SlideShare a Scribd company logo
1 of 11
CYBER PRIVACY
Presented by
ARYA. S
ROLL NO-24
PHYSICAL SCIENCE
CYBER PRIVACY
❇️Cyber privacy(internet privacy) is the privacy and security
level of personal data published via internet.
❇️ It refers to the vast range of technologies,protocols and
concepts related to giving individual users or other parties
more privacy protections in their use of global internet.
❇️ Internet privacy is also known as online privacy.
❇️ Internet privacy is cause for concern for any user planning
to make an online purchase, visit a social networking site,
participate in online games or attend forums. If a password is
comprised and revealed a victim's identity may be fraudulently
used or stolen.
IMPORTANCE OF CYBER PRIVACY
Privacy is a value for most, but not all people
Privacy means different things to different people
such as categories may include Ananymity,
confidentiality and security
There is a variety of privacy violations which
include embarrassment to personal loss and theft
Not all information is guarded at the same level
that is heath and financial information is considered
to be more valuable
People want control over information that relates
to them
People will risk potential privacy violations to
commit trusting acts online. These acts
include giving up personal information to buy
something online, online hacking and getting
health information
Online threats to privacy have grown in
recent years that is, home computer users
have experienced a problem with spyware .
INTERNET PRIVACY RISKS
PHISHING
An internet hacking activity
used to steal secure using
data,including username,
password, bank account
number, security pin or
credit card number.
PHARMING
An internet hacking activity used to
redirect a legitimate website visitor to
a different IP address
SPYWARE
An offline application
that obtains data
without user's consent.
When the computer is
online, previously
aquired data is sent to
the spyware source.
MALWARE
An application used to
illegally damage online and
offline computer users
through Trojans, viruses
and spyware.
Ways to minimize internet privacy
Violation Risks
 Update your software and operating system
 Use anti-virus software
 Do not open email attachments from unknown senders.
 Do not click on link in email from unknown senders or
unfamiliar websites
 Avoid using unsecure WiFi networks in public places
 Clear browser cache and history on a consistent basis
Avoid shopping on unreliable websites
Avoid exposing password, personal data on websites
with lower security levels
Avoid using the same password for all the accounts.
INTERNET IS A BOON OR BANE
DEPENDING ON HOW IT IS USED
THANK YOU

More Related Content

Similar to Edu -3 Cyber privacy arya. s

Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P Ptawnygsu
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 
Internet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety TipsInternet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety TipsCyber Security Experts
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptxhavaneb872
 

Similar to Edu -3 Cyber privacy arya. s (20)

Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
cyber crime
cyber crimecyber crime
cyber crime
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
Internet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety TipsInternet Safety | Online Safety | Internet Safety Tips
Internet Safety | Online Safety | Internet Safety Tips
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptx
 

More from ARYAS87

SOLUTIONS-WPS Office(1).pdf
SOLUTIONS-WPS Office(1).pdfSOLUTIONS-WPS Office(1).pdf
SOLUTIONS-WPS Office(1).pdfARYAS87
 
DOC-20230109-WA0004..pdf
DOC-20230109-WA0004..pdfDOC-20230109-WA0004..pdf
DOC-20230109-WA0004..pdfARYAS87
 
Nutrition chart
Nutrition chart Nutrition chart
Nutrition chart ARYAS87
 
Health chart
Health chart Health chart
Health chart ARYAS87
 
digitaltext me.pdf
digitaltext  me.pdfdigitaltext  me.pdf
digitaltext me.pdfARYAS87
 
Mcq arya. s 24 froebel
Mcq arya. s 24 froebelMcq arya. s 24 froebel
Mcq arya. s 24 froebelARYAS87
 
Edu 01 arya. s 24 (1) Froebel
Edu 01 arya. s 24 (1) FroebelEdu 01 arya. s 24 (1) Froebel
Edu 01 arya. s 24 (1) FroebelARYAS87
 
Mcq arya. s 24 cyber privacy
Mcq arya. s 24 cyber privacyMcq arya. s 24 cyber privacy
Mcq arya. s 24 cyber privacyARYAS87
 
