0% found this document useful (0 votes)
14 views15 pages

Cyber Safety

Cyber safety involves using information and communication technologies responsibly to protect against cyber threats, including identity theft, cybercrime, and various forms of malware. It emphasizes the importance of practices such as using firewalls, controlling browser settings, and being cautious with personal information online. Additionally, the document outlines the legal framework of cyber law in India, particularly the IT Act, and discusses the significance of digital society and netizenship.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views15 pages

Cyber Safety

Cyber safety involves using information and communication technologies responsibly to protect against cyber threats, including identity theft, cybercrime, and various forms of malware. It emphasizes the importance of practices such as using firewalls, controlling browser settings, and being cautious with personal information online. Additionally, the document outlines the legal framework of cyber law in India, particularly the IT Act, and discusses the significance of digital society and netizenship.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

CYBER SAFETY

WHAT IS CYBER SAFETY ?

Cyber safety is the practice of using information and communication


technologies safely and responsibly. It involves protecting devices, networks,
and programs from cyber attacks.

It involves gaining knowledge about possible threats to personal safety and


security of personal information along with measures to prevent and counter
them.
IDENTITY PROTECTION WHILE USING

What is Identity Theft ?


INTERNET
• Identity theft is a crime that occurs when someone steals your
personal information and uses it without your permission.
Types of Identity Theft:
1. Financial identity theft is a type of identity theft where
someone uses another person's financial information.
2. Criminal identity theft is when a criminal uses another
person's personal information to commit fraud or identify themselves
as that person
3. Medical identity theft is when someone uses another person's
personal information to obtain medical services or money without their
permission
WAYS WEBSITES TRACK YOU
1. IP ADDRESS
2. COOKIES
3. TRACKING SCRIPTS
4. HTTP REFERRER
5. SUPER COOKIES
6. USER AGENT
PRACTICES TO ENSURE
CONFIDIENTIALITY OF INFORMATION
1. USE FIREWALL WHEREEVER POSSIBLE
2. CONTROL BROWSER SETTINGS TO BLOCK TRACKING
3. BROWSE PRIVATELY
4. BE CAREFUL WHILE POSTING ON INTERNET
5. ENSURE SAFE SITES WHILE ENTERING CRUCIAL INFORMATION
6. CAREFULLY HANDLE EMAILS
7. DO NOT GIVE SENSITIVE INFORMATION ON WIRELESS NETWORKS
8. AVOID USING PUBLIC NETWORKS
WHAT IS CYBER CRIME

Cybercrime is an illegal activity that uses computers or the internet


It Includes:
• Identity theft: Stealing and using someone else's personal information
• Phishing: Using fake emails, social media posts, or direct messages to
trick people into giving away their personal information
• Ransomware: Using malware to lock access to data until a ransom is paid
• Distributed Denial of Service (DDoS) attacks: Overwhelming a
network or website with traffic to make it slow down or crash
• Cyber espionage: Hacking into government or corporate computers to
steal data
• Cryptojacking: Using resources that aren't owned to mine cryptocurrency
COMPUTER FORENSICS

Computer forensics (also known as computer forensic science)is a branch of Computer


forensics (also known as computer forensic science) is a branch of digital forensic science
pertaining to evidence found in computers and digital storage media.
The goal of computer forensics is to examine digital media in a forensically sound manner
with the aim of identifying, preserving, recovering, analysing, and presenting facts and
opinions about the digital information. Digital forensic science pertaining to evidence found
in computers and digital storage media.
CYBER LAW AND IT ACT
Cyber law is a set of laws that govern digital activities, including online
communication, e-commerce, and cybercrime. It's also known as
internet law or digital law.
Cyber law in India is primarily governed by the Information Technology
Act (IT Act) of 2000 and its amendments. The IT Act provides legal
recognition to electronic documents and transactions, and establishes a
framework to prevent cyber crimes
What does the IT Act do?
• Legalizes electronic documents and digital signatures
• Allows for electronic filing of documents with government agencies
• Provides a framework for e-commerce and e-filing
• Helps prevent cyber crimes

.
SOCIAL NETWORKING
SITES
1. FACEBOOK
2. TWITTER [NOW X]
3. LINKEDIN
4. INSTAGRAM
5. WHATSAPP
6. DISCORD
DIGITAL SOCIETY AND
NETIZEN
A Digital Society is a society that uses digital
technologies to communicate, collaborate,
create, and share information
A Netizen is a citizen of the internet who uses
the internet responsibly, ethically, and
respectfully.
Digital Footprints are the records and traces
individuals leave behind as they use the
internet
Privacy settings allow you to control how much
information is shared about you online
THREATS TO COMPUTER
SECURITY
• Computer society is threatened by many types of cyberattacks,
including malware, ransomware, phishing, and spyware. These attacks can
lead to financial loss, identity theft, and unauthorized access to corporate
systems.

• Malware
• A malicious program that can infect a computer and perform malicious
actions
• Includes viruses, worms, trojans, spyware, and adware
• Can be downloaded from an untrusted website or email, or from an unwanted
software download
• Can destroy data or shut down a system
THREATS TO COMPUTER
SECURITY
• Ransomware
• A type of malware that encrypts a victim's files or data and demands payment to
restore access
• Can be very expensive and frequent
• Can cause companies to lose income while hackers hold system access for ransom
• Phishing
• A social breach that uses deceptive emails, messages, or websites to trick people
into
revealing sensitive information
• Can lead to identity theft, financial loss, and unauthorized access to corporate
systems
• Can be avoided by not opening links from people you don't know
• Spyware
• A type of malware that secretly captures sensitive data and transfers it to attackers
• Can obtain login credentials, credit card information, and other personal details
SOLUTIONS TO COMPUTER
SECURITY
THREATS
• Use strong passwords: Use strong and unique passwords for each account.
• Enable multifactor authentication: Multifactor authentication (MFA)
verifies user access right before accessing corporate information and
resources.
• Update software regularly: Regularly updating software and security
patches minimizes vulnerabilities that attackers might exploit.
• Use a firewall: A firewall acts as a barrier between your computer and
another network, such as the internet.
• Use data encryption: Data encryption ensures that even if cybercriminals
intercept sensitive data, they cannot read or use it.
• Use DDoS protection: DDoS protection solutions can help mitigate the risk
of DDoS attacks, where cybercriminals overwhelm a network with a flood of
Internet traffic.
SOLUTIONS TO COMPUTER
SECURITY
THREATS
• Back up data regularly: Back up your data regularly.
• Train employees: Train employees on cybersecurity best practices.
• Use cloud-based security solutions: Cloud-based security solutions can be
more cost-effective for small businesses.
• Use network access control: Network access control establishes trust with
user identities and devices and enforces access policies for applications.
• Use attack surface management: Attack surface management (ASM)
involves the ongoing discovery, analysis, remediation, and monitoring of
cybersecurity vulnerabilities.
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy