2. INTERNET
Global computer network providing a variety of
information and communication facilities, consisting of
interconnected networks using standardized
communication protocols.
3. • Safer Internet Day is celebrated globally in February each year to
promote the safe and positive use of digital technology for children
and young people and inspire a national conversation.
INTERNET DAY
5. DARK WEB
Secret cyber underworld
is dark web
Illegal activities take
place
Buy – drugs, guns
The person enter into
the dark web is
untraceable.
Access by a special
browser.
8. SCEURE MEASURMENT
• Don't put personal information on
online.
• Don't answer unknown messages and
calls.
• Don't use same password for more
than one account.
• Don't share your password.
9. PROTECT YOURSELF ON ONLINE
• Choose great password.
• Keep all software up to date.
• Use a vpn (virtual private network)
• Check your social media privacy settings.
• Setup a passcode for all your devices.
• Keep personal data private.
10. ACCOUNT GET HACKED??
• Change your password.
• Setup two step verification.
• Use antivirus softwares.
• Backup your file to mega ,google drive....
11. CHANGE YOUR PASSWORD
• Use capital letter
• Numbers
• Symbols
• Characters
• Ex: T!P@h0$
12. SETUP TWO STEP VERIFICATION
Two factor authentication is a type of multifactor
authentication.
• It is a method of confirming a user’s claimed
identity by utilizing something they know
(password).
• A user-controlled password with one time
password (OTP) is received by an authenticator
that only the user processes
14. PARENTAL CONTROL OF KASPERSKY
1.Block unwanted sites.
2.Password need to unlock the
site
3.Block ads
4.Help children to access good
sites
15. VPN (VIRTUAL PRIVATE NETWORK)
A virtual private network extends a private network across a public
network, and enables users to send and receive data across
shared or public networks as if their computing devices were
directly connected to the private network.
16. TOR BROWSER
• Best browser
• Secure
• IP address non trackable browser.
• For hackers and comman people.
• Easy to handle.
17. THINK BEFORE YOU CLICK
T -Is it true
H-Is it helpful
I- Is it inspiring
N-Is it necessary
G-Is it kind
22. IDENTITY THEFT
One of the most common risks of online shopping is of identity
theft
Criminals get hold of your personal information.
Use the information to make personal purchases.
They monitor the activities of online shoppers closely to steal
their personal information.
23. CREDIT CARD FRAUD
• Credit card fraud is another common risk.
• Malicious users intercept the online stores at the payment portal.
• Customers redirect to the malicious user’s site instead of the
legitimate payment gateway after making payment of the
products.
• As the page looks identical to the gateway of the site they were
shopping from, customers get confused.
• The malicious users then get their hands on the customers’ credit
card details and use it for themselves.
24. ADWARE & MALWARE
• While surfing social networking sites or online stores, ads and offers
bombard the users’ screens.
• These advertisements are not always genuine.
• They might look appealing and hard to ignore, but as soon a user clicks on
these ads.
• The ad requires them to register and submit their personal details.
• scammers easily acquire the information. Sometimes, even good stores are
hit with malware so it spreads to all the users who visit the site.
• Simply visiting the website makes the malware attack your system.
• Without an efficient antivirus software, one can fall prey to harmful malware.
• Amazon suffered a massive data breach in which the attacker stole the
login credentials, as well as personal information of over 80,000 customers
25. FAKE ONLINE STORES
• The Internet is full of fake online stores and pages that trick
people into purchasing products.
• The truth is, there are no products and they are not for delivery.
• These stores show great offers and lure people into buying their
fake products.
• There have been various incidents where buyers never got what
they ordered and spent money in the online transaction
• These people make their sites appear as legitimate online stores.
26. OVERPAYMENT
• overpayment scams have become quite common.
• they depend on a seller’s goodwill to give exemplary customer
service.
• Scammers make a purchase and pay via an online transfer or
check.
• They pay more than the original payable amount.
• Then, the scammer asks for the refund of the excess amount.
• In the urgency, the seller usually has no time to see that the online
transaction/check did not go through.
• This kind of threat frequently links with fake order email scams
which alert an online seller about the sale of an item and the
money credited to an account by using an almost identical
27. TOP 4 CYBERCRIMES TO EFFORTLESSLY PROTECT YOUR
COMPUTER AND DATA AGAINST ITS IMPACT
1.Phishing scams
2.Online Harassment
3.Cyberstalking
4.Invasion of privacy
28. PHISHING SCAMS
1.Phishing is a practice of a cybercriminal or hacker attempting to
obtain sensitive or personal information from a computer user.
