SlideShare una empresa de Scribd logo
1 de 16
Cyber Safety
Done By:A.Afsheen Abdul&
K.S.Vishal
Class: XI - A
Cyber safety
Cyber safety refers to the safe and responsible use of internet to ensure safety
and security of personal information. It also includes not creating threat for
anyone else’s information.
Safely browsing the web
We can safely browse the web by keeping following
things in mind:
Try to avoid opening websites which are not secure
(without HTTPS).
Don’t provide your email, contact number , credit
card/debit card information , address and other such
information on websites/apps you are not fully sure
of.
Don’t download softwares or other files from every
website.
Identity theft
It is the process of stealing someone else’s identity to steal
money or gain other benefits. Identity theft may include using
name, photograph, email id or login details of someone else
without his/her consent.
Identity protection while using internet
There are two methods to protect identity on internet.
•Anonymous Browsing: Users can view websites without providing
any personal information like IP address and location of user.
•Private Browsing: There are different methods of private browsing.
Most common methods of private browsing are:
•Incognito Browsing: It opens web browser in such a way that it will
not track your activities on internet. Most of the modern web browsers
like Mozilla Firefox, Google Chrome provide this feature.
•Proxy: It is a computer on a network that acts as computer middle man
between your computer and the website. So your IP address and other
information is never shared. Information about Proxy is only shared.
•VPN (Virtual Private Network): It is a technique to add security
and privacy to your network. It never shares IP address, location and
other details of your computer.
Confidentiality of Information
• Internet is a public platform. The sites you visit, the products you search, the
posts that you put on social media are all visible to public.
• Confidentiality of information ensures that only authorized users get access to
sensitive and protected data
Practices to Ensure Confidentiality of Information:
1. Use Firewall wherever possible.
2. Control browser setting to block tracking
3. Browse privately wherever possible:
4. Be Careful while posting on Internet
5. Ensure Safe sites while entering crucial Information
6. Carefully handle emails
7. Do not give sensitive information on wireless networks
8. Avoid public computers
Cybercrime
Cybercrime is a crime that involves a computer and
a network. The computer may have been used to commit the
crime and in many cases, it is also the target. Cybercrime may
threaten a person or a nation’s security and financial health.
Cyber trolls & Cyber bullying
Cyber trolling is internet slang for a person who intentionally
starts arguments or upsets others by posting inflammatory
remarks. The sole purpose of trolling is angering people.
Purpose – to entertain, to argue, to upset victim, to get
attention
Cyber bullying: Saying and/or doing mean things to the person online. It is a
harm inflicted through using the Internet, ICT devices, Or mobile phones.
Purpose – to get revenge , To harass & threat, to humiliate
Cyber stalking: Doing research on every aspect of the person’s life.
Cyber harassment: Continuously contacting the person online, even though they
don’t want you to.
Computer Security Threats
Spreading rumours: (fake information) using internet is a
cyber crime.
Online fraud-
Online fraud refers to fraudulent activities such as identity
theft and financial frauds that are committed by using the
Internet.
•Non-delivered goods
•Non-Existent companies
•Stealing information
•Fraudulent payments
Information theft
It is the process of stealing someone else's identity to steal money or
gain other benefits. Identity theft may include using name, photograph, email
id or login details of someone else without his/her consent.
Scams
A scam is a deceptive scheme or trick used to
cheat someone out of something, especially
money. Scam is also a verb meaning to cheat
someone in such a way. Example: Banks will
never call you asking for your credit card
number or social security number over the
phone.
Illegal downloads
Illegal downloading is a process of getting/downloading data(like
documents, images, videos, audio, etc.) that you are not allowed to use
on the internet. Or, in other words, illegal downloads are a way in which
user/users download files without having any legal right to download
them.
Child Pornography
child pornography, in criminal law, any visual depiction of a minor (a person
who has not reached the age of consent) engaging in sexually explicit activity.
In the federal criminal code of the United states, child pornography is partly
defined as “any photograph, film, video, picture, or computer or computer-
generated image” that depicts actual or simulated sexually explicit activity by
a minor—where, in the latter case, the simulation is indistinguishable from
actual sexually explicit activity.
Reporting Cyber Crime
• File complaint to the local police station
•Provisions are made for filing of ‘E-FIR’ in most of the states
•The Ministry of Home Affairs launched a website for registering crimes
against women and children
Various common social networking sites
Most popular social networking sites are :
Facebook: It is a platform where we can share posts. These
posts may contain text, pictures, videos and links to websites.
We can also view, like and post comment for posts of our
friends and groups.
Twitter: It is a microblogging websites to post small
messages with maximum limit of 280 characters.
Linkedin: It is platform where you can create resumes and
share work related information.
Instagram: It is a platform for sharing pictures and videos
Cyber Law
•Cyber law, also known as cybercrime law, is legislation focused on the acceptable
behavorial use of technology including computer hardware and software, the
internet, and networks.
•Cyber law helps protect users from harm by enabling the investigation and
prosecution of online criminal activity.
•It applies to the actions of individuals, groups, the public, government, and
private organizations.
Overview of Indian IT ACT
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is
an Act of the Indian Parliament notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce.
A major amendment was made in 2008 and now it is called the IT (Amendment)
Act 2008.
Social Media etiquettes
1. Be Authentic
2. Be secure
3. Be reliable
4. Don’t pick fights online
5. Don’t use fake names or pseudonyms
6. Protect your Identity
7. Respect your audience
8. Respect other’s Sentiments
9. Monitor Comments

