SlideShare a Scribd company logo
1 of 24
Cyber safety
• Point to be cover :
What is Cyber safety?
Safety measures while using internet:
What are the elements of Cyber safety and how does it work?
Why is cybersecurity important?
Cyberbullying
Cyber Trolling
Spamming
Hacking
Payment Fraud
Social Engineering
• Cyber safety means being secure online.
to protect us against online crime
People should be able to safely use services.
We would prevent our systems from viruses , spyware, data
theft, hacking and crashing
Why Cyber Safety is important?
Cyber safety protect us from spammers and cyber
criminals. One single security branch can lead to
exposing the personal information of millions of
people. These breaches have a strong financial impact
on the companies and also loss of the trust of
customers. Hence, cyber security is very essential
Safety measures while using internet:
1.Create complex(strong) password for all your social media
accounts , and Email accounts.
2.Never share your personal information such as address phone
number or your location.
3.Keep your browser privacy on.
4. Make sure you take permission from elders before using
internet.
5. Do not respond to threating message or emails.
6. Use authorized website for searching.
Cyber threats
A cyberthreat refers to anything that has the potential to
cause serious harm to a computer system. A cyberthreat
is something that may or may not happen, but has the
potential to cause serious damage. Cyberthreats can
lead to attacks on computer systems, networks and
more.
Types of cyber threats
1. Carding: Carding is a term describing the trafficking
and unauthorized use of credit cards. The stolen credit
cards or credit card numbers are then used to buy
prepaid gift cards to cover up the tracks. Activities also
encompass exploitation of personal data, and money
laundering techniques.
Cloning
Cloning in cybersecurity refers to the process of
duplicating digital identities, systems, or data to perform
malicious activities such as identity theft, data breaches,
or unauthorized access.
Data Diddling:
Data diddling is a type of cybercrime in which data is
altered as it is entered into a computer system, most
often by a data entry clerk or a computer virus.
Computerized processing of the altered data results in a
fraudulent benefit.
Phreaking:
Phreaking is a form of hacking that targets the telephone
system. It is the practice of manipulating or hacking into the
telephone system to make free or unauthorized calls. Phreakers
use a variety of techniques to exploit the telephone system,
such as blue boxing, red boxing, call forwarding and caller ID
spoofing.
1
Cracking :
The term “cracking” means trying to get into computer
systems in order to steal, corrupt, or illegitimately view data.
The popular press refers to such activities as hacking, but
hackers see themselves as expert, elite programmers and
maintain that such illegitimate activity should be called
“cracking.”
Hacking
Hacking in cyber security refers to the misuse of devices like
computers, smartphones, tablets, and networks to cause
damage to or corrupt systems, gather information on users,
steal data and documents, or disrupt data-related activity.
Cyber Security:
Cyber security is the application of technologies, processes,
and controls to protect systems, networks, programs, devices
and data from cyber attacks. It aims to reduce the risk of cyber
attacks and protect against the unauthorized exploitation of
systems, networks, and technologies.
Netiquette
Netiquette, or Internet etiquette, is an ideal pattern of behavior
for Internet users, guidelines about what is acceptable in an
online medium for personal and professional use. The rules of
netiquette apply to web users of any age—just like manners.
Some Netiquettes:
Don’t post offensive comments online
Never use personal information, photos or videos of any other
person without their permission.
Make sure the subject of the mail should be in relation to the mail.
Don’t send emails again and again just for publicity.
Make sure the signature simple and small.
Email spoofing :
Email spoofing is a technique used in spam and phishing
attacks to trick users into thinking a message came from
a person or entity they know or trust. In spoofing
attacks, the sender forges email headers so that client
software displays the fraudulent sender address, which
most users take at face value.
Hacking:
Hacking in cyber security refers to the misuse of
devices like computers, smartphones, tablets, and
networks to cause damage to or corrupt systems,
gather information on users, steal data and
documents, or disrupt data-related activity.
Spamming:
Spamming can be defined as the unsolicited &
unwanted content sent electronically to a large
number of people. This content can be malicious,
irrelevant, or inappropriate & is often used as a
tool for cybercriminals to gain access to personal
information, identities & commit cyber crimes.
Cyberbullying
Cyberbullying is the use of technology to harass,
threaten, embarrass, or target another person. Online
threats and mean, aggressive, or rude texts, tweets,
posts, or messages all count. So does posting
personal information, pictures, or videos designed to
hurt or embarrass someone else.
Cyber Trolling:
Trolling, a category of cyberbullying, is the act of
posting damaging or harassing comments on social
media to purposefully insult or humiliate the
recipient.
Social Engineering :
Social engineering refers to all techniques aimed at
talking a target into revealing specific information or
performing a specific action for illegitimate reasons.
Payment Fraud:
Payment fraud is any type of false or illegal
transaction completed by a cybercriminal. The
perpetrator deprives the victim of funds, personal
property, interest or sensitive information via the
Internet. Payment fraud is characterized in three
ways: Fraudulent or unauthorized transactions.
Intellectual Property fraud:
Intellectual property fraud is when someone
steals something that is protected by copyright,
trademark, patent, or trade secret laws. The
term "intellectual property fraud" covers a
wide range of behaviors.
Cyber Safety  and cyber security. Safety measures towards computer networks and data protection

