SlideShare a Scribd company logo
CYBER SECURITY ON SOCIAL MEDIA
G.CHARITHA
1210315518 1
2
1) WHAT IS CYBER SECURITY?
2) CYBER CRIME
i) TYPES OF CYBER CRIME
ii) HACKERS
3) CYBER ATTACKS
3) WHY CYBER SECURITY?
4) SAFETY MEASURES
5) CRYPTOGRAPHY
3
1) WHAT IS CYBER SECURITY?
Cybersecurity is the body of technologies, processes and
practices designed to protect networks, computers,
programs and data from attack, damage or unauthorized
access.
4
2) CYBER CRIME
It is simply a crime that encompasses any criminal act
dealing with computers and networks .
This may include committing crimes like identity theft ,
various email scams , violating privacy etc.
5
i) TYPES OF CYBER CRIMES
Cyber crimes are broadly classified into three categories,
namely crimes against:
❏ Individual
❏ Property
❏ Government
6
Cyber Crime may take many forms. The most
common ones are :
❏ Hacking
❏ Theft
❏ Cyber Stalking
❏ Malicious software
❏ Child soliciting and Abuse
❏ Denial of service attack
7
ii) HACKERS
A hacker is an individual who uses computer, network or
other technical skills to overcome a technical problem.
➔ But often refers to a person who uses his/her
abilities to gain unauthorised access to systems or
networks in order to commit crimes, steal information
to hurt people etc.
➔ This process is called as “Hacking”.
T
8
3) CYBER ATTACKS
It is an attempt by hackers to damage or destroy a
computer network or system.
➔ According to the Global State of Information Security
survey 2015, there are approximately 81 attacks per
minute.
➔ Types of cyber attacks:
❏ Cyber fraud
❏ Cyber spying
❏ Cyber stalking and bullying
❏ Cyber assault
❏ Cyber warfare
9
❏ Cyber fraud
➔ Cyber attacks that are generally aimed at gaining
monetary or related gains for the hacker.
➔ Includes phishing attacks combined with fake websites to
steal users personal details and also their money.
❏ Cyber spying
➔ The main motive of this attack is to gain the info for the
hacker and thus sell the info gained and make money.
10
❏ Cyber stalking and bullying
➔ Designed to frighten and intimidate individuals .
➔ Usually social media based - Ask.fm,Facebook,Twitter.
11
❏ Cyber assault
➔ Aimed at causing damage to info or equipment that is
being attacked.
➔ Damage may be physical or reputational or corruption or
deletion of important info.
❏ Cyber warfare
➔ An extreme form of cyber-assault where at least one of
the parties involved is a nation state.
➔ These are much harder to validate.
12
➔ Everyday we come across many cyber attacks especially
using the social media. The frequently used sites
include:
❏ Facebook
❏ Twitter
❏ Gmail
❏ Netflix
13
3) WHY CYBER SECURITY?
Cyber Security is much needed thing nowadays because
of:
★ Increase in Cyber crimes
★ Increase in Cyber attacks
★ Data being unsecured
14
4) SAFETY MEASURES
The common safety tips for safe browsing on any social
networking sites are:
★ Use unique password for each social network.
★ Don’t be too personal.
★ Customize privacy options.
★ Block spammers.
★ Sensitive browsing should always be done on a network
that you trust.
★ Don’t trust, just verify!
★ Watch what you are sharing on social networks.
★ Report and control abusive comments.
15
❏ Safety tips for frequently used social site - “FACEBOOK”
i) Set the privacy settings on your profile to “Friends”:
16
ii)Always monitor pictures that other people put of you and
tag you on.
17
iii) Be cautious of the statues, photos and
videos etc.
18
iv) Avoid putting your basic info and contact
details.
19
v) Avoid posting info about an upcoming vacation or trip
as status
20
vi)Change your password often.
21
vii) Be careful on who you friend!!!
viii) Before clicking on a link from facebook, always
remember to check the address bar, displaying
“www.facebook.com/” and not “www.facebook1.php” etc.
22
23
History
The first evidence of use of cryptography(in some form)
was found in an inscription carved around 1900 BC, in the
main chamber of the tomb of the nobleman Khnumhotep
II, in Egypt.
★ Around 100 BC Julius Caesar was known to use a form
of encryption to convey secret messages to his army
generals posted in the war front.
24
CRYPTOGRAPHY
Cryptography is the science and art of transforming the
messages to make them secure and immune to attack.
➔ Provides Confidentiality,Integrity and Accuracy.
25
26
Ancient Cipher
Main Terms
❏ Plain text
❏ Ciphertext
❏ Keys
❏ Cipher
❏ Encryption & Decryption
27
28
Categories of Cryptography
❏ Symmetric Key Cryptography
❏ Asymmetric Key Cryptography
29
Symmetric key Cryptography
Also known as secret key.Sender & Receiver uses same
key and an encryption/decryption algorithm to
encrypt/decrypt the data.
30
31
Traditional Ciphers for Symmetric Cryptography
❏ Substitution Cipher
❏ Transposition Cipher
32
Substitution Cipher
A technique in which the letters/numbers/symbols of plain
text are changed into other letters/numbers/symbols.
33
Transposition Cipher
Here, the positions of the letters/number/symbols in the
plain text are changed with one another.
34
Asymmetric key Cryptography
Also known as public key cryptography.
➔ Sender and Receiver uses different keys for encryption
and decryption namely PUBLIC and PRIVATE.
35
36
37

