: Any person, who stores or possesses pornographic material in any form involving a child for commercial purpose shall be punished on the first conviction with imprisonment of either description which shall not be less than three years which may extend to five years, or with fine, or with both and in the event of second or subsequent conviction, with imprisonment of either description which shall not be less than five years which may extend to seven years and shall also be liable to fine.
  7. Cyber Trolls Cyber bullying is when someone is targeting you online, doing or saying things that upset you, or trying to make you look bad to others. This could be by writing nasty things about you, either in a public way e.g. commenting on a YouTube video, @replying on Twitter/tweeting about you, writing Facebook posts about you/commenting on your posts, writing a blog about you, etc. Or it could be a more private bully, who will send you emails, Facebook PMs, private Twitter messages, and so on.
  8. IT Act 2000 The Information Technology Act, 2000 was enacted by the Indian Parliament in 2000. It is the primary law in India for matters related to cybercrime and e- commerce. The act was enacted to give legal sanction to electronic commerce and electronic transactions, to enable e-governance, and also to prevent cybercrime.
  9. Cyber Stalking Cyberstalking is a crime committed when someone uses the internet and other technologies to harass or stalk another person online. Even though cyberstalking is a broad ter9m for online harassment, it can include defamation, false accusations, teasing, and even extreme threats
  10. Illegal Downloads ● Illegal downloading is a process of getting/downloading data(like documents, images, videos, audio, etc.) that you are not allowed to use on the internet. Or, in other words, illegal downloads are a way in which user/users download files without having any legal right to download them. The files which are downloaded are copyrighted.
  11. Thank You