SlideShare una empresa de Scribd logo
1 de 21
NAME : ACHUTHA KUMARAN.B
CLASS : II C
SUBJECT : COMPUTER SCIENCE
Cyber Safety is trying to be safe on the
internet and is the knowledge of maximizing
the user’s personal safety and security risks to
private information and property associated
with using the internet and the self-
protection from computer crime in general
 Protecting yourself by securing your
devices, software and connections is important,
but making the right choices when doing things
on the web can make a huge difference to your
safety online. There are potential risks involved
in doing things online, but by making smart
choices you can reduce that risk
 By using a combination of preventive
measures and making good choices online you
can stay safe while browsing the web
 Exploiting email and web browsing
applications is the most common way
hackers and malware try to gain access to
devices and your information. Protect
yourself before you start browsing the web
by making sure that your operating system,
web browser, security software, browser
plugins and other applications up-to-date
 You can adjust the settings in your web browser
to work in a more or less secure way. Some
functionality might be limited when using the
most secure settings, but they can provide the
best protection from malicious content. Most
web browsers will give you warnings when they
detect you visiting a malicious website or
possibly being exposed to malicious content.
Pay attention to these warnings-they can help
protect you from malware, phishing and identity
theft
Use the following advise when browsing the web to significantly
reduce your risk of being a victim of cybercrime:
 Use strong unique passwords online
 Only download files and applications from websites that you trust,
such as from official app stores or legitimate organisations,such as
your bank
 Pause and think carefully before clicking on links in email,
messages or on social networking sites. Don’t click on links in
messages if you don’t know the sender or if the message is
unexpected
 If you think a link looks suspicious or you can’t tell where it leads
to, before you click hover over that link to see the actual web
address it may take you to. If you do not recognize or trust the
address, try searching for relevant key terms in a web browser.
This way you can find the article, video or webpage without
directly clicking on the suspicious link.
 Expand suspended URLs to check if they are safe. Short URLs are
often used in social media.There are number of services that
create short links-such as goo.gl,bit.ly,tinyurl.com.To check if
these links are safe you can use an “expand link” facility to get the
original URL from the shortened link without having to click
through the destinaton.Look for a short URL expander that is
recommended by your anti-virus software of a reputable software
company.
 Be wary of offers that seem too good to be true. Leave websites
that ask for your personal or banking details in return for money-
these are scams
 Don’t agree to friend requests from people you don’t know on
social media networks-people are not always who they say they
are
Your personal identity is important as it defines
who you are.Your identity includes your
personal information: information such as
name,address,contact information, bank
account, credit card numbers and social
security numbers should all be kept private.
Confidentiality is roughly equivalent to
privacy. Measures undertaken to ensure
confidentiality are designed to prevent sensitive
information from reaching the wrong people,
while making sure the right people can it fact get
it: Access must be restricted to those authorized
to view the data in question. It is common, as
well, for data to be categorized according to the
amount and type of damage that could be done
should it fall into unintended hands. More of less
stringent measures can then be implemented
according to those categories.
 Data encryption is a common method of ensuring
confidentiality. User IDs and passwords constitute a
standard procedure; two-factor authentication is
becoming the norm. Other options include biometric
