SlideShare a Scribd company logo
1 of 13
Cyber Privacy and
Password protection
Cyber Privacy and
Password protection
Bavijesh Thaliyil
M.Ed, Dept. of Education
University of Kerala
Cyber privacy is the privacy and security level of personal data published
via the Internet. It is a broad term that refers to a variety of factors,
techniques and technologies used to protect sensitive and private data,
communications, and preferences.
CCyber-Privacy is mostly defined by the services used by
individuals. Whatever agreements individuals agree to when
they sign up for a service usually signs away their right to
privacy. In other cases the reasonable expectation of privacy is
not reasonable if the behaviors or communications in question
were knowingly exposed to public view.
“
”
Cyber Privacy – A PraludeCyber Privacy – A Pralude
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Cyber-Privacy is a huge concern for civilians and espeically for companies
because of the potential for crime.
Such crimes include:
Malware
such as the use of
malicious code which can
compromise a user's
identity and/or informaton
Denial of Service Attacks
Block a user from
accessing his or her
information
Computer Viruses
Can compromise user
information as well as
identity
All of these crimes fall under the category or
fraud, identity theft, phishing scams and or
information warfare.
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
The Cyber-Privacy Project attempts to raise public awareness and promote
the education of Cyber Privacy to prevent crimes from happening.
Privacy protection and cyber security should be thought of as
interconnected: as more and more personal information is processed or stored
online, privacy protection increasingly relies on effective cyber security
implementation by organizations to secure personal data both when it is in
transit and at rest.17 In some cases, cyber security measures underpin critical
infrastructure that protects data, thereby safeguarding personal information
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Credit-card fraud
Data communications fraud
Piggyback on someone else’s network
Office network for personal purposes
Computer-directed diversion of funds
Unauthorized access to computer files
Accessing confidential employee records
Theft of trade secrets and product pricing
Unlawful copying of copyrighted software
Casual sharing of copyrighted software
Assembly-line copying
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
 Bomb
 Program to trigger damage
• Scheduled to run at a later date
• May be found in software for general public, especially shareware
 Data diddling
• Changing data before or as it enters the system
 Denial of service attack (DOS)
• Hackers bombard a site with more request for service than it can
possible handle
• Prevents legitimate users from accessing the site
• Appearance of requests coming from many different sites simultaneously
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Piggybacking
Original user does not sign off properly
Intruder gains accesses to files via the original user id
Salami technique
Embezzlement
Scavenging
Search garbage and recycling bins for personal information
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Trapdoor
Illicit program left within a completed legitimate program
Permits unauthorized and unknown entry to the program
Trojan horse
Illegal instructions placed inside a legitimate program
Program does something useful and destructive at the same
time
Zapping
Software to bypass security systems
Crimes Security - ChallengesCrimes Security - Challenges
Social MediasSocial Medias MobileMobile
TechnologyTechnology
Big DataBig Data
Cyber Chellenges - ComplexityCyber Chellenges - Complexity
Complexity of the connected environment
Growing sophistication of the threat
Threats are moving to the mobile sphere
The “big data” paradox: is it a bigger risk or a solution?
For many, breach preparedness is still not a priority
Compliance vs risk-management
Cyber Security – Policy DevelopmentCyber Security – Policy Development
Stewardship vs securitization
Cyberspace governance and security is a global issue
ConclusionConclusion
As individuals grow more dependent on and connected to the cyberspace,
they will become more reliant on organizations’ effective implementation of
cyber security and sensitivity to privacy. The following are some of the key
areas in which an increased emphasis on privacy protection could help
support, advance and augment cyber security activities
Building privacy values into cyber security policy directions
Legislative approaches that incentivize cyber security preparedness
Facilitating broader dialogue on cyber security that acknowledges its
importance for privacy, trust, and responsible data stewardship
Cyber Privacy and Password Protection Tips

More Related Content

What's hot

Interactive whiteboard
Interactive whiteboardInteractive whiteboard
Interactive whiteboardjohnnajoo
 
Web based learning [autosaved]
Web based learning [autosaved]Web based learning [autosaved]
Web based learning [autosaved]Akhilajs2
 