2.This process is usually accomplished through phishing websites
which are designed to mimic a legitimate website
3.That the unsuspecting computer user will enter several bits of
personal information such as their banking passwords, home
address or even social security number.
4.To avoid phishing scams, we recommend using a phishing filter
feature on your web browser so that it can actively scan websites
that you visit to check if they have been identified as a phishing
website.
29. ONLINE HARASSMENT
Harassment online is usually related to your social lifestyle and if you choose
to use a popular social network such as Facebook or Twitter.
Online harassment can consist of threats sent through email, instant
message or through a social network message/post.
It is simple to report these threats to the social network you're being
harassed on.
Harassment can also be found to result in cyberbullying kids which can have
dire consequences as you may have witnessed recently in the media where
a 13-year-old kid .
Megan Meier committed suicide from being bullied online.
for handling harassment online is to immediately report any activity out of the
ordinary before it gets out of hand even
if you may know the person on the other end.
30. CYBERSTALKING
Need great lengths to try to monitor a victims online activity.
Include infecting a person's computer with malware that is
able to log computer activity.
Cyberstalkers are also known to continually harass their
potential victims.
Cyberstalking cases should also be reported to authorities,
just like online harassment cases.
Cyberstalkers may contact a victim's colleagues, friends and
other online contacts in an effort to slander them or extract
personal information from them.
31. INVASION OF PRIVACY
The invasion of privacy is basically the act of someone
attempting to intrude on a person's personal life.
This includes hacking into a person's computer, reading their
emails or monitoring online activities.
Many of these specific crimes are punishable under the law.
If you ever suspect someone invading your privacy, you can
simply contact the police and file a report.
32. CYBER SECURITY
Cyber security is the protection of internet connected
systems including hardware , software and data from
cyber attack.
33. MOST COMMON CYBER ATTACK
Malware
Phishing
Password attacks
DDOS (Distributed Denial of service)
Rogue software
Malvertising
Drive by download
Man in middle attack
35. GAME ADDICTION
Game addiction is described as an impulse control disorder, which
does not involve use of an intoxicating drug and is very similar to
pathological gambling. Video game addiction has also been
referred to as video game overuse, pathological or
compulsive/excessive use of computer games and/or video games.
36. PUBG (PLAYER UNKNOWN'S BATTLEGROUNDS)
Player Unknown's
Battlegrounds is an
online multiplayer battle
royale game developed
and published by PUBG
Corporation, a
subsidiary of South
Korean video game
company Blue hole.
37. FREE FIRE
Garena Free Fire is an
electronic game for
mobile of action-
adventure battle royale
game, developed by 111
dots Studio and
published by Garena.
The game was beta-
released in November
20, 2017 and was
officially released for
Android and iOS on
December 4, 2017
38. PROBLEMS ASSOCIATED WITH GAME
ADDICTION1.Neglect in personal hygiene.
2.ADD and ADHD
3.Learning disabilities.
4.Loss of personal relationships
5.Weight gain and obesity
6.Stress.
7.Restlessness and anxiety
8.Poor nutrition.
9.Arthritis and carpal tunnel syndrome
10.Sleep disorders
11.Aggressive thoughts and behaviors
39. NEGLECT IN PERSONAL HYGIENE
Those addicted to video games tend to care less
about their hygiene since they spend less time in
social settings and more time alone playing games.
40. ADD AND ADHD
These hyperactivity disorders are highly common among video
game addicts due to the high interactivity levels of most of
today’s video games.
41. LEARNING DISABILITIES
Those used to progressing quickly in intense video
games often suffer learning disabilities when
spending time in the real world.
42. LOSS OF PERSONAL RELATIONSHIPS
Addicted gamers often devote more time to video games
than to friends, family, and social activities.
43. WEIGHT GAIN AND OBESITY
Those addicted to video games often spend less time outdoors and
being physically active, which increases the risk for weight gain,
obesity, and related conditions like type two diabetes and heart
disease.
44. STRESS
Video game addiction can lead to stress when players are unable
to pass difficult levels or achieve certain rewards. Stress can also
occur when players face life problems with work, education, and
family due to their gaming addiction
45. RESTLESSNESS AND ANXIETY.
Those addicted to video games often become anxious and
restless when they’re unable to play video games for any
reason.
46. POOR NUTRITION
Addicted gamers usually neglect nutrition and opt for frozen
meals, fast food, and other convenient, unhealthy options. Poor
nutrition can lead to nutritional deficiency, and problems with
diabetes and weight gain.