More Related Content

What's hot

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Social engineering
Social engineeringSocial engineering
Social engineering
Vishal Kumar
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Phishing
PhishingPhishing
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
Dababrata Mondal
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
Tannistho Ghosh
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 

What's hot (20)

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 

Similar to CYBER SECURITY ON SOCIAL MEDIA

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
NavanathDarwante1
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
Chiranjit Adhikary
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT CollegesPotato
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
C3 Cyber
C3 CyberC3 Cyber
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
Avinash Katariya
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
raja jawahar
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
NitishChoudhary23
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
nanjeebarifa
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
rishirvk1995
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
sagarpanthee
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
Bini R A
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
MayurSapkale7
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
chrixymae
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
AnkitShaw27
 

Similar to CYBER SECURITY ON SOCIAL MEDIA (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
 

Recently uploaded

HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
SocioCosmos
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
AJHSSR Journal
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
SocioCosmos
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
AJHSSR Journal
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
zeqirielmedina8
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
ClarissaAlanoCredito
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 

Recently uploaded (19)

HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 

CYBER SECURITY ON SOCIAL MEDIA

  • 1. CYBER SECURITY ON SOCIAL MEDIA G.CHARITHA 1210315518 1
  • 2. 2 1) WHAT IS CYBER SECURITY? 2) CYBER CRIME i) TYPES OF CYBER CRIME ii) HACKERS 3) CYBER ATTACKS 3) WHY CYBER SECURITY? 4) SAFETY MEASURES 5) CRYPTOGRAPHY
  • 3. 3 1) WHAT IS CYBER SECURITY? Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
  • 4. 4 2) CYBER CRIME It is simply a crime that encompasses any criminal act dealing with computers and networks . This may include committing crimes like identity theft , various email scams , violating privacy etc.
  • 5. 5 i) TYPES OF CYBER CRIMES Cyber crimes are broadly classified into three categories, namely crimes against: ❏ Individual ❏ Property ❏ Government
  • 6. 6 Cyber Crime may take many forms. The most common ones are : ❏ Hacking ❏ Theft ❏ Cyber Stalking ❏ Malicious software ❏ Child soliciting and Abuse ❏ Denial of service attack
  • 7. 7 ii) HACKERS A hacker is an individual who uses computer, network or other technical skills to overcome a technical problem. ➔ But often refers to a person who uses his/her abilities to gain unauthorised access to systems or networks in order to commit crimes, steal information to hurt people etc. ➔ This process is called as “Hacking”. T
  • 8. 8 3) CYBER ATTACKS It is an attempt by hackers to damage or destroy a computer network or system. ➔ According to the Global State of Information Security survey 2015, there are approximately 81 attacks per minute. ➔ Types of cyber attacks: ❏ Cyber fraud ❏ Cyber spying ❏ Cyber stalking and bullying ❏ Cyber assault ❏ Cyber warfare
