SlideShare a Scribd company logo
1 of 8
CYBER SAFETY
BY VIBHOR SRIVASTAVA
CONTENT
• WHAT IS CYBER SAFETY?
• CYBER CRIME
 CYBERSTALKING
 CYBERBULLYING
• MALWARE
• HOW TO A REPORT CYBER CRIME?
WHAT IS CYBERSAFETY?
Internet safety or online safety or cyber
safety or E-Safety is trying to be safe on the
internet and is the act of maximizing a user's
awareness of personal safety and security
risks to private information and property
associated with using the internet, and the
self-protection from computer crime.
As the number of internet users continues to
grow worldwide, internets, governments and
organizations have expressed concerns
about the safety of children and teenagers
using the Internet. Over 45% have
announced they have endured some sort of
cyber-harassment. Safer Internet Day is
celebrated worldwide in February to raise
awareness about internet safety.
CYBER CRIME
Cybercrime is a crime that involves a computer and a
network. The computer may have been used in the
commission of a crime, or it may be the target.
Cybercrime may harm someone's security and financial
health.
There are many privacy concerns surrounding
Cybercrime when confidential information is intercepted
or disclosed, lawfully or otherwise. Internationally, both
governmental and non-state actors engage in
cybercrimes, including espionage, financial theft, and
other cross-border crimes. Cybercrimes crossing
international borders and involving the actions of at
least one nation-state are sometimes referred to as
cyberwarfare.
A report (sponsored by McAfee) published in 2014
estimated that the annual damage to the global
economy was $445 billion. A 2016 report by
Cybersecurity ventures predicted that global damages
incurred as a result of cybercrime would cost up to $6
trillion annually by 2021 and $10.5 trillion annually by
2025.
CYBERBULLYING
Cyberbullying or cyber harassment is
a form of bullying or harassment using
electronic means. Cyberbullying and
cyber harassment are also known as
online bullying. It has become
increasingly common, especially
among teenagers, as the digital
sphere has expanded and technology
has advanced. Cyberbullying is when
someone, typically a teenager, bullies
or harasses others on the internet and
other digital spaces, particularly on
social media sites. Harmful bullying
behavior can include posting rumors,
threats, sexual remarks, a victims'
personal information, or pejorative
labels (i.e. hate speech).
CYBERSTALKING
Cyberstalking is when the stalker
uses the Internet to contact or follow
that person. The stalker may make
direct contact with that person, they
may send nasty messages to that
person or spread lies about them to
others. Sometimes stalkers use the
Internet to learn more about the
other person. They might find their
address, phone number, workplace
or photograph. Then they might use
this information to do more stalking
or find other ways to hurt that
person on the Internet or hurt their
body.
MALWARE
Malware is any software
intentionally designed to cause
damage to a computer, server,
client, or computer network. By
contrast, software that causes
unintentional harm due to some
deficiency is typically described
as a software bug. A wide variety
of malware types exist, including
computer viruses, worms, Trojan
horses, ransomware, spyware,
adware, rogue software, wiper
and scareware.
HOW TO REPORT A CYBER CRIME?
• CALL IN POLICE
STATION OR TELL
YOUR ELDERS ABOUT
CYBER CRIME
• THE MINISTRY OF
HOME AFFAIRS HAS
LAUNCHED A PORTAL
TO REPORT CYBER
CRIME

More Related Content

Similar to Cyber safety

Similar to Cyber safety (20)

Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptx
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptx
 
Cyrenne Madlangsakay
Cyrenne MadlangsakayCyrenne Madlangsakay
Cyrenne Madlangsakay
 
Facebook
FacebookFacebook
Facebook
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Stalking2
Stalking2Stalking2
Stalking2
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
cyber crime
cyber crimecyber crime
cyber crime
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 

Recently uploaded

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 

Recently uploaded (17)

Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 

Cyber safety

  • 2. CONTENT • WHAT IS CYBER SAFETY? • CYBER CRIME  CYBERSTALKING  CYBERBULLYING • MALWARE • HOW TO A REPORT CYBER CRIME?
  • 3. WHAT IS CYBERSAFETY? Internet safety or online safety or cyber safety or E-Safety is trying to be safe on the internet and is the act of maximizing a user's awareness of personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime. As the number of internet users continues to grow worldwide, internets, governments and organizations have expressed concerns about the safety of children and teenagers using the Internet. Over 45% have announced they have endured some sort of cyber-harassment. Safer Internet Day is celebrated worldwide in February to raise awareness about internet safety.
  • 4. CYBER CRIME Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health. There are many privacy concerns surrounding Cybercrime when confidential information is intercepted or disclosed, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation-state are sometimes referred to as cyberwarfare. A report (sponsored by McAfee) published in 2014 estimated that the annual damage to the global economy was $445 billion. A 2016 report by Cybersecurity ventures predicted that global damages incurred as a result of cybercrime would cost up to $6 trillion annually by 2021 and $10.5 trillion annually by 2025.
  • 5. CYBERBULLYING Cyberbullying or cyber harassment is a form of bullying or harassment using electronic means. Cyberbullying and cyber harassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital sphere has expanded and technology has advanced. Cyberbullying is when someone, typically a teenager, bullies or harasses others on the internet and other digital spaces, particularly on social media sites. Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims' personal information, or pejorative labels (i.e. hate speech).
  • 6. CYBERSTALKING Cyberstalking is when the stalker uses the Internet to contact or follow that person. The stalker may make direct contact with that person, they may send nasty messages to that person or spread lies about them to others. Sometimes stalkers use the Internet to learn more about the other person. They might find their address, phone number, workplace or photograph. Then they might use this information to do more stalking or find other ways to hurt that person on the Internet or hurt their body.
  • 7. MALWARE Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. By contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug. A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware.
  • 8. HOW TO REPORT A CYBER CRIME? • CALL IN POLICE STATION OR TELL YOUR ELDERS ABOUT CYBER CRIME • THE MINISTRY OF HOME AFFAIRS HAS LAUNCHED A PORTAL TO REPORT CYBER CRIME