Chapter 3 The Role of Multimedia in Education
Chapter 3   The Role of Multimedia in EducationChapter 3   The Role of Multimedia in Education
Chapter 3 The Role of Multimedia in EducationSalina Saharudin
 
Role of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internetRole of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internetsujinaganga
 
Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Jincy24
 
introduction of Multimedia
introduction of Multimedia introduction of Multimedia
introduction of Multimedia Sagar Pednekar
 
E-content Features : Concept, Scope ppt presentation
E-content Features : Concept, Scope ppt presentationE-content Features : Concept, Scope ppt presentation
E-content Features : Concept, Scope ppt presentationAbhiramiMRS3Unitary
 
misuse of internet - mcq
misuse of internet - mcqmisuse of internet - mcq
misuse of internet - mcqJincy24
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: HackingQhaiyum Shah
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...Jincy24
 
Health hazards of using computer
Health hazards of using computerHealth hazards of using computer
Health hazards of using computerNeenujain
 
Resource centres for educatonal technology
Resource centres for educatonal technologyResource centres for educatonal technology
Resource centres for educatonal technologyFasalPB
 
Computer assisted instruction vs computer managed instruction
Computer assisted instruction vs computer managed instructionComputer assisted instruction vs computer managed instruction
Computer assisted instruction vs computer managed instructionSurekha Gireesh
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 

What's hot (20)

Interactive whiteboard
Interactive whiteboardInteractive whiteboard
Interactive whiteboard
 
Web based learning [autosaved]
Web based learning [autosaved]Web based learning [autosaved]
Web based learning [autosaved]
 
Chapter 3 The Role of Multimedia in Education
Chapter 3   The Role of Multimedia in EducationChapter 3   The Role of Multimedia in Education
Chapter 3 The Role of Multimedia in Education
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Role of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internetRole of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internet
 
Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...
 
introduction of Multimedia
introduction of Multimedia introduction of Multimedia
introduction of Multimedia
 
E-content Features : Concept, Scope ppt presentation
E-content Features : Concept, Scope ppt presentationE-content Features : Concept, Scope ppt presentation
E-content Features : Concept, Scope ppt presentation
 
misuse of internet - mcq
misuse of internet - mcqmisuse of internet - mcq
misuse of internet - mcq
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
E content
E contentE content
E content
 
Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...
 
Health hazards of using computer
Health hazards of using computerHealth hazards of using computer
Health hazards of using computer
 
Resource centres for educatonal technology
Resource centres for educatonal technologyResource centres for educatonal technology
Resource centres for educatonal technology
 
Computer assisted instruction vs computer managed instruction
Computer assisted instruction vs computer managed instructionComputer assisted instruction vs computer managed instruction
Computer assisted instruction vs computer managed instruction
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 

Viewers also liked

Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawNitya Nand Pandey
 
Violation of privacy
Violation of privacyViolation of privacy
Violation of privacyLauren2342
 
12 Social Media Fears and overcoming them now!
12 Social Media Fears and overcoming them now!12 Social Media Fears and overcoming them now!
12 Social Media Fears and overcoming them now!New Media Lab
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 

Viewers also liked (9)

Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
Violation of privacy
Violation of privacyViolation of privacy
Violation of privacy
 
12 Social Media Fears and overcoming them now!
12 Social Media Fears and overcoming them now!12 Social Media Fears and overcoming them now!
12 Social Media Fears and overcoming them now!
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
2017 Digital Yearbook
2017 Digital Yearbook2017 Digital Yearbook
2017 Digital Yearbook
 

Similar to Cyber Privacy and Password Protection Tips

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDaniel Martin
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxhimanshuratnama
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxInfosectrain3
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...cyberprosocial
 

Similar to Cyber Privacy and Password Protection Tips (20)

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

More from Bavijesh Thaliyil

More from Bavijesh Thaliyil (7)

APA Style manual
APA Style manualAPA Style manual
APA Style manual
 
Values
ValuesValues
Values
 
Teaching Physical science
Teaching Physical scienceTeaching Physical science
Teaching Physical science
 