47. ARTHRITIS AND CARPAL TUNNEL SYNDROME
Those who perform repetitive movements with their fingers and
wrists playing mobile games can develop arthritis and carpal tunnel
syndrome.
48. SLEEP DISORDERS
. Addicted gamers who stay up late in the night playing games can
suffer sleep disorders like insomnia that increase the risk for
illness and disease — including cancer.
49. AGGRESSIVE THOUGHTS AND BEHAVIORS
Children and youth who become addicted to video games
tend to display aggressive thoughts and behaviors as a
direct result of prolonged video game exposure.
50. SMARTPHONE ADDICTION
• Smartphone addiction,
sometimes colloquially
known as “nomophobia”
• It is often fueled by an
Internet overuse
problem or Internet
addiction disorder.
52. SMARTPHONE OR INTERNET ADDICTION CAN ALSO
NEGATIVELY IMPACT YOUR LIFE
• Increasing loneliness and depression
• Fueling anxiety
• Increasing stress
• Exacerbating attention deficit disorders
• Diminishing your ability to concentrate and think
deeply or creatively.
• Disturbing your sleep
• Encouraging self-absorption
53. WARNING SIGNS OF SMARTPHONE OR INTERNET OVERUSE
INCLUDE
1.Trouble completing tasks at work or home.
2.Isolation from family and friends.
3.Concealing your smartphone use
4.Having a fear of missing out
5.Feeling of dread, anxiety, or panic if you leave your
smartphone at home
54. TREATMENT FOR SMARTPHONE AND INTERNET
ADDICTION
1.Cognitive-behavioral therapy
2.Marriage or couples counseling.
3.Group support
55. COGNITIVE-BEHAVIORAL THERAPY
Cognitive-behavioral therapy provides step-by-step ways to
stop compulsive behaviors and change your perceptions about
your smartphone and the Internet. Therapy can also help you
learn healthier ways of coping with uncomfortable emotions—
such as stress, anxiety, or depression—that may be fueling your
smartphone use.
56. MARRIAGE OR COUPLES COUNSELING
If excessive use of Internet pornography or online affairs
is affecting your relationship, counseling can help you
work through these challenging issues and reconnect
with your partner.
57. GROUP SUPPORT
Organizations such as Internet Tech Addiction Anonymous (ITAA)
and On-Line Gamers Anonymous offer online support and face-to-
face meetings to curb excessive technology use. Of course, you
need real-life people to benefit fully from any addiction support
group. Online support groups can be helpful in finding sources of
assistance, but it’s easy to use them as an excuse to spend even
more time on your smartphone. Sex Addicts Anonymous can be a
place to try if you’re having trouble with cybersex addiction.
58. INTERNET ADDICTION
Internet Addiction” is a controversial theorized mental disorder, the
existance and/or importance of which is still being debated among
the psychological community. While this screening test may reveal
some of the more pathological aspects of internet and smartphone
use, it should not be used as a definitive diagnostic test
59. INTERNET ADDICTION ASSESSMENT
1. I find myself using my smartphone or computer longer than I planned to.
2. I would rather be on my smartphone or computer than interact with my partner
3. I would rather spend time online than do things around the house.
4. My performance in school or at work suffers because of the amount of time I spend online.
5. People close to me are concerned about the amount of time I spend on my smartphone or
computer.
6. When asked what I do online, I prefer not to answer
7. My productivity and attentiveness suffers because of the amount of time I spend online.
8. I check my social media, text messages, or emails first thing after waking up.
9. I am bothered when people interupt me while I am using my computer or smartphone
10.I feel anxious when I do not have my smartphone with me
11.I use the internet to escape from my real life
12.I would be less interesting and happy without access to the internet.
13.I put off things I have to do by using my computer or smartphone
14.When I am unable to use my smartphone, I miss it or think about what I could be doing online
60. 15. I stay up later at night than I had intended due to doing things online.
16. I would rather stay home and use the internet than go out with friends.
17. I have tried to reduce my smartphone or internet use without success
18. I am concerned about missing out on thing online when not checking my
smartphone
61. INTERNET PROTOCOLS
A set of rules governing the format of data sent over the Internet
or other network.
The Internet Protocol is the principal communications protocol in
the Internet protocol suite for relaying datagrams across
network boundaries. Its routing function enables
internetworking, and essentially establishes the Internet
62. PROTOCOLS ARE USED ON THE INTERNET
• Electronic Mail (e-mail)
• File Transfer Protocol (FTP)
• HTTP (World Wide Web)
• News (or Usenet)
• Gopher
• Telnet
63. ELECTRONIC MAIL
The email protocol are three distinct protocols.
