SlideShare a Scribd company logo
1 of 90
INTERNET SAFETY AND SECURITY
INTERNET
Global computer network providing a variety of
information and communication facilities, consisting of
interconnected networks using standardized
communication protocols.
• Safer Internet Day is celebrated globally in February each year to
promote the safe and positive use of digital technology for children
and young people and inspire a national conversation.
INTERNET DAY
WEB
DARK WEB
Secret cyber underworld
is dark web
Illegal activities take
place
Buy – drugs, guns
The person enter into
the dark web is
untraceable.
Access by a special
browser.
DARK WEB
MYSTERY BOX
SCEURE MEASURMENT
• Don't put personal information on
online.
• Don't answer unknown messages and
calls.
• Don't use same password for more
than one account.
• Don't share your password.
PROTECT YOURSELF ON ONLINE
• Choose great password.
• Keep all software up to date.
• Use a vpn (virtual private network)
• Check your social media privacy settings.
• Setup a passcode for all your devices.
• Keep personal data private.
ACCOUNT GET HACKED??
• Change your password.
• Setup two step verification.
• Use antivirus softwares.
• Backup your file to mega ,google drive....
CHANGE YOUR PASSWORD
• Use capital letter
• Numbers
• Symbols
• Characters
• Ex: T!P@h0$
SETUP TWO STEP VERIFICATION
Two factor authentication is a type of multifactor
authentication.
• It is a method of confirming a user’s claimed
identity by utilizing something they know
(password).
• A user-controlled password with one time
password (OTP) is received by an authenticator
that only the user processes
ANTIVIRUS SOFTWARES
1. Kaspersky
2.Avast
3.AVG
4.MalwareByte
5.QuickHeal
PARENTAL CONTROL OF KASPERSKY
1.Block unwanted sites.
2.Password need to unlock the
site
3.Block ads
4.Help children to access good
sites
VPN (VIRTUAL PRIVATE NETWORK)
A virtual private network extends a private network across a public
network, and enables users to send and receive data across
shared or public networks as if their computing devices were
directly connected to the private network.
TOR BROWSER
• Best browser
• Secure
• IP address non trackable browser.
• For hackers and comman people.
• Easy to handle.
THINK BEFORE YOU CLICK
T -Is it true
H-Is it helpful
I- Is it inspiring
N-Is it necessary
G-Is it kind
SECURE WEB AND UNSECURE WEB
BEST RECOVERY SOFTWARE
• Recuva
• Wise Data Recovery. ...
• Free Undelete. ...
• Pandora Recovery. ...
• Mini Tool Power
• Data Recovery. ...
• Glary Undelete. ...
• Undelete My Files Pro. ...
• PC Inspector File Recovery.
ONLINE SHOPPING
RISKS OF ONLINE SHOPPING
Identity Theft
Credit Card Fraud
Adware & Malware
Fake Online Stores
Overpayment
IDENTITY THEFT
One of the most common risks of online shopping is of identity
theft
Criminals get hold of your personal information.
Use the information to make personal purchases.
They monitor the activities of online shoppers closely to steal
their personal information.
CREDIT CARD FRAUD
• Credit card fraud is another common risk.
• Malicious users intercept the online stores at the payment portal.
• Customers redirect to the malicious user’s site instead of the
legitimate payment gateway after making payment of the
products.
• As the page looks identical to the gateway of the site they were
shopping from, customers get confused.
• The malicious users then get their hands on the customers’ credit
card details and use it for themselves.
ADWARE & MALWARE
• While surfing social networking sites or online stores, ads and offers
bombard the users’ screens.
• These advertisements are not always genuine.
• They might look appealing and hard to ignore, but as soon a user clicks on
these ads.
• The ad requires them to register and submit their personal details.
• scammers easily acquire the information. Sometimes, even good stores are
hit with malware so it spreads to all the users who visit the site.
• Simply visiting the website makes the malware attack your system.
• Without an efficient antivirus software, one can fall prey to harmful malware.
• Amazon suffered a massive data breach in which the attacker stole the
login credentials, as well as personal information of over 80,000 customers
FAKE ONLINE STORES
• The Internet is full of fake online stores and pages that trick
people into purchasing products.
• The truth is, there are no products and they are not for delivery.
• These stores show great offers and lure people into buying their
fake products.
• There have been various incidents where buyers never got what
they ordered and spent money in the online transaction
• These people make their sites appear as legitimate online stores.
OVERPAYMENT
• overpayment scams have become quite common.
• they depend on a seller’s goodwill to give exemplary customer
service.
• Scammers make a purchase and pay via an online transfer or
check.
• They pay more than the original payable amount.
• Then, the scammer asks for the refund of the excess amount.
• In the urgency, the seller usually has no time to see that the online
transaction/check did not go through.
