SlideShare a Scribd company logo
1 of 15
Download to read offline
CYBER CRIMES
DR SUSHMA SINGH
WHY IS CYBER SECURITY A CONCERN?
CYBER THREATS THAT CAN IMPACT ANYONE
CYBER BULLYING
CYBER GROOMING
ONLINE GAMING
E-MAIL FRAUD
ONLINE TRANSACTION FRAUD
SAFEGUARDS FOR YOUR SOCIAL NETWORKING
PROFILE
AGENDA
DR
SUSHMA
SINGH
2
WHY IS CYBER SECURITY A CONCERN?
DR
SUSHMA
SINGH
3
Internet, computers, smartphones and other
communication technology devices have become an
integral part of our life.
Internet communication mediums like google, email,
WhatsApp, twitter, Facebook etc are part and parcel of
our everyday activities.
We are unaware of cyber safety and security so it is
essential to safe guard ourselves.
GRAPHICAL PRESENTATION
DR
SUSHMA
SINGH
4
CYBER THREATS THAT CAN IMPACT ANYONE
CYBER BULLYING
BANKING FRAUDS
IDENTITY THEFTS
JOB FRAUDS
COMMON WAYS USED BY
CYBER CRIMINALS
DR
SUSHMA
SINGH
6
EMAIL
SPOOFING
IS SENDING EMAILS THROUGH FAKE ACCOUNTS
MALICIOUS FILE
AAPPLICATIONN1
TO GET ACCESS OG YOUR COMPUTER THROUGH EMAIL, WEBSITE, MESSAGEING AND
GAMING APP
SOCIAL
ENGINEERINGQ2
IS TECHNIQUE TO GAIN YOUR CONFIDENCE TO GET YOUR PERSONAL INFORMATION
FROM YOU
CYBER
BULLYINGQ3
A FORM OF HARRASMENTOR BULLYING INFLICTED THROUGH, THE USE OF
ELECTRONIC OR COMMUNICATION DEVICES SUCH AS COMPUTER MOBILE PHONE,
LAPTOP ETC
CYBERGROOMING
IS A PRACTICE WHERE SOMEONE BUILDS AN EMOTIONAL BOND WITH CHILDREN
THROUGH SOCIAL MEDIA OR MESSAGING PLATFORMS WITH AN OBJECTIVE OF
GAINING THEIR TRUST FOR SEXUALLY ABUSING OR EXPLOITING THEM
CYBER BULLYING
DR
SUSHMA
SINGH
7
RUDE, MEAN
AND HURTFUL
MESSAGES
Comments and images
TEXT MESSAGE,
EMAIL, SOCIAL
MEDIA
Web pages chatrooms
KNOWN PERSON,
FRIEND,
RELATIVE
Unknown person
HARM
PHYSICALLY
EMOTIONALLY
phytologically
CYBER GROOMING
DR
SHUMA
SINGH
8
GAMING
WEBSITES
Compliments
INSTANT
MESSAGE
Photographs
SOCIAL MEDIA
gifts
LONG TERM
GROOMING
Sexually explicit images
EMAIL
Job offer
PERSONAL
DETAILS
Friend request
CHATROOM
Obscene message
WEBCAM
Chat partner
“GAMING IS ANOTHER
AREA WHICH HAS BEEN
TRANSFORMED WITH THE
ADVENT OF INFORMATION
TECHNOLOGY.”
ONLINE GAMMING
DR
SUSHMA
SINGH
9
ON LINE GAMMING
DR
SUSHMA
SINGH
PLATFORMS
Mobiles, Consoles
Computers
Portable gaming devices
HOW RISKS
ASSOCIATED
Aggressive players
Inappropriate language
Adults and cybercriminals
HOW YOU
GET
TRAPPED
Free websites links
Links through email
Links through messages
HOW IT
CAN HARM
Down load malware,
viruses can affect your
computers or devices
HOW THEY
TRAP YOU
But points/coins to improve
performance in the game and
share credit cards
1 0
E-MAIL FRAUD
DR
SUSHMA
SINGH
1 1
PHISHING
To take your Personnel
information
LOTTERY
To take your Credit
card details
EMAIL ADDRESS
To Misguide you
LINKS, EMAIL
To hack your email
account
DOCUMENTS,
EMAIL
To Install malware in
your computer
ONLINE TRANSACTION FRAUD
DR
SUSHMA
SINGH
1 2
BANK DETAILS
Never share bank details password,
card number CVV, expiry date PIN,
OTP etc with any one.
Protect your mobile phone
Review monthly statements of the
bank.
Stolen or lost credit or debit cards
call the bank and block your cards
Iterative approaches to corporate strategy
Establish a management framework from the inside
ON LINE TRANSACTIONS
Make it a habit to regularly update your
online password of your bank account.
Make it a habit to type bank website
yourself must not click the links
appearing in email or text message or a
popup.
Avoid making online transitions using
public wi-fi or cyber cafe
If unauthorized transaction has taken
place you must lodge a formal complaint
at local police station
SAFE GUARDS FOR
YOUR SOCIAL
NETWORKING PROFILE
DR
SUSHMA
SINGH
1 3
FAKE ACCOUNT ON SOCIAL
MEDIA
Make password complex and change it
regularly.
Never share your password.
Avoid accepting friend request from unknown
person
Do not share personal details on social media
post
BULLYING
In case of bullying share with parents and
elders.
If needed your parents can contact local
police station
Ask service provider or block the person
ONLINE FRAUDS
Never click password while using the cyber
café.
Put a strong password of your mobile as it is
linked with your bank account
SUMMARY
DR
SUSHMA
SINGH
1 4
Presentation presents:
Why is cyber security a concern?, Cyber threats that
can impact anyone, Cyber bullying. Cyber grooming,
Online gaming, E-mail fraud, Online, transaction
fraud and Safeguards for your social networking
profile
THANK YOU
FROM
DR SUSHMA SINGH
DIRECTOR OF EDUCATION GNCT OF DELHI, LADLI FOUNDATION, PRINCIPAL

