SlideShare a Scribd company logo
1 of 22
“OTP” Nahi Dunga.
One Time Password
Cybersecurity, Laws and
Awareness.
15th august 2020
What is Cybersecurity?
Cyber security refers to the body of
technologies, processes, and
practices designed to protect
networks, devices, programs, and
data from attack, damage, or
unauthorized access.
Who are cybercriminals ?
 Person who conducts following activities are called as Cybercriminals:
 Illegal Videos
 Credit card fraud
 Cyberstalking
 Defaming another online
 Gaining unauthorized access to computer systems
 Ignoring copyright
 Software licensing and trademark protection
 Overriding encryption to make illegal copies
 Software piracy
 Stealing another’s identity (Identity theft) to perform criminal acts
Classification of cybercrimes
 Cybercrime against individual:
 Electronic mail spoofing and other online frauds
 Phishing
 Spamming
 Cyberdefamation
 Cyberstalking and harassment
 Computer sabotage
 Illegal videos offenses
 Password sniffing
Social Networking Sites
 Popular social networking sites:
 Facebook
 Twitter
 Instagram
 WhatsApp
 Snapchat.
 Users create “profiles.”
 Communicate with friends.
 Find people with similar interests.
How to beware of Predators
 Pretends as other children or kindly adults
 Trick children into revealing personal information
 Lure children and teenagers into meeting them in
person
Keep Personal Information
“Private”
 Never reveal:
 Name
 Address
 Phone number
 School name
 Don’t post or send photographs of yourself.
 Choose a nondescript screen name.
Basic Internet Rules for Children
 Never give out identifying information.
 Never write or post anything you wouldn’t be comfortable with the
whole world seeing.
 Treat others online as you would treat them in person.
 Never share your password.
 Never open an email or click on a link from someone you don’t know.
 Never download or click on anything without checking with me or
another trusted adult first.
Video-Sharing Sites
 Popular video-sharing sites:
 YouTube
 Vimeo
 Never search for inappropriate content online.
Inappropriate Content
 There are “bad” parts of the Internet,
just as there are “bad” parts of town.
 Shield yourself:
 parental control software ( windows
family safety)
 child-friendly search engines (Kiddle,
Kidrex)
 bookmarks to favorite sites
Social engineering
 A technique to influence and persuasion to deceive people to obtain the
information or perform some action.
 Social engineers exploit the natural tendency of a person to trust Social
engineer’s word, rather than exploiting computer security holes.
Social engineering
 A technique to influence and persuasion to deceive people to obtain the
information or perform some action.
 Social engineers exploit the natural tendency of a person to trust Social
engineer’s word, rather than exploiting computer security holes.
Social engineering
Scenario!
How you can protect yourself being a
victim?
 Never to give out personal information, such as name, home address,
or telephone number, to anyone they don’t know through email, Twitter,
Facebook, or in online chat rooms or bulletin boards.
 Regularly updating security software can protect your family against scammers,
hackers, and other online threats that can compromise your computer system
 Create unique passwords
 Prevent cyberbullying
Types of attacks on we Indians Face?
 Ask for OTPs
 Sim Swapping
 ATM Swapping
 Internet banking spoofing.
 31% of Indians organization may be the victim of cyber attacks.
Keys Points to remember for life, This
Independence Day.
 Never share your passwords with anybody.
 Keep your passwords very very unique.
 Never visit illegal websites.
 Never allowed any strangers use your device.
 Never share OTPs #OTP NAHI DUNGA.
 Never share ATM card Details with anybody.
Hacking and Indian laws
 Cybercrimes are punishable under 2 categories:
 ITA 2000 (Information Technology Act 2000)
 IPC (Indian Penal Code)
 The Indian Penal Code (IPC) is the official criminal code of India. It is
comprehensive code intended to cover all substantive aspects of criminal law.
Credits
 Netflix
 Government Of India Presentation On Cybersecurity.
 Government of USA on Child Safety.
 Economic Times for Facts And figure.
 PTO today.
 SAKEC Professor – Gauri Deshpande.

