SlideShare a Scribd company logo
1 of 20
INTRODUCTION
beeventhoughtof without internet,even
ghinternethasmademanythingseasier
meit hasposedmanysecurityriskstoo,if
erway. Thus,it isimportant to know
eats, challengesandrisksof workingon
personalsafetyandinformationsecurity
dealswiththesame.It talksaboutpossible
ninternetandsafetymeasuresto avoid
WHATISCYBERSECURITY?
Cyber refers to the safe and
responsibility use of internet so as to
safety and security of personal
information . It involves gaining
knowledge about possible threats to
personal safety and security risks for
the information along with the
measures to personal safety and
security risks for the information
along with measures to prevent and
counter them
Safely browsing the web
These days working on web has become inevitable and thus it is
very important to know the threats it offers in many ways .safe
browsing on web needs you to know many things like :
What are the possible danger?
How to avoid the these ?
How to virtually conduct
yourself while browsing web ?
We surf the internet for a variety of reasons ,from using
social media ,building and other internet users (such as
while filling up some forms or making payments online
),we trust them to use them to use that information for
legitimate purposes .this isn’t always the case though
and financial and personal data can be used for harmful
reasons like hacking ,stalking and indentity fraud
.indentity fraud is when personal details that have been
accessed or stolen are used are used to commit
fraudulent acts posing as someone with stolen identity
http referrer : When you click a link ,your browser loads the web
loads the web page linked website on a website
(see figure below ) then the linked website will get
opened and internally information about you such
as your IP address ,location, your web browser
,machine type etc. will also be provided to the
linked website – it known as the HTTP referrer
(e.g., see the figure below )
anonymous browsing
Anonymous browsers allow users to view website
without reveling any personal like IP address
websites anonymously . It can be used as a tool for
governments ,journalists and everyday security-
conscious surfers
Private browsing
There are other ways to use the internet without revealing
your search history and a sharing your data. These are :
proxy works by acting as a middle by as a middle man between your computer and the website you want
The tracking website will get the IP address and information the belongs to proxy site ,so you are effec
Same content from another sources
Incognito browsing opens up a version of the browser that will not track your activity . It’s particularly u
Entering sensitive data like bank details into the browser ,it can be Useful if can minimize the risk of your
Saved to that computer
Virtual private network or a VPN is a method used to add security and privacy to private and public
And public network ,like wifi hotspots and the internet . VPNs were originally meant for business
Employees working offsite to gain access to shared drives or networks . Nowadays you can setup a
VPN at home to protect your shelf from hackers trying to access your sensitive information .
Cybercrimeisanycriminal offenceinvolves the
Useof,electronic communication orinformation
Systems,including anyelectronic device, computer,
Ortheinternet. Thetermcybercrime,
isageneraltermthatcovers crimes
Likephishing,creditcardfrauds,
Illegal downloading,industrialespionage
Childpornography,cyberbulling, cyber
Stalking, cyberterrorism,creationand/or
Distributionofviruses,
spamandsoon.
Cyberbullying occurswhensomeone
uses theinternet ,acell phone,email,
instant,messaging, chatrooms,or social
network ,suchas instagram , facebook
etc….to harass,demean,embarrass,or
intimidatesomeone else. Itiscommonly
acrimecommitted byteens too,astheir
growingaccesstoelectronic
communicationsmakesitpossible to
makefunoforostracizeother
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx

More Related Content

Similar to cyber security.pptx

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...IJNSA Journal
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos Beretas
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using ITMirza Ćutuk
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!aimane
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...IJNSA Journal
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Monique Jones
 
E0334035040
E0334035040E0334035040
E0334035040theijes
 

Similar to cyber security.pptx (20)

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )
 
E0334035040
E0334035040E0334035040
E0334035040
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

cyber security.pptx

  • 1.
  • 2. INTRODUCTION beeventhoughtof without internet,even ghinternethasmademanythingseasier meit hasposedmanysecurityriskstoo,if erway. Thus,it isimportant to know eats, challengesandrisksof workingon personalsafetyandinformationsecurity dealswiththesame.It talksaboutpossible ninternetandsafetymeasuresto avoid
  • 3. WHATISCYBERSECURITY? Cyber refers to the safe and responsibility use of internet so as to safety and security of personal information . It involves gaining knowledge about possible threats to personal safety and security risks for the information along with the measures to personal safety and security risks for the information along with measures to prevent and counter them
  • 4.
  • 5. Safely browsing the web These days working on web has become inevitable and thus it is very important to know the threats it offers in many ways .safe browsing on web needs you to know many things like : What are the possible danger? How to avoid the these ? How to virtually conduct yourself while browsing web ?
  • 6. We surf the internet for a variety of reasons ,from using social media ,building and other internet users (such as while filling up some forms or making payments online ),we trust them to use them to use that information for legitimate purposes .this isn’t always the case though and financial and personal data can be used for harmful reasons like hacking ,stalking and indentity fraud .indentity fraud is when personal details that have been accessed or stolen are used are used to commit fraudulent acts posing as someone with stolen identity
  • 7. http referrer : When you click a link ,your browser loads the web loads the web page linked website on a website (see figure below ) then the linked website will get opened and internally information about you such as your IP address ,location, your web browser ,machine type etc. will also be provided to the linked website – it known as the HTTP referrer (e.g., see the figure below )
  • 8. anonymous browsing Anonymous browsers allow users to view website without reveling any personal like IP address websites anonymously . It can be used as a tool for governments ,journalists and everyday security- conscious surfers
  • 9. Private browsing There are other ways to use the internet without revealing your search history and a sharing your data. These are : proxy works by acting as a middle by as a middle man between your computer and the website you want The tracking website will get the IP address and information the belongs to proxy site ,so you are effec Same content from another sources Incognito browsing opens up a version of the browser that will not track your activity . It’s particularly u Entering sensitive data like bank details into the browser ,it can be Useful if can minimize the risk of your Saved to that computer Virtual private network or a VPN is a method used to add security and privacy to private and public And public network ,like wifi hotspots and the internet . VPNs were originally meant for business Employees working offsite to gain access to shared drives or networks . Nowadays you can setup a VPN at home to protect your shelf from hackers trying to access your sensitive information .
  • 10. Cybercrimeisanycriminal offenceinvolves the Useof,electronic communication orinformation Systems,including anyelectronic device, computer, Ortheinternet. Thetermcybercrime, isageneraltermthatcovers crimes Likephishing,creditcardfrauds, Illegal downloading,industrialespionage Childpornography,cyberbulling, cyber Stalking, cyberterrorism,creationand/or Distributionofviruses, spamandsoon.
  • 11. Cyberbullying occurswhensomeone uses theinternet ,acell phone,email, instant,messaging, chatrooms,or social network ,suchas instagram , facebook etc….to harass,demean,embarrass,or intimidatesomeone else. Itiscommonly acrimecommitted byteens too,astheir growingaccesstoelectronic communicationsmakesitpossible to makefunoforostracizeother