SlideShare a Scribd company logo
CYBER SECURITY ON SOCIAL MEDIA
G.CHARITHA
1210315518 1
2
1) WHAT IS CYBER SECURITY?
2) CYBER CRIME
i) TYPES OF CYBER CRIME
ii) HACKERS
3) CYBER ATTACKS
3) WHY CYBER SECURITY?
4) SAFETY MEASURES
5) CRYPTOGRAPHY
3
1) WHAT IS CYBER SECURITY?
Cybersecurity is the body of technologies, processes and
practices designed to protect networks, computers,
programs and data from attack, damage or unauthorized
access.
4
2) CYBER CRIME
It is simply a crime that encompasses any criminal act
dealing with computers and networks .
This may include committing crimes like identity theft ,
various email scams , violating privacy etc.
5
i) TYPES OF CYBER CRIMES
Cyber crimes are broadly classified into three categories,
namely crimes against:
❏ Individual
❏ Property
❏ Government
6
Cyber Crime may take many forms. The most
common ones are :
❏ Hacking
❏ Theft
❏ Cyber Stalking
❏ Malicious software
❏ Child soliciting and Abuse
❏ Denial of service attack
7
ii) HACKERS
A hacker is an individual who uses computer, network or
other technical skills to overcome a technical problem.
➔ But often refers to a person who uses his/her
abilities to gain unauthorised access to systems or
networks in order to commit crimes, steal information
to hurt people etc.
➔ This process is called as “Hacking”.
T
8
3) CYBER ATTACKS
It is an attempt by hackers to damage or destroy a
computer network or system.
➔ According to the Global State of Information Security
survey 2015, there are approximately 81 attacks per
minute.
➔ Types of cyber attacks:
❏ Cyber fraud
❏ Cyber spying
❏ Cyber stalking and bullying
❏ Cyber assault
❏ Cyber warfare
9
❏ Cyber fraud
➔ Cyber attacks that are generally aimed at gaining
monetary or related gains for the hacker.
➔ Includes phishing attacks combined with fake websites to
steal users personal details and also their money.
❏ Cyber spying
➔ The main motive of this attack is to gain the info for the
hacker and thus sell the info gained and make money.
10
❏ Cyber stalking and bullying
➔ Designed to frighten and intimidate individuals .
➔ Usually social media based - Ask.fm,Facebook,Twitter.
11
❏ Cyber assault
➔ Aimed at causing damage to info or equipment that is
being attacked.
➔ Damage may be physical or reputational or corruption or
deletion of important info.
❏ Cyber warfare
➔ An extreme form of cyber-assault where at least one of
the parties involved is a nation state.
➔ These are much harder to validate.
12
➔ Everyday we come across many cyber attacks especially
using the social media. The frequently used sites
include:
❏ Facebook
❏ Twitter
❏ Gmail
❏ Netflix
13
3) WHY CYBER SECURITY?
Cyber Security is much needed thing nowadays because
of:
★ Increase in Cyber crimes
★ Increase in Cyber attacks
★ Data being unsecured
14
4) SAFETY MEASURES
The common safety tips for safe browsing on any social
networking sites are:
★ Use unique password for each social network.
★ Don’t be too personal.
★ Customize privacy options.
★ Block spammers.
★ Sensitive browsing should always be done on a network
that you trust.
★ Don’t trust, just verify!
★ Watch what you are sharing on social networks.
★ Report and control abusive comments.
15
❏ Safety tips for frequently used social site - “FACEBOOK”
i) Set the privacy settings on your profile to “Friends”:
16
ii)Always monitor pictures that other people put of you and
tag you on.
17
iii) Be cautious of the statues, photos and
videos etc.
18
iv) Avoid putting your basic info and contact
details.
19
v) Avoid posting info about an upcoming vacation or trip
as status
20
vi)Change your password often.
21
vii) Be careful on who you friend!!!
viii) Before clicking on a link from facebook, always
remember to check the address bar, displaying
“www.facebook.com/” and not “www.facebook1.php” etc.
22
23
History
The first evidence of use of cryptography(in some form)
was found in an inscription carved around 1900 BC, in the
main chamber of the tomb of the nobleman Khnumhotep
II, in Egypt.
★ Around 100 BC Julius Caesar was known to use a form
of encryption to convey secret messages to his army
generals posted in the war front.
24
CRYPTOGRAPHY
Cryptography is the science and art of transforming the
messages to make them secure and immune to attack.
➔ Provides Confidentiality,Integrity and Accuracy.
25
26
Ancient Cipher
Main Terms
❏ Plain text
❏ Ciphertext
❏ Keys
❏ Cipher
❏ Encryption & Decryption
27
28
Categories of Cryptography
❏ Symmetric Key Cryptography
❏ Asymmetric Key Cryptography
29
Symmetric key Cryptography
Also known as secret key.Sender & Receiver uses same
key and an encryption/decryption algorithm to
encrypt/decrypt the data.
30
31
Traditional Ciphers for Symmetric Cryptography
❏ Substitution Cipher
❏ Transposition Cipher
32
Substitution Cipher
A technique in which the letters/numbers/symbols of plain
text are changed into other letters/numbers/symbols.
33
Transposition Cipher
Here, the positions of the letters/number/symbols in the
plain text are changed with one another.
34
Asymmetric key Cryptography
Also known as public key cryptography.
➔ Sender and Receiver uses different keys for encryption
and decryption namely PUBLIC and PRIVATE.
35
36
37