  • 9. 9 ❏ Cyber fraud ➔ Cyber attacks that are generally aimed at gaining monetary or related gains for the hacker. ➔ Includes phishing attacks combined with fake websites to steal users personal details and also their money. ❏ Cyber spying ➔ The main motive of this attack is to gain the info for the hacker and thus sell the info gained and make money.
  • 10. 10 ❏ Cyber stalking and bullying ➔ Designed to frighten and intimidate individuals . ➔ Usually social media based - Ask.fm,Facebook,Twitter.
  • 11. 11 ❏ Cyber assault ➔ Aimed at causing damage to info or equipment that is being attacked. ➔ Damage may be physical or reputational or corruption or deletion of important info. ❏ Cyber warfare ➔ An extreme form of cyber-assault where at least one of the parties involved is a nation state. ➔ These are much harder to validate.
  • 12. 12 ➔ Everyday we come across many cyber attacks especially using the social media. The frequently used sites include: ❏ Facebook ❏ Twitter ❏ Gmail ❏ Netflix
  • 13. 13 3) WHY CYBER SECURITY? Cyber Security is much needed thing nowadays because of: ★ Increase in Cyber crimes ★ Increase in Cyber attacks ★ Data being unsecured
  • 14. 14 4) SAFETY MEASURES The common safety tips for safe browsing on any social networking sites are: ★ Use unique password for each social network. ★ Don’t be too personal. ★ Customize privacy options. ★ Block spammers. ★ Sensitive browsing should always be done on a network that you trust. ★ Don’t trust, just verify! ★ Watch what you are sharing on social networks. ★ Report and control abusive comments.
  • 15. 15 ❏ Safety tips for frequently used social site - “FACEBOOK” i) Set the privacy settings on your profile to “Friends”:
  • 16. 16 ii)Always monitor pictures that other people put of you and tag you on.
  • 17. 17 iii) Be cautious of the statues, photos and videos etc.
  • 18. 18 iv) Avoid putting your basic info and contact details.
  • 19. 19 v) Avoid posting info about an upcoming vacation or trip as status
  • 21. 21 vii) Be careful on who you friend!!! viii) Before clicking on a link from facebook, always remember to check the address bar, displaying “www.facebook.com/” and not “www.facebook1.php” etc.
  • 22. 22
  • 23. 23
  • 24. History The first evidence of use of cryptography(in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt. ★ Around 100 BC Julius Caesar was known to use a form of encryption to convey secret messages to his army generals posted in the war front. 24
  • 25. CRYPTOGRAPHY Cryptography is the science and art of transforming the messages to make them secure and immune to attack. ➔ Provides Confidentiality,Integrity and Accuracy. 25
  • 27. Main Terms ❏ Plain text ❏ Ciphertext ❏ Keys ❏ Cipher ❏ Encryption & Decryption 27
  • 28. 28
  • 29. Categories of Cryptography ❏ Symmetric Key Cryptography ❏ Asymmetric Key Cryptography 29
  • 30. Symmetric key Cryptography Also known as secret key.Sender & Receiver uses same key and an encryption/decryption algorithm to encrypt/decrypt the data. 30
  • 31. 31
  • 32. Traditional Ciphers for Symmetric Cryptography ❏ Substitution Cipher ❏ Transposition Cipher 32
  • 33. Substitution Cipher A technique in which the letters/numbers/symbols of plain text are changed into other letters/numbers/symbols. 33
  • 34. Transposition Cipher Here, the positions of the letters/number/symbols in the plain text are changed with one another. 34
  • 35. Asymmetric key Cryptography Also known as public key cryptography. ➔ Sender and Receiver uses different keys for encryption and decryption namely PUBLIC and PRIVATE. 35
  • 36. 36
  • 37. 37