SlideShare a Scribd company logo
INTERNET
SECURITY
YOUR
TEACHER
SRIJAN
MUKHOPADHYA
Y
- Hey there!
I am extremely happy to be here with you guys
today.
- I look forward to an amazing session with all of
you!
- Let’s have a great time!
TOPICS
OF
DISCUSSION
WHAT IS
CYBERSECURITY?
FACTS ABOUT
CYBERSECURITY
CYBER
SAFETY AND
LIFE ON THE
INTERNET
IT’S FUN
TIME!
WHAT IS
CYBERCRIME?
A LITTLE
HISTORY ON
THE CYBER
WORLD
WHAT IS
CYBERSECURITY?
WHAT IS
CYBERCRIME?
Cybersecurity is when
someone protects
networks, electronic
devices and data from
falling into wrong hands.
WHAT IS CYBERSECURITY?
It is also the practice of
ensuring safety, integrity,
and security of one’s
information over the
cyberspace.
WHAT IS CYBERSPACE?
Cyberspace is anything that has
to do with the Internet.
For example: We use the Internet to
communicate and stay connected to
our friends and family. We play
video games, download music, and
watch TV shows and movies after
homework is done. Grownups use it
do things like banking, shopping,
and other important everyday
activities online as well.
WHAT IS
CYBERCRIME?
Cybercrime is criminal
activities carried out by
means of computers or
the internet.
The former descriptions were
"computer crime" or "crime by
computer".
The Internet brought other new
terms, like "digital", "electronic",
"virtual" , "IT", "high-tech" and
“technology-enabled" crime.
SOME
COMMON
ONLINE
ISSUES
WE
FACE
TODAY
Cyber
Predators
They are people who
search online for
others in order to
use, control, or harm
them in some way.
Identity Theft
It happens to be an
illegal and wrong
method, in which
criminals collect
and use other
people’s private
data; commonly for
financial gains.
Cyber
Bullying
It is the electronic
posting of mean-
spirited messages
about a person, often
done anonymously.
Are the actions of
this little girl safe?
Should she have
done something
different?
Do you guys want
to know how to
be safe?
MEET ALIA
She is a school going girl just
like the rest of you and loves to
play games and watching
cartoons on the internet.
She will help you understand
the concept of Internet.
The Internet is like a busy road with lots of traffic in all directions.
This ‘traffic’ is called Data.
The games, videos, cartoons, movies, emails etc. that you all love to see just like Alia,travels
over the Internet like data.
While the Internet does seems spectacular on the outside, it has many unseen insides.
One must use it very carefully to stay safe!
Everyday Alia goes to school and enjoys the computer classes, just like all other kids. She
has learned that the computer had something very magical inside it called the Internet. It is
the same thing she sees on mobile phones and tablets.
The Internet lets you do a lot of things. It even lets you make friends online. It can get
infected with viruses which can harm your computer or electronic device. So one has to be
very, very careful.
Alia will now teach you how to stay safe, and use the Internet to enjoy it.
Before you use the Internet, always ask an adult if the computer has a
firewall and antivirus.
Together, they both protect your computer from many kinds of viruses
that attack our computer and steal our data.
We all like to chat with our friends and keep up with them, don’t we? We
can do so easily via email. If we are using a public network or a computer,
we must always log out once we are done.
If it is also very important to know that we must never click on a lik or an
ad in our email or on the Internet. Always ask an adult before doing so.
To help with your regular studies that Internet and is an amazing resource.
Before you sign up for a website, ask your parents for help and
supervision. In matters such as these, they know best.
You may find free Wifi in public spaces like shops, railway stations,
shopping malls, metros etc. to surf the Internet and use it. Avoid using it
as they can be harmful. Never connect to them, as they are not safe!
CONGRATULATIONS! YOU ARE NOW CYBER / INTERNET SAFE!
A LITTLE HISTORY ON
THE CYBER WORLD
FACTS ABOUT
INTERNET SECURITY
The first spam email took
place in 1978 when it was
sent over the Arpanet.
The first recorded
cyber crime was
recorded in the year
1820.
The first virus was
installed on an Apple
Computer in 1982.
YOUR DOSE OF HISTORY
ON CYBERCRIME
95% cyber breaches are due
to human error.
There are around 6 million
cybersecurity jobs.
43% of cyber attacks target
businesses.
A cyberattack is attempted
every 39 seconds.
SOME INTERESTING
FACTS
CYBER SAFETY AND
LIFE ON THE INTERNET
UNDERSTAND LIFE ON THE
INTERNET
The Internet has turned our
existence upside down. It has