More Related Content

Similar to OK.pdf

ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
Avinash Katariya
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
Kira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
raja jawahar
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
NitishChoudhary23
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
nanjeebarifa
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
rishirvk1995
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
sagarpanthee
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
Bini R A
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
MayurSapkale7
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
chrixymae
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
AnkitShaw27
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
Ramya Nellutla
 
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Vi Tính Hoàng Nam
 
Cyber crime
Cyber crimeCyber crime
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
MananSharma75241
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Dr.S.Jagadeesh Kumar
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz
 

Similar to OK.pdf (20)

ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Recently uploaded

How to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docxHow to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docx
Buy bitget
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
DOT TECH
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf
morearsh02
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
Falcon Invoice Discounting
 
Summary of financial results for 1Q2024
Summary of financial  results for 1Q2024Summary of financial  results for 1Q2024
Summary of financial results for 1Q2024
InterCars
 
what is the future of Pi Network currency.
what is the future of Pi Network currency.what is the future of Pi Network currency.
what is the future of Pi Network currency.
DOT TECH
 
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Vighnesh Shashtri
 
The new type of smart, sustainable entrepreneurship and the next day | Europe...
The new type of smart, sustainable entrepreneurship and the next day | Europe...The new type of smart, sustainable entrepreneurship and the next day | Europe...
The new type of smart, sustainable entrepreneurship and the next day | Europe...
Antonis Zairis
 
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
beulahfernandes8
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
va2132004
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
DOT TECH
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
muslimdavidovich670
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
DOT TECH
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
mikemetalprod
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
FinTech Belgium
 

Recently uploaded (20)

How to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docxHow to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docx
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
 
Summary of financial results for 1Q2024
Summary of financial  results for 1Q2024Summary of financial  results for 1Q2024
Summary of financial results for 1Q2024
 
what is the future of Pi Network currency.
what is the future of Pi Network currency.what is the future of Pi Network currency.
what is the future of Pi Network currency.
 
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
Empowering the Unbanked: The Vital Role of NBFCs in Promoting Financial Inclu...
 
The new type of smart, sustainable entrepreneurship and the next day | Europe...
The new type of smart, sustainable entrepreneurship and the next day | Europe...The new type of smart, sustainable entrepreneurship and the next day | Europe...
The new type of smart, sustainable entrepreneurship and the next day | Europe...
 