Thullal
Thullal Thullal
Thullal ARYAS87
 
Edu 1 contributions of froebel arya. s 24
Edu 1 contributions of  froebel arya. s 24Edu 1 contributions of  froebel arya. s 24
Edu 1 contributions of froebel arya. s 24ARYAS87
 
Albert einstein 2
Albert einstein 2Albert einstein 2
Albert einstein 2ARYAS87
 

More from ARYAS87 (11)

SOLUTIONS-WPS Office(1).pdf
SOLUTIONS-WPS Office(1).pdfSOLUTIONS-WPS Office(1).pdf
SOLUTIONS-WPS Office(1).pdf
 
DOC-20230109-WA0004..pdf
DOC-20230109-WA0004..pdfDOC-20230109-WA0004..pdf
DOC-20230109-WA0004..pdf
 
Nutrition chart
Nutrition chart Nutrition chart
Nutrition chart
 
Health chart
Health chart Health chart
Health chart
 
digitaltext me.pdf
digitaltext  me.pdfdigitaltext  me.pdf
digitaltext me.pdf
 
Mcq arya. s 24 froebel
Mcq arya. s 24 froebelMcq arya. s 24 froebel
Mcq arya. s 24 froebel
 
Edu 01 arya. s 24 (1) Froebel
Edu 01 arya. s 24 (1) FroebelEdu 01 arya. s 24 (1) Froebel
Edu 01 arya. s 24 (1) Froebel
 
Mcq arya. s 24 cyber privacy
Mcq arya. s 24 cyber privacyMcq arya. s 24 cyber privacy
Mcq arya. s 24 cyber privacy
 
Thullal
Thullal Thullal
Thullal
 
Edu 1 contributions of froebel arya. s 24
Edu 1 contributions of  froebel arya. s 24Edu 1 contributions of  froebel arya. s 24
Edu 1 contributions of froebel arya. s 24
 
Albert einstein 2
Albert einstein 2Albert einstein 2
Albert einstein 2
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

Edu -3 Cyber privacy arya. s

  • 1. CYBER PRIVACY Presented by ARYA. S ROLL NO-24 PHYSICAL SCIENCE
  • 2. CYBER PRIVACY ❇️Cyber privacy(internet privacy) is the privacy and security level of personal data published via internet. ❇️ It refers to the vast range of technologies,protocols and concepts related to giving individual users or other parties more privacy protections in their use of global internet. ❇️ Internet privacy is also known as online privacy. ❇️ Internet privacy is cause for concern for any user planning to make an online purchase, visit a social networking site, participate in online games or attend forums. If a password is comprised and revealed a victim's identity may be fraudulently used or stolen.
  • 3. IMPORTANCE OF CYBER PRIVACY Privacy is a value for most, but not all people Privacy means different things to different people such as categories may include Ananymity, confidentiality and security There is a variety of privacy violations which include embarrassment to personal loss and theft Not all information is guarded at the same level that is heath and financial information is considered to be more valuable People want control over information that relates to them
  • 4. People will risk potential privacy violations to commit trusting acts online. These acts include giving up personal information to buy something online, online hacking and getting health information Online threats to privacy have grown in recent years that is, home computer users have experienced a problem with spyware .
  • 5. INTERNET PRIVACY RISKS PHISHING An internet hacking activity used to steal secure using data,including username, password, bank account number, security pin or credit card number.
  • 6. PHARMING An internet hacking activity used to redirect a legitimate website visitor to a different IP address
  • 7. SPYWARE An offline application that obtains data without user's consent. When the computer is online, previously aquired data is sent to the spyware source.
  • 8. MALWARE An application used to illegally damage online and offline computer users through Trojans, viruses and spyware.
  • 9. Ways to minimize internet privacy Violation Risks  Update your software and operating system  Use anti-virus software  Do not open email attachments from unknown senders.  Do not click on link in email from unknown senders or unfamiliar websites  Avoid using unsecure WiFi networks in public places  Clear browser cache and history on a consistent basis Avoid shopping on unreliable websites Avoid exposing password, personal data on websites with lower security levels Avoid using the same password for all the accounts.
  • 10. INTERNET IS A BOON OR BANE DEPENDING ON HOW IT IS USED