More Related Content

Similar to Presentation on cyber crimes. By Dr Sushma Singh

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020Rahul Boga
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxErrorError22
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesOluwatobi Olowu
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptxMehedi Hasan
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 

Similar to Presentation on cyber crimes. By Dr Sushma Singh (20)

E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Phishing
PhishingPhishing
Phishing
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
123.pptx
123.pptx123.pptx
123.pptx
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 

More from Directorate of Education Delhi

Anjali SKV Sector16 Rohini SWOT Analysis Social Internship Program
Anjali SKV Sector16 Rohini SWOT Analysis Social Internship ProgramAnjali SKV Sector16 Rohini SWOT Analysis Social Internship Program
Anjali SKV Sector16 Rohini SWOT Analysis Social Internship ProgramDirectorate of Education Delhi
 
Social Internship Program. Report #directorateofeducation #ladlifoundation
Social Internship Program. Report #directorateofeducation  #ladlifoundation Social Internship Program. Report #directorateofeducation  #ladlifoundation
Social Internship Program. Report #directorateofeducation #ladlifoundation Directorate of Education Delhi
 
SWOT ANALYSIS by Vinita Joshi, G.S.K.V Sec-16 Rohini Delhi.pdf
SWOT ANALYSIS by Vinita Joshi, G.S.K.V Sec-16 Rohini Delhi.pdfSWOT ANALYSIS by Vinita Joshi, G.S.K.V Sec-16 Rohini Delhi.pdf
SWOT ANALYSIS by Vinita Joshi, G.S.K.V Sec-16 Rohini Delhi.pdfDirectorate of Education Delhi
 
WASH( Water Sanitation and Hygiene) by Dr Sushma Singh
WASH( Water Sanitation and Hygiene) by Dr Sushma Singh WASH( Water Sanitation and Hygiene) by Dr Sushma Singh
WASH( Water Sanitation and Hygiene) by Dr Sushma Singh Directorate of Education Delhi
 

More from Directorate of Education Delhi (20)

Intern Neha Kumari SWOT analysis .
Intern Neha Kumari SWOT analysis .Intern Neha Kumari SWOT analysis .
Intern Neha Kumari SWOT analysis .
 
Anjali SKV Sector16 Rohini SWOT Analysis Social Internship Program
Anjali SKV Sector16 Rohini SWOT Analysis Social Internship ProgramAnjali SKV Sector16 Rohini SWOT Analysis Social Internship Program
Anjali SKV Sector16 Rohini SWOT Analysis Social Internship Program
 
Bhoomi(Skv sector 16 rohini) SWOT Analysis
Bhoomi(Skv sector 16 rohini) SWOT AnalysisBhoomi(Skv sector 16 rohini) SWOT Analysis
Bhoomi(Skv sector 16 rohini) SWOT Analysis
 
Social Internship Program. Report #directorateofeducation #ladlifoundation
Social Internship Program. Report #directorateofeducation  #ladlifoundation Social Internship Program. Report #directorateofeducation  #ladlifoundation
Social Internship Program. Report #directorateofeducation #ladlifoundation
 
