SlideShare a Scribd company logo
1 of 24
Cyber
Safety
What is Cyber Safety?
•The act of protecting networks, computers,
servers, mobile devices, electronic systems, and
data against malicious attacks is known as cyber
safety.
•It is the mindful and secure use of the internet to
protect the privacy of personal data.
Identity Theft:- It occurs when someone impersonates
another using their personal information to commit
fraud.
Identity
Theft
Financial
Identity used
for getting
financial gain
Criminal
Identity used
to commit
crimes freely
Medical
Identity used
to obtain
medical
drugs
Ways in which websites track us
•IP address:- An IP address is a unique address which
identifies a device on the internet or a local network.
These are available to websites we visit and also
contain information about our rough location.
•Cookies:- They are small pieces of information stored
in the browser, which track, personalize, and save
information about each user’s session. Websites use
cookies to streamline your web experiences.
HTTP referrer:- It contains the address of the previous
web page from which a link to the currently requested
page was followed.
Super cookie:- They are a type of cookie which are
more persistent. These cookies are stored often in
multiple locations and are repopulated through
other locations when deleted from a particular
part. They are harder to get rid of.
User agent:- It tells the websites we visit about our
browser and operating system.
How to protect ourselves:- Anonymous and
Private browsing
• Anonymous browsers:- They are used by journalists governments etc.
which let the user access the internet without revealing personal
information such as IP address. For e.g. Tor browser
Private Browsing can be achieved through the following ways:-
Incognito Browsing
Proxy
VPNs
• Incognito browsing:- This is a version of the browser which
simply keeps your browsing activity private. It does not,
however, keep your ISP from seeing the sites you visit. For
e.g. Incognito mode in Chrome, private browsing in Firefox.
• Proxy:- A proxy site serves as an intermediate between the
user and the desired website. Instead of the user, the
trackers receive data about the proxy site.
• VPN:- A virtual private network, or VPN, is an encrypted
connection via internet from a device to a network. It can be
installed as a plugin too. It tunnels your connection through
a private server.
Need for confidentiality
The internet is a necessary tool in our day to day life.
There are multiple ways in which our data can be used
against us.
In order to avoid these mishappenings, there are a few
measures we need to take while browsing the
internet:-
Use a firewall whenever possible:-
A firewall is a barrier which
monitors and filters incoming and
outgoing network traffic based on
given guidelines. It keeps
unauthorized traffic out.
Control browser settings:-
Browsers track user data and share
information with websites you
might not approve of. Disable 3rd
party cookies to prevent tracking.
Use private browsing:- Using
methods such as the ones
mentioned previously, keep your
personal information and browsing
data safe.
Be careful with url:- It is better to
type it in yourself instead of
clicking on a link and making sure
that the connection is secure with
https and a padlock sign.
Be careful about what you’re
posting on the internet:- While
posting on social media sites like
Facebook, it should be ensured
that no personal information like
residential addresses are divulged.
Handle emails with care:- Be
cautious with how much you trust
emails, especially ones from
illegitimate looking sources. Do not
open attachments in this case, nor
click on any links.
Avoid dealing with sensitive
information while using public
connections:- Public WIFI's are
often unencrypted and are thus
easy to gain access to which can be
used to commit fraudulent
activities.
Avoid using public computers:-
Ensure your login information and
passwords are not getting saved.
Avoid putting sensitive data in and
make sure the computer is not left
unattended if you do. Delete
cookies and log out when you are
done.
THANK YOU
Submitted To: Er Anupam Sharma
Subm,itted by Swara Patil
Cyber Crime
And computer forensics
What is a Cybercrime?
Cybercrime is any criminal offense that
is facilitated by or involves electronic
communications or information systems,
including any electronic device, computer,
or the internet.
It is a general term that covers
crimes like phishing, credit card fraud,
illegal downloading, child pornography,
cyberbullying, and so on.
Common Cybercrimes
1. Cyber Trolls- A person who purposely posts
sarcastic, demeaning, or insulting comments
about someone.
2. Cyber Bullying- When someone uses the
internet, any electronic device, and social media
network to harass, embarrass or intimidate
someone else.
• Criminal charges such as harassment, libel,
assault, and even terrorism can be charged on
the criminal.
• According to the civil lawsuit they may be asked
