Hello! It is my pleasure to introduce myself as Moiz Ahmed, a student in class 6. I currently live in Karachi, Pakistan. My favorite topic of the presentation is Internet fraud and common modes of security threats, and I love to make PowerPoint presentations about various topics such as science, computer technology, and much more. Hope you will find it informative.
2. Although some businesses use the terms data protection. data security and data
privacy, have different purposes:
Data protection safeguards information from loss through backup and recovery.
Data security refers specifically to measures taken to protect the integrity of the
data itself against manipulation and malware. It provides defense from internal
and external threats.
Data privacy refers to controlling access to the data, Organizations must
determine who has access to data. Understandably, a privacy breach can lead to
data security issues
Differences between data protection,
security, and privacy
3. What Is data privacy? Data
Privacy generally means the ability of a people to determine for themselves
when, how, and to what extent personal information about them is shared
with or communicated to others. This personal information can be one's
name, location, contact information, or online or world behavior, Just as
someone may wish to exclude people from a private conversation, many
online users want to contol or prevent certain types of personal data
collection. As Internet usage has increased over the years, so has the
importance of data privacy. Websites, applications, and social media
platforms often need to collect and store personal data about the uses of
provided services. However, some applications and platforms may exceed
users' expectations for data collection and usage, leaving users with more
privacy than they realized. Other apps and platforms may not place adequate
safeguards around the data they collect, which can result in ina data breach
that compromises user privacy.
4. Why is data privacy important?
In many jurisdictions, privacy's considered afundamental human rights and
data protectionlaws exist to a quarry that right. Data privacy isalso important
because in order fr invaluableto be willing to engage online, they have to
trustthat their data will be handled withcate, Organizations use data
protectionpractices to demonstrate to their customersand users that can be
trusted with theirpersonal data.
Personal data can be misused in several ways ie if it is not kept private or if people
don't have the ability to control how their information is used:
5. Criminals can use personal data to defraudor harass users.
Entities may sell personal data to advertisersor other outside parties without
the userconsent, which can result in users receiving unwanted marketing or
advertising.
When a person's activities are tracked and monitored, this may restrict their
ability to express themselves freely, especially under repressive governments.
For individuals, any of these outcomes can be harmful. For businesses, these
outcomes canirreparably harm their reputation, as well as resulting in fines,
sanctions, and other legal consequences. In addition to the reward implications
of privacy infringements, many people and countries hold that privacy has
intrinsic value that privacy is a human right fundamental to a free society, like
the right to free speech. Internet fraud can be defined as any type of a scheme
that uses one or more components of theInternet (e.g. chat, email, website) to
publish fraudulent solicitations, conduct fraudulent transactions, or transmit
proceeds obtained trough fraud.
6. Who are hackers?
Hackers are people who gain access to a computer and then carry out
activities like stealing data, changing information, and so on. These
activities are done without the knowledge of the original user. Hacking is
typically technical (like creating malvertising that deposits malware in a
drive-by attack requiring user interaction). But hackers can also use
psychology to trick the user into clicking on a malicious attachment or
providing personal data. These tactics arem referred to as “social
engineering.” in fact. it's accurate to characterize hacking as an over-
arching umbrella term for activity behind most if not all of the malware
and malicious cyberattacks on the computing public, businesses,
andgovernments. Becides social engineering and malvertising, common
hacking techniques include:
8. What is phishing?
Phishing is a type of online fraud that involves tricking people into
providing sensitive information, such as passwords or credit card numbers,
by masquerading as trustworthy source. Phishing can be done through
email, social media, or malicious websites.
9. How does phishing work?
Phishing works by sending messages that looklike they are from a
legitimate company or website. Phishing messages will usually contain a
link that takes the user to a fake website that it looks like the real thing.
The user is then asked to enter personal information, such as their credit
card number. This information is then used to steal the person's identity or
to make fraudulent charges on their next card.
10. What is spyware?
Spyware is loosely defined as malicious software designed to enter your
computer device, gather data about you, and forward it to a third party
without your consent. Spyware can also refer to legitimate software that
monitors your data for commercial purposes like advertising, however,
malicious spyware explicitly used to profit from stolen data. Whether
legitimate or based on fraud, spyware surveillance activity leaves you open
to data breaches and misuse of your private data, Spyware also affects
network and device performance, showing down daily user activities. By
becoming aware of how spyware works, you can avoid issues in enterprise
and personal use.
11. What does spyware do?
All spyware peeks into your data and all your computer activity —
whether authorized or not. However, many trusted computer services and
applications use “spyware-like" tracking tools. As such, the spyware
definition is reserved mostly for malicious applications nowadays.
Malicious spyware is a type of malware specifically installed without your
informed consent. Step-by-step, spyware will take the following actions on
your computer or mobile device:
Infiltrate — via an app install package, malicious website, or file
attachment.
12. Monitor and capture data — via keystrokes, screen captures, and other
tracking codes.
Send stolen data — to the spyware author, to be used directly or sold to
other parties.
In short, spyware communicates personal, confidential information
about you to an attacker. The information gathered might be reported
about your online browsing habits or purchases, but spyware codes can
also be modified to record more specific activities. Data compromised by
spyware often includes collecting confidential info such as:
Login credentials — passwords and usernames
Account PINs
Credit card numbers
Monitored keyboard strokes
Tracked browsing habits
Harvested email addresses
The methods by which spyware gets onto your computer and mobile
devices can vary.
13. What is adware?
Adware refers to a type of malware that displays unwanted advertisements
on yourcomputer or device. Adware is commonlyactivated unknowingly
when users are tryingto install legitimate applications thatadware is
bundled with. While sometimes, the adware can be safe,some pop-up
windows intend to not only display advertisements but also collect data
and information to target you with customized adverts. In these cases,
adware can direct you to malicious websites and infected pages through
various advert links, putting you at risk of computer viruses.
14. How to detect adware?
The most common way to recognize adware is the appearance of pop-up
advertisements, and applications that you are unfamiliar with and on
browsers where they had not been displayed before. In some cases, the
adware can also cause changes to your browser, below are a few things to
look out for:
Lagging performance and eventual crashing
Unrequested changes to your browser homepages
Appearance of new extensions and toolbars
Web pages not displaying properly
Unwanted software installing