Más contenido relacionado

La actualidad más candente

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Navegar por internet de forma segura.pptx
Navegar por internet de forma segura.pptxNavegar por internet de forma segura.pptx
Navegar por internet de forma segura.pptx231455800
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Floreslorrflores
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationTENZING LHADON
 

La actualidad más candente (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Navegar por internet de forma segura.pptx
Navegar por internet de forma segura.pptxNavegar por internet de forma segura.pptx
Navegar por internet de forma segura.pptx
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Cyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer ApplicationCyber ethics(CBSE Class X), Computer Application
Cyber ethics(CBSE Class X), Computer Application
 

Similar a cyber safety_grade11cse_afsheen,vishal.pptx

Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxTejasSingh70
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)Abhinav Pathak
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPTpriya785691
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 

Similar a cyber safety_grade11cse_afsheen,vishal.pptx (20)

Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 

Último

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Último (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

cyber safety_grade11cse_afsheen,vishal.pptx

  • 1. Cyber Safety Done By:A.Afsheen Abdul& K.S.Vishal Class: XI - A
  • 2. Cyber safety Cyber safety refers to the safe and responsible use of internet to ensure safety and security of personal information. It also includes not creating threat for anyone else’s information. Safely browsing the web We can safely browse the web by keeping following things in mind: Try to avoid opening websites which are not secure (without HTTPS). Don’t provide your email, contact number , credit card/debit card information , address and other such information on websites/apps you are not fully sure of. Don’t download softwares or other files from every website.
  • 3. Identity theft It is the process of stealing someone else’s identity to steal money or gain other benefits. Identity theft may include using name, photograph, email id or login details of someone else without his/her consent.
  • 4. Identity protection while using internet There are two methods to protect identity on internet. •Anonymous Browsing: Users can view websites without providing any personal information like IP address and location of user. •Private Browsing: There are different methods of private browsing. Most common methods of private browsing are: •Incognito Browsing: It opens web browser in such a way that it will not track your activities on internet. Most of the modern web browsers like Mozilla Firefox, Google Chrome provide this feature. •Proxy: It is a computer on a network that acts as computer middle man between your computer and the website. So your IP address and other information is never shared. Information about Proxy is only shared. •VPN (Virtual Private Network): It is a technique to add security and privacy to your network. It never shares IP address, location and other details of your computer.
  • 5. Confidentiality of Information • Internet is a public platform. The sites you visit, the products you search, the posts that you put on social media are all visible to public. • Confidentiality of information ensures that only authorized users get access to sensitive and protected data Practices to Ensure Confidentiality of Information: 1. Use Firewall wherever possible. 2. Control browser setting to block tracking 3. Browse privately wherever possible: 4. Be Careful while posting on Internet 5. Ensure Safe sites while entering crucial Information 6. Carefully handle emails 7. Do not give sensitive information on wireless networks 8. Avoid public computers
