Cyber Security Awareness by Class-9
Cyber Security Awareness by Class-9
SECURITY
AND
AWARENES
S
Name: Shubham Vora
Class: 9-A
Roll No: 29
Cyber Security Cyber Security Best
Fundamentals Practices
Introduction To Cyber Security
Concepts
01 04 Key Guidelines For Online
Security
Common Cyber
Threats Recognizing Cyber Threats
Types And Examples Of
Cyber Threats
02 05 Identifying Deceptive Online
Practices
● For instance, the 2017 WannaCry ransom ware attack affected over
300,000 computers in 150 countries, causing extensive financial
damage.
Cyber Security's Role in Society
● Beyond individual • This section
provides a
security, cyber
foundational
security plays a
understanding of
critical role in
the importance of
national security.
cyber security and
Attacks on critical
sets the stage for a
infrastructure,
deeper exploration
like power grids,
of specific threats
transportation
and protective
systems, and
measures. As the
healthcare, can
digital landscape
have catastrophic
continues to evolve,
consequences.
it's imperative that
Therefore, cyber
individuals and
security is a key
organizations
component of
remain vigilant and
national defense.
proactive in
addressing cyber
security challenges.
02
Common
Cyber
Threats
Types And Examples Of
Cyber Threats
Malware
● Malware is a broad
category that includes
viruses, worms, ransom
ware, and spyware.
Each of these types of
malware has a unique
method of operation,
but they all share the
goal of compromising or
damaging computer
systems and data.
Phishing Attacks
● Phishing involves
deceiving
individuals into
revealing personal,
financial, or
sensitive
information.
Cybercriminals
typically send
fraudulent emails
or direct victims to
fake websites that
mimic trusted
Social Engineering
● DoS attacks
overwhelm a system
or network, rendering
it unavailable to users.
These attacks disrupt
services, causing
inconvenience or
financial losses for
businesses.
Advanced Persistent Threats (APTs)
• Avoid clicking on
links or downloading
attachments from
unknown sources.
2. Malware Indicators
• Beware of
unexpected pop-up
ads.
• Pay attention to
antivirus alerts.
3. Social Engineering Tactics
• Be cautious with
unexpected requests
for sensitive
information.
4. Unusual Account Activity
• Regularly review
online accounts for
unfamiliar logins
or changes.
• Verify unexpected
emails confirming
changes you didn't
make.
5.Fake Antivirus Software and Scareware
• Be skeptical of pop-up
messages claiming your
system is infected.
• Avoid purchasing or
installing software
prompted by urgent
alerts.
06
Reporting and
Staying
Informed
Incident Reporting and
Staying Updated
Reporting Cyber Threats
Incident Documentation
1. Incident Classification
2. Date and Time
3. Incident Description
4. Evidence Collection
5. Impact Assessment
Staying Informed on Cyber Security News
Cyber Security Communities and Forums
• Participating in
cyber security
communities and
forums can be an
invaluable resource
for individuals and
organizations
looking to stay
informed, share
knowledge, and
collaborate with
others in the field of
cyber security.
Cyber Security Training and Awareness
Programs
• Effective cyber
security training
and awareness
programs are
essential for
individuals and
organizations to
build a strong
defense against
cyber threats.
Government Alerts and Notifications