verification and security tokens , key fobs or soft tokens. In
addition, users can take precautions to minimize the
number of places where the information appears and the
numbers of times it is actually transmitted to complete a
required transaction. Extra measures might be taken in
the case of extremely sensitive documents, precautions
such as storing only on air gapped computers,
disconnected storage devices or, for highly sensitive
information, in hard copy from only
Social networking is playing a huge role in our
life. Now a days businesses heavily rely on
social media for their promotions and sale for
their products. But on the other hand lot of
frauds are being done using social media.
Person shouldn’t accept any random request.
There are lot of fake accounts on social media
which might be hackers they might intrude in
your PC
Trolling is internet slang for a person who intentionally starts
arguments or upsets others by posting inflammatory remarks. The
sole purpose of trolling is angering people. It has been compared
to flaming in cyber bullying.Plus,many people who troll think what
they do is an “art". They frequently hide behind a cloak of
anonymity. The symbol for trolling is a black and white drawing of
a face with a mischievous grin, which is symbolic of the expression
someone is making while trolling victims.
Purpose of trolling is to be a source of entertainment for the
troller,to be offensive and argumentative, to derive pleasure from
annoying the hell out of others, to scour the internet for bait, to
get attention, to feel powerful, to gain recoginition,to upset the
victim
Cyber bullying is deliberate and repeated harm
inflicted through using the internet, interactive
and digital technologies or mobile phones
PURPOSE
 To get revenge
 To feel empowered
 To gain popularity
 To harass and threaten
 To be offensive
 To humiliate
 To intimidate
 To upset the victim
 This a kind of online harassment where in the
victim is subjected to a barrage so online
messages and E-mails . A cyber stalker relies
upon the anonymity offered by the internet
to allow them to stalk their victim without
being detected
Fraud committed using the internet is
calledOnline Fraud. Online fraud may occur
in many forms such as :
 Non delivered goods
 Non existence companies
 Stealing information
 Fraudulent payments
The examples of such online frauds include
credit card frauds and identity thefts .
 Phishing is the practice of attempting to acquire
sensitive information from individuals over the
internet by means of deception. Information
typically targeted by Phishing schemes includes
passwords, usernames, bank account
information and social security numbers .
Hackers use various forms of bait in order to
catch a victim. An imposter uses an authentic
looking E-mail or website to trick recipients into
giving out sensitive personal information.They
information obtained are later used for Cyber
crimes an frauds
 Any fraudulent business practice that extracts
money from an unsuspecting, ignorant person is
called as Scam . Measures to avoid online
Scams:
 Never enter personal or financial information on
unsecure websites
 Never reply to E-mails or advertisement from
any unknown source
 Never click on any links that u have received in
your E-mail. Rather open a browser window and
type the URL yourself
Cyber law refers to all the legal and
regulatory aspects of internet andWWW .
Cyber law is important because it touches
almost all aspects of transactions and
activities concerning the internet,WWW and
cyberspace .
 IT Act 2000’s prime purpose was to provide
legal recognition to electronic commerce and
to facilitate filing of electronic records with
the government
 The act was later amended in December
2008 through the IT(Amendment)Act , 2008.
It provided additional focus on information
security . It has added several new sections
on offences including cyber terrorism and
data protection
 Be authentic
 Be secure
 Be reliable
 Don’t pick fights online
 Don’t use fake names
 Protect your identity
 Before posting , pass the publicity test
 Respect your audience
 Respect others sentiments
 Monitor comments
Cyber safety.pptx