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 

OK.pdf

  • 1. CYBER SECURITY ON SOCIAL MEDIA G.CHARITHA 1210315518 1
  • 2. 2 1) WHAT IS CYBER SECURITY? 2) CYBER CRIME i) TYPES OF CYBER CRIME ii) HACKERS 3) CYBER ATTACKS 3) WHY CYBER SECURITY? 4) SAFETY MEASURES 5) CRYPTOGRAPHY
  • 3. 3 1) WHAT IS CYBER SECURITY? Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
  • 4. 4 2) CYBER CRIME It is simply a crime that encompasses any criminal act dealing with computers and networks . This may include committing crimes like identity theft , various email scams , violating privacy etc.
  • 5. 5 i) TYPES OF CYBER CRIMES Cyber crimes are broadly classified into three categories, namely crimes against: ❏ Individual ❏ Property ❏ Government
  • 6. 6 Cyber Crime may take many forms. The most common ones are : ❏ Hacking ❏ Theft ❏ Cyber Stalking ❏ Malicious software ❏ Child soliciting and Abuse ❏ Denial of service attack
  • 7. 7 ii) HACKERS A hacker is an individual who uses computer, network or other technical skills to overcome a technical problem. ➔ But often refers to a person who uses his/her abilities to gain unauthorised access to systems or networks in order to commit crimes, steal information to hurt people etc. ➔ This process is called as “Hacking”. T
  • 8. 8 3) CYBER ATTACKS It is an attempt by hackers to damage or destroy a computer network or system. ➔ According to the Global State of Information Security survey 2015, there are approximately 81 attacks per minute. ➔ Types of cyber attacks: ❏ Cyber fraud ❏ Cyber spying ❏ Cyber stalking and bullying ❏ Cyber assault ❏ Cyber warfare
  • 9. 9 ❏ Cyber fraud ➔ Cyber attacks that are generally aimed at gaining monetary or related gains for the hacker. ➔ Includes phishing attacks combined with fake websites to steal users personal details and also their money. ❏ Cyber spying ➔ The main motive of this attack is to gain the info for the hacker and thus sell the info gained and make money.
  • 10. 10 ❏ Cyber stalking and bullying ➔ Designed to frighten and intimidate individuals . ➔ Usually social media based - Ask.fm,Facebook,Twitter.
  • 11. 11 ❏ Cyber assault ➔ Aimed at causing damage to info or equipment that is being attacked. ➔ Damage may be physical or reputational or corruption or deletion of important info. ❏ Cyber warfare ➔ An extreme form of cyber-assault where at least one of the parties involved is a nation state. ➔ These are much harder to validate.
  • 12. 12 ➔ Everyday we come across many cyber attacks especially using the social media. The frequently used sites include: ❏ Facebook ❏ Twitter ❏ Gmail ❏ Netflix
  • 13. 13 3) WHY CYBER SECURITY? Cyber Security is much needed thing nowadays because of: ★ Increase in Cyber crimes ★ Increase in Cyber attacks ★ Data being unsecured
  • 14. 14 4) SAFETY MEASURES The common safety tips for safe browsing on any social networking sites are: ★ Use unique password for each social network. ★ Don’t be too personal. ★ Customize privacy options. ★ Block spammers. ★ Sensitive browsing should always be done on a network that you trust. ★ Don’t trust, just verify! ★ Watch what you are sharing on social networks. ★ Report and control abusive comments.
  • 15. 15 ❏ Safety tips for frequently used social site - “FACEBOOK” i) Set the privacy settings on your profile to “Friends”:
  • 16. 16 ii)Always monitor pictures that other people put of you and tag you on.
  • 17. 17 iii) Be cautious of the statues, photos and videos etc.
  • 18. 18 iv) Avoid putting your basic info and contact details.
  • 19. 19 v) Avoid posting info about an upcoming vacation or trip as status
  • 21. 21 vii) Be careful on who you friend!!! viii) Before clicking on a link from facebook, always remember to check the address bar, displaying “www.facebook.com/” and not “www.facebook1.php” etc.
  • 22. 22
  • 23. 23
  • 24. History The first evidence of use of cryptography(in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt. ★ Around 100 BC Julius Caesar was known to use a form of encryption to convey secret messages to his army generals posted in the war front. 24
  • 25. CRYPTOGRAPHY Cryptography is the science and art of transforming the messages to make them secure and immune to attack. ➔ Provides Confidentiality,Integrity and Accuracy. 25
  • 27. Main Terms ❏ Plain text ❏ Ciphertext ❏ Keys ❏ Cipher ❏ Encryption & Decryption 27
  • 28. 28
  • 29. Categories of Cryptography ❏ Symmetric Key Cryptography ❏ Asymmetric Key Cryptography 29
  • 30. Symmetric key Cryptography Also known as secret key.Sender & Receiver uses same key and an encryption/decryption algorithm to encrypt/decrypt the data. 30
  • 31. 31
  • 32. Traditional Ciphers for Symmetric Cryptography ❏ Substitution Cipher ❏ Transposition Cipher 32
  • 33. Substitution Cipher A technique in which the letters/numbers/symbols of plain text are changed into other letters/numbers/symbols. 33
  • 34. Transposition Cipher Here, the positions of the letters/number/symbols in the plain text are changed with one another. 34
  • 35. Asymmetric key Cryptography Also known as public key cryptography. ➔ Sender and Receiver uses different keys for encryption and decryption namely PUBLIC and PRIVATE. 35
  • 36. 36
  • 37. 37