You are on page 1of 40

CYBER SAFETY

Done by
S.Naren Karthikeyan
Admn.No.305
Class XI - C
Contents

Introduction to Cyber Safety

Safe browsing the web

Identity protection while using internet

Ways of tracking your identity

Confidentiality of Information

Cyber Crime

Cyber Trolls

Cyber Bullying

Cyber Stalking

Spreading Rumours online

Reporting Cybercrime

Combating and Preventing Cybercrime

Cyber Forensics

IT Act 2000

Appropriate usage of social media

Network Security Threats

Communicating Data Safely

Identity Verification

Cyber Safety is a Nutshell
Introduction to Cyber Safety

Cyber safety refers to the safe and responsible
use of internet to ensure safety and security of
personal information and not posing threats to
information available online about others.

Main Objective: To gain knowledge to limit
computer crimes, especially those associated
with hacking and identity theft, by ensuring
security and safety of personal information.
Safely Browsing the Web

Protecting ourself by securing our devices,
software and connections.

Tips to ensure safety whie browsing the web:
– Update the software before starting
– Protect your web browser
– Observe safe online behaviour
– Online transaction handling
– Cookies and security
– Bookmark important sites
Identity protection while using
internet

Identity theft is a type of fraud involves using
someone else's identity to steal money or gain
other benefits.

(i.e.) stealing someone's personal information
such as name, login details, credit card details
etc., and then posing as that person online.

To protect ourselves from such frauds, we
should follow:
– Private browsing or Anonymous Browsing

In this type the browser opens in incognito mode or
Virtual Private Network(VPN) and does not store cookies.
Ways of Tracking Identity

Ways of Tracking your Identity

Cookies and
IP Address Tracking Scipts HTTP Referrer Super Cookies User Agents
Ways of Tracking your Identity
IP Address:


IP address is an unique address of our device
when connected to the internet.

Our geographical location can be determined
when you sharethis on network.
Ways of Tracking your Identity
Cookies and Tracking Text:


These are small text fies storing small piece of
information related to your onine habits.

Types of Cookies
– First Party Cookies:

stores own loginID, Password, and autofill information
etc.,
– Third PartyCookies:

Stores search history, web browsing history etc.,
Ways of Tracking your Identity
HTTP Referrer:


It is an HTTP header field that identifies the
origin of the URL

By checking the referrer the newweb page can
see where the request is originated and pass
your details such as IP address, our mail id,
password, etc., to these inked sites.
Ways of Tracking your Identity
Super Cookies:

These are persistent cookies, i.e., they come
back even after being deleted.

They store cookie data in multipe places.

e.g. Flash cookies, Silverlight storage, browsing
history and HTML5 local storage, etc.,

User Agent:

These tells about our browser and Operating
System to the websites.
Confidentiality of Information

Confidentialityof Information ensures that only
authorised user get access to sensitive and
protected data.

Most common threats to confidentiality is
Password Hacking in online money transaction
system.
Ways for maintaining Confidentiality
1. Prevention by encrypting the data by limiting the places where it
might appear.
2. Using Firewall wherever possible.
3. Controlling browser settings to block tracking.
4. Browsing privately wherever possible.
5. Taking care while posting on social media.
6. Ensuring safe sites while entering crucial information.
7. Ensuring that the address contains HTTPS and a pad lock sign.
8. Carefully handing emails.
9. Not giving sensitive information on wireess networks.
10.Avoid use of public computers.
Cybercrime

Cybercrime is defined as a crime in which a
computer is the object of the crime e.g.,
hacking, phishing, spamming ,

A computer is used as a tool to commit an
offense. e.g., child pornography, hate crimes.

Some common cybercrimes are:
– Cyber Trolls.
– Cyber Bullying.
– Cyber Stalking.
– Spreading Rumours online.
Cyber Troll

A Cyber Troll is a person who starts quarrel on
the intrenet to distract and sow discord by
posting inflammatory and disgressive ,
extraneous, or off-topic messages to an online
community with the intent of provoking readers
into displaying emotional responses and
normalizing tangential discussion, whether for
the troll's amusement or for a specific gain.
Cyber Bullying

Cyber Bullying is an attack on an individual or a
group through the use of electronic means such
as instant messaging,social media,email and
other forms of online communications with the
intent to abuse,intimidate or over power.

Types of cyber bullying
– Posting any kind of humiliating content about the
victim.
– Hacking the victim's acoount.
– Sending or posting vulgar messages online.
– Threatening to commit act of violence.
– Stalking by means of calls, messages ,etc.
– Threats of child phonography
Cyber Stalking

Cyber stalking is the use of internet or other
electronic means to stalk or harass an
individual, or an organisation.
– Making false accusations or statemets of facts.
– Monitoring.
– Making threats.
– Identify theft
– Damage to data or equipment .
– Solcitation of minors for objectionable activities
– Gathering information that may be used to harass
someone.
Spreading rumours online

By creating fake email ids and masking their
actual identification people post false
information on social networking sites and
spread rumours or make comments which may
hurt others and result in quarres and even lead
to communal tension.
Reporting Cybercrime

In case any cybrecrime invoving a child or student is
detected, it should first be brought to the notice of the
parent and school authorities and then reported to the
police.