Neeru SWOTAnalysis.pdf
Neeru SWOTAnalysis.pdfNeeru SWOTAnalysis.pdf
Neeru SWOTAnalysis.pdf
 
SWOT ANALYSIS by Vinita Joshi, G.S.K.V Sec-16 Rohini Delhi.pdf
SWOT ANALYSIS by Vinita Joshi, G.S.K.V Sec-16 Rohini Delhi.pdfSWOT ANALYSIS by Vinita Joshi, G.S.K.V Sec-16 Rohini Delhi.pdf
SWOT ANALYSIS by Vinita Joshi, G.S.K.V Sec-16 Rohini Delhi.pdf
 
Mahak SWOTAnalysis.pptx
Mahak SWOTAnalysis.pptxMahak SWOTAnalysis.pptx
Mahak SWOTAnalysis.pptx
 
NaazmeenSWOTAnalysis.pptx
NaazmeenSWOTAnalysis.pptxNaazmeenSWOTAnalysis.pptx
NaazmeenSWOTAnalysis.pptx
 
MahiSWOTAnalysis.pdf
MahiSWOTAnalysis.pdfMahiSWOTAnalysis.pdf
MahiSWOTAnalysis.pdf
 
AyeshaSWOTAnalysis.PDF
AyeshaSWOTAnalysis.PDFAyeshaSWOTAnalysis.PDF
AyeshaSWOTAnalysis.PDF
 
AnnuSWOTAnalysis.pdf
AnnuSWOTAnalysis.pdfAnnuSWOTAnalysis.pdf
AnnuSWOTAnalysis.pdf
 
DeepaSWOTAnalysis.pdf
DeepaSWOTAnalysis.pdfDeepaSWOTAnalysis.pdf
DeepaSWOTAnalysis.pdf
 
soni SWOTAnalysis.pptx
soni SWOTAnalysis.pptxsoni SWOTAnalysis.pptx
soni SWOTAnalysis.pptx
 
Geetanjali SWOT Analysis.pdf
Geetanjali SWOT Analysis.pdfGeetanjali SWOT Analysis.pdf
Geetanjali SWOT Analysis.pdf
 
shivangi SWOTAnalysis.pdf
shivangi SWOTAnalysis.pdfshivangi SWOTAnalysis.pdf
shivangi SWOTAnalysis.pdf
 
JannatSWOTAnalysis.pptx
JannatSWOTAnalysis.pptxJannatSWOTAnalysis.pptx
JannatSWOTAnalysis.pptx
 
Sakshi SWOT Analysis S.K.V sec 16 rohini.pdf
Sakshi SWOT Analysis S.K.V sec 16 rohini.pdfSakshi SWOT Analysis S.K.V sec 16 rohini.pdf
Sakshi SWOT Analysis S.K.V sec 16 rohini.pdf
 
Khushboo SWOTAnalysis.pptx
Khushboo SWOTAnalysis.pptxKhushboo SWOTAnalysis.pptx
Khushboo SWOTAnalysis.pptx
 
Digital Empowerment. By Dr Sushma Singh
Digital Empowerment. By Dr Sushma SinghDigital Empowerment. By Dr Sushma Singh
Digital Empowerment. By Dr Sushma Singh
 
WASH( Water Sanitation and Hygiene) by Dr Sushma Singh
WASH( Water Sanitation and Hygiene) by Dr Sushma Singh WASH( Water Sanitation and Hygiene) by Dr Sushma Singh
WASH( Water Sanitation and Hygiene) by Dr Sushma Singh
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Presentation on cyber crimes. By Dr Sushma Singh