1.SMTP (Simple Mail Transfer Protocol)
2.IMAP (Internet Message Access Protocol)
3.POP3 (Post Office Protocol 3)
SMTP is a protocol used for sending mail
while IMAP and POP3 are used for receiving
64. FILE TRANSFER PROTOCOL
File Transfer Protocol, or FTP, is a means of transferring a file
from one computer to another.
FTP is commonly used for uploading a web page to a web server
so that it may be seen on the World Wide Web. A special program,
called a client, is usually needed to use FTP.
65. HTTP (WORLD WIDE WEB)
HyperText Transfer Protocol, or HTTP, is the protocol used
by web
server to allow web pages to be shown in a web browser.
If you look up into the address bar of your web browser, the
place where you type in the address that you want to visit, it
has the prefix "http://" in front of the address.
Because most web browsers are capable of FTP as well as
viewing web pages, the http tells the browser what kind of
information to expect.
66. NEWS (OR USENET)
Network News Transfer Protocol (NNTP) is used for serving
Usenet posts Usenet is similar to the forums that many web sites
have.
Usenet has forums that are dedicated to specific companies as
well as forums that have a wide range of topics. Usenet is divided
into several areas.
Some of the forums that are included in Usenet are comp.
for discussion of computer-related topics, sci. for discussion of
scientific subjects, rec.
for discussion of recreational activities (e.g. games and hobbies)
and talk. for discussion of contentious issues such as religion and
politics.
67. GOPHER
Another tool of the Internet is Gopher, a menu-based program
that enables you to browse for information without knowing
where the material is located. It lets you search a list of
resources and then sends the material to you.
68. TELNET
Telnet lets you log in to a remote computer just as
you would if you were there. So any commands that
you would be able to run from the remote computer
if you were sitting in front of it, you would be able to
run from the computer you logged in from.
73. Cyber love includes relationship build up through online,
it can be msn , facebook , friendster and any website online
dating. "Cyber dating, cyber love...most people may feel so
fresh with these terms.A guy "meets" a girl in a chatting room.
Cyber love
74. LINK BAITING
Link baiting happens when the content of your website or pages
gets linked to other sites. After few times a link will received.
Your photo just got leaked on internet, click here
Look what people are taking about you:
This video of yours is going viral . To know more click here
75. CYBER CRIME
Cyber Crime is not defined officially in IT Act or in any other
legislation. In fact, it cannot be too. Offence or crime has been
dealt with elaborately listing various acts and the punishments for
each, under the Indian Penal Code, 1860 and related legislations.
Hence, the concept of cyber crime is just a “combination of crime
and computer”.
77. IT ACT SECTIONS
• Section 43 – Penalty and Compensation for damage to computer, computer system, etc
• Section 65 – Tampering with Computer Source Documents
• Section 66 – Computer Related offenses
• Section 66C – Punishment for identity theft
• Section 66D – Punishment for cheating by impersonation by using computer resource
• Section 66E – Punishment for violation of privacy
• Section-66F Cyber Terrorism
• Section 67 – Punishment for publishing or transmitting obscene material in electronic
form
• Section 67B – Punishment for publishing or transmitting of material depicting children
in
• sexually explicit act, etc. in electronic form
• Section 69 – Powers to issue directions for interception or monitoring or decryption of
any
• information through any computer resource
78. CYBERCELL
Cyber-crime cells are the one track solution towards
combatting and tackling cyber-crime. Now an act of cyber-
crime is a punishable criminal act which may include acts
of online stalking, online banking or credit card scams,
hacking and proliferating software viruses.
79. SWAYAM
S – study
W – webs of
A – active learning for
Y – young
A – aspiring
M - minds
80. SWAYAM
Online education portal
Classes from 9 to PG
New syllabus
Get certificate after course complete
100 of courses are hosted
It is under the control of government of india
Courses were offered by best teachers of india
Courses delivered in swayam are free of cost for
learning
81. CLASSES IN SWAYAM
Video lecture with multimedia presentation.
Specially prepared reading material that can
downloaded/printed.
Self assessment tests through tests and quizzes.
82. HSSLIVE
For high secondary students.
Study material
Previous and model question paper
Exam result
Government orders
Software
Circular
Mela results
83. SAMAGRA
For 1 – 12 students
Text book (pdf)
e-Resources
Question Pool
84. VIRUSES
A computer virus is a type
of computer program that,
when executed, replicates
itself by modifying other
computer programs and
inserting its own code.
When this replication
succeeds, the affected
areas are then said to be
"infected" with a computer
virus.