You are on page 1of 20

Cyber

Safety

A Presentation by Vanshika Singh


Class- 7th (B)
What is cyber
safety?

Cyber safety, also known as online safety or electronic safety, refers to the
practices and processes that aim to reduce harm caused by the misuse of
information technology. It involves protecting computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks.
It’s importance

The internet is a powerful tool that has revolutionized the way we live, work,
and communicate. However, it also poses risks if not used wisely. Cyber safety
is important because it helps protect individuals, businesses, and governments
from cyber threats such as hacking, identity theft, and cyberbullying.
Cybersecurity is the practice of protecting computer systems and networks
from unauthorized access or attack. It is important to invest in cybersecurity
to protect sensitive data and assets from criminals 1.
Common Online Threats and How to Stay Safe

The internet, while an incredible world of knowledge and connection, also harbors hidden dangers. Let's explore some of
the most common online threats and how to navigate them safely:
Cyberbullying: 1 in 7 young people affected, leading to severe mental health impacts.
Phishing: Most common cybercrime, tricking users to steal sensitive information and cause financial harm.
Identity Theft: Over 16,000 cases in India alone, causing financial ruin and credit score damage.
Malware: 400% increase in attacks, leading to data loss, system crashes, and potential financial theft.

Staying Safe:
Use strong, unique passwords.
Beware of suspicious links and attachments.
Update software regularly.
Guard your personal information online.

Remember, online safety is a shared responsibility. By educating ourselves and practicing caution, we can create a safer
and more enjoyable digital world for everyone.
1. Email Spoofing
Email spoofing is sending of an email from a forged sender address. It confuses the
recipient into thinking of the email originated from someone or somewhere other that
the intended source.
This is commonplace for spam and phishing emails to use the said spoofing to trick
the recipient into trusting the origin of the message. Email spoofing intends to get
recipients to open, and possibly even respond to, a solicitation. Most of the time these
spoofed messages are usually just a nuisance requiring little ✓ action besides removal.
The more malicious varieties can cause significant problems and sometimes pose a
real security threat.

As an example, a spoofed email may be from a well-known retail business, asking the
recipient to provide personal information, like, a password or credit card number
2. Hacking

Hacking means trying to exploit a computer system or a private network inside a


computer. It is the unauthorized access to or control over the computer network security
systems. The term "hacker" has become associated in popular culture with a "security
hacker". Someone who utilizes his technical knowledge, the know-how of bugs to break
into computer systems and access data which would otherwise be unavailable to him.
Hacking can also be utilized by legitimate figures in legal situations.

For example, Law Enforcement agencies sometimes use hacking techniques to collect
evidence on criminals and other malicious factors.
3. Spamming

Spam email is unsolicited and unwanted junk email sent out in bulk to an indiscriminate
recipient list. It can be sent in massive volume by botnets, networks of infected computers.
Spamemail is sent for commercial purposes as well as for malicious purposes. While some
people view it as unethical, many businesses still use spam. The cost per email is incredibly
low.and businesses can send out mass quantities of emails consistently for advertising their
products or services. Spam email can also be a malicious attempt to gain access to your
computer.
4. Cyber bulling
Cyberbullying is the use of technology to harass, threaten, embarrass, or target runther person.
meals ay online threats, mean, aggressiveon rude texts, tweets, yberbullying means sending
Online testing personal information, pictures, or videos designed to hurt or embarrass someone
else.
Cyberbullying also includes photos, messages, or pages that don't get taken down, even after
the person has been asked to do so. In other words, it's anything that gets posted online and is
meant to hurt, harass or upset someone else
Intimidation or mean comments that focus on things, like a person's gender, religion, sexual
orientation, race, or physical differences count as discrimination, which is against the law in
many states.
Online bullying and harassment can be easier to commit than other acts of bullying because the
bully doesn't have to confront his or her target in person. But cyber experts can trace the origin
of messages and book the culprits.
5. Cyber Throttling