revolutionized communications, to
the extent that it is now our
preferred medium of everyday
communication. In almost
everything we do, we use the
Internet. Ordering a pizza, buying a
television, sharing a moment with a
friend, sending a picture over
instant messaging.
The Internet has so much control
over almost every aspect of
human life, not only our private
lives but, also various public
services.
There are unforeseen
consequences to sharing our
private and public information and
the results could damage our
presence on the internet.
Private
Information
Information about you that can
be used to identify you because
it's unique to you (e.g., your full
name or your address)
Personal / Public
Information
Information about you that
cannot be used to identify you
because it is also true for many
other people (e.g., your hair
color or the city you live in)
YAPPY
-
THE
DON’T
OF
THE
CYBERWORLD
Y
You don't give Your full
name out.
P
Don’t hand over your
Phone Number
A
You don't give out your
Address
P
Do not share your
Password
Y
You don't tell
others about Your
PRINCIPLES
OF
LIFE
ON
THE
INTERNET
Do not
install apps
without
permission.
01
When it comes to
passwords, sharing
is not caring.
Avoid using names
in your passwords
for better security.
Only add people
you fully know of
on social media.
Never upload
pictures or posts
regarding others,
without their
permission.
03
02 04
WHOA!
Let’s have a chat on security now...
PASSWORD
SECURITY
GRASP
THE
CONCEPT
OF
PASSWORD
SECURITY
WHAT IS A
PASSWORD?
A secret string of letters,
symbols, and numbers
that you can use to restrict
people, who can access
something digital.
WHY DO I NEED A
PASSWORD AT
ALL?
Passwords provide the
first line of defense
against unauthorized
access.
HOW OFTEN
SHOULD I CHANGE
MY PASSWORD?
Ideally, every 6
months.
WHAT SORT OF A
PASSWORD
SHOULD I HAVE?
Preferably, strong.
WHY SHOULD I
HAVE A STRONG
PASSWORD?
It makes it very hard
for bad men and
criminals to access our
data and hurt us.
WHAT ARE THE
DO’s AND DON'Ts
OF A PASSWORD?
Let’s learn about it
further!
DO’s
AND
DON’Ts
OF
PASSWORD
MAKING
Never disclose your
usernames and
passwords to
strangers.
Do not use the
‘remember me’
options or save
passwords on a
public computer or
network.
Initially, consult
with your parents
before you create
a password. Once
you get the hang
of it, you can do it
on your own.
Run regular virus
scans on your
devices; say
every week or so.
Never store your
usernames and
passwords on a paper
or in an easily
accessible place.
LET’S DO AN ACTIVITY!
Start with a phrase. Think of a quote or
group of words that will be easy to
remember.
Example: I am in grade three.
Write down just the first letter of each word
in the phrase.
Example: I / A / I / G / T
Capitalize some of the letters. Example: I / a / i / g / T
Add one or two memorable numbers. Example: I / a / 3 / i / g / 2 / 6 / T
Memorize it. Repeat your new password in
your head so it sticks.
Therefore, you new password - Ia3ig26T
THINGS
YOU
OUGHT
TO
DO
FOR
BETTER
PROTECTION
SOFTWARE
● Your device – computer, laptop, tablet, or
smartphone – should be equipped with
reliable anti-virus software.
BROWSER SECURITY
● Most popular browsers have special settings
that allow blocking potentially harmful
resources.
DOWNLOADS
Always ask your parents or a trusted adult
before you download anything!
IT'S FUN TIME!
LET’S ENJOY A
LITTLE
Name four things about yourself that you should not share online with strangers.
True or false: If you wouldn’t say it to someone’s face, don’t say it on the computer
You just got an email from a stranger that says, “You’ve won!” One thing you
definitely shouldn’t do is:
a. show it to a parent b. open it to see what you’ve won c. delete it d. log off
True or false: It’s OK to send your picture to someone you met online, as long as
they sent you theirs first.
True or false: Online information is always trustworthy.
Which of the following passwords is the safest password?
a.) password b.) abc123 c.) Answ3RM3$1 d.) Fluffy01
Q&A SESSION
ANSWERS
1) My full name / My address / My phone number / The identity of my kin /
My plans
1) True, I wouldn’t want to hurt someone else and definately, would not like
someone to hurt me.
1) b. open it to see what you’ve won
1) False, I should never do so. I am not always aware of other’s intentions.
1) False; there is a lot of untrustworthy and incorrect on the Internet.
1) Option c.) Answ3RM3$1
ENCRYPTION - DECRYPTION
omecturp
asofterw
coed
akeybdro
etrenint
tcegyoholn
ntuarvsii
ailflwre
asr powder
Computer
Software
Code
Keyboard
Internet
Technology
Antivirus
Firewall
Passwords
A COOL WORD SEARCH!
THANK
YOU!