to compensate for the damage caused.
3. Cyber Stalking- This is a kind of online harassment wherein the victim
is subjected to a barrage of online messages and emails.
• They collect all personal information.
• They may post the information online on any filthy/obscene sites
posing as if the victim is posting this information.
• People of all kinds, from all over the world, who come across this
information, start calling the victim at his/her residence for many
filthy/obscene reasons.
• Some stalkers subscribe the e-mail account of the victim to
innumerable obscene or illegal sites because of which the victim
starts receiving unsolicited e-mails.
• Some stalkers send repeated e-mails to ask for favours or threaten
them.
4. Spreading rumors online- When people
indulge in posting false information on social
media, or comments that could hurt or
spread rumors that could hurt others, may
trigger panic, or hurt the religious sentiments
of people resulting in clashes or even riots.
• As per the Information Technology Act of
India, publishing/circulation of rumors,
especially hurting religious sentiments is a
cybercrime and it may invite a fine with
imprisonment extendable upto 3 years.
5. Information Theft- Stealing of personal
information through ways such as-
• Phishing- It is a practice of attempting to
acquire sensitive information from
individuals over the internet, by means
of deception.
• Social engineering/pretexting- posing as
a legitimate business or government
official to obtain personal information.
6. Online Fraud- Fraud committed using the internet is called Online
Fraud.
7. Scam- Fraudulent business practice that extracts money.
Measures-
• Never enter any financial information on unsecure websites.
• Never answer e-mails from any unreliable source.
• Never click on links received in emails rather type the URL yourself.
• Never respond to an e-mail claiming you won something.
Non-delivered goods Non- existent companies
Stealing information Fraudulent Payments
Ways in which
it may occur
Strong
security
mechanism
Measures
8. Illegal Downloads- Illegal downloading refers to obtaining files for
which we don’t have the right to use on download from the internet. It
is downloading a paid item, without making any payment.
9. Child Pornography- Child Pornography is defined as any visual or
written representation that depicts or advocates the sexual activity of
anyone under the age of 18.
• The law also includes some child nudity, simulated sex involving
children, and any material that is computer-doctored to look like
child porn.
• Information Technology Act, 2000 & Indian Penal Code, 1860
provides protection from child pornography to a child below the age
of 18.
• According to the amended Information Technology Bill, Section 67
has been amended that not only creating and transmitting obscene
material in electronic form but also browsing such sites is an
offense.
Reporting Cybercrime
If any cyber crime happens, one must report it firstly to parents, school
authorities, and then to the police.
To report a cybercrime:
The Information technology Act provides that a cybercrime may be
reported in the Cyber Crime Units of any city, irrespective of the place
where the crime is committed.
The local police could be
approached for filing
complaints
Provisions have now
been made to file ‘E-FIR’
Complains can also be
filed on a website for
registering crimes against
women and children.
Computer Forensics
• Digital Forensics or computer forensics refers to methods used for
the interpretation of computer media for digital evidence.
Data
identification
Project
Planning
Data capture
Data
processing
Data analysis Data display
Data
processing
Important Practices of Computer Forensics:
• Acquire the evidence without damaging or altering the original.
• Authenticate that your recovered evidence is the same as the
originally seized data.
• Analyze the data without modifying it.
Cyber Law and IT Act
• Cyber law is a generic term that refers to
all legal and regulatory aspects of the
Internet and the World Wide Web.
• Cyber law is important because it touches
almost all aspects of transactions and
activities on and concerning the Internet,
the World Wide Web and Cyberspace.
India’s IT act and IT (Amendment) Act, 2008
• In India Cyber Laws are enforced through Information Technology
Act, 2000 (IT Act 2000).
• IT ACT 2000’s prime purpose was to provide legal recognition to
electronic commerce.
• IT (Amendment) Act, 2008 added several new sections of offenses
including Cyber Terrorism and Data Protection.
• Major amendments of IT ACT (2008)-
Digital Signatures
• Authentication of
electronic records
Electronic Governance
• E-Documents get legal
recognition
• Legal documents can be
supplied in electronic
form
Offences and Penalties
• Penalty upto INR 1
crore
Amendments to other
laws
• Indian Penal Code, 1860
• The Indian Evidence
Act, 1872
• The Banker’s book
evidence Act, 1891 and
many more
Submitted To: Er Anupam Sharma
Submitted

