SlideShare a Scribd company logo
1 of 11
Download to read offline
CSI COLLEGE OF EDUCATION
L.M.S COMPOUND PARASSALA
RECORD OF
…………………..
(SEMESTER-1)
2020-22
EDU 01
Candidate Name :JIHITHA J P
Candidate Code :18020351006
Subject :MATHEMATICS
Certified that this is a Bonafide Record
Member of the faculty Principal
Place: Parassala Place: Parassala
Date: Date:
CYBER PRIVACY AND PASSWORD
PROTECTION
In this cyber world cyber privacy and password protection is very
important. Privacy is our right to control what happens with personal
information about us. Cyber privacy is the privacy and security level of personal
data published via the internet. It is a broad item that refers to a variety of
factors, techniques and technologies used to protect sensitive and private data,
communications and preferences. Here we discuss about cyber privacy, crimes
involving cyber privacy and how to minimize the internet privacy violation
risks. And also we discuss about the password protection. Password protection
is a security process that protects information accessible via internet. Every
password is important with many ways while we using internet. It keeps a great
privacy of our information on internet. We can say password protection is also
an important part of cyber privacy.
CYBER PRIVACY
Cyber privacy is mostly defined by the services used by individuals. Whatever
agreements individuals agree to when they sign up for a service usually signs
away their right to privacy. In other cases the reasonable expectation of privacy
is not reasonable if the behaviours or communications in question were
knowingly exposed to public view. Internet privacy is a cause for concern for
any user planning to make an online purchase, visit a social networking site,
participation in online games or attend forums. Internet privacy, ethics and
online security are important issues because they are present in every action
taken by every user online. With the rising rate of incidents of hacking, cyber
bullying and identity theft, it is clear that people need directions now more than
ever.
CRIMES INVOLVING CYBER – PRIVACY
1) Malware - It is the collective name for a number of malicious software
variants including virus, spyware, trogen….which cause extensive damage to
system and data or to gain access to a network. The use of malicious code which
can compromise a user’s identity or information.
2) Denial of service attacks (DoS attack) – It is a cyber-attack, it disrupt the
services by overloading the provider of the service. It blocks a user from
accessing his/her personal information.
3) Computer Viruses - A series of man made replicable programme or code. It
can compromise user information as well as identity
All these crimes fall under the category of,
 Fraud
 Identity Theft
 Phishing scams
 Information warfare
 Cyber bullying
INTERNET PRIVACY VIOLATION RISKS MAY BE MINIMIZED AS
FOLLOWS
 Always use preventative software application such as anti-virus, anti-
malware, anti-spam and firewalls.
 Update the software on a regular basis
 Install safety features like scans or filters.
 Avoid exposing password, personal data on websites with lower security
levels.
 Clear the browser’s Cache and browsing history on a consistent basis.
 Avoid shopping from unreliable websites.
 Use a strong alpha-numerical passwords
 Avoid using the same password for all the accounts
 Change passwords and PIN regularly; do not share it with others.
 Internet is a boon or bane depending on how it is used.
PASSWORD PROTECTION
In a cyber-privacy a password and its protection is very important.
Passwords are the first line of defense against cybercrimes. A password is a
secret word or string of characters that is used for authentication.
Basically every security system is based on password. In modern times, user
names and passwords are commonly used by people during a log in process that
controls access to protected computer operating systems, mobile phones, cable
TV decoders, automated teller machine (ATM) etc. A typical internet user has
passwords for many purposes: logging into accounts, retrieving email, accessing
applications, websites and even reading the morning newspaper online. It is
crucial to pick strong passwords that are different for each of the important
account and it is a good practice to update password regularly.
SOME TIPS FOR PASSWORD PROTECTION
 Use different password for each of the important accounts like email
and online banking.
Choosing the same password for each of the online
accounts is like using the same key to lock the home, car and
office. If a criminal gains access to one, all of them are compromised.
So don’t use the same password for everything.
 The password must be big enough. It must have a minimum of eight -
character letters or number or both mixed together.
 The password kept in a secret place that isn’t easily visible. Don’t
reveal your password to anyone or write in a common place where it is
visible to all.
 Set the password recovery option.
If you forget your password and get locked out, you need a
way to get back into your account. So make sure your recovery
email address is up- to- date and it's an account you can still
access.
 You can also further secure your account by using additional
authentication methods.
Having a mobile phone number on your account is one of
the easiest and most reliable ways to keep your account safe. So if
anyone login to your account you will get notification about it.
 Always remember to sign out while using your accounts in a local
network, internet cafes, public computers etc. Never save your Id and
password in such situations. Clear the browser’s Cache and browsing
history after using internet in public places.
 Don’t reveal your password to anyone else. Frequently change and keep
them up-to-date.
Cyber privacy is an important issue in this era. Password protection is
obviously a part of cyber privacy. If a password is compromised and revealed a
victim's identity or the privacy may be fraudulently used or stolen. So any way
we have got a crystal and clear idea about cyber privacy and the password
protection. We have clearly discussed about all the aspects of cyber privacy and
the password protection. In this era we should aware about all these aspects. We
should follow all the privacy safety measures also.

