SlideShare a Scribd company logo
By: Tanvi Jindal ,
Parwinder Kaur
Introduction
The internet in India is growing rapidly. It has given rise to new
opportunities in every field we can think of— be it entertainment,
business, sports or education.
There are two sides of a coin. Internet also has its own
disadvantages as well as advantages. One of the major
disadvantages is Cyber crime — illegal activity committed on the
internet and the advantage is Cyber Security.
Cyber Crimes
• It’s an unlawful act wherein the computer
is either a tool or a target or both.
• Cyber space is a virtual space that has
become as important as real space for
business, politics, and communities
What is cyber crime ?
• Using the Internet to commit a crime.
– Identity Theft
– Hacking
– Viruses
• Facilitation of traditional criminal activity
– Stalking
– Stealing information
– Child Pornography
Cyber-safety is a
common term used
to describe a set of
practices, measures
or actions you can
take to protect personal
information and your
computer from
attacks.
WHAT IS CYBER-SAFETY?
TOP FOUR CYBER-SAFETY ACTIONS
Faculty and staff should work with their technical support
coordinator before implementing these measures.
1. Run Anti-virus Software
2. Prevent Identity Theft
3. Turn on Personal Firewalls
4. Protect Passwords
RUN ANTI-VIRUS SOFTWARE
 To avoid computer problems caused by viruses, install and run
an anti-virus program.
 Periodically, check to see if your anti-virus is up to date by
opening your anti-virus program and checking the
Last updated: date.
 Anti-virus software removes viruses and repairs infected files,
and can help to prevent future viruses.
PREVENT IDENTITY THEFT
Don't give out financial account numbers, Social
Security numbers, driver’s license numbers or other
personal identity information unless you know exactly
who's receiving it.
Protect other people’s information as you would your
own.
Never send personal or confidential information via
email or instant messages as these can be easily
intercepted.
TURN ON PERSONAL
FIREWALLS
 Check your computer's security settings for a built-in
personal firewall. If you have one, turn it on. Microsoft
Vista and Mac OSX have built-in firewalls
 Firewalls act as protective barriers between computers
and the internet.
 Hackers search the Internet by sending outcalls to
random computers and wait for responses. Firewalls
prevent your computer from responding to these calls.
PROTECT PASSWORDS
 Do not share your passwords, and always make new
passwords difficult to guess by avoiding dictionary words.
mixing letters, numbers and punctuation.
 Do not use one of these common passwords or any variation
of them.
 Change your passwords periodically.
 When choosing a password:
o Mix upper and lower case letters
o Use a minimum of 8 characters
o Use mnemonics to help you remember a difficult
password
 Avoid leaving your laptop unsupervised and in plain
view in the library or coffee house, or in your car, home.
 Set up a user account and password to prevent
unauthorized access to your computer files.
 Do not install unnecessary programs on your compute
r.
CYBER-SAFETY AT HOME
 Be sure to work with your technical support
coordinator before implementing new cyber-safety
measures.
 Talk with your technical support coordinator about
what cyber-safety measures are in place in your
department.
 Do not install unnecessary programs on your work
computer.
CYBER-SAFETY AT WORK
IT ACT PROVISIONS
• Email would now be a valid and legal form of
communication in our country that can be duly
produced and approved in a court of law.
• Companies shall now be able to carry out electronic
commerce using the legal infrastructure provided by
the Act.
• Digital signatures have been given legal validity and
sanction in the Act.
IT ACT PROVISIONS
• The Act now allows Government to issue
notification on the web thus indicating
e-governance
• statutory remedy in case if anyone breaks into
companies computer systems or network and
causes damages or copies data
Video
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)

More Related Content

What's hot

Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
Ritik Kumar
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
Sunit Belapure
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
NehaRohtagi1
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
Parth Makadiya
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
divyanigarg2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
Jayed Hossain Jibon
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crime
Jayakumar PP
 
Cyber security and its advantages
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantages
Radhika Sharma
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Teja Babu
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
Suad 00
 
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
 
cyber crime
cyber crimecyber crime
cyber crime
Mukund10
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection Measures
Shiva Bissessar
 
Importance of cyber crime security
Importance of cyber crime security Importance of cyber crime security
Importance of cyber crime security
Pavan Kuls
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 

What's hot (20)

Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crime
 
Cyber security and its advantages
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantages
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
ITBIS105 3
ITBIS105 3ITBIS105 3
ITBIS105 3
 
Cyber security
Cyber security Cyber security
Cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection Measures
 
Importance of cyber crime security
Importance of cyber crime security Importance of cyber crime security
Importance of cyber crime security
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 