Teaching methods
Teaching methodsTeaching methods
Teaching methods
 
Need for research in Educational Management
Need for research in Educational ManagementNeed for research in Educational Management
Need for research in Educational Management
 
Management By Objectives and Decision Making
Management By Objectives and Decision MakingManagement By Objectives and Decision Making
Management By Objectives and Decision Making
 
Need for Curriculum revision
Need for Curriculum revisionNeed for Curriculum revision
Need for Curriculum revision
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Cyber Privacy and Password Protection Tips

  • 1. Cyber Privacy and Password protection Cyber Privacy and Password protection Bavijesh Thaliyil M.Ed, Dept. of Education University of Kerala
  • 2. Cyber privacy is the privacy and security level of personal data published via the Internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences. CCyber-Privacy is mostly defined by the services used by individuals. Whatever agreements individuals agree to when they sign up for a service usually signs away their right to privacy. In other cases the reasonable expectation of privacy is not reasonable if the behaviors or communications in question were knowingly exposed to public view. “ ” Cyber Privacy – A PraludeCyber Privacy – A Pralude
  • 3. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy Cyber-Privacy is a huge concern for civilians and espeically for companies because of the potential for crime. Such crimes include: Malware such as the use of malicious code which can compromise a user's identity and/or informaton Denial of Service Attacks Block a user from accessing his or her information Computer Viruses Can compromise user information as well as identity All of these crimes fall under the category or fraud, identity theft, phishing scams and or information warfare.
  • 4. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy The Cyber-Privacy Project attempts to raise public awareness and promote the education of Cyber Privacy to prevent crimes from happening. Privacy protection and cyber security should be thought of as interconnected: as more and more personal information is processed or stored online, privacy protection increasingly relies on effective cyber security implementation by organizations to secure personal data both when it is in transit and at rest.17 In some cases, cyber security measures underpin critical infrastructure that protects data, thereby safeguarding personal information
  • 5. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy Credit-card fraud Data communications fraud Piggyback on someone else’s network Office network for personal purposes Computer-directed diversion of funds Unauthorized access to computer files Accessing confidential employee records Theft of trade secrets and product pricing Unlawful copying of copyrighted software Casual sharing of copyrighted software Assembly-line copying
  • 6. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy  Bomb  Program to trigger damage • Scheduled to run at a later date • May be found in software for general public, especially shareware  Data diddling • Changing data before or as it enters the system  Denial of service attack (DOS) • Hackers bombard a site with more request for service than it can possible handle • Prevents legitimate users from accessing the site • Appearance of requests coming from many different sites simultaneously
  • 7. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy Piggybacking Original user does not sign off properly Intruder gains accesses to files via the original user id Salami technique Embezzlement Scavenging Search garbage and recycling bins for personal information
  • 8. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy Trapdoor Illicit program left within a completed legitimate program Permits unauthorized and unknown entry to the program Trojan horse Illegal instructions placed inside a legitimate program Program does something useful and destructive at the same time Zapping Software to bypass security systems
  • 9. Crimes Security - ChallengesCrimes Security - Challenges Social MediasSocial Medias MobileMobile TechnologyTechnology Big DataBig Data
  • 10. Cyber Chellenges - ComplexityCyber Chellenges - Complexity Complexity of the connected environment Growing sophistication of the threat Threats are moving to the mobile sphere The “big data” paradox: is it a bigger risk or a solution? For many, breach preparedness is still not a priority Compliance vs risk-management
  • 11. Cyber Security – Policy DevelopmentCyber Security – Policy Development Stewardship vs securitization Cyberspace governance and security is a global issue
  • 12. ConclusionConclusion As individuals grow more dependent on and connected to the cyberspace, they will become more reliant on organizations’ effective implementation of cyber security and sensitivity to privacy. The following are some of the key areas in which an increased emphasis on privacy protection could help support, advance and augment cyber security activities Building privacy values into cyber security policy directions Legislative approaches that incentivize cyber security preparedness Facilitating broader dialogue on cyber security that acknowledges its importance for privacy, trust, and responsible data stewardship