• This kind of threat frequently links with fake order email scams
which alert an online seller about the sale of an item and the
money credited to an account by using an almost identical
TOP 4 CYBERCRIMES TO EFFORTLESSLY PROTECT YOUR
COMPUTER AND DATA AGAINST ITS IMPACT
1.Phishing scams
2.Online Harassment
3.Cyberstalking
4.Invasion of privacy
PHISHING SCAMS
1.Phishing is a practice of a cybercriminal or hacker attempting to
obtain sensitive or personal information from a computer user.
2.This process is usually accomplished through phishing websites
which are designed to mimic a legitimate website
3.That the unsuspecting computer user will enter several bits of
personal information such as their banking passwords, home
address or even social security number.
4.To avoid phishing scams, we recommend using a phishing filter
feature on your web browser so that it can actively scan websites
that you visit to check if they have been identified as a phishing
website.
ONLINE HARASSMENT
Harassment online is usually related to your social lifestyle and if you choose
to use a popular social network such as Facebook or Twitter.
Online harassment can consist of threats sent through email, instant
message or through a social network message/post.
It is simple to report these threats to the social network you're being
harassed on.
Harassment can also be found to result in cyberbullying kids which can have
dire consequences as you may have witnessed recently in the media where
a 13-year-old kid .
Megan Meier committed suicide from being bullied online.
for handling harassment online is to immediately report any activity out of the
ordinary before it gets out of hand even
if you may know the person on the other end.
CYBERSTALKING
Need great lengths to try to monitor a victims online activity.
Include infecting a person's computer with malware that is
able to log computer activity.
Cyberstalkers are also known to continually harass their
potential victims.
Cyberstalking cases should also be reported to authorities,
just like online harassment cases.
Cyberstalkers may contact a victim's colleagues, friends and
other online contacts in an effort to slander them or extract
personal information from them.
INVASION OF PRIVACY
 The invasion of privacy is basically the act of someone
attempting to intrude on a person's personal life.
 This includes hacking into a person's computer, reading their
emails or monitoring online activities.
 Many of these specific crimes are punishable under the law.
 If you ever suspect someone invading your privacy, you can
simply contact the police and file a report.
CYBER SECURITY
Cyber security is the protection of internet connected
systems including hardware , software and data from
cyber attack.
MOST COMMON CYBER ATTACK
Malware
Phishing
Password attacks
DDOS (Distributed Denial of service)
Rogue software
Malvertising
Drive by download
Man in middle attack
ADDICTION
1)Game addiction
2)Mobile addiction
3)Internet addiction
GAME ADDICTION
Game addiction is described as an impulse control disorder, which
does not involve use of an intoxicating drug and is very similar to
pathological gambling. Video game addiction has also been
referred to as video game overuse, pathological or
compulsive/excessive use of computer games and/or video games.
PUBG (PLAYER UNKNOWN'S BATTLEGROUNDS)
Player Unknown's
Battlegrounds is an
online multiplayer battle
royale game developed
and published by PUBG
Corporation, a
subsidiary of South
Korean video game
company Blue hole.
FREE FIRE
Garena Free Fire is an
electronic game for
mobile of action-
adventure battle royale
game, developed by 111
dots Studio and
published by Garena.
The game was beta-
released in November
20, 2017 and was
officially released for
Android and iOS on
December 4, 2017
PROBLEMS ASSOCIATED WITH GAME
ADDICTION1.Neglect in personal hygiene.
2.ADD and ADHD
3.Learning disabilities.
4.Loss of personal relationships
5.Weight gain and obesity
6.Stress.
7.Restlessness and anxiety
8.Poor nutrition.
9.Arthritis and carpal tunnel syndrome
10.Sleep disorders
11.Aggressive thoughts and behaviors
NEGLECT IN PERSONAL HYGIENE
Those addicted to video games tend to care less
about their hygiene since they spend less time in
social settings and more time alone playing games.
ADD AND ADHD
These hyperactivity disorders are highly common among video
game addicts due to the high interactivity levels of most of
today’s video games.
LEARNING DISABILITIES
Those used to progressing quickly in intense video
games often suffer learning disabilities when
spending time in the real world.
LOSS OF PERSONAL RELATIONSHIPS
Addicted gamers often devote more time to video games
than to friends, family, and social activities.
WEIGHT GAIN AND OBESITY
Those addicted to video games often spend less time outdoors and
being physically active, which increases the risk for weight gain,
obesity, and related conditions like type two diabetes and heart
disease.
STRESS
Video game addiction can lead to stress when players are unable
to pass difficult levels or achieve certain rewards. Stress can also
occur when players face life problems with work, education, and
family due to their gaming addiction
RESTLESSNESS AND ANXIETY.
Those addicted to video games often become anxious and
restless when they’re unable to play video games for any
reason.