  • 6. Cybercrime Cybercrime is a crime that involves a computer and a network. The computer may have been used to commit the crime and in many cases, it is also the target. Cybercrime may threaten a person or a nation’s security and financial health.
  • 7. Cyber trolls & Cyber bullying Cyber trolling is internet slang for a person who intentionally starts arguments or upsets others by posting inflammatory remarks. The sole purpose of trolling is angering people. Purpose – to entertain, to argue, to upset victim, to get attention
  • 8. Cyber bullying: Saying and/or doing mean things to the person online. It is a harm inflicted through using the Internet, ICT devices, Or mobile phones. Purpose – to get revenge , To harass & threat, to humiliate Cyber stalking: Doing research on every aspect of the person’s life. Cyber harassment: Continuously contacting the person online, even though they don’t want you to.
  • 10. Spreading rumours: (fake information) using internet is a cyber crime. Online fraud- Online fraud refers to fraudulent activities such as identity theft and financial frauds that are committed by using the Internet. •Non-delivered goods •Non-Existent companies •Stealing information •Fraudulent payments
  • 11. Information theft It is the process of stealing someone else's identity to steal money or gain other benefits. Identity theft may include using name, photograph, email id or login details of someone else without his/her consent. Scams A scam is a deceptive scheme or trick used to cheat someone out of something, especially money. Scam is also a verb meaning to cheat someone in such a way. Example: Banks will never call you asking for your credit card number or social security number over the phone.
  • 12. Illegal downloads Illegal downloading is a process of getting/downloading data(like documents, images, videos, audio, etc.) that you are not allowed to use on the internet. Or, in other words, illegal downloads are a way in which user/users download files without having any legal right to download them. Child Pornography child pornography, in criminal law, any visual depiction of a minor (a person who has not reached the age of consent) engaging in sexually explicit activity. In the federal criminal code of the United states, child pornography is partly defined as “any photograph, film, video, picture, or computer or computer- generated image” that depicts actual or simulated sexually explicit activity by a minor—where, in the latter case, the simulation is indistinguishable from actual sexually explicit activity.
  • 13. Reporting Cyber Crime • File complaint to the local police station •Provisions are made for filing of ‘E-FIR’ in most of the states •The Ministry of Home Affairs launched a website for registering crimes against women and children
  • 14. Various common social networking sites Most popular social networking sites are : Facebook: It is a platform where we can share posts. These posts may contain text, pictures, videos and links to websites. We can also view, like and post comment for posts of our friends and groups. Twitter: It is a microblogging websites to post small messages with maximum limit of 280 characters. Linkedin: It is platform where you can create resumes and share work related information. Instagram: It is a platform for sharing pictures and videos
  • 15. Cyber Law •Cyber law, also known as cybercrime law, is legislation focused on the acceptable behavorial use of technology including computer hardware and software, the internet, and networks. •Cyber law helps protect users from harm by enabling the investigation and prosecution of online criminal activity. •It applies to the actions of individuals, groups, the public, government, and private organizations. Overview of Indian IT ACT The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. A major amendment was made in 2008 and now it is called the IT (Amendment) Act 2008.
  • 16. Social Media etiquettes 1. Be Authentic 2. Be secure 3. Be reliable 4. Don’t pick fights online 5. Don’t use fake names or pseudonyms 6. Protect your Identity 7. Respect your audience 8. Respect other’s Sentiments 9. Monitor Comments