More Related Content

What's hot

Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 

What's hot (20)

Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Hacking
HackingHacking
Hacking
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Cyber Safety ppt.pptx

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 

Similar to Cyber Safety ppt.pptx (20)

Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 

More from CGC Technical campus,Mohali

More from CGC Technical campus,Mohali (20)

Gender Issues CS.pptx
Gender Issues CS.pptxGender Issues CS.pptx
Gender Issues CS.pptx
 
Intellectual Property Rights.pptx
Intellectual Property Rights.pptxIntellectual Property Rights.pptx
Intellectual Property Rights.pptx
 
Python Modules .pptx
Python Modules .pptxPython Modules .pptx
Python Modules .pptx
 
Dynamic allocation
Dynamic allocationDynamic allocation
Dynamic allocation
 
Arrays in c
Arrays in cArrays in c
Arrays in c
 
Control statments in c
Control statments in cControl statments in c
Control statments in c
 
Operators in c by anupam
Operators in c by anupamOperators in c by anupam
Operators in c by anupam
 
Datatypes in c
Datatypes in cDatatypes in c
Datatypes in c
 
Fundamentals of-computer
Fundamentals of-computerFundamentals of-computer
Fundamentals of-computer
 
Searching
Searching Searching
Searching
 
File handling-c
File handling-cFile handling-c
File handling-c
 
Structure in C language
Structure in C languageStructure in C language
Structure in C language
 
Intro
IntroIntro
Intro
 
Function in c program
Function in c programFunction in c program
Function in c program
 
Function in c
Function in cFunction in c
Function in c
 
string in C
string in Cstring in C
string in C
 
C arrays
C arraysC arrays
C arrays
 
Data processing and Report writing in Research(Section E)
Data processing and Report writing in Research(Section E)Data processing and Report writing in Research(Section E)
Data processing and Report writing in Research(Section E)
 
data analysis and report wring in research (Section d)
data analysis and report wring  in research (Section d)data analysis and report wring  in research (Section d)
data analysis and report wring in research (Section d)
 
Section C(Analytical and descriptive surveys... )
Section C(Analytical and descriptive surveys... )Section C(Analytical and descriptive surveys... )
Section C(Analytical and descriptive surveys... )
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
nhezmainit1
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 

Recently uploaded (20)

TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Pharmaceutical Biotechnology VI semester.pdf
Pharmaceutical Biotechnology VI semester.pdfPharmaceutical Biotechnology VI semester.pdf
Pharmaceutical Biotechnology VI semester.pdf
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 

