Introduction-Cyber Safety

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
POSSIBLE THREATS TO DATA
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Cyber Crimes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Unit 19 INTERNET SECURITY
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
What is Spam? d min.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Internet safety By Suman Nazir
Digital Citizen Project By: Frances Murphey Technology and Education.
Cyber Safety Jamie Salazar.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Managing Windows Security
Edexcel GCSE Cyber security threats Computer Science 1CP1
DIGITAL CITIZENSHIP What You Should Know!.
3.6 Fundamentals of cyber security
IT Security  .
Internet Identity, Safety, & Security
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
How to build a good reputation online
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Risk of the Internet At Home
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
How to keep the bad guys out and your data safe
What devices use the internet?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
cyber safety class :- Xi Chapter no. :- 17
Created by:- Sailesh Mathur School:- k.v.5 Jaipur
Presentation transcript:

Introduction-Cyber Safety Cyber safety is the safe and responsible use of Internet & ICT(Information & Communication Technology). Cyber safety is about to not only keeping information safe and secure, but also being responsible with that information, being respectful of other people online. As per Cyber safety peoples are advised to use good 'netiquette' (internet etiquettes). The term cyber security is used to refer to the security offered through on line services to protect your online information.

To understand What is the meaning of the word cyber What is the need of cyber security What are the security problems in cyber field How to implement and maintain security of a cyber field around us

CYBER It is combining form relating to information technology, the internet, and virtual reality. Cyber security is necessary since it helps in securing data form threats such as data theft or misuse, also safeguards your system from viruses.

Cyber trolls & Cyber bullying Cyber trolling is internet slang for a person who intentionally starts arguments or upsets others by posting inflammatory remarks. The sole purpose of trolling is angering people. Purpose – to entertain,to argument,to upset victim,to get attention Cyberbulling: Saying and/or doing mean things to the person online. It is a harm inflicted through using the Internet,ICT devices,or mobile phones. Purpose – to get revenge,to harass & threat, to humiliate Cyberstalking: Doing research on every aspect of the person’s life. Cyberharrassment: Continuously contacting the person online, even though they don’t want you to.

Usage of Social Network Social Network refers to web and mobile technologies or their practices to share content, thoughts, ideas, opinions, experiences etc. online. Various examples of social networks are Facebook, Twitter, YouTube, LinkedIn, and blogging sites among many others. Problems to Avoid Cyber trolling Cyberbulling Cyberstalking Cyberharrassment Stranger Danger

 Digital Footprint The history of a person's usage of digital devices, movie search, programs watched, flight searched, websites surfed, credit card transaction,cell phone calls,social media messages sent, links clicked and Facebook pages liked etc.Such information is being used to target ads to consumers as these are digital footprint of such consumers.

Computer Security Threats Malware: Malware could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious . computer virus: It is a small piece of software that can spread from one infected computer to another. It can corrupt, steal, or delete data on your computer/hard drive. Trojan horse: can do anything from record your passwords by logging keystrokes (known as a keylogger) to hijacking your webcam to watch and record your every move. Computer worm: A computer worm is a software program that can copy itself from one computer to another, without human interaction. Spam: unwanted messages in your email inbox.

Phishing: Phishing are fraudulent attempts by cybercriminals to obtain private information. For e.g.a message prompt your personal information by pretending that bank/mail service provider is updating its website. spyware: spyware is used to spy on their victims. An e.g. is keylogger software that records a victim’s every keystroke on his or her keyboard. Adware : unwanted ads shown while surfing internet. Eavesdropping : is the act of intercepting communications between two points.

Safely accessing web sites How to prevent/remove Adware/malware Uninstall the malicious programs from Windows Use antivirus program for malware and unwanted programs Reset the browser settings to their original defaults Scan for malicious programs antivirus/antimalware program

How to prevent/remove virus Beware of Fake Download Buttons Use a Secure Browser Avoid Public Torrent Sites Don’t Open Email Attachments Forwarded to You Don’t Use Your PC’s Admin Account Scan All New Files and Disks

How to prevent/remove Trojan Never open unsolicited emails from unknown senders Avoid downloading and installing programs unless you fully trust publisher Use firewall software Use a fully updated antivirus program

Safely Communicating data  Eavesdropping-eavesdropping in a man in middle attack and the message is passing from the client to server. The solutions to this problem are:  to encrypt the message  to encrypt the channel Both are appropriate in different situations. To prevent Eavesdropping in any kind of communication channel can be achieved by usage of "Secure Tunneling" of your channel data.

THANK YOU BY VISHAKHA WADHWANI