POOR NUTRITION
Addicted gamers usually neglect nutrition and opt for frozen
meals, fast food, and other convenient, unhealthy options. Poor
nutrition can lead to nutritional deficiency, and problems with
diabetes and weight gain.
ARTHRITIS AND CARPAL TUNNEL SYNDROME
Those who perform repetitive movements with their fingers and
wrists playing mobile games can develop arthritis and carpal tunnel
syndrome.
SLEEP DISORDERS
. Addicted gamers who stay up late in the night playing games can
suffer sleep disorders like insomnia that increase the risk for
illness and disease — including cancer.
AGGRESSIVE THOUGHTS AND BEHAVIORS
Children and youth who become addicted to video games
tend to display aggressive thoughts and behaviors as a
direct result of prolonged video game exposure.
SMARTPHONE ADDICTION
• Smartphone addiction,
sometimes colloquially
known as “nomophobia”
• It is often fueled by an
Internet overuse
problem or Internet
addiction disorder.
IMPULSE-CONTROL PROBLEMS
1.Virtual relationships
2.Information overload
3.Cybersex addiction
4.Online compulsions
SMARTPHONE OR INTERNET ADDICTION CAN ALSO
NEGATIVELY IMPACT YOUR LIFE
• Increasing loneliness and depression
• Fueling anxiety
• Increasing stress
• Exacerbating attention deficit disorders
• Diminishing your ability to concentrate and think
deeply or creatively.
• Disturbing your sleep
• Encouraging self-absorption
WARNING SIGNS OF SMARTPHONE OR INTERNET OVERUSE
INCLUDE
1.Trouble completing tasks at work or home.
2.Isolation from family and friends.
3.Concealing your smartphone use
4.Having a fear of missing out
5.Feeling of dread, anxiety, or panic if you leave your
smartphone at home
TREATMENT FOR SMARTPHONE AND INTERNET
ADDICTION
1.Cognitive-behavioral therapy
2.Marriage or couples counseling.
3.Group support
COGNITIVE-BEHAVIORAL THERAPY
Cognitive-behavioral therapy provides step-by-step ways to
stop compulsive behaviors and change your perceptions about
your smartphone and the Internet. Therapy can also help you
learn healthier ways of coping with uncomfortable emotions—
such as stress, anxiety, or depression—that may be fueling your
smartphone use.
MARRIAGE OR COUPLES COUNSELING
If excessive use of Internet pornography or online affairs
is affecting your relationship, counseling can help you
work through these challenging issues and reconnect
with your partner.
GROUP SUPPORT
Organizations such as Internet Tech Addiction Anonymous (ITAA)
and On-Line Gamers Anonymous offer online support and face-to-
face meetings to curb excessive technology use. Of course, you
need real-life people to benefit fully from any addiction support
group. Online support groups can be helpful in finding sources of
assistance, but it’s easy to use them as an excuse to spend even
more time on your smartphone. Sex Addicts Anonymous can be a
place to try if you’re having trouble with cybersex addiction.
INTERNET ADDICTION
Internet Addiction” is a controversial theorized mental disorder, the
existance and/or importance of which is still being debated among
the psychological community. While this screening test may reveal
some of the more pathological aspects of internet and smartphone
use, it should not be used as a definitive diagnostic test
INTERNET ADDICTION ASSESSMENT
1. I find myself using my smartphone or computer longer than I planned to.
2. I would rather be on my smartphone or computer than interact with my partner
3. I would rather spend time online than do things around the house.
4. My performance in school or at work suffers because of the amount of time I spend online.
5. People close to me are concerned about the amount of time I spend on my smartphone or
computer.
6. When asked what I do online, I prefer not to answer
7. My productivity and attentiveness suffers because of the amount of time I spend online.
8. I check my social media, text messages, or emails first thing after waking up.
9. I am bothered when people interupt me while I am using my computer or smartphone
10.I feel anxious when I do not have my smartphone with me
11.I use the internet to escape from my real life
12.I would be less interesting and happy without access to the internet.
13.I put off things I have to do by using my computer or smartphone
14.When I am unable to use my smartphone, I miss it or think about what I could be doing online
15. I stay up later at night than I had intended due to doing things online.
16. I would rather stay home and use the internet than go out with friends.
17. I have tried to reduce my smartphone or internet use without success
18. I am concerned about missing out on thing online when not checking my
smartphone
INTERNET PROTOCOLS
 A set of rules governing the format of data sent over the Internet
or other network.
 The Internet Protocol is the principal communications protocol in
the Internet protocol suite for relaying datagrams across
network boundaries. Its routing function enables
internetworking, and essentially establishes the Internet
PROTOCOLS ARE USED ON THE INTERNET
• Electronic Mail (e-mail)
• File Transfer Protocol (FTP)
• HTTP (World Wide Web)
• News (or Usenet)
• Gopher
• Telnet
ELECTRONIC MAIL
The email protocol are three distinct protocols.