More Related Content

What's hot

Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Privacy and Security Information
Privacy and Security InformationPrivacy and Security Information
Privacy and Security InformationAdeel Rasheed
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
Ethical hacking course.
Ethical hacking course.Ethical hacking course.
Ethical hacking course.vasudhaaligeti
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutionsCyberhunter Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the webViral Parmar
 

What's hot (18)

Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Privacy and Security Information
Privacy and Security InformationPrivacy and Security Information
Privacy and Security Information
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Cybersecurity tips
Cybersecurity tipsCybersecurity tips
Cybersecurity tips
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Comslide 3
Comslide 3Comslide 3
Comslide 3
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Ethical hacking course.
Ethical hacking course.Ethical hacking course.
Ethical hacking course.
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
 

Similar to EDU 01SEMINAR.pdf

Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in DemandSamidha Takle
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfGMATechnologies1
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfTakshila Learning
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityDiegoMtzS
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyTentacle Cloud
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 

Similar to EDU 01SEMINAR.pdf (20)

Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in Demand
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdf
 
techalpha07
techalpha07techalpha07
techalpha07
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Why Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small BusinessesWhy Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small Businesses
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data Effectively
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 

More from JihithaJP

Innovative lesson plan.pdf
Innovative lesson plan.pdfInnovative lesson plan.pdf
Innovative lesson plan.pdfJihithaJP
 
Innovative lesson plan.pdf
Innovative lesson plan.pdfInnovative lesson plan.pdf
Innovative lesson plan.pdfJihithaJP
 
innovative work.pdf
innovative work.pdfinnovative work.pdf
innovative work.pdfJihithaJP
 
innovative work.pdf
innovative work.pdfinnovative work.pdf
innovative work.pdfJihithaJP
 
പലതരം ബഹുപദങ്ങളും അവയുടെ പൊതുരൂപങ്ങളും.pptx
പലതരം ബഹുപദങ്ങളും അവയുടെ പൊതുരൂപങ്ങളും.pptxപലതരം ബഹുപദങ്ങളും അവയുടെ പൊതുരൂപങ്ങളും.pptx
പലതരം ബഹുപദങ്ങളും അവയുടെ പൊതുരൂപങ്ങളും.pptxJihithaJP
 
ബഹുപദങ്ങളുടെ ഗുണകങ്ങൾ.pptx
ബഹുപദങ്ങളുടെ ഗുണകങ്ങൾ.pptxബഹുപദങ്ങളുടെ ഗുണകങ്ങൾ.pptx
ബഹുപദങ്ങളുടെ ഗുണകങ്ങൾ.pptxJihithaJP
 
ബഹുപദങ്ങളുടെ കൃത്യങ്കങ്ങൾ.pptx
ബഹുപദങ്ങളുടെ കൃത്യങ്കങ്ങൾ.pptxബഹുപദങ്ങളുടെ കൃത്യങ്കങ്ങൾ.pptx
ബഹുപദങ്ങളുടെ കൃത്യങ്കങ്ങൾ.pptxJihithaJP
 
അംശബന്ധം3.pptx
അംശബന്ധം3.pptxഅംശബന്ധം3.pptx
അംശബന്ധം3.pptxJihithaJP
 
അംശബന്ധം2.pptx
അംശബന്ധം2.pptxഅംശബന്ധം2.pptx
അംശബന്ധം2.pptxJihithaJP
 
അംശബന്ധം1.pptx
അംശബന്ധം1.pptxഅംശബന്ധം1.pptx
അംശബന്ധം1.pptxJihithaJP
 
PRACTICUM.pdf
PRACTICUM.pdfPRACTICUM.pdf
PRACTICUM.pdfJihithaJP
 
TOOL PREPARATION.pdf
TOOL PREPARATION.pdfTOOL PREPARATION.pdf
TOOL PREPARATION.pdfJihithaJP
 
EDU 06 MCQ.pdf
EDU 06 MCQ.pdfEDU 06 MCQ.pdf
EDU 06 MCQ.pdfJihithaJP
 
EDU-01 Capacity Building Program-2 FINAL.pdf
EDU-01 Capacity Building Program-2 FINAL.pdfEDU-01 Capacity Building Program-2 FINAL.pdf
EDU-01 Capacity Building Program-2 FINAL.pdfJihithaJP
 