More Related Content

Similar to Cyber Safety and cyber security. Safety measures towards computer networks and data protection

cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxjonadhe mondeja
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Jevaughan Edie
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 

Similar to Cyber Safety and cyber security. Safety measures towards computer networks and data protection (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 

More from Ankita Shirke

All about Sikkim.pptx
All about Sikkim.pptxAll about Sikkim.pptx
All about Sikkim.pptxAnkita Shirke
 
Entrepreneurial Skills.pptx
Entrepreneurial Skills.pptxEntrepreneurial Skills.pptx
Entrepreneurial Skills.pptxAnkita Shirke
 
Communication and Self Management skills.pptx
Communication and Self Management skills.pptxCommunication and Self Management skills.pptx
Communication and Self Management skills.pptxAnkita Shirke
 
How to back up data.pptx
How to back up data.pptxHow to back up data.pptx
How to back up data.pptxAnkita Shirke
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptxAnkita Shirke
 
Fundamentals of Computers.ppt
Fundamentals of Computers.pptFundamentals of Computers.ppt
Fundamentals of Computers.pptAnkita Shirke
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptxAnkita Shirke
 
Computer periphirals
Computer periphiralsComputer periphirals
Computer periphiralsAnkita Shirke
 
E commerce, blogging and podcasting
E commerce, blogging and podcastingE commerce, blogging and podcasting
E commerce, blogging and podcastingAnkita Shirke
 
Scratch programming introduction to game creation
Scratch programming  introduction to game creationScratch programming  introduction to game creation
Scratch programming introduction to game creationAnkita Shirke
 
File management and data organisation
File management and data organisationFile management and data organisation
File management and data organisationAnkita Shirke
 
Grade vi sub word processor tabular presentation unit 3
Grade vi  sub word processor   tabular presentation unit 3Grade vi  sub word processor   tabular presentation unit 3
Grade vi sub word processor tabular presentation unit 3Ankita Shirke
 

More from Ankita Shirke (20)

Python.pptx
Python.pptxPython.pptx
Python.pptx
 
All about Sikkim.pptx
All about Sikkim.pptxAll about Sikkim.pptx
All about Sikkim.pptx
 
ICT Skills.pptx
ICT Skills.pptxICT Skills.pptx
ICT Skills.pptx
 
Green skills.pptx
Green skills.pptxGreen skills.pptx
Green skills.pptx
 
Entrepreneurial Skills.pptx
Entrepreneurial Skills.pptxEntrepreneurial Skills.pptx
Entrepreneurial Skills.pptx
 
Communication and Self Management skills.pptx
Communication and Self Management skills.pptxCommunication and Self Management skills.pptx
Communication and Self Management skills.pptx
 
How to back up data.pptx
How to back up data.pptxHow to back up data.pptx
How to back up data.pptx
 
Artificial Intelligence.pptx
Artificial Intelligence.pptxArtificial Intelligence.pptx
Artificial Intelligence.pptx
 
Fundamentals of Computers.ppt
Fundamentals of Computers.pptFundamentals of Computers.ppt
Fundamentals of Computers.ppt
 
Mail Merge.pptx
Mail Merge.pptxMail Merge.pptx
Mail Merge.pptx
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
Computer worksheet
Computer worksheetComputer worksheet
Computer worksheet
 
Mailmerge
Mailmerge Mailmerge
Mailmerge
 
Computer periphirals
Computer periphiralsComputer periphirals
Computer periphirals
 
More on Windows 10
More on Windows 10More on Windows 10
More on Windows 10
 
Computer virus
Computer virusComputer virus
Computer virus
 
E commerce, blogging and podcasting
E commerce, blogging and podcastingE commerce, blogging and podcasting
E commerce, blogging and podcasting
 
Scratch programming introduction to game creation
Scratch programming  introduction to game creationScratch programming  introduction to game creation
Scratch programming introduction to game creation
 
File management and data organisation
File management and data organisationFile management and data organisation
File management and data organisation
 
