2. WHY IS CYBER SECURITY A CONCERN?
CYBER THREATS THAT CAN IMPACT ANYONE
CYBER BULLYING
CYBER GROOMING
ONLINE GAMING
E-MAIL FRAUD
ONLINE TRANSACTION FRAUD
SAFEGUARDS FOR YOUR SOCIAL NETWORKING
PROFILE
AGENDA
DR
SUSHMA
SINGH
2
3. WHY IS CYBER SECURITY A CONCERN?
DR
SUSHMA
SINGH
3
Internet, computers, smartphones and other
communication technology devices have become an
integral part of our life.
Internet communication mediums like google, email,
WhatsApp, twitter, Facebook etc are part and parcel of
our everyday activities.
We are unaware of cyber safety and security so it is
essential to safe guard ourselves.
5. CYBER THREATS THAT CAN IMPACT ANYONE
CYBER BULLYING
BANKING FRAUDS
IDENTITY THEFTS
JOB FRAUDS
6. COMMON WAYS USED BY
CYBER CRIMINALS
DR
SUSHMA
SINGH
6
EMAIL
SPOOFING
IS SENDING EMAILS THROUGH FAKE ACCOUNTS
MALICIOUS FILE
AAPPLICATIONN1
TO GET ACCESS OG YOUR COMPUTER THROUGH EMAIL, WEBSITE, MESSAGEING AND
GAMING APP
SOCIAL
ENGINEERINGQ2
IS TECHNIQUE TO GAIN YOUR CONFIDENCE TO GET YOUR PERSONAL INFORMATION
FROM YOU
CYBER
BULLYINGQ3
A FORM OF HARRASMENTOR BULLYING INFLICTED THROUGH, THE USE OF
ELECTRONIC OR COMMUNICATION DEVICES SUCH AS COMPUTER MOBILE PHONE,
LAPTOP ETC
CYBERGROOMING
IS A PRACTICE WHERE SOMEONE BUILDS AN EMOTIONAL BOND WITH CHILDREN
THROUGH SOCIAL MEDIA OR MESSAGING PLATFORMS WITH AN OBJECTIVE OF
GAINING THEIR TRUST FOR SEXUALLY ABUSING OR EXPLOITING THEM
7. CYBER BULLYING
DR
SUSHMA
SINGH
7
RUDE, MEAN
AND HURTFUL
MESSAGES
Comments and images
TEXT MESSAGE,
EMAIL, SOCIAL
MEDIA
Web pages chatrooms
KNOWN PERSON,
FRIEND,
RELATIVE
Unknown person
HARM
PHYSICALLY
EMOTIONALLY
phytologically
9. “GAMING IS ANOTHER
AREA WHICH HAS BEEN
TRANSFORMED WITH THE
ADVENT OF INFORMATION
TECHNOLOGY.”
ONLINE GAMMING
DR
SUSHMA
SINGH
9
10. ON LINE GAMMING
DR
SUSHMA
SINGH
PLATFORMS
Mobiles, Consoles
Computers
Portable gaming devices
HOW RISKS
ASSOCIATED
Aggressive players
Inappropriate language
Adults and cybercriminals
HOW YOU
GET
TRAPPED
Free websites links
Links through email
Links through messages
HOW IT
CAN HARM
Down load malware,
viruses can affect your
computers or devices
HOW THEY
TRAP YOU
But points/coins to improve
performance in the game and
share credit cards
1 0
11. E-MAIL FRAUD
DR
SUSHMA
SINGH
1 1
PHISHING
To take your Personnel
information
LOTTERY
To take your Credit
card details
EMAIL ADDRESS
To Misguide you
LINKS, EMAIL
To hack your email
account
DOCUMENTS,
EMAIL
To Install malware in
your computer
12. ONLINE TRANSACTION FRAUD
DR
SUSHMA
SINGH
1 2
BANK DETAILS
Never share bank details password,
card number CVV, expiry date PIN,
OTP etc with any one.
Protect your mobile phone
Review monthly statements of the
bank.
Stolen or lost credit or debit cards
call the bank and block your cards
Iterative approaches to corporate strategy
Establish a management framework from the inside
ON LINE TRANSACTIONS
Make it a habit to regularly update your
online password of your bank account.
Make it a habit to type bank website
yourself must not click the links
appearing in email or text message or a
popup.
Avoid making online transitions using
public wi-fi or cyber cafe
If unauthorized transaction has taken
place you must lodge a formal complaint
at local police station
13. SAFE GUARDS FOR
YOUR SOCIAL
NETWORKING PROFILE
DR
SUSHMA
SINGH
1 3
FAKE ACCOUNT ON SOCIAL
MEDIA
Make password complex and change it
regularly.
Never share your password.
Avoid accepting friend request from unknown
person
Do not share personal details on social media
post
BULLYING
In case of bullying share with parents and
elders.
If needed your parents can contact local
police station
Ask service provider or block the person
ONLINE FRAUDS
Never click password while using the cyber
café.
Put a strong password of your mobile as it is
linked with your bank account
14. SUMMARY
DR
SUSHMA
SINGH
1 4
Presentation presents:
Why is cyber security a concern?, Cyber threats that
can impact anyone, Cyber bullying. Cyber grooming,
Online gaming, E-mail fraud, Online, transaction
fraud and Safeguards for your social networking
profile