EDU 11 Practicum.pdf
EDU 11 Practicum.pdfEDU 11 Practicum.pdf
EDU 11 Practicum.pdfJihithaJP
 
EDU-11 MCQ.pdf
EDU-11 MCQ.pdfEDU-11 MCQ.pdf
EDU-11 MCQ.pdfJihithaJP
 
EDU - 06 PPT of popu edu.pptx
EDU - 06 PPT of popu edu.pptxEDU - 06 PPT of popu edu.pptx
EDU - 06 PPT of popu edu.pptxJihithaJP
 
Aleena Jihitha
Aleena JihithaAleena Jihitha
Aleena JihithaJihithaJP
 

More from JihithaJP (19)

Innovative lesson plan.pdf
Innovative lesson plan.pdfInnovative lesson plan.pdf
Innovative lesson plan.pdf
 
Innovative lesson plan.pdf
Innovative lesson plan.pdfInnovative lesson plan.pdf
Innovative lesson plan.pdf
 
innovative work.pdf
innovative work.pdfinnovative work.pdf
innovative work.pdf
 
innovative work.pdf
innovative work.pdfinnovative work.pdf
innovative work.pdf
 
പലതരം ബഹുപദങ്ങളും അവയുടെ പൊതുരൂപങ്ങളും.pptx
പലതരം ബഹുപദങ്ങളും അവയുടെ പൊതുരൂപങ്ങളും.pptxപലതരം ബഹുപദങ്ങളും അവയുടെ പൊതുരൂപങ്ങളും.pptx
പലതരം ബഹുപദങ്ങളും അവയുടെ പൊതുരൂപങ്ങളും.pptx
 
ബഹുപദങ്ങളുടെ ഗുണകങ്ങൾ.pptx
ബഹുപദങ്ങളുടെ ഗുണകങ്ങൾ.pptxബഹുപദങ്ങളുടെ ഗുണകങ്ങൾ.pptx
ബഹുപദങ്ങളുടെ ഗുണകങ്ങൾ.pptx
 
ബഹുപദങ്ങളുടെ കൃത്യങ്കങ്ങൾ.pptx
ബഹുപദങ്ങളുടെ കൃത്യങ്കങ്ങൾ.pptxബഹുപദങ്ങളുടെ കൃത്യങ്കങ്ങൾ.pptx
ബഹുപദങ്ങളുടെ കൃത്യങ്കങ്ങൾ.pptx
 
അംശബന്ധം3.pptx
അംശബന്ധം3.pptxഅംശബന്ധം3.pptx
അംശബന്ധം3.pptx
 
അംശബന്ധം2.pptx
അംശബന്ധം2.pptxഅംശബന്ധം2.pptx
അംശബന്ധം2.pptx
 
അംശബന്ധം1.pptx
അംശബന്ധം1.pptxഅംശബന്ധം1.pptx
അംശബന്ധം1.pptx
 
PRACTICUM.pdf
PRACTICUM.pdfPRACTICUM.pdf
PRACTICUM.pdf
 
TOOL PREPARATION.pdf
TOOL PREPARATION.pdfTOOL PREPARATION.pdf
TOOL PREPARATION.pdf
 
EDU 06 MCQ.pdf
EDU 06 MCQ.pdfEDU 06 MCQ.pdf
EDU 06 MCQ.pdf
 
EDU-01 Capacity Building Program-2 FINAL.pdf
EDU-01 Capacity Building Program-2 FINAL.pdfEDU-01 Capacity Building Program-2 FINAL.pdf
EDU-01 Capacity Building Program-2 FINAL.pdf
 
EDU 11 Practicum.pdf
EDU 11 Practicum.pdfEDU 11 Practicum.pdf
EDU 11 Practicum.pdf
 
EDU-11 MCQ.pdf
EDU-11 MCQ.pdfEDU-11 MCQ.pdf
EDU-11 MCQ.pdf
 
EDU - 06 PPT of popu edu.pptx
EDU - 06 PPT of popu edu.pptxEDU - 06 PPT of popu edu.pptx
EDU - 06 PPT of popu edu.pptx
 
Aleena Jihitha
Aleena JihithaAleena Jihitha
Aleena Jihitha
 
Planning 1
Planning 1Planning 1
Planning 1
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 