1.SMTP (Simple Mail Transfer Protocol)
2.IMAP (Internet Message Access Protocol)
3.POP3 (Post Office Protocol 3)
 SMTP is a protocol used for sending mail
 while IMAP and POP3 are used for receiving
FILE TRANSFER PROTOCOL
File Transfer Protocol, or FTP, is a means of transferring a file
from one computer to another.
 FTP is commonly used for uploading a web page to a web server
so that it may be seen on the World Wide Web. A special program,
called a client, is usually needed to use FTP.
HTTP (WORLD WIDE WEB)
HyperText Transfer Protocol, or HTTP, is the protocol used
by web
server to allow web pages to be shown in a web browser.
If you look up into the address bar of your web browser, the
place where you type in the address that you want to visit, it
has the prefix "http://" in front of the address.
Because most web browsers are capable of FTP as well as
viewing web pages, the http tells the browser what kind of
information to expect.
NEWS (OR USENET)
Network News Transfer Protocol (NNTP) is used for serving
Usenet posts Usenet is similar to the forums that many web sites
have.
Usenet has forums that are dedicated to specific companies as
well as forums that have a wide range of topics. Usenet is divided
into several areas.
Some of the forums that are included in Usenet are comp.
for discussion of computer-related topics, sci. for discussion of
scientific subjects, rec.
for discussion of recreational activities (e.g. games and hobbies)
and talk. for discussion of contentious issues such as religion and
politics.
GOPHER
Another tool of the Internet is Gopher, a menu-based program
that enables you to browse for information without knowing
where the material is located. It lets you search a list of
resources and then sends the material to you.
TELNET
Telnet lets you log in to a remote computer just as
you would if you were there. So any commands that
you would be able to run from the remote computer
if you were sitting in front of it, you would be able to
run from the computer you logged in from.
SOCIALMEDIA
ARE GIRLS SAFE IN CYBER WORLD
SAFE ?
CYBER LOVE
Cyber love includes relationship build up through online,
it can be msn , facebook , friendster and any website online
dating. "Cyber dating, cyber love...most people may feel so
fresh with these terms.A guy "meets" a girl in a chatting room.
Cyber love
LINK BAITING
Link baiting happens when the content of your website or pages
gets linked to other sites. After few times a link will received.
Your photo just got leaked on internet, click here
Look what people are taking about you:
This video of yours is going viral . To know more click here
CYBER CRIME
Cyber Crime is not defined officially in IT Act or in any other
legislation. In fact, it cannot be too. Offence or crime has been
dealt with elaborately listing various acts and the punishments for
each, under the Indian Penal Code, 1860 and related legislations.
Hence, the concept of cyber crime is just a “combination of crime
and computer”.
CYBERCELL
IT ACT SECTIONS
• Section 43 – Penalty and Compensation for damage to computer, computer system, etc
• Section 65 – Tampering with Computer Source Documents
• Section 66 – Computer Related offenses
• Section 66C – Punishment for identity theft
• Section 66D – Punishment for cheating by impersonation by using computer resource
• Section 66E – Punishment for violation of privacy
• Section-66F Cyber Terrorism
• Section 67 – Punishment for publishing or transmitting obscene material in electronic
form
• Section 67B – Punishment for publishing or transmitting of material depicting children
in
• sexually explicit act, etc. in electronic form
• Section 69 – Powers to issue directions for interception or monitoring or decryption of
any
• information through any computer resource
CYBERCELL
Cyber-crime cells are the one track solution towards
combatting and tackling cyber-crime. Now an act of cyber-
crime is a punishable criminal act which may include acts
of online stalking, online banking or credit card scams,
hacking and proliferating software viruses.
SWAYAM
S – study
W – webs of
A – active learning for
Y – young
A – aspiring
M - minds
SWAYAM
Online education portal
Classes from 9 to PG
New syllabus
Get certificate after course complete
100 of courses are hosted
It is under the control of government of india
Courses were offered by best teachers of india
Courses delivered in swayam are free of cost for
learning
CLASSES IN SWAYAM
Video lecture with multimedia presentation.
Specially prepared reading material that can
downloaded/printed.
Self assessment tests through tests and quizzes.
HSSLIVE
For high secondary students.
Study material
Previous and model question paper
Exam result
Government orders
Software
Circular
Mela results
SAMAGRA
For 1 – 12 students
Text book (pdf)
e-Resources
Question Pool
VIRUSES
A computer virus is a type
of computer program that,
when executed, replicates
itself by modifying other
computer programs and
inserting its own code.
When this replication
succeeds, the affected
areas are then said to be
"infected" with a computer
virus.
