SlideShare a Scribd company logo
1 of 26
CYBER SECURITY
AWARNESS
Akhil Nadh PC
Slide 1
CONTENTS
Slide 2
1. Introduction
2. Cyber Crime Motivation
3. Cyber Crime Awareness
4. Common Mistakes we all do and Prevention
5. Job Opportunity
6. Conclusion
Slide 3
Introduction
• Computer
Slide 4
Introduction
• Server and Datacenters
Slide 5
Introduction
• Internet
Slide 6
Introduction
• Cyber Crime
is defined as a crimes that are directly related to computing devices
using other computing devices
• Cyber Crime Types
1. Target Group of Computers – DoS , Virus
2. Against Person – Transmission of indecent materials, harassment
3. Against Property – Transmission of harmful pgm , Computer Vandalism
4. Against Govt - Cyber terrorism, Hacking , Momo Challenge
• IT ACT in India 2000
Slide 7
Cyber Crime Motivation
1. Curiosity
2. Revenge
3. Money
4. Fun
5. Popularity
Slide 8
Cyber Crime Awareness
• Curiosity and revenge may be the primary reasons for students to get
motivated for cyber crimes
• Most of the times students are not aware about the implications of
the crime
• Know the IT ACT Dos and Don’t Dos
Slide 9
Common Mistakes we all do and Prevention
• Fraud Emails and Text Messages
Name@google.com
Slide 10
Common Mistakes we all do and Prevention
• Importance of one Email Address
- Linked to Bank
- Linked to Social Media
- Linked to Payments Apps like Gpay, Paytm etc
Slide 11
Common Mistakes we all do and Prevention
• ATM PIN and Password
 Date Of Birth
 Last Digits of Phone Number
 Wedding Anniversary Date
Common Numbers (eg. 1234 , 6789, 1111, 0000 )
1998 -> 8991 -> 9918
Slide 12
Common Mistakes we all do and Prevention
• RFID Wi-Fi ATM
Slide 13
Common Mistakes we all do and Prevention
• Photo Editing Apps
Slide 14
Common Mistakes we all do and Prevention
• App Download and App Permissions
Slide 15
Common Mistakes we all do and Prevention
• Know Your Friends and Their Intension
 Do not talk to Strangers
Do not send your personal photos and videos
 Accept Friend Request from people who knows you in Person
 Do not accept Friend Request from people claiming they are
friends of your friends
 Monitor your friend list often
 Accept Fried Request from people only if there are enough Mutual
Friends
 Stop Comparing Followers and Friend Request and Likes
 Do not Mass tag people on your personal photos
Slide 16
Common Mistakes we all do and Prevention
• Social Media and Privacy – Cyber Stalking
Slide 17
Common Mistakes we all do and Prevention
• Passwords
• Typing Passwords from a safe place.
• Strong Password Policy
• Character (Mix of Upper and Lower Case ) + Number + Symbols
“Don't stop chasing your dreams, because dreams do come true.”
Dntscurd,bdcT@1998#FB
Dntscurd,bdcT@1998#Gmail
Dntscurd,bdcT@1998#SBI
Slide 18
Common Mistakes we all do and Prevention
• Letting someone steal your Information
• Login in Café or in a friends phone
• Submitting Information to a Café or e-Akshaya Centers
• Applying for PSU or Engineering/Medical Exams asking help from
Internet Café
• Scanning Your Documents from Internet Café
• 2Factor Authentication
Slide 19
Common Mistakes we all do and Prevention
• Know your apps and software installed .
Slide 20
Common Mistakes we all do and Prevention
• Data and Privacy
Slide 21
Common Mistakes we all do and Prevention
• Know the website before you login – Phishing
Slide 22
Common Mistakes we all do and Prevention
• Scam Telephone numbers
Slide 23
Prevention
• Backup Information in HDD
• Ensure software is up to date . – Ramsomeware Attack
• Download Apps from authorized sources.
• Auto lock Phone
• Connect to secure wifi sources only – Key Loggers
• Do not jailbreak or root your phone
• Use anti virus
• Factory Restore or Reset once in a while
Slide 24
Job Opportunity
• RAW – Research and Analysis Wing, India
• Cyber Security Specialist
• Cyber Security Experts
• Kerala Cyberdome
• C-DAC
• compTIA – Certification Courses
Slide 25
Conclusion and Q&A
Slide 26
Thank You.

More Related Content

What's hot

What's hot (20)

Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber security awareness for students

Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthDababrata Mondal
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Hîmãlåy Làdhä
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & CybersecurityRitamaJana
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionAnsar Gill
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 

Similar to Cyber security awareness for students (20)

Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 

More from Akhil Nadh PC

Introduction to Computer basics for students
Introduction to Computer basics for studentsIntroduction to Computer basics for students
Introduction to Computer basics for studentsAkhil Nadh PC
 
High Secure Password Authentication System
High Secure Password Authentication SystemHigh Secure Password Authentication System
High Secure Password Authentication SystemAkhil Nadh PC
 
Blockchain Technology - A Systematic Study.
Blockchain Technology - A Systematic Study.Blockchain Technology - A Systematic Study.
Blockchain Technology - A Systematic Study.Akhil Nadh PC
 
Linux Basic Networking Command
Linux Basic Networking CommandLinux Basic Networking Command
Linux Basic Networking CommandAkhil Nadh PC
 