Grade vi sub word processor tabular presentation unit 3
Grade vi  sub word processor   tabular presentation unit 3Grade vi  sub word processor   tabular presentation unit 3
Grade vi sub word processor tabular presentation unit 3
 

Recently uploaded

Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 

Recently uploaded (20)

Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 

Cyber Safety and cyber security. Safety measures towards computer networks and data protection

  • 2. • Point to be cover : What is Cyber safety? Safety measures while using internet: What are the elements of Cyber safety and how does it work? Why is cybersecurity important? Cyberbullying Cyber Trolling Spamming Hacking Payment Fraud Social Engineering
  • 3. • Cyber safety means being secure online. to protect us against online crime People should be able to safely use services. We would prevent our systems from viruses , spyware, data theft, hacking and crashing
  • 4. Why Cyber Safety is important? Cyber safety protect us from spammers and cyber criminals. One single security branch can lead to exposing the personal information of millions of people. These breaches have a strong financial impact on the companies and also loss of the trust of customers. Hence, cyber security is very essential
  • 5. Safety measures while using internet: 1.Create complex(strong) password for all your social media accounts , and Email accounts. 2.Never share your personal information such as address phone number or your location. 3.Keep your browser privacy on. 4. Make sure you take permission from elders before using internet. 5. Do not respond to threating message or emails. 6. Use authorized website for searching.
  • 6. Cyber threats A cyberthreat refers to anything that has the potential to cause serious harm to a computer system. A cyberthreat is something that may or may not happen, but has the potential to cause serious damage. Cyberthreats can lead to attacks on computer systems, networks and more.
  • 7. Types of cyber threats 1. Carding: Carding is a term describing the trafficking and unauthorized use of credit cards. The stolen credit cards or credit card numbers are then used to buy prepaid gift cards to cover up the tracks. Activities also encompass exploitation of personal data, and money laundering techniques.
  • 8. Cloning Cloning in cybersecurity refers to the process of duplicating digital identities, systems, or data to perform malicious activities such as identity theft, data breaches, or unauthorized access.
  • 9. Data Diddling: Data diddling is a type of cybercrime in which data is altered as it is entered into a computer system, most often by a data entry clerk or a computer virus. Computerized processing of the altered data results in a fraudulent benefit.
  • 10. Phreaking: Phreaking is a form of hacking that targets the telephone system. It is the practice of manipulating or hacking into the telephone system to make free or unauthorized calls. Phreakers use a variety of techniques to exploit the telephone system, such as blue boxing, red boxing, call forwarding and caller ID spoofing. 1
  • 11. Cracking : The term “cracking” means trying to get into computer systems in order to steal, corrupt, or illegitimately view data. The popular press refers to such activities as hacking, but hackers see themselves as expert, elite programmers and maintain that such illegitimate activity should be called “cracking.”
  • 12. Hacking Hacking in cyber security refers to the misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems, gather information on users, steal data and documents, or disrupt data-related activity.
  • 13. Cyber Security: Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks, and technologies.
  • 14. Netiquette Netiquette, or Internet etiquette, is an ideal pattern of behavior for Internet users, guidelines about what is acceptable in an online medium for personal and professional use. The rules of netiquette apply to web users of any age—just like manners.
  • 15. Some Netiquettes: Don’t post offensive comments online Never use personal information, photos or videos of any other person without their permission. Make sure the subject of the mail should be in relation to the mail. Don’t send emails again and again just for publicity. Make sure the signature simple and small.
  • 16. Email spoofing : Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they know or trust. In spoofing attacks, the sender forges email headers so that client software displays the fraudulent sender address, which most users take at face value.
  • 17. Hacking: Hacking in cyber security refers to the misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems, gather information on users, steal data and documents, or disrupt data-related activity.
  • 18. Spamming: Spamming can be defined as the unsolicited & unwanted content sent electronically to a large number of people. This content can be malicious, irrelevant, or inappropriate & is often used as a tool for cybercriminals to gain access to personal information, identities & commit cyber crimes.
  • 19. Cyberbullying Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.
  • 20. Cyber Trolling: Trolling, a category of cyberbullying, is the act of posting damaging or harassing comments on social media to purposefully insult or humiliate the recipient.
  • 21. Social Engineering : Social engineering refers to all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons.
  • 22. Payment Fraud: Payment fraud is any type of false or illegal transaction completed by a cybercriminal. The perpetrator deprives the victim of funds, personal property, interest or sensitive information via the Internet. Payment fraud is characterized in three ways: Fraudulent or unauthorized transactions.
  • 23. Intellectual Property fraud: Intellectual property fraud is when someone steals something that is protected by copyright, trademark, patent, or trade secret laws. The term "intellectual property fraud" covers a wide range of behaviors.