2. • Point to be cover :
What is Cyber safety?
Safety measures while using internet:
What are the elements of Cyber safety and how does it work?
Why is cybersecurity important?
Cyberbullying
Cyber Trolling
Spamming
Hacking
Payment Fraud
Social Engineering
3. • Cyber safety means being secure online.
to protect us against online crime
People should be able to safely use services.
We would prevent our systems from viruses , spyware, data
theft, hacking and crashing
4. Why Cyber Safety is important?
Cyber safety protect us from spammers and cyber
criminals. One single security branch can lead to
exposing the personal information of millions of
people. These breaches have a strong financial impact
on the companies and also loss of the trust of
customers. Hence, cyber security is very essential
5. Safety measures while using internet:
1.Create complex(strong) password for all your social media
accounts , and Email accounts.
2.Never share your personal information such as address phone
number or your location.
3.Keep your browser privacy on.
4. Make sure you take permission from elders before using
internet.
5. Do not respond to threating message or emails.
6. Use authorized website for searching.
6. Cyber threats
A cyberthreat refers to anything that has the potential to
cause serious harm to a computer system. A cyberthreat
is something that may or may not happen, but has the
potential to cause serious damage. Cyberthreats can
lead to attacks on computer systems, networks and
more.
7. Types of cyber threats
1. Carding: Carding is a term describing the trafficking
and unauthorized use of credit cards. The stolen credit
cards or credit card numbers are then used to buy
prepaid gift cards to cover up the tracks. Activities also
encompass exploitation of personal data, and money
laundering techniques.
8. Cloning
Cloning in cybersecurity refers to the process of
duplicating digital identities, systems, or data to perform
malicious activities such as identity theft, data breaches,
or unauthorized access.
9. Data Diddling:
Data diddling is a type of cybercrime in which data is
altered as it is entered into a computer system, most
often by a data entry clerk or a computer virus.
Computerized processing of the altered data results in a
fraudulent benefit.
10. Phreaking:
Phreaking is a form of hacking that targets the telephone
system. It is the practice of manipulating or hacking into the
telephone system to make free or unauthorized calls. Phreakers
use a variety of techniques to exploit the telephone system,
such as blue boxing, red boxing, call forwarding and caller ID
spoofing.
1
11. Cracking :
The term “cracking” means trying to get into computer
systems in order to steal, corrupt, or illegitimately view data.
The popular press refers to such activities as hacking, but
hackers see themselves as expert, elite programmers and
maintain that such illegitimate activity should be called
“cracking.”
12. Hacking
Hacking in cyber security refers to the misuse of devices like
computers, smartphones, tablets, and networks to cause
damage to or corrupt systems, gather information on users,
steal data and documents, or disrupt data-related activity.
13. Cyber Security:
Cyber security is the application of technologies, processes,
and controls to protect systems, networks, programs, devices
and data from cyber attacks. It aims to reduce the risk of cyber
attacks and protect against the unauthorized exploitation of
systems, networks, and technologies.
14. Netiquette
Netiquette, or Internet etiquette, is an ideal pattern of behavior
for Internet users, guidelines about what is acceptable in an
online medium for personal and professional use. The rules of
netiquette apply to web users of any age—just like manners.
15. Some Netiquettes:
Don’t post offensive comments online
Never use personal information, photos or videos of any other
person without their permission.
Make sure the subject of the mail should be in relation to the mail.
Don’t send emails again and again just for publicity.
Make sure the signature simple and small.
16. Email spoofing :
Email spoofing is a technique used in spam and phishing
attacks to trick users into thinking a message came from
a person or entity they know or trust. In spoofing
attacks, the sender forges email headers so that client
software displays the fraudulent sender address, which
most users take at face value.
17. Hacking:
Hacking in cyber security refers to the misuse of
devices like computers, smartphones, tablets, and
networks to cause damage to or corrupt systems,
gather information on users, steal data and
documents, or disrupt data-related activity.
18. Spamming:
Spamming can be defined as the unsolicited &
unwanted content sent electronically to a large
number of people. This content can be malicious,
irrelevant, or inappropriate & is often used as a
tool for cybercriminals to gain access to personal
information, identities & commit cyber crimes.
19. Cyberbullying
Cyberbullying is the use of technology to harass,
threaten, embarrass, or target another person. Online
threats and mean, aggressive, or rude texts, tweets,
posts, or messages all count. So does posting
personal information, pictures, or videos designed to
hurt or embarrass someone else.
20. Cyber Trolling:
Trolling, a category of cyberbullying, is the act of
posting damaging or harassing comments on social
media to purposefully insult or humiliate the
recipient.
21. Social Engineering :
Social engineering refers to all techniques aimed at
talking a target into revealing specific information or
performing a specific action for illegitimate reasons.
22. Payment Fraud:
Payment fraud is any type of false or illegal
transaction completed by a cybercriminal. The
perpetrator deprives the victim of funds, personal
property, interest or sensitive information via the
Internet. Payment fraud is characterized in three
ways: Fraudulent or unauthorized transactions.
23. Intellectual Property fraud:
Intellectual property fraud is when someone
steals something that is protected by copyright,
trademark, patent, or trade secret laws. The
term "intellectual property fraud" covers a
wide range of behaviors.