SOME COMMON VIRUSES
 Resident Virus
 Multipartite Virus
 Direct Action Virus
 Browser Hijacker
 Overwrite Virus
 Web Scripting Virus
 Boot Sector Virus
 Macro Virus
 Directory Virus
 Polymorphic Virus
 File Infector Virus
 Encrypted Virus
 Network Virus
 FAT Virus
JOCKER VIRUS
I LOVE YOU VIRUS
1.Most powerful virus
RANSOMWARE VIRUS README NOTE
Information technology and the Internet are rapidly
transforming almost every aspect of our lives - some for
better, some for worse.
THANKS

More Related Content

What's hot

What's hot (16)

Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh Ghodela
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Users guide
Users guideUsers guide
Users guide
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
The Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting HackedThe Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting Hacked
 

Similar to Internet safety and security

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitysamina khan
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Jay Visavadiya
 

Similar to Internet safety and security (20)

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Internet safety and security

  • 2. INTERNET Global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  • 3. • Safer Internet Day is celebrated globally in February each year to promote the safe and positive use of digital technology for children and young people and inspire a national conversation. INTERNET DAY
  • 4. WEB
  • 5. DARK WEB Secret cyber underworld is dark web Illegal activities take place Buy – drugs, guns The person enter into the dark web is untraceable. Access by a special browser.
  • 8. SCEURE MEASURMENT • Don't put personal information on online. • Don't answer unknown messages and calls. • Don't use same password for more than one account. • Don't share your password.
  • 9. PROTECT YOURSELF ON ONLINE • Choose great password. • Keep all software up to date. • Use a vpn (virtual private network) • Check your social media privacy settings. • Setup a passcode for all your devices. • Keep personal data private.
  • 10. ACCOUNT GET HACKED?? • Change your password. • Setup two step verification. • Use antivirus softwares. • Backup your file to mega ,google drive....
  • 11. CHANGE YOUR PASSWORD • Use capital letter • Numbers • Symbols • Characters • Ex: T!P@h0$
  • 12. SETUP TWO STEP VERIFICATION Two factor authentication is a type of multifactor authentication. • It is a method of confirming a user’s claimed identity by utilizing something they know (password). • A user-controlled password with one time password (OTP) is received by an authenticator that only the user processes
  • 14. PARENTAL CONTROL OF KASPERSKY 1.Block unwanted sites. 2.Password need to unlock the site 3.Block ads 4.Help children to access good sites
  • 15. VPN (VIRTUAL PRIVATE NETWORK) A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  • 16. TOR BROWSER • Best browser • Secure • IP address non trackable browser. • For hackers and comman people. • Easy to handle.
  • 17. THINK BEFORE YOU CLICK T -Is it true H-Is it helpful I- Is it inspiring N-Is it necessary G-Is it kind
  • 18. SECURE WEB AND UNSECURE WEB
  • 19. BEST RECOVERY SOFTWARE • Recuva • Wise Data Recovery. ... • Free Undelete. ... • Pandora Recovery. ... • Mini Tool Power • Data Recovery. ... • Glary Undelete. ... • Undelete My Files Pro. ... • PC Inspector File Recovery.
  • 21. RISKS OF ONLINE SHOPPING Identity Theft Credit Card Fraud Adware & Malware Fake Online Stores Overpayment
  • 22. IDENTITY THEFT One of the most common risks of online shopping is of identity theft Criminals get hold of your personal information. Use the information to make personal purchases. They monitor the activities of online shoppers closely to steal their personal information.
  • 23. CREDIT CARD FRAUD • Credit card fraud is another common risk. • Malicious users intercept the online stores at the payment portal. • Customers redirect to the malicious user’s site instead of the legitimate payment gateway after making payment of the products. • As the page looks identical to the gateway of the site they were shopping from, customers get confused. • The malicious users then get their hands on the customers’ credit card details and use it for themselves.
  • 24. ADWARE & MALWARE • While surfing social networking sites or online stores, ads and offers bombard the users’ screens. • These advertisements are not always genuine. • They might look appealing and hard to ignore, but as soon a user clicks on these ads. • The ad requires them to register and submit their personal details. • scammers easily acquire the information. Sometimes, even good stores are hit with malware so it spreads to all the users who visit the site. • Simply visiting the website makes the malware attack your system. • Without an efficient antivirus software, one can fall prey to harmful malware. • Amazon suffered a massive data breach in which the attacker stole the login credentials, as well as personal information of over 80,000 customers
  • 25. FAKE ONLINE STORES • The Internet is full of fake online stores and pages that trick people into purchasing products. • The truth is, there are no products and they are not for delivery. • These stores show great offers and lure people into buying their fake products. • There have been various incidents where buyers never got what they ordered and spent money in the online transaction • These people make their sites appear as legitimate online stores.