Más contenido relacionado

Similar a Cyber safety.pptx

The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 

Similar a Cyber safety.pptx (20)

The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Users guide
Users guideUsers guide
Users guide
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
techalpha07
techalpha07techalpha07
techalpha07
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 

Último

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Último (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Cyber safety.pptx

  • 1. NAME : ACHUTHA KUMARAN.B CLASS : II C SUBJECT : COMPUTER SCIENCE
  • 2. Cyber Safety is trying to be safe on the internet and is the knowledge of maximizing the user’s personal safety and security risks to private information and property associated with using the internet and the self- protection from computer crime in general
  • 3.  Protecting yourself by securing your devices, software and connections is important, but making the right choices when doing things on the web can make a huge difference to your safety online. There are potential risks involved in doing things online, but by making smart choices you can reduce that risk  By using a combination of preventive measures and making good choices online you can stay safe while browsing the web
  • 4.  Exploiting email and web browsing applications is the most common way hackers and malware try to gain access to devices and your information. Protect yourself before you start browsing the web by making sure that your operating system, web browser, security software, browser plugins and other applications up-to-date
  • 5.  You can adjust the settings in your web browser to work in a more or less secure way. Some functionality might be limited when using the most secure settings, but they can provide the best protection from malicious content. Most web browsers will give you warnings when they detect you visiting a malicious website or possibly being exposed to malicious content. Pay attention to these warnings-they can help protect you from malware, phishing and identity theft
  • 6. Use the following advise when browsing the web to significantly reduce your risk of being a victim of cybercrime:  Use strong unique passwords online  Only download files and applications from websites that you trust, such as from official app stores or legitimate organisations,such as your bank  Pause and think carefully before clicking on links in email, messages or on social networking sites. Don’t click on links in messages if you don’t know the sender or if the message is unexpected  If you think a link looks suspicious or you can’t tell where it leads to, before you click hover over that link to see the actual web address it may take you to. If you do not recognize or trust the address, try searching for relevant key terms in a web browser. This way you can find the article, video or webpage without directly clicking on the suspicious link.
  • 7.  Expand suspended URLs to check if they are safe. Short URLs are often used in social media.There are number of services that create short links-such as goo.gl,bit.ly,tinyurl.com.To check if these links are safe you can use an “expand link” facility to get the original URL from the shortened link without having to click through the destinaton.Look for a short URL expander that is recommended by your anti-virus software of a reputable software company.  Be wary of offers that seem too good to be true. Leave websites that ask for your personal or banking details in return for money- these are scams  Don’t agree to friend requests from people you don’t know on social media networks-people are not always who they say they are
  • 8. Your personal identity is important as it defines who you are.Your identity includes your personal information: information such as name,address,contact information, bank account, credit card numbers and social security numbers should all be kept private.
  • 9. Confidentiality is roughly equivalent to privacy. Measures undertaken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people, while making sure the right people can it fact get it: Access must be restricted to those authorized to view the data in question. It is common, as well, for data to be categorized according to the amount and type of damage that could be done should it fall into unintended hands. More of less stringent measures can then be implemented according to those categories.
  • 10.  Data encryption is a common method of ensuring confidentiality. User IDs and passwords constitute a standard procedure; two-factor authentication is becoming the norm. Other options include biometric verification and security tokens , key fobs or soft tokens. In addition, users can take precautions to minimize the number of places where the information appears and the numbers of times it is actually transmitted to complete a required transaction. Extra measures might be taken in the case of extremely sensitive documents, precautions such as storing only on air gapped computers, disconnected storage devices or, for highly sensitive information, in hard copy from only
  • 11. Social networking is playing a huge role in our life. Now a days businesses heavily rely on social media for their promotions and sale for their products. But on the other hand lot of frauds are being done using social media. Person shouldn’t accept any random request. There are lot of fake accounts on social media which might be hackers they might intrude in your PC
  • 12. Trolling is internet slang for a person who intentionally starts arguments or upsets others by posting inflammatory remarks. The sole purpose of trolling is angering people. It has been compared to flaming in cyber bullying.Plus,many people who troll think what they do is an “art". They frequently hide behind a cloak of anonymity. The symbol for trolling is a black and white drawing of a face with a mischievous grin, which is symbolic of the expression someone is making while trolling victims. Purpose of trolling is to be a source of entertainment for the troller,to be offensive and argumentative, to derive pleasure from annoying the hell out of others, to scour the internet for bait, to get attention, to feel powerful, to gain recoginition,to upset the victim
  • 13. Cyber bullying is deliberate and repeated harm inflicted through using the internet, interactive and digital technologies or mobile phones PURPOSE  To get revenge  To feel empowered  To gain popularity  To harass and threaten  To be offensive  To humiliate  To intimidate  To upset the victim
  • 14.  This a kind of online harassment where in the victim is subjected to a barrage so online messages and E-mails . A cyber stalker relies upon the anonymity offered by the internet to allow them to stalk their victim without being detected
  • 15. Fraud committed using the internet is calledOnline Fraud. Online fraud may occur in many forms such as :  Non delivered goods  Non existence companies  Stealing information  Fraudulent payments The examples of such online frauds include credit card frauds and identity thefts .
  • 16.  Phishing is the practice of attempting to acquire sensitive information from individuals over the internet by means of deception. Information typically targeted by Phishing schemes includes passwords, usernames, bank account information and social security numbers . Hackers use various forms of bait in order to catch a victim. An imposter uses an authentic looking E-mail or website to trick recipients into giving out sensitive personal information.They information obtained are later used for Cyber crimes an frauds
  • 17.  Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is called as Scam . Measures to avoid online Scams:  Never enter personal or financial information on unsecure websites  Never reply to E-mails or advertisement from any unknown source  Never click on any links that u have received in your E-mail. Rather open a browser window and type the URL yourself
  • 18. Cyber law refers to all the legal and regulatory aspects of internet andWWW . Cyber law is important because it touches almost all aspects of transactions and activities concerning the internet,WWW and cyberspace .
  • 19.  IT Act 2000’s prime purpose was to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the government  The act was later amended in December 2008 through the IT(Amendment)Act , 2008. It provided additional focus on information security . It has added several new sections on offences including cyber terrorism and data protection
  • 20.  Be authentic  Be secure  Be reliable  Don’t pick fights online  Don’t use fake names  Protect your identity  Before posting , pass the publicity test  Respect your audience  Respect others sentiments  Monitor comments