Introduction to python programming [part 1]
Introduction to python programming [part 1]Introduction to python programming [part 1]
Introduction to python programming [part 1]Akhil Nadh PC
 
Introduction to Information Channel
Introduction to Information ChannelIntroduction to Information Channel
Introduction to Information ChannelAkhil Nadh PC
 
Web Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerWeb Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerAkhil Nadh PC
 
Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]Akhil Nadh PC
 

More from Akhil Nadh PC (8)

Introduction to Computer basics for students
Introduction to Computer basics for studentsIntroduction to Computer basics for students
Introduction to Computer basics for students
 
High Secure Password Authentication System
High Secure Password Authentication SystemHigh Secure Password Authentication System
High Secure Password Authentication System
 
Blockchain Technology - A Systematic Study.
Blockchain Technology - A Systematic Study.Blockchain Technology - A Systematic Study.
Blockchain Technology - A Systematic Study.
 
Linux Basic Networking Command
Linux Basic Networking CommandLinux Basic Networking Command
Linux Basic Networking Command
 
Introduction to python programming [part 1]
Introduction to python programming [part 1]Introduction to python programming [part 1]
Introduction to python programming [part 1]
 
Introduction to Information Channel
Introduction to Information ChannelIntroduction to Information Channel
Introduction to Information Channel
 
Web Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerWeb Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket Layer
 
Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Cyber security awareness for students

  • 2. CONTENTS Slide 2 1. Introduction 2. Cyber Crime Motivation 3. Cyber Crime Awareness 4. Common Mistakes we all do and Prevention 5. Job Opportunity 6. Conclusion
  • 6. Slide 6 Introduction • Cyber Crime is defined as a crimes that are directly related to computing devices using other computing devices • Cyber Crime Types 1. Target Group of Computers – DoS , Virus 2. Against Person – Transmission of indecent materials, harassment 3. Against Property – Transmission of harmful pgm , Computer Vandalism 4. Against Govt - Cyber terrorism, Hacking , Momo Challenge • IT ACT in India 2000
  • 7. Slide 7 Cyber Crime Motivation 1. Curiosity 2. Revenge 3. Money 4. Fun 5. Popularity
  • 8. Slide 8 Cyber Crime Awareness • Curiosity and revenge may be the primary reasons for students to get motivated for cyber crimes • Most of the times students are not aware about the implications of the crime • Know the IT ACT Dos and Don’t Dos
  • 9. Slide 9 Common Mistakes we all do and Prevention • Fraud Emails and Text Messages Name@google.com
  • 10. Slide 10 Common Mistakes we all do and Prevention • Importance of one Email Address - Linked to Bank - Linked to Social Media - Linked to Payments Apps like Gpay, Paytm etc
  • 11. Slide 11 Common Mistakes we all do and Prevention • ATM PIN and Password  Date Of Birth  Last Digits of Phone Number  Wedding Anniversary Date Common Numbers (eg. 1234 , 6789, 1111, 0000 ) 1998 -> 8991 -> 9918
  • 12. Slide 12 Common Mistakes we all do and Prevention • RFID Wi-Fi ATM
  • 13. Slide 13 Common Mistakes we all do and Prevention • Photo Editing Apps
  • 14. Slide 14 Common Mistakes we all do and Prevention • App Download and App Permissions
  • 15. Slide 15 Common Mistakes we all do and Prevention • Know Your Friends and Their Intension  Do not talk to Strangers Do not send your personal photos and videos  Accept Friend Request from people who knows you in Person  Do not accept Friend Request from people claiming they are friends of your friends  Monitor your friend list often  Accept Fried Request from people only if there are enough Mutual Friends  Stop Comparing Followers and Friend Request and Likes  Do not Mass tag people on your personal photos
  • 16. Slide 16 Common Mistakes we all do and Prevention • Social Media and Privacy – Cyber Stalking
  • 17. Slide 17 Common Mistakes we all do and Prevention • Passwords • Typing Passwords from a safe place. • Strong Password Policy • Character (Mix of Upper and Lower Case ) + Number + Symbols “Don't stop chasing your dreams, because dreams do come true.” Dntscurd,bdcT@1998#FB Dntscurd,bdcT@1998#Gmail Dntscurd,bdcT@1998#SBI
  • 18. Slide 18 Common Mistakes we all do and Prevention • Letting someone steal your Information • Login in Café or in a friends phone • Submitting Information to a Café or e-Akshaya Centers • Applying for PSU or Engineering/Medical Exams asking help from Internet Café • Scanning Your Documents from Internet Café • 2Factor Authentication
  • 19. Slide 19 Common Mistakes we all do and Prevention • Know your apps and software installed .
  • 20. Slide 20 Common Mistakes we all do and Prevention • Data and Privacy
  • 21. Slide 21 Common Mistakes we all do and Prevention • Know the website before you login – Phishing
  • 22. Slide 22 Common Mistakes we all do and Prevention • Scam Telephone numbers
  • 23. Slide 23 Prevention • Backup Information in HDD • Ensure software is up to date . – Ramsomeware Attack • Download Apps from authorized sources. • Auto lock Phone • Connect to secure wifi sources only – Key Loggers • Do not jailbreak or root your phone • Use anti virus • Factory Restore or Reset once in a while
  • 24. Slide 24 Job Opportunity • RAW – Research and Analysis Wing, India • Cyber Security Specialist • Cyber Security Experts • Kerala Cyberdome • C-DAC • compTIA – Certification Courses