More Related Content

What's hot

Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 

Similar to Cybersecurity for children

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Similar to Cybersecurity for children (20)

Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
cyber crime
cyber crimecyber crime
cyber crime
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
Users guide
Users guideUsers guide
Users guide
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 

Recently uploaded

Recently uploaded (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 

Cybersecurity for children

  • 1.
  • 4. What is Cybersecurity? Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
  • 5. Who are cybercriminals ?  Person who conducts following activities are called as Cybercriminals:  Illegal Videos  Credit card fraud  Cyberstalking  Defaming another online  Gaining unauthorized access to computer systems  Ignoring copyright  Software licensing and trademark protection  Overriding encryption to make illegal copies  Software piracy  Stealing another’s identity (Identity theft) to perform criminal acts
  • 6. Classification of cybercrimes  Cybercrime against individual:  Electronic mail spoofing and other online frauds  Phishing  Spamming  Cyberdefamation  Cyberstalking and harassment  Computer sabotage  Illegal videos offenses  Password sniffing
  • 7. Social Networking Sites  Popular social networking sites:  Facebook  Twitter  Instagram  WhatsApp  Snapchat.  Users create “profiles.”  Communicate with friends.  Find people with similar interests.
  • 8. How to beware of Predators  Pretends as other children or kindly adults  Trick children into revealing personal information  Lure children and teenagers into meeting them in person
  • 9. Keep Personal Information “Private”  Never reveal:  Name  Address  Phone number  School name  Don’t post or send photographs of yourself.  Choose a nondescript screen name.
  • 10. Basic Internet Rules for Children  Never give out identifying information.  Never write or post anything you wouldn’t be comfortable with the whole world seeing.  Treat others online as you would treat them in person.  Never share your password.  Never open an email or click on a link from someone you don’t know.  Never download or click on anything without checking with me or another trusted adult first.
  • 11. Video-Sharing Sites  Popular video-sharing sites:  YouTube  Vimeo  Never search for inappropriate content online.
  • 12. Inappropriate Content  There are “bad” parts of the Internet, just as there are “bad” parts of town.  Shield yourself:  parental control software ( windows family safety)  child-friendly search engines (Kiddle, Kidrex)  bookmarks to favorite sites
  • 13. Social engineering  A technique to influence and persuasion to deceive people to obtain the information or perform some action.  Social engineers exploit the natural tendency of a person to trust Social engineer’s word, rather than exploiting computer security holes.
  • 14. Social engineering  A technique to influence and persuasion to deceive people to obtain the information or perform some action.  Social engineers exploit the natural tendency of a person to trust Social engineer’s word, rather than exploiting computer security holes.
  • 17. How you can protect yourself being a victim?  Never to give out personal information, such as name, home address, or telephone number, to anyone they don’t know through email, Twitter, Facebook, or in online chat rooms or bulletin boards.  Regularly updating security software can protect your family against scammers, hackers, and other online threats that can compromise your computer system  Create unique passwords  Prevent cyberbullying
  • 18. Types of attacks on we Indians Face?  Ask for OTPs  Sim Swapping  ATM Swapping  Internet banking spoofing.  31% of Indians organization may be the victim of cyber attacks.
  • 19.
  • 20. Keys Points to remember for life, This Independence Day.  Never share your passwords with anybody.  Keep your passwords very very unique.  Never visit illegal websites.  Never allowed any strangers use your device.  Never share OTPs #OTP NAHI DUNGA.  Never share ATM card Details with anybody.
  • 21. Hacking and Indian laws  Cybercrimes are punishable under 2 categories:  ITA 2000 (Information Technology Act 2000)  IPC (Indian Penal Code)  The Indian Penal Code (IPC) is the official criminal code of India. It is comprehensive code intended to cover all substantive aspects of criminal law.
  • 22. Credits  Netflix  Government Of India Presentation On Cybersecurity.  Government of USA on Child Safety.  Economic Times for Facts And figure.  PTO today.  SAKEC Professor – Gauri Deshpande.