More Related Content

What's hot

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
xlilmermaidx
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
Chris Burrows
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
Sarah K Miller
 
Actividad integradora 3
Actividad integradora 3Actividad integradora 3
Actividad integradora 3
BeatrizLozaDiaz
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
Avanzo net
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 
Navegar por internet de forma segura
Navegar por internet de forma seguraNavegar por internet de forma segura
Navegar por internet de forma segura
FelipeAgisPeres
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
 
Navegar por internet de forma segura
Navegar por internet de forma seguraNavegar por internet de forma segura
Navegar por internet de forma segura
rosa de sharon
 

What's hot (20)

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Actividad integradora 3
Actividad integradora 3Actividad integradora 3
Actividad integradora 3
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Navegar por internet de forma segura
Navegar por internet de forma seguraNavegar por internet de forma segura
Navegar por internet de forma segura
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Navegar por internet de forma segura
Navegar por internet de forma seguraNavegar por internet de forma segura
Navegar por internet de forma segura
 

Similar to Internet / Cyber Security

Digital literacy
Digital literacyDigital literacy
Digital literacy
Amanda lee
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
Nurizcka
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwenguest3d3a205b
 
Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
guest3d3a205b
 
How to stay safe online.docx
How to stay safe online.docxHow to stay safe online.docx
How to stay safe online.docx
Nikki Neko
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Girl Scouts Online Safety Training
Girl Scouts Online Safety TrainingGirl Scouts Online Safety Training
Girl Scouts Online Safety Training
Sarah Granger
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship
takahe2
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynotetakahe2
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
takahe2
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
takahe2
 

Similar to Internet / Cyber Security (20)

Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
 
Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How to stay safe online.docx
How to stay safe online.docxHow to stay safe online.docx
How to stay safe online.docx
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Girl Scouts Online Safety Training
Girl Scouts Online Safety TrainingGirl Scouts Online Safety Training
Girl Scouts Online Safety Training
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Internet / Cyber Security