Viewers also liked

презентация Microsoft power point (3)
презентация Microsoft power point (3)презентация Microsoft power point (3)
презентация Microsoft power point (3)
virtualtaganrog
 
User-Centered Analysis and Design in Agile
User-Centered Analysis and Design in AgileUser-Centered Analysis and Design in Agile
User-Centered Analysis and Design in Agile
Nazli Ceren BINYILDIRIM
 
Исследование клиентов «Особенного банка»
Исследование клиентов «Особенного банка»Исследование клиентов «Особенного банка»
Исследование клиентов «Особенного банка»
SpecialBank
 
информационное письмо
информационное письмоинформационное письмо
информационное письмо
Julia Korkina
 
Informe economic i comercial argelia. icex 2014
Informe economic i comercial argelia. icex 2014Informe economic i comercial argelia. icex 2014
Informe economic i comercial argelia. icex 2014
coacnet
 
Os 127 2016
Os 127 2016Os 127 2016
Os 127 2016
mauvet52
 
LNN 6th sem
LNN 6th semLNN 6th sem
LNN 6th sem
LN Neupane
 
Roca gallery_20120919_dossier_xina
Roca gallery_20120919_dossier_xinaRoca gallery_20120919_dossier_xina
Roca gallery_20120919_dossier_xina
coacnet
 
информационное письмо
информационное письмоинформационное письмо
информационное письмо
Julia Korkina
 
11.12.15 Concurs Biennal Venècia
11.12.15 Concurs Biennal Venècia11.12.15 Concurs Biennal Venècia
11.12.15 Concurs Biennal Venèciacoacnet
 
Ciudad mexico es
Ciudad mexico esCiudad mexico es
Ciudad mexico es
Paula Figueroa
 
чин ван ханддорж
чин ван ханддоржчин ван ханддорж
чин ван ханддорж
Khongor Bukhtsooj
 
2016 Oral Health Exam - FINAL
2016 Oral Health Exam - FINAL2016 Oral Health Exam - FINAL
2016 Oral Health Exam - FINAL
Kaitlyn Bocskey
 
111117 Presentació Missió Canadà
111117 Presentació Missió Canadà 111117 Presentació Missió Canadà
111117 Presentació Missió Canadà
coacnet
 
Pla d’internacionalització dels arquitectes catalans
Pla d’internacionalització dels arquitectes catalansPla d’internacionalització dels arquitectes catalans
Pla d’internacionalització dels arquitectes catalanscoacnet
 
Profundizado07 gr2
Profundizado07 gr2Profundizado07 gr2
Profundizado07 gr2
Alvarogarcy
 
Wendy Meredith
Wendy MeredithWendy Meredith
Wendy Meredith
Lucia Garcia
 
Progress 2
Progress 2Progress 2
Progress 2
051021
 
Personality traits that affect how managers think
Personality traits that affect how managers thinkPersonality traits that affect how managers think
Personality traits that affect how managers think
juneza barrera
 

Viewers also liked (19)

презентация Microsoft power point (3)
презентация Microsoft power point (3)презентация Microsoft power point (3)
презентация Microsoft power point (3)
 
User-Centered Analysis and Design in Agile
User-Centered Analysis and Design in AgileUser-Centered Analysis and Design in Agile
User-Centered Analysis and Design in Agile
 
Исследование клиентов «Особенного банка»
Исследование клиентов «Особенного банка»Исследование клиентов «Особенного банка»
Исследование клиентов «Особенного банка»
 
информационное письмо
информационное письмоинформационное письмо
информационное письмо
 
Informe economic i comercial argelia. icex 2014
Informe economic i comercial argelia. icex 2014Informe economic i comercial argelia. icex 2014
Informe economic i comercial argelia. icex 2014
 
Os 127 2016
Os 127 2016Os 127 2016
Os 127 2016
 
LNN 6th sem
LNN 6th semLNN 6th sem
LNN 6th sem
 
Roca gallery_20120919_dossier_xina
Roca gallery_20120919_dossier_xinaRoca gallery_20120919_dossier_xina
Roca gallery_20120919_dossier_xina
 
информационное письмо
информационное письмоинформационное письмо
информационное письмо
 
11.12.15 Concurs Biennal Venècia
11.12.15 Concurs Biennal Venècia11.12.15 Concurs Biennal Venècia
11.12.15 Concurs Biennal Venècia
 
Ciudad mexico es
Ciudad mexico esCiudad mexico es
Ciudad mexico es
 
чин ван ханддорж
чин ван ханддоржчин ван ханддорж
чин ван ханддорж
 
2016 Oral Health Exam - FINAL
2016 Oral Health Exam - FINAL2016 Oral Health Exam - FINAL
2016 Oral Health Exam - FINAL
 
111117 Presentació Missió Canadà
111117 Presentació Missió Canadà 111117 Presentació Missió Canadà
111117 Presentació Missió Canadà
 