  • 26. OVERPAYMENT • overpayment scams have become quite common. • they depend on a seller’s goodwill to give exemplary customer service. • Scammers make a purchase and pay via an online transfer or check. • They pay more than the original payable amount. • Then, the scammer asks for the refund of the excess amount. • In the urgency, the seller usually has no time to see that the online transaction/check did not go through. • This kind of threat frequently links with fake order email scams which alert an online seller about the sale of an item and the money credited to an account by using an almost identical
  • 27. TOP 4 CYBERCRIMES TO EFFORTLESSLY PROTECT YOUR COMPUTER AND DATA AGAINST ITS IMPACT 1.Phishing scams 2.Online Harassment 3.Cyberstalking 4.Invasion of privacy
  • 28. PHISHING SCAMS 1.Phishing is a practice of a cybercriminal or hacker attempting to obtain sensitive or personal information from a computer user. 2.This process is usually accomplished through phishing websites which are designed to mimic a legitimate website 3.That the unsuspecting computer user will enter several bits of personal information such as their banking passwords, home address or even social security number. 4.To avoid phishing scams, we recommend using a phishing filter feature on your web browser so that it can actively scan websites that you visit to check if they have been identified as a phishing website.
  • 29. ONLINE HARASSMENT Harassment online is usually related to your social lifestyle and if you choose to use a popular social network such as Facebook or Twitter. Online harassment can consist of threats sent through email, instant message or through a social network message/post. It is simple to report these threats to the social network you're being harassed on. Harassment can also be found to result in cyberbullying kids which can have dire consequences as you may have witnessed recently in the media where a 13-year-old kid . Megan Meier committed suicide from being bullied online. for handling harassment online is to immediately report any activity out of the ordinary before it gets out of hand even if you may know the person on the other end.
  • 30. CYBERSTALKING Need great lengths to try to monitor a victims online activity. Include infecting a person's computer with malware that is able to log computer activity. Cyberstalkers are also known to continually harass their potential victims. Cyberstalking cases should also be reported to authorities, just like online harassment cases. Cyberstalkers may contact a victim's colleagues, friends and other online contacts in an effort to slander them or extract personal information from them.
  • 31. INVASION OF PRIVACY  The invasion of privacy is basically the act of someone attempting to intrude on a person's personal life.  This includes hacking into a person's computer, reading their emails or monitoring online activities.  Many of these specific crimes are punishable under the law.  If you ever suspect someone invading your privacy, you can simply contact the police and file a report.
  • 32. CYBER SECURITY Cyber security is the protection of internet connected systems including hardware , software and data from cyber attack.
  • 33. MOST COMMON CYBER ATTACK Malware Phishing Password attacks DDOS (Distributed Denial of service) Rogue software Malvertising Drive by download Man in middle attack
  • 35. GAME ADDICTION Game addiction is described as an impulse control disorder, which does not involve use of an intoxicating drug and is very similar to pathological gambling. Video game addiction has also been referred to as video game overuse, pathological or compulsive/excessive use of computer games and/or video games.
  • 36. PUBG (PLAYER UNKNOWN'S BATTLEGROUNDS) Player Unknown's Battlegrounds is an online multiplayer battle royale game developed and published by PUBG Corporation, a subsidiary of South Korean video game company Blue hole.
  • 37. FREE FIRE Garena Free Fire is an electronic game for mobile of action- adventure battle royale game, developed by 111 dots Studio and published by Garena. The game was beta- released in November 20, 2017 and was officially released for Android and iOS on December 4, 2017
  • 38. PROBLEMS ASSOCIATED WITH GAME ADDICTION1.Neglect in personal hygiene. 2.ADD and ADHD 3.Learning disabilities. 4.Loss of personal relationships 5.Weight gain and obesity 6.Stress. 7.Restlessness and anxiety 8.Poor nutrition. 9.Arthritis and carpal tunnel syndrome 10.Sleep disorders 11.Aggressive thoughts and behaviors
  • 39. NEGLECT IN PERSONAL HYGIENE Those addicted to video games tend to care less about their hygiene since they spend less time in social settings and more time alone playing games.
  • 40. ADD AND ADHD These hyperactivity disorders are highly common among video game addicts due to the high interactivity levels of most of today’s video games.
  • 41. LEARNING DISABILITIES Those used to progressing quickly in intense video games often suffer learning disabilities when spending time in the real world.
  • 42. LOSS OF PERSONAL RELATIONSHIPS Addicted gamers often devote more time to video games than to friends, family, and social activities.
  • 43. WEIGHT GAIN AND OBESITY Those addicted to video games often spend less time outdoors and being physically active, which increases the risk for weight gain, obesity, and related conditions like type two diabetes and heart disease.
  • 44. STRESS Video game addiction can lead to stress when players are unable to pass difficult levels or achieve certain rewards. Stress can also occur when players face life problems with work, education, and family due to their gaming addiction
  • 45. RESTLESSNESS AND ANXIETY. Those addicted to video games often become anxious and restless when they’re unable to play video games for any reason.
