SlideShare a Scribd company logo
CYBER
SAFETY
COMPUTER SCIENCE
- Priya Majmundar (XI A)
INDEX
• Cyber Safety
• Safely browsing the web
• Identity Protection
• Confidentiality
Cyber Safety refers to the safe
and responsible use of
Internet so as to ensure safety
and security of personal
information and not posing
threat to anyone else's
information. In short, Cyber
safety means being secure
online.
WHAT IS CYBER SAFETY?
Safe browsing on web needs you to know
many things like:
 What are the possible dangers?
 How to avoid these?
 How to virtually conduct yourself while browsing?
SAFELY BROWSING THE WEB
One of the most common dangers while browsing the web is Identity
theft. Identity theft is a type of fraud that involves using someone else's
identity to steal money or gain other benefits. Online identity theft refers
to an act of stealing someone’s personal information such as name, login
details etc. and then posing as that person online.
This can take place in multiple forms, such as:
Financial Identity theft
Criminal identity theft
Medical identity theft
IDENTITY PROTECTION WHILE USING
INTERNET
Anonymous browsing:
Anonymous browsers allow users to view websites without
revealing any personal information of the user like their IP
address, machine type, location etc. It can be used as a tool
governments, journalists and everyday security-conscious
surfers.
SOLUTION?
Private/Anonymous
Browsing.
There are many other ways to use internet without revealing your search
history & sharing your data. These are:
1) INCOGNITO MODE
Incognito browsing opens up a version of a
browser that will not track your activity. It is
particularly useful if you’re entering sensitive
data like bank details into your browser, as it can
minimise the risk of your information being
saved to the computer. You may also use
private browsers and search engines
like DuckDuckGo.
Private Browsing:
2) PROXY
Proxy works by acting as a
middleman b/w your computer
and the website you want to
access. Now the tracking website
will get the IP address &
information that belongs to the
proxy site, so you’re effectively
getting the same content from
another source without it getting
to know your browsing details.
Private Browsing:
3) VIRTUAL PRIVATE NETWORK
VPN is a method used to add security and privacy
to public & private networks, like WiFi hotspots &
the internet. VPNs are most often used by
corporations to protect sensitive data.
Nowadays, you can set up a VPN at home
to protect yourself from hackers trying to
access your sensitive information.
Private Browsing:
Confidentiality of information ensures that only
authorized users get access to sensitive and protected
data.
Best ways to ensure confidentiality are as follows:
CONFIDENTIALITY
• Use firewall wherever
possible
Firewall is a program that monitors all
communications & traps all illicit packets.
Most operating systems come with a
firewall preinstalled.
• Be careful while posting
on Internet
When you post anything to a public Internet
as social networking sites like Instagram or
Facebook, you generally give up the rights to
content and any expectation of privacy or
confidentiality is useless.
In most countries, anything you post to a public
space can be saved, archived, duplicated,
distributed, and published, even years later. So
ensure that you never post your crucial
information such as address, mobile number,
bank details, credit card details etc. on public
Internet sites.
(a) First of all, browse privately.
(b)Don’t save your login information.
(c) Never save passwords while working on a
public computer.
(d)Don’t leave the computer unattended with
sensitive information on the screen.
(e) Properly log out before you leave the
computer.
(f) Erase history and traces of your work, i.e.,
clear history and cookies.
• Avoid using public computers
Always try NOT to use the public computer especially if you’ve to deal
with crucial data. But if you absolutely need to, then make sure the
following things :
THANK YOU! :)

More Related Content

What's hot

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
primeteacher32
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
imtnoida112
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
JoyBhowmik4
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Sanket Gogoi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
rishith23
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
Rahmat Inggi
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
J A Bhavsar
 
CYBER CRIME PPT
CYBER CRIME PPTCYBER CRIME PPT
CYBER CRIME PPT
Gaurav Lakha
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rahul Reddy
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Cyber crime
Cyber crimeCyber crime

What's hot (20)

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
CYBER CRIME PPT
CYBER CRIME PPTCYBER CRIME PPT
CYBER CRIME PPT
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to CYBER SAFETY PPT

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Sri023
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
JoelGautham
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
Brian Pichman
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
Vong Borey
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
Vong Borey
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
Franklin Sondakh
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
VaishnaviKhandelwal6
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptx
havaneb872
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
nehal patel
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Cyber security
Cyber securityCyber security
Cyber security
Anju Sharma
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
 
Protect your Privacy
Protect your PrivacyProtect your Privacy
Protect your Privacy
Marcos Lopez-Carlson
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 

Similar to CYBER SAFETY PPT (20)