Cyber trolling is a behaviour wherein the troll intends to inflame, upset, or otherwise
damage the civil discourse of his target. In the context of this series of articles, it
tends towards disrupting the online or public communication of others through the
use of vile invective, insults, and other verbal havoc. It is often misogynistic. The ability
to be anonymous on the Internet removes much of the inhibition a person might
otherwise feel to behave so uncivil. But cyber police can trace the origin of messages
and book the culprits.
6. Payment Fraud
Payment fraud is a serious criminal act that involves using stolen or false payment information to
make purchases. It's more than just individual theft; it can be used for identity theft, money laundering,
and even terrorist financing.
Criminals typically steal personally identifiable information (PII) through deceptive tactics like phishing
scams. This information can be used to commit various frauds, including creating fake identities for
further criminal activity.
While data theft is often a step towards fraud, it's not fraud itself. However, various social engineering
techniques like phishing, smishing, vishing, whaling, and pharming play a crucial role in acquiring PII for
fraudulent purposes.

Key takeaways:
Payment fraud harms individuals and fuels larger criminal activities.
PII theft is essential for fraudsters and often achieved through social engineering.
Payment fraud poses a significant threat to online security and requires vigilance.
7. Tips for Cyber Safety

Use strong and unique passwords: Avoid using dictionary words, personal information like birthdays
or pet names, or simple patterns like "123456." Instead, use a combination of upper and lowercase
letters, numbers, and special symbols.
Never reuse passwords: Don't use the same password for multiple accounts. If one account is
compromised, all your other accounts could be at risk.
Consider using a password manager: A password manager can help you generate and store strong,
unique passwords for all your accounts.
Enable two-factor authentication (2FA): Whenever possible, enable 2FA on your accounts. This adds
an extra layer of security by requiring a second factor, such as a code from your phone, to log in.
Privacy Settings:
Review and adjust privacy settings on all your online accounts: This includes social media, email,
banking, and other online services. Limit the information you share publicly and be selective about
who you grant access to your data.

Be careful about what apps and websites you grant access to your data: Only give apps and
websites access to the data they need to function. Be wary of apps or websites that request access
to a lot of your personal information.

Use privacy-focused browsers and search engines: Consider using a privacy-focused browser like
DuckDuckGo or Tor and a search engine like DuckDuckGo to protect your privacy while browsing
the web.

Remember, cyber safety is an ongoing process. By following these tips and staying informed about the
latest threats, you can help protect yourself from online scams and attacks.
General: Tips:
Be wary of phishing scams: Watch out for suspicious emails, texts, or calls that try to
trick you into revealing personal information or clicking malicious links. Never give out your
login credentials or financial information unless you're absolutely sure the sender is
legitimate.
Keep software updated: Regularly update your operating system, web browser, and other
software to patch vulnerabilities that attackers could exploit.
Use a strong antivirus and anti-malware program: Install and regularly update a
reputable antivirus and anti-malware program to protect your devices from
malware and other threats.
Back up your data regularly: Regularly back up your important data to a secure location in
case your devices are compromised or damaged.
Be mindful of what you share online: Think before you post anything online, especially
personal information or anything that could be used to identify you.
Social Enagineering
Social engineering is the term used for a broad range of malicious activities
accomplished through human interactions. It uses psychological
manipulation to trick users into making security mistakes or giving away
sensitive information Social engineering attacks happen in one or more steps.
A perpetrator first investigates the intended victim to gather necessary
background information, such as potential points of entry and weak security
protocols, needed to proceed with the attack. Then, the attacker moves to
gain the victim's trust and provide stimuli for subsequent actions that break
security practices, such as revealing sensitive information or granting access
to critical resources.
Intellectual Property Fraud
Intellectual property (IP) fraud is a broad term that encompasses any deceptive or illegal activity
that infringes on the rights of someone who owns intellectual property. This can include things
like:
Copyright infringement: This is the unauthorized use of someone else's copyrighted material,
such as music, movies, books, or software.
Trademark infringement: This is the unauthorized use of someone else's trademark, which is a
symbol or word that identifies and distinguishes their goods or services from those of others.
Patent infringement: This is the unauthorized use of someone else's patented invention.
Trade secret misappropriation: This is the unauthorized disclosure or use of someone else's
trade secret, which is confidential information that gives a business a competitive advantage.