  • 46. POOR NUTRITION Addicted gamers usually neglect nutrition and opt for frozen meals, fast food, and other convenient, unhealthy options. Poor nutrition can lead to nutritional deficiency, and problems with diabetes and weight gain.
  • 47. ARTHRITIS AND CARPAL TUNNEL SYNDROME Those who perform repetitive movements with their fingers and wrists playing mobile games can develop arthritis and carpal tunnel syndrome.
  • 48. SLEEP DISORDERS . Addicted gamers who stay up late in the night playing games can suffer sleep disorders like insomnia that increase the risk for illness and disease — including cancer.
  • 49. AGGRESSIVE THOUGHTS AND BEHAVIORS Children and youth who become addicted to video games tend to display aggressive thoughts and behaviors as a direct result of prolonged video game exposure.
  • 50. SMARTPHONE ADDICTION • Smartphone addiction, sometimes colloquially known as “nomophobia” • It is often fueled by an Internet overuse problem or Internet addiction disorder.
  • 51. IMPULSE-CONTROL PROBLEMS 1.Virtual relationships 2.Information overload 3.Cybersex addiction 4.Online compulsions
  • 52. SMARTPHONE OR INTERNET ADDICTION CAN ALSO NEGATIVELY IMPACT YOUR LIFE • Increasing loneliness and depression • Fueling anxiety • Increasing stress • Exacerbating attention deficit disorders • Diminishing your ability to concentrate and think deeply or creatively. • Disturbing your sleep • Encouraging self-absorption
  • 53. WARNING SIGNS OF SMARTPHONE OR INTERNET OVERUSE INCLUDE 1.Trouble completing tasks at work or home. 2.Isolation from family and friends. 3.Concealing your smartphone use 4.Having a fear of missing out 5.Feeling of dread, anxiety, or panic if you leave your smartphone at home
  • 54. TREATMENT FOR SMARTPHONE AND INTERNET ADDICTION 1.Cognitive-behavioral therapy 2.Marriage or couples counseling. 3.Group support
  • 55. COGNITIVE-BEHAVIORAL THERAPY Cognitive-behavioral therapy provides step-by-step ways to stop compulsive behaviors and change your perceptions about your smartphone and the Internet. Therapy can also help you learn healthier ways of coping with uncomfortable emotions— such as stress, anxiety, or depression—that may be fueling your smartphone use.
  • 56. MARRIAGE OR COUPLES COUNSELING If excessive use of Internet pornography or online affairs is affecting your relationship, counseling can help you work through these challenging issues and reconnect with your partner.
  • 57. GROUP SUPPORT Organizations such as Internet Tech Addiction Anonymous (ITAA) and On-Line Gamers Anonymous offer online support and face-to- face meetings to curb excessive technology use. Of course, you need real-life people to benefit fully from any addiction support group. Online support groups can be helpful in finding sources of assistance, but it’s easy to use them as an excuse to spend even more time on your smartphone. Sex Addicts Anonymous can be a place to try if you’re having trouble with cybersex addiction.
  • 58. INTERNET ADDICTION Internet Addiction” is a controversial theorized mental disorder, the existance and/or importance of which is still being debated among the psychological community. While this screening test may reveal some of the more pathological aspects of internet and smartphone use, it should not be used as a definitive diagnostic test
  • 59. INTERNET ADDICTION ASSESSMENT 1. I find myself using my smartphone or computer longer than I planned to. 2. I would rather be on my smartphone or computer than interact with my partner 3. I would rather spend time online than do things around the house. 4. My performance in school or at work suffers because of the amount of time I spend online. 5. People close to me are concerned about the amount of time I spend on my smartphone or computer. 6. When asked what I do online, I prefer not to answer 7. My productivity and attentiveness suffers because of the amount of time I spend online. 8. I check my social media, text messages, or emails first thing after waking up. 9. I am bothered when people interupt me while I am using my computer or smartphone 10.I feel anxious when I do not have my smartphone with me 11.I use the internet to escape from my real life 12.I would be less interesting and happy without access to the internet. 13.I put off things I have to do by using my computer or smartphone 14.When I am unable to use my smartphone, I miss it or think about what I could be doing online
  • 60. 15. I stay up later at night than I had intended due to doing things online. 16. I would rather stay home and use the internet than go out with friends. 17. I have tried to reduce my smartphone or internet use without success 18. I am concerned about missing out on thing online when not checking my smartphone
  • 61. INTERNET PROTOCOLS  A set of rules governing the format of data sent over the Internet or other network.  The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet
  • 62. PROTOCOLS ARE USED ON THE INTERNET • Electronic Mail (e-mail) • File Transfer Protocol (FTP) • HTTP (World Wide Web) • News (or Usenet) • Gopher • Telnet
  • 63. ELECTRONIC MAIL The email protocol are three distinct protocols. 1.SMTP (Simple Mail Transfer Protocol) 2.IMAP (Internet Message Access Protocol) 3.POP3 (Post Office Protocol 3)  SMTP is a protocol used for sending mail  while IMAP and POP3 are used for receiving
  • 64. FILE TRANSFER PROTOCOL File Transfer Protocol, or FTP, is a means of transferring a file from one computer to another.  FTP is commonly used for uploading a web page to a web server so that it may be seen on the World Wide Web. A special program, called a client, is usually needed to use FTP.
