SlideShare a Scribd company logo
INTRODUCTION
beeventhoughtof without internet,even
ghinternethasmademanythingseasier
meit hasposedmanysecurityriskstoo,if
erway. Thus,it isimportant to know
eats, challengesandrisksof workingon
personalsafetyandinformationsecurity
dealswiththesame.It talksaboutpossible
ninternetandsafetymeasuresto avoid
WHATISCYBERSECURITY?
Cyber refers to the safe and
responsibility use of internet so as to
safety and security of personal
information . It involves gaining
knowledge about possible threats to
personal safety and security risks for
the information along with the
measures to personal safety and
security risks for the information
along with measures to prevent and
counter them
Safely browsing the web
These days working on web has become inevitable and thus it is
very important to know the threats it offers in many ways .safe
browsing on web needs you to know many things like :
What are the possible danger?
How to avoid the these ?
How to virtually conduct
yourself while browsing web ?
We surf the internet for a variety of reasons ,from using
social media ,building and other internet users (such as
while filling up some forms or making payments online
),we trust them to use them to use that information for
legitimate purposes .this isn’t always the case though
and financial and personal data can be used for harmful
reasons like hacking ,stalking and indentity fraud
.indentity fraud is when personal details that have been
accessed or stolen are used are used to commit
fraudulent acts posing as someone with stolen identity
http referrer : When you click a link ,your browser loads the web
loads the web page linked website on a website
(see figure below ) then the linked website will get
opened and internally information about you such
as your IP address ,location, your web browser
,machine type etc. will also be provided to the
linked website – it known as the HTTP referrer
(e.g., see the figure below )
anonymous browsing
Anonymous browsers allow users to view website
without reveling any personal like IP address
websites anonymously . It can be used as a tool for
governments ,journalists and everyday security-
conscious surfers
Private browsing
There are other ways to use the internet without revealing
your search history and a sharing your data. These are :
proxy works by acting as a middle by as a middle man between your computer and the website you want
The tracking website will get the IP address and information the belongs to proxy site ,so you are effec
Same content from another sources
Incognito browsing opens up a version of the browser that will not track your activity . It’s particularly u
Entering sensitive data like bank details into the browser ,it can be Useful if can minimize the risk of your
Saved to that computer
Virtual private network or a VPN is a method used to add security and privacy to private and public
And public network ,like wifi hotspots and the internet . VPNs were originally meant for business
Employees working offsite to gain access to shared drives or networks . Nowadays you can setup a
VPN at home to protect your shelf from hackers trying to access your sensitive information .
Cybercrimeisanycriminal offenceinvolves the
Useof,electronic communication orinformation
Systems,including anyelectronic device, computer,
Ortheinternet. Thetermcybercrime,
isageneraltermthatcovers crimes
Likephishing,creditcardfrauds,
Illegal downloading,industrialespionage
Childpornography,cyberbulling, cyber
Stalking, cyberterrorism,creationand/or
Distributionofviruses,
spamandsoon.
Cyberbullying occurswhensomeone
uses theinternet ,acell phone,email,
instant,messaging, chatrooms,or social
network ,suchas instagram , facebook
etc….to harass,demean,embarrass,or
intimidatesomeone else. Itiscommonly
acrimecommitted byteens too,astheir
growingaccesstoelectronic
communicationsmakesitpossible to
makefunoforostracizeother
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx
cyber security.pptx

More Related Content

Similar to cyber security.pptx

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
RheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
JakeTorio1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
EliseoBartolome1
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
TrixieAnneAlindao
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
EhraicaSaquing
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
ChadrickThompson1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
DineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
Liberty Aquino
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
IJNSA Journal
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos Beretas
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
devashishicai
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
OMNIRISC SECURITY SERVICES
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
Mirza Ćutuk
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter Cyber Security
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
aimane
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
IJNSA Journal
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
Best Online Paper Writing Service
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )
Monique Jones
 
E0334035040
E0334035040E0334035040
E0334035040
theijes
 

Similar to cyber security.pptx (20)

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )
 
E0334035040
E0334035040E0334035040
E0334035040
 

Recently uploaded

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 

cyber security.pptx

  • 1.
  • 2. INTRODUCTION beeventhoughtof without internet,even ghinternethasmademanythingseasier meit hasposedmanysecurityriskstoo,if erway. Thus,it isimportant to know eats, challengesandrisksof workingon personalsafetyandinformationsecurity dealswiththesame.It talksaboutpossible ninternetandsafetymeasuresto avoid
  • 3. WHATISCYBERSECURITY? Cyber refers to the safe and responsibility use of internet so as to safety and security of personal information . It involves gaining knowledge about possible threats to personal safety and security risks for the information along with the measures to personal safety and security risks for the information along with measures to prevent and counter them
  • 4.
  • 5. Safely browsing the web These days working on web has become inevitable and thus it is very important to know the threats it offers in many ways .safe browsing on web needs you to know many things like : What are the possible danger? How to avoid the these ? How to virtually conduct yourself while browsing web ?
  • 6. We surf the internet for a variety of reasons ,from using social media ,building and other internet users (such as while filling up some forms or making payments online ),we trust them to use them to use that information for legitimate purposes .this isn’t always the case though and financial and personal data can be used for harmful reasons like hacking ,stalking and indentity fraud .indentity fraud is when personal details that have been accessed or stolen are used are used to commit fraudulent acts posing as someone with stolen identity
  • 7. http referrer : When you click a link ,your browser loads the web loads the web page linked website on a website (see figure below ) then the linked website will get opened and internally information about you such as your IP address ,location, your web browser ,machine type etc. will also be provided to the linked website – it known as the HTTP referrer (e.g., see the figure below )
  • 8. anonymous browsing Anonymous browsers allow users to view website without reveling any personal like IP address websites anonymously . It can be used as a tool for governments ,journalists and everyday security- conscious surfers
  • 9. Private browsing There are other ways to use the internet without revealing your search history and a sharing your data. These are : proxy works by acting as a middle by as a middle man between your computer and the website you want The tracking website will get the IP address and information the belongs to proxy site ,so you are effec Same content from another sources Incognito browsing opens up a version of the browser that will not track your activity . It’s particularly u Entering sensitive data like bank details into the browser ,it can be Useful if can minimize the risk of your Saved to that computer Virtual private network or a VPN is a method used to add security and privacy to private and public And public network ,like wifi hotspots and the internet . VPNs were originally meant for business Employees working offsite to gain access to shared drives or networks . Nowadays you can setup a VPN at home to protect your shelf from hackers trying to access your sensitive information .
  • 10. Cybercrimeisanycriminal offenceinvolves the Useof,electronic communication orinformation Systems,including anyelectronic device, computer, Ortheinternet. Thetermcybercrime, isageneraltermthatcovers crimes Likephishing,creditcardfrauds, Illegal downloading,industrialespionage Childpornography,cyberbulling, cyber Stalking, cyberterrorism,creationand/or Distributionofviruses, spamandsoon.
  • 11. Cyberbullying occurswhensomeone uses theinternet ,acell phone,email, instant,messaging, chatrooms,or social network ,suchas instagram , facebook etc….to harass,demean,embarrass,or intimidatesomeone else. Itiscommonly acrimecommitted byteens too,astheir growingaccesstoelectronic communicationsmakesitpossible to makefunoforostracizeother