  • 2. WHY IS CYBER SECURITY A CONCERN? CYBER THREATS THAT CAN IMPACT ANYONE CYBER BULLYING CYBER GROOMING ONLINE GAMING E-MAIL FRAUD ONLINE TRANSACTION FRAUD SAFEGUARDS FOR YOUR SOCIAL NETWORKING PROFILE AGENDA DR SUSHMA SINGH 2
  • 3. WHY IS CYBER SECURITY A CONCERN? DR SUSHMA SINGH 3 Internet, computers, smartphones and other communication technology devices have become an integral part of our life. Internet communication mediums like google, email, WhatsApp, twitter, Facebook etc are part and parcel of our everyday activities. We are unaware of cyber safety and security so it is essential to safe guard ourselves.
  • 5. CYBER THREATS THAT CAN IMPACT ANYONE CYBER BULLYING BANKING FRAUDS IDENTITY THEFTS JOB FRAUDS
  • 6. COMMON WAYS USED BY CYBER CRIMINALS DR SUSHMA SINGH 6 EMAIL SPOOFING IS SENDING EMAILS THROUGH FAKE ACCOUNTS MALICIOUS FILE AAPPLICATIONN1 TO GET ACCESS OG YOUR COMPUTER THROUGH EMAIL, WEBSITE, MESSAGEING AND GAMING APP SOCIAL ENGINEERINGQ2 IS TECHNIQUE TO GAIN YOUR CONFIDENCE TO GET YOUR PERSONAL INFORMATION FROM YOU CYBER BULLYINGQ3 A FORM OF HARRASMENTOR BULLYING INFLICTED THROUGH, THE USE OF ELECTRONIC OR COMMUNICATION DEVICES SUCH AS COMPUTER MOBILE PHONE, LAPTOP ETC CYBERGROOMING IS A PRACTICE WHERE SOMEONE BUILDS AN EMOTIONAL BOND WITH CHILDREN THROUGH SOCIAL MEDIA OR MESSAGING PLATFORMS WITH AN OBJECTIVE OF GAINING THEIR TRUST FOR SEXUALLY ABUSING OR EXPLOITING THEM
  • 7. CYBER BULLYING DR SUSHMA SINGH 7 RUDE, MEAN AND HURTFUL MESSAGES Comments and images TEXT MESSAGE, EMAIL, SOCIAL MEDIA Web pages chatrooms KNOWN PERSON, FRIEND, RELATIVE Unknown person HARM PHYSICALLY EMOTIONALLY phytologically
  • 8. CYBER GROOMING DR SHUMA SINGH 8 GAMING WEBSITES Compliments INSTANT MESSAGE Photographs SOCIAL MEDIA gifts LONG TERM GROOMING Sexually explicit images EMAIL Job offer PERSONAL DETAILS Friend request CHATROOM Obscene message WEBCAM Chat partner
  • 9. “GAMING IS ANOTHER AREA WHICH HAS BEEN TRANSFORMED WITH THE ADVENT OF INFORMATION TECHNOLOGY.” ONLINE GAMMING DR SUSHMA SINGH 9
  • 10. ON LINE GAMMING DR SUSHMA SINGH PLATFORMS Mobiles, Consoles Computers Portable gaming devices HOW RISKS ASSOCIATED Aggressive players Inappropriate language Adults and cybercriminals HOW YOU GET TRAPPED Free websites links Links through email Links through messages HOW IT CAN HARM Down load malware, viruses can affect your computers or devices HOW THEY TRAP YOU But points/coins to improve performance in the game and share credit cards 1 0
  • 11. E-MAIL FRAUD DR SUSHMA SINGH 1 1 PHISHING To take your Personnel information LOTTERY To take your Credit card details EMAIL ADDRESS To Misguide you LINKS, EMAIL To hack your email account DOCUMENTS, EMAIL To Install malware in your computer
  • 12. ONLINE TRANSACTION FRAUD DR SUSHMA SINGH 1 2 BANK DETAILS Never share bank details password, card number CVV, expiry date PIN, OTP etc with any one. Protect your mobile phone Review monthly statements of the bank. Stolen or lost credit or debit cards call the bank and block your cards Iterative approaches to corporate strategy Establish a management framework from the inside ON LINE TRANSACTIONS Make it a habit to regularly update your online password of your bank account. Make it a habit to type bank website yourself must not click the links appearing in email or text message or a popup. Avoid making online transitions using public wi-fi or cyber cafe If unauthorized transaction has taken place you must lodge a formal complaint at local police station
  • 13. SAFE GUARDS FOR YOUR SOCIAL NETWORKING PROFILE DR SUSHMA SINGH 1 3 FAKE ACCOUNT ON SOCIAL MEDIA Make password complex and change it regularly. Never share your password. Avoid accepting friend request from unknown person Do not share personal details on social media post BULLYING In case of bullying share with parents and elders. If needed your parents can contact local police station Ask service provider or block the person ONLINE FRAUDS Never click password while using the cyber café. Put a strong password of your mobile as it is linked with your bank account
  • 14. SUMMARY DR SUSHMA SINGH 1 4 Presentation presents: Why is cyber security a concern?, Cyber threats that can impact anyone, Cyber bullying. Cyber grooming, Online gaming, E-mail fraud, Online, transaction fraud and Safeguards for your social networking profile
  • 15. THANK YOU FROM DR SUSHMA SINGH DIRECTOR OF EDUCATION GNCT OF DELHI, LADLI FOUNDATION, PRINCIPAL