  • 2. YOUR TEACHER SRIJAN MUKHOPADHYA Y - Hey there! I am extremely happy to be here with you guys today. - I look forward to an amazing session with all of you! - Let’s have a great time!
  • 3. TOPICS OF DISCUSSION WHAT IS CYBERSECURITY? FACTS ABOUT CYBERSECURITY CYBER SAFETY AND LIFE ON THE INTERNET IT’S FUN TIME! WHAT IS CYBERCRIME? A LITTLE HISTORY ON THE CYBER WORLD
  • 5. Cybersecurity is when someone protects networks, electronic devices and data from falling into wrong hands. WHAT IS CYBERSECURITY? It is also the practice of ensuring safety, integrity, and security of one’s information over the cyberspace. WHAT IS CYBERSPACE? Cyberspace is anything that has to do with the Internet. For example: We use the Internet to communicate and stay connected to our friends and family. We play video games, download music, and watch TV shows and movies after homework is done. Grownups use it do things like banking, shopping, and other important everyday activities online as well.
  • 6. WHAT IS CYBERCRIME? Cybercrime is criminal activities carried out by means of computers or the internet. The former descriptions were "computer crime" or "crime by computer". The Internet brought other new terms, like "digital", "electronic", "virtual" , "IT", "high-tech" and “technology-enabled" crime.
  • 7. SOME COMMON ONLINE ISSUES WE FACE TODAY Cyber Predators They are people who search online for others in order to use, control, or harm them in some way. Identity Theft It happens to be an illegal and wrong method, in which criminals collect and use other people’s private data; commonly for financial gains. Cyber Bullying It is the electronic posting of mean- spirited messages about a person, often done anonymously.
  • 8. Are the actions of this little girl safe? Should she have done something different? Do you guys want to know how to be safe?
  • 9. MEET ALIA She is a school going girl just like the rest of you and loves to play games and watching cartoons on the internet. She will help you understand the concept of Internet.
  • 10. The Internet is like a busy road with lots of traffic in all directions. This ‘traffic’ is called Data. The games, videos, cartoons, movies, emails etc. that you all love to see just like Alia,travels over the Internet like data. While the Internet does seems spectacular on the outside, it has many unseen insides. One must use it very carefully to stay safe! Everyday Alia goes to school and enjoys the computer classes, just like all other kids. She has learned that the computer had something very magical inside it called the Internet. It is the same thing she sees on mobile phones and tablets. The Internet lets you do a lot of things. It even lets you make friends online. It can get infected with viruses which can harm your computer or electronic device. So one has to be very, very careful. Alia will now teach you how to stay safe, and use the Internet to enjoy it.
  • 11. Before you use the Internet, always ask an adult if the computer has a firewall and antivirus. Together, they both protect your computer from many kinds of viruses that attack our computer and steal our data. We all like to chat with our friends and keep up with them, don’t we? We can do so easily via email. If we are using a public network or a computer, we must always log out once we are done. If it is also very important to know that we must never click on a lik or an ad in our email or on the Internet. Always ask an adult before doing so. To help with your regular studies that Internet and is an amazing resource. Before you sign up for a website, ask your parents for help and supervision. In matters such as these, they know best. You may find free Wifi in public spaces like shops, railway stations, shopping malls, metros etc. to surf the Internet and use it. Avoid using it as they can be harmful. Never connect to them, as they are not safe! CONGRATULATIONS! YOU ARE NOW CYBER / INTERNET SAFE!
  • 12. A LITTLE HISTORY ON THE CYBER WORLD FACTS ABOUT INTERNET SECURITY
  • 13. The first spam email took place in 1978 when it was sent over the Arpanet. The first recorded cyber crime was recorded in the year 1820. The first virus was installed on an Apple Computer in 1982. YOUR DOSE OF HISTORY ON CYBERCRIME
  • 14. 95% cyber breaches are due to human error. There are around 6 million cybersecurity jobs. 43% of cyber attacks target businesses. A cyberattack is attempted every 39 seconds. SOME INTERESTING FACTS
  • 15. CYBER SAFETY AND LIFE ON THE INTERNET