  • 65. HTTP (WORLD WIDE WEB) HyperText Transfer Protocol, or HTTP, is the protocol used by web server to allow web pages to be shown in a web browser. If you look up into the address bar of your web browser, the place where you type in the address that you want to visit, it has the prefix "http://" in front of the address. Because most web browsers are capable of FTP as well as viewing web pages, the http tells the browser what kind of information to expect.
  • 66. NEWS (OR USENET) Network News Transfer Protocol (NNTP) is used for serving Usenet posts Usenet is similar to the forums that many web sites have. Usenet has forums that are dedicated to specific companies as well as forums that have a wide range of topics. Usenet is divided into several areas. Some of the forums that are included in Usenet are comp. for discussion of computer-related topics, sci. for discussion of scientific subjects, rec. for discussion of recreational activities (e.g. games and hobbies) and talk. for discussion of contentious issues such as religion and politics.
  • 67. GOPHER Another tool of the Internet is Gopher, a menu-based program that enables you to browse for information without knowing where the material is located. It lets you search a list of resources and then sends the material to you.
  • 68. TELNET Telnet lets you log in to a remote computer just as you would if you were there. So any commands that you would be able to run from the remote computer if you were sitting in front of it, you would be able to run from the computer you logged in from.
  • 70. ARE GIRLS SAFE IN CYBER WORLD
  • 73. Cyber love includes relationship build up through online, it can be msn , facebook , friendster and any website online dating. "Cyber dating, cyber love...most people may feel so fresh with these terms.A guy "meets" a girl in a chatting room. Cyber love
  • 74. LINK BAITING Link baiting happens when the content of your website or pages gets linked to other sites. After few times a link will received. Your photo just got leaked on internet, click here Look what people are taking about you: This video of yours is going viral . To know more click here
  • 75. CYBER CRIME Cyber Crime is not defined officially in IT Act or in any other legislation. In fact, it cannot be too. Offence or crime has been dealt with elaborately listing various acts and the punishments for each, under the Indian Penal Code, 1860 and related legislations. Hence, the concept of cyber crime is just a “combination of crime and computer”.
  • 77. IT ACT SECTIONS • Section 43 – Penalty and Compensation for damage to computer, computer system, etc • Section 65 – Tampering with Computer Source Documents • Section 66 – Computer Related offenses • Section 66C – Punishment for identity theft • Section 66D – Punishment for cheating by impersonation by using computer resource • Section 66E – Punishment for violation of privacy • Section-66F Cyber Terrorism • Section 67 – Punishment for publishing or transmitting obscene material in electronic form • Section 67B – Punishment for publishing or transmitting of material depicting children in • sexually explicit act, etc. in electronic form • Section 69 – Powers to issue directions for interception or monitoring or decryption of any • information through any computer resource
  • 78. CYBERCELL Cyber-crime cells are the one track solution towards combatting and tackling cyber-crime. Now an act of cyber- crime is a punishable criminal act which may include acts of online stalking, online banking or credit card scams, hacking and proliferating software viruses.
  • 79. SWAYAM S – study W – webs of A – active learning for Y – young A – aspiring M - minds
  • 80. SWAYAM Online education portal Classes from 9 to PG New syllabus Get certificate after course complete 100 of courses are hosted It is under the control of government of india Courses were offered by best teachers of india Courses delivered in swayam are free of cost for learning
  • 81. CLASSES IN SWAYAM Video lecture with multimedia presentation. Specially prepared reading material that can downloaded/printed. Self assessment tests through tests and quizzes.
  • 82. HSSLIVE For high secondary students. Study material Previous and model question paper Exam result Government orders Software Circular Mela results
  • 83. SAMAGRA For 1 – 12 students Text book (pdf) e-Resources Question Pool
  • 84. VIRUSES A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.
  • 85. SOME COMMON VIRUSES  Resident Virus  Multipartite Virus  Direct Action Virus  Browser Hijacker  Overwrite Virus  Web Scripting Virus  Boot Sector Virus  Macro Virus  Directory Virus  Polymorphic Virus  File Infector Virus  Encrypted Virus  Network Virus  FAT Virus
  • 87. I LOVE YOU VIRUS 1.Most powerful virus
  • 89. Information technology and the Internet are rapidly transforming almost every aspect of our lives - some for better, some for worse.