EDU 01SEMINAR.pdf

  • 1. CSI COLLEGE OF EDUCATION L.M.S COMPOUND PARASSALA RECORD OF ………………….. (SEMESTER-1) 2020-22 EDU 01 Candidate Name :JIHITHA J P Candidate Code :18020351006 Subject :MATHEMATICS Certified that this is a Bonafide Record Member of the faculty Principal Place: Parassala Place: Parassala Date: Date:
  • 2.
  • 3. CYBER PRIVACY AND PASSWORD PROTECTION
  • 4.
  • 5. In this cyber world cyber privacy and password protection is very important. Privacy is our right to control what happens with personal information about us. Cyber privacy is the privacy and security level of personal data published via the internet. It is a broad item that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications and preferences. Here we discuss about cyber privacy, crimes involving cyber privacy and how to minimize the internet privacy violation risks. And also we discuss about the password protection. Password protection is a security process that protects information accessible via internet. Every password is important with many ways while we using internet. It keeps a great privacy of our information on internet. We can say password protection is also an important part of cyber privacy.
  • 6.
  • 7. CYBER PRIVACY Cyber privacy is mostly defined by the services used by individuals. Whatever agreements individuals agree to when they sign up for a service usually signs away their right to privacy. In other cases the reasonable expectation of privacy is not reasonable if the behaviours or communications in question were knowingly exposed to public view. Internet privacy is a cause for concern for any user planning to make an online purchase, visit a social networking site, participation in online games or attend forums. Internet privacy, ethics and online security are important issues because they are present in every action taken by every user online. With the rising rate of incidents of hacking, cyber bullying and identity theft, it is clear that people need directions now more than ever. CRIMES INVOLVING CYBER – PRIVACY 1) Malware - It is the collective name for a number of malicious software variants including virus, spyware, trogen….which cause extensive damage to system and data or to gain access to a network. The use of malicious code which can compromise a user’s identity or information. 2) Denial of service attacks (DoS attack) – It is a cyber-attack, it disrupt the services by overloading the provider of the service. It blocks a user from accessing his/her personal information. 3) Computer Viruses - A series of man made replicable programme or code. It can compromise user information as well as identity All these crimes fall under the category of,  Fraud  Identity Theft  Phishing scams
  • 8.  Information warfare  Cyber bullying INTERNET PRIVACY VIOLATION RISKS MAY BE MINIMIZED AS FOLLOWS  Always use preventative software application such as anti-virus, anti- malware, anti-spam and firewalls.  Update the software on a regular basis  Install safety features like scans or filters.  Avoid exposing password, personal data on websites with lower security levels.  Clear the browser’s Cache and browsing history on a consistent basis.  Avoid shopping from unreliable websites.  Use a strong alpha-numerical passwords  Avoid using the same password for all the accounts  Change passwords and PIN regularly; do not share it with others.  Internet is a boon or bane depending on how it is used. PASSWORD PROTECTION In a cyber-privacy a password and its protection is very important. Passwords are the first line of defense against cybercrimes. A password is a secret word or string of characters that is used for authentication. Basically every security system is based on password. In modern times, user names and passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machine (ATM) etc. A typical internet user has passwords for many purposes: logging into accounts, retrieving email, accessing applications, websites and even reading the morning newspaper online. It is
  • 9. crucial to pick strong passwords that are different for each of the important account and it is a good practice to update password regularly. SOME TIPS FOR PASSWORD PROTECTION  Use different password for each of the important accounts like email and online banking. Choosing the same password for each of the online accounts is like using the same key to lock the home, car and office. If a criminal gains access to one, all of them are compromised. So don’t use the same password for everything.  The password must be big enough. It must have a minimum of eight - character letters or number or both mixed together.  The password kept in a secret place that isn’t easily visible. Don’t reveal your password to anyone or write in a common place where it is visible to all.  Set the password recovery option. If you forget your password and get locked out, you need a way to get back into your account. So make sure your recovery email address is up- to- date and it's an account you can still access.  You can also further secure your account by using additional authentication methods. Having a mobile phone number on your account is one of the easiest and most reliable ways to keep your account safe. So if anyone login to your account you will get notification about it.
  • 10.  Always remember to sign out while using your accounts in a local network, internet cafes, public computers etc. Never save your Id and password in such situations. Clear the browser’s Cache and browsing history after using internet in public places.  Don’t reveal your password to anyone else. Frequently change and keep them up-to-date.
  • 11. Cyber privacy is an important issue in this era. Password protection is obviously a part of cyber privacy. If a password is compromised and revealed a victim's identity or the privacy may be fraudulently used or stolen. So any way we have got a crystal and clear idea about cyber privacy and the password protection. We have clearly discussed about all the aspects of cyber privacy and the password protection. In this era we should aware about all these aspects. We should follow all the privacy safety measures also.