Cyber Safety ppt.pptx

  • 2. What is Cyber Safety? •The act of protecting networks, computers, servers, mobile devices, electronic systems, and data against malicious attacks is known as cyber safety. •It is the mindful and secure use of the internet to protect the privacy of personal data.
  • 3. Identity Theft:- It occurs when someone impersonates another using their personal information to commit fraud. Identity Theft Financial Identity used for getting financial gain Criminal Identity used to commit crimes freely Medical Identity used to obtain medical drugs
  • 4. Ways in which websites track us •IP address:- An IP address is a unique address which identifies a device on the internet or a local network. These are available to websites we visit and also contain information about our rough location. •Cookies:- They are small pieces of information stored in the browser, which track, personalize, and save information about each user’s session. Websites use cookies to streamline your web experiences.
  • 5. HTTP referrer:- It contains the address of the previous web page from which a link to the currently requested page was followed. Super cookie:- They are a type of cookie which are more persistent. These cookies are stored often in multiple locations and are repopulated through other locations when deleted from a particular part. They are harder to get rid of. User agent:- It tells the websites we visit about our browser and operating system.
  • 6. How to protect ourselves:- Anonymous and Private browsing • Anonymous browsers:- They are used by journalists governments etc. which let the user access the internet without revealing personal information such as IP address. For e.g. Tor browser Private Browsing can be achieved through the following ways:- Incognito Browsing Proxy VPNs
  • 7. • Incognito browsing:- This is a version of the browser which simply keeps your browsing activity private. It does not, however, keep your ISP from seeing the sites you visit. For e.g. Incognito mode in Chrome, private browsing in Firefox. • Proxy:- A proxy site serves as an intermediate between the user and the desired website. Instead of the user, the trackers receive data about the proxy site. • VPN:- A virtual private network, or VPN, is an encrypted connection via internet from a device to a network. It can be installed as a plugin too. It tunnels your connection through a private server.
  • 8. Need for confidentiality The internet is a necessary tool in our day to day life. There are multiple ways in which our data can be used against us. In order to avoid these mishappenings, there are a few measures we need to take while browsing the internet:-
  • 9. Use a firewall whenever possible:- A firewall is a barrier which monitors and filters incoming and outgoing network traffic based on given guidelines. It keeps unauthorized traffic out. Control browser settings:- Browsers track user data and share information with websites you might not approve of. Disable 3rd party cookies to prevent tracking. Use private browsing:- Using methods such as the ones mentioned previously, keep your personal information and browsing data safe. Be careful with url:- It is better to type it in yourself instead of clicking on a link and making sure that the connection is secure with https and a padlock sign.
  • 10. Be careful about what you’re posting on the internet:- While posting on social media sites like Facebook, it should be ensured that no personal information like residential addresses are divulged. Handle emails with care:- Be cautious with how much you trust emails, especially ones from illegitimate looking sources. Do not open attachments in this case, nor click on any links. Avoid dealing with sensitive information while using public connections:- Public WIFI's are often unencrypted and are thus easy to gain access to which can be used to commit fraudulent activities. Avoid using public computers:- Ensure your login information and passwords are not getting saved. Avoid putting sensitive data in and make sure the computer is not left unattended if you do. Delete cookies and log out when you are done.
  • 11. THANK YOU Submitted To: Er Anupam Sharma Subm,itted by Swara Patil
  • 13. What is a Cybercrime? Cybercrime is any criminal offense that is facilitated by or involves electronic communications or information systems, including any electronic device, computer, or the internet. It is a general term that covers crimes like phishing, credit card fraud, illegal downloading, child pornography, cyberbullying, and so on.
  • 14. Common Cybercrimes 1. Cyber Trolls- A person who purposely posts sarcastic, demeaning, or insulting comments about someone. 2. Cyber Bullying- When someone uses the internet, any electronic device, and social media network to harass, embarrass or intimidate someone else. • Criminal charges such as harassment, libel, assault, and even terrorism can be charged on the criminal. • According to the civil lawsuit they may be asked to compensate for the damage caused.
  • 15. 3. Cyber Stalking- This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. • They collect all personal information. • They may post the information online on any filthy/obscene sites posing as if the victim is posting this information. • People of all kinds, from all over the world, who come across this information, start calling the victim at his/her residence for many filthy/obscene reasons. • Some stalkers subscribe the e-mail account of the victim to innumerable obscene or illegal sites because of which the victim starts receiving unsolicited e-mails. • Some stalkers send repeated e-mails to ask for favours or threaten them.
  • 16. 4. Spreading rumors online- When people indulge in posting false information on social media, or comments that could hurt or spread rumors that could hurt others, may trigger panic, or hurt the religious sentiments of people resulting in clashes or even riots. • As per the Information Technology Act of India, publishing/circulation of rumors, especially hurting religious sentiments is a cybercrime and it may invite a fine with imprisonment extendable upto 3 years.
  • 17. 5. Information Theft- Stealing of personal information through ways such as- • Phishing- It is a practice of attempting to acquire sensitive information from individuals over the internet, by means of deception. • Social engineering/pretexting- posing as a legitimate business or government official to obtain personal information.
  • 18. 6. Online Fraud- Fraud committed using the internet is called Online Fraud. 7. Scam- Fraudulent business practice that extracts money. Measures- • Never enter any financial information on unsecure websites. • Never answer e-mails from any unreliable source. • Never click on links received in emails rather type the URL yourself. • Never respond to an e-mail claiming you won something. Non-delivered goods Non- existent companies Stealing information Fraudulent Payments Ways in which it may occur Strong security mechanism Measures
  • 19. 8. Illegal Downloads- Illegal downloading refers to obtaining files for which we don’t have the right to use on download from the internet. It is downloading a paid item, without making any payment. 9. Child Pornography- Child Pornography is defined as any visual or written representation that depicts or advocates the sexual activity of anyone under the age of 18. • The law also includes some child nudity, simulated sex involving children, and any material that is computer-doctored to look like child porn. • Information Technology Act, 2000 & Indian Penal Code, 1860 provides protection from child pornography to a child below the age of 18. • According to the amended Information Technology Bill, Section 67 has been amended that not only creating and transmitting obscene material in electronic form but also browsing such sites is an offense.
  • 20. Reporting Cybercrime If any cyber crime happens, one must report it firstly to parents, school authorities, and then to the police. To report a cybercrime: The Information technology Act provides that a cybercrime may be reported in the Cyber Crime Units of any city, irrespective of the place where the crime is committed. The local police could be approached for filing complaints Provisions have now been made to file ‘E-FIR’ Complains can also be filed on a website for registering crimes against women and children.
  • 21. Computer Forensics • Digital Forensics or computer forensics refers to methods used for the interpretation of computer media for digital evidence. Data identification Project Planning Data capture Data processing Data analysis Data display Data processing Important Practices of Computer Forensics: • Acquire the evidence without damaging or altering the original. • Authenticate that your recovered evidence is the same as the originally seized data. • Analyze the data without modifying it.
  • 22. Cyber Law and IT Act • Cyber law is a generic term that refers to all legal and regulatory aspects of the Internet and the World Wide Web. • Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace.
  • 23. India’s IT act and IT (Amendment) Act, 2008 • In India Cyber Laws are enforced through Information Technology Act, 2000 (IT Act 2000). • IT ACT 2000’s prime purpose was to provide legal recognition to electronic commerce. • IT (Amendment) Act, 2008 added several new sections of offenses including Cyber Terrorism and Data Protection. • Major amendments of IT ACT (2008)- Digital Signatures • Authentication of electronic records Electronic Governance • E-Documents get legal recognition • Legal documents can be supplied in electronic form Offences and Penalties • Penalty upto INR 1 crore Amendments to other laws • Indian Penal Code, 1860 • The Indian Evidence Act, 1872 • The Banker’s book evidence Act, 1891 and many more
  • 24. Submitted To: Er Anupam Sharma Submitted