Pla d’internacionalització dels arquitectes catalans
Pla d’internacionalització dels arquitectes catalansPla d’internacionalització dels arquitectes catalans
Pla d’internacionalització dels arquitectes catalans
 
Profundizado07 gr2
Profundizado07 gr2Profundizado07 gr2
Profundizado07 gr2
 
Wendy Meredith
Wendy MeredithWendy Meredith
Wendy Meredith
 
Progress 2
Progress 2Progress 2
Progress 2
 
Personality traits that affect how managers think
Personality traits that affect how managers thinkPersonality traits that affect how managers think
Personality traits that affect how managers think
 

Similar to Smart-phone-with-Chains-PowerPoint-Widescreen (1)

Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
Aarush59
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
Anwar CHFI, SSCP, ITIL
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Information security
Information securityInformation security
Information security
Laxmiprasad Bansod
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Data security
 Data security  Data security
Data security
Laura Breese
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
Rahul Nayan
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
jondon17
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
WeSecureApp
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
Pasquale Tursi
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
online Marketing
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Security Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeSecurity Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop Safe
Noida
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 

Similar to Smart-phone-with-Chains-PowerPoint-Widescreen (1) (20)

Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Information security
Information securityInformation security
Information security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Data security
 Data security  Data security
Data security
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Security Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeSecurity Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop Safe
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Smart-phone-with-Chains-PowerPoint-Widescreen (1)

  • 1. By: Tanvi Jindal , Parwinder Kaur
  • 2. Introduction The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of— be it entertainment, business, sports or education. There are two sides of a coin. Internet also has its own disadvantages as well as advantages. One of the major disadvantages is Cyber crime — illegal activity committed on the internet and the advantage is Cyber Security.
  • 3. Cyber Crimes • It’s an unlawful act wherein the computer is either a tool or a target or both. • Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  • 4. What is cyber crime ? • Using the Internet to commit a crime. – Identity Theft – Hacking – Viruses • Facilitation of traditional criminal activity – Stalking – Stealing information – Child Pornography
  • 5.
  • 6. Cyber-safety is a common term used to describe a set of practices, measures or actions you can take to protect personal information and your computer from attacks. WHAT IS CYBER-SAFETY?
  • 7. TOP FOUR CYBER-SAFETY ACTIONS Faculty and staff should work with their technical support coordinator before implementing these measures. 1. Run Anti-virus Software 2. Prevent Identity Theft 3. Turn on Personal Firewalls 4. Protect Passwords
  • 8. RUN ANTI-VIRUS SOFTWARE  To avoid computer problems caused by viruses, install and run an anti-virus program.  Periodically, check to see if your anti-virus is up to date by opening your anti-virus program and checking the Last updated: date.  Anti-virus software removes viruses and repairs infected files, and can help to prevent future viruses.
  • 9. PREVENT IDENTITY THEFT Don't give out financial account numbers, Social Security numbers, driver’s license numbers or other personal identity information unless you know exactly who's receiving it. Protect other people’s information as you would your own. Never send personal or confidential information via email or instant messages as these can be easily intercepted.
  • 10. TURN ON PERSONAL FIREWALLS  Check your computer's security settings for a built-in personal firewall. If you have one, turn it on. Microsoft Vista and Mac OSX have built-in firewalls  Firewalls act as protective barriers between computers and the internet.  Hackers search the Internet by sending outcalls to random computers and wait for responses. Firewalls prevent your computer from responding to these calls.
  • 11. PROTECT PASSWORDS  Do not share your passwords, and always make new passwords difficult to guess by avoiding dictionary words. mixing letters, numbers and punctuation.  Do not use one of these common passwords or any variation of them.  Change your passwords periodically.  When choosing a password: o Mix upper and lower case letters o Use a minimum of 8 characters o Use mnemonics to help you remember a difficult password
  • 12.  Avoid leaving your laptop unsupervised and in plain view in the library or coffee house, or in your car, home.  Set up a user account and password to prevent unauthorized access to your computer files.  Do not install unnecessary programs on your compute r. CYBER-SAFETY AT HOME
  • 13.  Be sure to work with your technical support coordinator before implementing new cyber-safety measures.  Talk with your technical support coordinator about what cyber-safety measures are in place in your department.  Do not install unnecessary programs on your work computer. CYBER-SAFETY AT WORK
  • 14. IT ACT PROVISIONS • Email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.
  • 15. IT ACT PROVISIONS • The Act now allows Government to issue notification on the web thus indicating e-governance • statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 16. Video