  • 16. UNDERSTAND LIFE ON THE INTERNET The Internet has turned our existence upside down. It has revolutionized communications, to the extent that it is now our preferred medium of everyday communication. In almost everything we do, we use the Internet. Ordering a pizza, buying a television, sharing a moment with a friend, sending a picture over instant messaging. The Internet has so much control over almost every aspect of human life, not only our private lives but, also various public services. There are unforeseen consequences to sharing our private and public information and the results could damage our presence on the internet.
  • 17. Private Information Information about you that can be used to identify you because it's unique to you (e.g., your full name or your address) Personal / Public Information Information about you that cannot be used to identify you because it is also true for many other people (e.g., your hair color or the city you live in)
  • 18.
  • 19.
  • 20. YAPPY - THE DON’T OF THE CYBERWORLD Y You don't give Your full name out. P Don’t hand over your Phone Number A You don't give out your Address P Do not share your Password Y You don't tell others about Your
  • 21. PRINCIPLES OF LIFE ON THE INTERNET Do not install apps without permission. 01 When it comes to passwords, sharing is not caring. Avoid using names in your passwords for better security. Only add people you fully know of on social media. Never upload pictures or posts regarding others, without their permission. 03 02 04
  • 22. WHOA! Let’s have a chat on security now...
  • 23.
  • 24.
  • 26. GRASP THE CONCEPT OF PASSWORD SECURITY WHAT IS A PASSWORD? A secret string of letters, symbols, and numbers that you can use to restrict people, who can access something digital. WHY DO I NEED A PASSWORD AT ALL? Passwords provide the first line of defense against unauthorized access. HOW OFTEN SHOULD I CHANGE MY PASSWORD? Ideally, every 6 months. WHAT SORT OF A PASSWORD SHOULD I HAVE? Preferably, strong. WHY SHOULD I HAVE A STRONG PASSWORD? It makes it very hard for bad men and criminals to access our data and hurt us. WHAT ARE THE DO’s AND DON'Ts OF A PASSWORD? Let’s learn about it further!
  • 27.
  • 28. DO’s AND DON’Ts OF PASSWORD MAKING Never disclose your usernames and passwords to strangers. Do not use the ‘remember me’ options or save passwords on a public computer or network. Initially, consult with your parents before you create a password. Once you get the hang of it, you can do it on your own. Run regular virus scans on your devices; say every week or so. Never store your usernames and passwords on a paper or in an easily accessible place.
  • 29. LET’S DO AN ACTIVITY! Start with a phrase. Think of a quote or group of words that will be easy to remember. Example: I am in grade three. Write down just the first letter of each word in the phrase. Example: I / A / I / G / T Capitalize some of the letters. Example: I / a / i / g / T Add one or two memorable numbers. Example: I / a / 3 / i / g / 2 / 6 / T Memorize it. Repeat your new password in your head so it sticks. Therefore, you new password - Ia3ig26T
  • 30. THINGS YOU OUGHT TO DO FOR BETTER PROTECTION SOFTWARE ● Your device – computer, laptop, tablet, or smartphone – should be equipped with reliable anti-virus software. BROWSER SECURITY ● Most popular browsers have special settings that allow blocking potentially harmful resources. DOWNLOADS Always ask your parents or a trusted adult before you download anything!
  • 31. IT'S FUN TIME! LET’S ENJOY A LITTLE
  • 32. Name four things about yourself that you should not share online with strangers. True or false: If you wouldn’t say it to someone’s face, don’t say it on the computer You just got an email from a stranger that says, “You’ve won!” One thing you definitely shouldn’t do is: a. show it to a parent b. open it to see what you’ve won c. delete it d. log off True or false: It’s OK to send your picture to someone you met online, as long as they sent you theirs first. True or false: Online information is always trustworthy. Which of the following passwords is the safest password? a.) password b.) abc123 c.) Answ3RM3$1 d.) Fluffy01 Q&A SESSION
  • 33. ANSWERS 1) My full name / My address / My phone number / The identity of my kin / My plans 1) True, I wouldn’t want to hurt someone else and definately, would not like someone to hurt me. 1) b. open it to see what you’ve won 1) False, I should never do so. I am not always aware of other’s intentions. 1) False; there is a lot of untrustworthy and incorrect on the Internet. 1) Option c.) Answ3RM3$1
  • 34. ENCRYPTION - DECRYPTION omecturp asofterw coed akeybdro etrenint tcegyoholn ntuarvsii ailflwre asr powder Computer Software Code Keyboard Internet Technology Antivirus Firewall Passwords
  • 35. A COOL WORD SEARCH!