SlideShare a Scribd company logo
1 of 13
CYBER
SAFETY
COMPUTER SCIENCE
- Priya Majmundar (XI A)
INDEX
• Cyber Safety
• Safely browsing the web
• Identity Protection
• Confidentiality
Cyber Safety refers to the safe
and responsible use of
Internet so as to ensure safety
and security of personal
information and not posing
threat to anyone else's
information. In short, Cyber
safety means being secure
online.
WHAT IS CYBER SAFETY?
Safe browsing on web needs you to know
many things like:
 What are the possible dangers?
 How to avoid these?
 How to virtually conduct yourself while browsing?
SAFELY BROWSING THE WEB
One of the most common dangers while browsing the web is Identity
theft. Identity theft is a type of fraud that involves using someone else's
identity to steal money or gain other benefits. Online identity theft refers
to an act of stealing someone’s personal information such as name, login
details etc. and then posing as that person online.
This can take place in multiple forms, such as:
Financial Identity theft
Criminal identity theft
Medical identity theft
IDENTITY PROTECTION WHILE USING
INTERNET
Anonymous browsing:
Anonymous browsers allow users to view websites without
revealing any personal information of the user like their IP
address, machine type, location etc. It can be used as a tool
governments, journalists and everyday security-conscious
surfers.
SOLUTION?
Private/Anonymous
Browsing.
There are many other ways to use internet without revealing your search
history & sharing your data. These are:
1) INCOGNITO MODE
Incognito browsing opens up a version of a
browser that will not track your activity. It is
particularly useful if you’re entering sensitive
data like bank details into your browser, as it can
minimise the risk of your information being
saved to the computer. You may also use
private browsers and search engines
like DuckDuckGo.
Private Browsing:
2) PROXY
Proxy works by acting as a
middleman b/w your computer
and the website you want to
access. Now the tracking website
will get the IP address &
information that belongs to the
proxy site, so you’re effectively
getting the same content from
another source without it getting
to know your browsing details.
Private Browsing:
3) VIRTUAL PRIVATE NETWORK
VPN is a method used to add security and privacy
to public & private networks, like WiFi hotspots &
the internet. VPNs are most often used by
corporations to protect sensitive data.
Nowadays, you can set up a VPN at home
to protect yourself from hackers trying to
access your sensitive information.
Private Browsing:
Confidentiality of information ensures that only
authorized users get access to sensitive and protected
data.
Best ways to ensure confidentiality are as follows:
CONFIDENTIALITY
• Use firewall wherever
possible
Firewall is a program that monitors all
communications & traps all illicit packets.
Most operating systems come with a
firewall preinstalled.
• Be careful while posting
on Internet
When you post anything to a public Internet
as social networking sites like Instagram or
Facebook, you generally give up the rights to
content and any expectation of privacy or
confidentiality is useless.
In most countries, anything you post to a public
space can be saved, archived, duplicated,
distributed, and published, even years later. So
ensure that you never post your crucial
information such as address, mobile number,
bank details, credit card details etc. on public
Internet sites.
(a) First of all, browse privately.
(b)Don’t save your login information.
(c) Never save passwords while working on a
public computer.
(d)Don’t leave the computer unattended with
sensitive information on the screen.
(e) Properly log out before you leave the
computer.
(f) Erase history and traces of your work, i.e.,
clear history and cookies.
• Avoid using public computers
Always try NOT to use the public computer especially if you’ve to deal
with crucial data. But if you absolutely need to, then make sure the
following things :
THANK YOU! :)

More Related Content

Similar to CYBER SAFETY PPT

Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalVaishnaviKhandelwal6
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptxhavaneb872
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and securityAwais Haider
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!TalhaMTZ
 

Similar to CYBER SAFETY PPT (20)

Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptx
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Protect your Privacy
Protect your PrivacyProtect your Privacy
Protect your Privacy
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and security
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 

Recently uploaded

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 

Recently uploaded (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 

CYBER SAFETY PPT

  • 2. INDEX • Cyber Safety • Safely browsing the web • Identity Protection • Confidentiality
  • 3. Cyber Safety refers to the safe and responsible use of Internet so as to ensure safety and security of personal information and not posing threat to anyone else's information. In short, Cyber safety means being secure online. WHAT IS CYBER SAFETY?
  • 4. Safe browsing on web needs you to know many things like:  What are the possible dangers?  How to avoid these?  How to virtually conduct yourself while browsing? SAFELY BROWSING THE WEB
  • 5. One of the most common dangers while browsing the web is Identity theft. Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits. Online identity theft refers to an act of stealing someone’s personal information such as name, login details etc. and then posing as that person online. This can take place in multiple forms, such as: Financial Identity theft Criminal identity theft Medical identity theft IDENTITY PROTECTION WHILE USING INTERNET
  • 6. Anonymous browsing: Anonymous browsers allow users to view websites without revealing any personal information of the user like their IP address, machine type, location etc. It can be used as a tool governments, journalists and everyday security-conscious surfers. SOLUTION? Private/Anonymous Browsing.
  • 7. There are many other ways to use internet without revealing your search history & sharing your data. These are: 1) INCOGNITO MODE Incognito browsing opens up a version of a browser that will not track your activity. It is particularly useful if you’re entering sensitive data like bank details into your browser, as it can minimise the risk of your information being saved to the computer. You may also use private browsers and search engines like DuckDuckGo. Private Browsing:
  • 8. 2) PROXY Proxy works by acting as a middleman b/w your computer and the website you want to access. Now the tracking website will get the IP address & information that belongs to the proxy site, so you’re effectively getting the same content from another source without it getting to know your browsing details. Private Browsing:
  • 9. 3) VIRTUAL PRIVATE NETWORK VPN is a method used to add security and privacy to public & private networks, like WiFi hotspots & the internet. VPNs are most often used by corporations to protect sensitive data. Nowadays, you can set up a VPN at home to protect yourself from hackers trying to access your sensitive information. Private Browsing:
  • 10. Confidentiality of information ensures that only authorized users get access to sensitive and protected data. Best ways to ensure confidentiality are as follows: CONFIDENTIALITY • Use firewall wherever possible Firewall is a program that monitors all communications & traps all illicit packets. Most operating systems come with a firewall preinstalled.
  • 11. • Be careful while posting on Internet When you post anything to a public Internet as social networking sites like Instagram or Facebook, you generally give up the rights to content and any expectation of privacy or confidentiality is useless. In most countries, anything you post to a public space can be saved, archived, duplicated, distributed, and published, even years later. So ensure that you never post your crucial information such as address, mobile number, bank details, credit card details etc. on public Internet sites.
  • 12. (a) First of all, browse privately. (b)Don’t save your login information. (c) Never save passwords while working on a public computer. (d)Don’t leave the computer unattended with sensitive information on the screen. (e) Properly log out before you leave the computer. (f) Erase history and traces of your work, i.e., clear history and cookies. • Avoid using public computers Always try NOT to use the public computer especially if you’ve to deal with crucial data. But if you absolutely need to, then make sure the following things :