The local police stations can be approached for filing
complaints which have designated cybercrime cells.

Complaints can also be registered by filing an e-FIR
which is very convinient.

The ministry of home affairs has also launched a
website for registering crimes against women and
children online including cybercrimes.

An important feature of the IT Act is that the
cybercrime has global jurisdiction.
Combating and Preventing Cybercrime

Handled wisely with the twin approach of being
alert and taking legal help.

Safety measures to reduce the risk of
cybercrimes are:
– Take regular back-up of important data.
– Use an anti-virus and keep it updated.
– Avoid installing pirated softwares. Always download
software from known and secured sites (HTTPS).
– Always update the system software which include
the internet browser and other application software.
– Do not visit or download anything from un-trusted
website.
Appropriate usage of Social Media

Social networking sites can
support participation,
collaboration, and community
building andprove a useful
resource for team based
projects.

Some prominent social media
platforms are:
– Facebook
– Twitter
– Youtube
– LinkedIn
– Blogging Sites
Rules to be followed while working
on social networking sites

Don't give or post any personal information.

Never give out your passwords to anyone except your
parent or gaurdian.

Privacy issues should be considered while choosing a
social networking site.

Add only those people as friends to your page whom you
know in real life.

Delete any unwanted messages, inappropriate comments
and immediatey report those comments to the networking
sites.
Rules to be followed while working
on social networking sites

Care about the share.

Regulary check your privacy settings on social media.

Respect privacy of others.

Keep everything updated.

Be aware of Spams.

Cyber bullying and harassment: If you are targeted by this
kind of behaviour, you must know what to do and where to
get help.

Keep your friends close and strangers at arm's length.

Check your reactions to trolls
Network Security Threats

Threats are potentials for vulnerabilities to turn
into attacks on computer systems and
networks.

They can put individuals, computer systems
and business computers at risk.

Network security measures are needed to
protect data during their transmission and to
guarantee that data transmissions are
authentic.
Denial 0f Services (DoS) Attacks

These are attacks that prevent the legitimate
usera from accessing or using resources and
information.

These may eat up all the resources of the
system and bring the computer to a 'halt' state.

Various DoS attacks are:
– Denial of Access to Information
– Denial of Access to Appliction
– Denial of Access to Resources
– Denial of Access to Website
Malware

Short for “malicious software”

It's file or code delivered over a network that
infects, explores, steals, or conducts virtually
any behaviour an attacker wants.

Main objective of a malware is:
– Provide remote control to an attacker to use an
infected machine.
– Send spam from the infected machine to
unsuspecting targets.
– Investigate the infected user's local network.
– Steal sensitive data.
Viruses

Viruses are programs
that can copy
themselves
throughout a
computer or network.

Can corrupt or deete
data, use the user's
email to spread, or
erase everything on
the hard disk.
Worms and Trojans

Worms are self-replicating
viruses that exploit
security vulnerabilities to
automatically spread
themselves across
computers and networks.


Trojans are malware disguised in what appears
to be legitimate software.

Once activated, Trojans will conduct whatever
actions they have been programmed to carry
out.

They do not replicate or reproduce.
Zombie Computers and Botnets

Zombie is a computer connected to the internet
that has been compromised by an hacker,
computer virus or Trojan horse and can be used
to perform malicious tasks under remote
directions.
– Zeus, Koobface, TidServ, Monkif, Hamweq,
Swizzor, Gammima, etc., are a few examples
of Zombie computers.

Botnet are often used to spread email spam
and launch Denial of Sevice attacks.
Spyware
Spyware are malware that collects
information about the usage of the
infected computer and communicates
it back to the attacker.
– Spyware monitors your internet
activity, tracking your login and
password information and
spying on your sensitive
information.
– Spyware is a malicious
software that includes adware,
keyboard loggers, Trojans and
mobile information stealing
programs.
Phishing and Pharming
Phishing is a type of scam
where the scammers disguise
as a trustworthy source in an
attempt to obtain private
information such as
passwords, credit card
information, etc.,
Pharming is an attack in
which a hacker attempts to
redirect a website's traffic to
another fake or bogus
website.
Adware
Adware refers to a type of malware that displays
unwanted advertisements on your computer or
device.
– Track your movement and activities online in order
to talior specific adverts to you.
– Redirect your activities in order to share adverts
with you.
– Uses up your data, with every pop-up download.
– Uses up power, affecting the performance of your
device.
Child Pornography
Child Pornography is publishing and transmitting obscene material
about children in electronic form.

Safeguards for students
1. Never give address to people whom you do not know.
2. Never publish your personal information in public/social networking sites.
3. The best safety option on facebook is the “only friends” option.
4. Do not open suspicious emails.

Tips for Parents
1. Talk with your children about the importance of keeping personal
information private.
2. Inform them about identity theft and how they can prevent it.
3. Set some internet rules pertaining to websites child is alowed to acces.
4. For a price,obtain an identity theft program that protects your computer's
privacy.

Tips for educators
1.Teach students the importance of keeping their
personal information private.
2.Monitor the websites that students have acces
to.
3.Teach students the dangers of viruses and
pening suspicious emails.

You might also like