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Hamza
HamzaHamza
Hamza
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptx
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Protect your Privacy
Protect your PrivacyProtect your Privacy
Protect your Privacy
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Recently uploaded

Microsoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptxMicrosoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptx
jrodriguezq3110
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
Paul Brebner
 
Streamlining End-to-End Testing Automation
Streamlining End-to-End Testing AutomationStreamlining End-to-End Testing Automation
Streamlining End-to-End Testing Automation
Anand Bagmar
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
widenerjobeyrl638
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
vaishalijagtap12
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA ComplianceSecure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
ICS
 
How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
Zycus
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
campbellclarkson
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Paul Brebner
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
Alina Yurenko
 
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in NashikUpturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
Jhone kinadey
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Vince Scalabrino
 

Recently uploaded (20)

Microsoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptxMicrosoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptx
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
 
Streamlining End-to-End Testing Automation
Streamlining End-to-End Testing AutomationStreamlining End-to-End Testing Automation
Streamlining End-to-End Testing Automation
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA ComplianceSecure-by-Design Using Hardware and Software Protection for FDA Compliance
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
 
Upturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in NashikUpturn India Technologies - Web development company in Nashik
Upturn India Technologies - Web development company in Nashik
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
 
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery FleetStork Product Overview: An AI-Powered Autonomous Delivery Fleet
Stork Product Overview: An AI-Powered Autonomous Delivery Fleet
 

CYBER SAFETY PPT

  • 2. INDEX • Cyber Safety • Safely browsing the web • Identity Protection • Confidentiality
  • 3. Cyber Safety refers to the safe and responsible use of Internet so as to ensure safety and security of personal information and not posing threat to anyone else's information. In short, Cyber safety means being secure online. WHAT IS CYBER SAFETY?
  • 4. Safe browsing on web needs you to know many things like:  What are the possible dangers?  How to avoid these?  How to virtually conduct yourself while browsing? SAFELY BROWSING THE WEB
  • 5. One of the most common dangers while browsing the web is Identity theft. Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits. Online identity theft refers to an act of stealing someone’s personal information such as name, login details etc. and then posing as that person online. This can take place in multiple forms, such as: Financial Identity theft Criminal identity theft Medical identity theft IDENTITY PROTECTION WHILE USING INTERNET
  • 6. Anonymous browsing: Anonymous browsers allow users to view websites without revealing any personal information of the user like their IP address, machine type, location etc. It can be used as a tool governments, journalists and everyday security-conscious surfers. SOLUTION? Private/Anonymous Browsing.
  • 7. There are many other ways to use internet without revealing your search history & sharing your data. These are: 1) INCOGNITO MODE Incognito browsing opens up a version of a browser that will not track your activity. It is particularly useful if you’re entering sensitive data like bank details into your browser, as it can minimise the risk of your information being saved to the computer. You may also use private browsers and search engines like DuckDuckGo. Private Browsing:
  • 8. 2) PROXY Proxy works by acting as a middleman b/w your computer and the website you want to access. Now the tracking website will get the IP address & information that belongs to the proxy site, so you’re effectively getting the same content from another source without it getting to know your browsing details. Private Browsing:
  • 9. 3) VIRTUAL PRIVATE NETWORK VPN is a method used to add security and privacy to public & private networks, like WiFi hotspots & the internet. VPNs are most often used by corporations to protect sensitive data. Nowadays, you can set up a VPN at home to protect yourself from hackers trying to access your sensitive information. Private Browsing:
  • 10. Confidentiality of information ensures that only authorized users get access to sensitive and protected data. Best ways to ensure confidentiality are as follows: CONFIDENTIALITY • Use firewall wherever possible Firewall is a program that monitors all communications & traps all illicit packets. Most operating systems come with a firewall preinstalled.
  • 11. • Be careful while posting on Internet When you post anything to a public Internet as social networking sites like Instagram or Facebook, you generally give up the rights to content and any expectation of privacy or confidentiality is useless. In most countries, anything you post to a public space can be saved, archived, duplicated, distributed, and published, even years later. So ensure that you never post your crucial information such as address, mobile number, bank details, credit card details etc. on public Internet sites.
  • 12. (a) First of all, browse privately. (b)Don’t save your login information. (c) Never save passwords while working on a public computer. (d)Don’t leave the computer unattended with sensitive information on the screen. (e) Properly log out before you leave the computer. (f) Erase history and traces of your work, i.e., clear history and cookies. • Avoid using public computers Always try NOT to use the public computer especially if you’ve to deal with crucial data. But if you absolutely need to, then make sure the following things :