IP fraud can have serious consequences for both the victim and the perpetrator. For the victim, it
can mean lost profits, damage to their reputation, and even legal action. For the perpetrator, it can
mean fines, imprisonment, and even civil lawsuits.
There are a number of ways to protect yourself from IP fraud. Here are a few tips:

Be aware of the different types of IP fraud. The more you know about the different types of
IP fraud, the better equipped you will be to spot it.
Be careful about what you share online. Don't share your personal information or
confidential business information online unless you are sure that the website or person
you are sharing it with is trustworthy.
Use strong passwords and keep them safe. Don't use the same password for multiple
accounts, and don't share your passwords with anyone.
Install anti-virus and anti-malware software. This software can help to protect your
computer from malware that can be used to steal your intellectual property.
Report any suspected IP fraud to the authorities. If you think that you may have been the
victim of IP fraud, report it to the appropriate authorities.

By following these tips, you can help to protect yourself from IP fraud and ensure that your
intellectual property is safe.
Recap
Cybersecurity isn't just about technology, it's about behavior. Our vigilance and awareness are
instrumental in preventing attacks.
Simple, proactive steps like strong passwords, smart sharing, and software updates can significantly
boost our online defense.
Remember, scams come in many forms! Be wary of phishing, social engineering, and malware
masquerading as harmless links or downloads.
Data, once stolen, can fuel larger crimes. Protecting our PII is crucial to combatting not just
personal theft, but organized crime and even terrorist financing.
A Call to Action:
As responsible digital citizens, let's embrace these learnings and actively:
Practice cyber hygiene daily. Strong passwords, privacy settings, and critical thinking are our
frontline tools.
Educate others! Share your knowledge and empower your family and friends to be safer online.
Support responsible technology development. Advocate for data privacy and security as core
principles in the digital world.
By taking these steps, we can foster a more secure and trusted online environment for everyone.
Together, let's build a stronger digital future!
Real-Life Cyber Safety Scenarios:
Scenario 1: The Phishing Attack (A Classic Trap):
Imagine receiving an email from your "bank," notifying you about suspicious activity on your
account. Panicked, you click the provided link to "secure" your account. Unfortunately, it's a
phishing scam! You've just entered your login credentials into a fake website, handing over your
financial data to cybercriminals.
Cyber Safety Tips in Action:
Hover, don't click: Before clicking any link, hover over it to see the actual destination URL.
Check for misspellings or inconsistencies.
Verify directly: Contact your bank through a trusted channel, like their official website or
phone number, to confirm the email's legitimacy.
Enable 2FA: Two-factor authentication adds an extra layer of security, even if your password
is compromised.
Q&A
Now's the time to delve deeper and engage in some open discussion. Don't hesitate to raise your hand or
jump in with any questions, comments, or personal experiences you'd like to share.
Here are some questions to get the conversation rolling:

Has anyone encountered a real-life cyber security situation similar to the scenarios we discussed?
How did you handle it?
Which cyber safety tip resonates with you the most? Why?
Are there any specific online platforms or activities you feel particularly vulnerable on? How can we
address those concerns?
What additional questions or concerns do you have about cyber safety in today's digital world?
Let's brainstorm some creative ways to spread awareness about cyber safety within our community.

Remember, there are no wrong questions here. This is a safe space to learn, share, and build our
collective knowledge about staying secure online. I encourage everyone to actively participate and make
the most of this open forum. Let's keep the conversation flowing!
I want to extend a heartfelt thank you to everyone for your active participation and valuable
insights during this session. The questions and discussions raised today have been incredibly
enriching, and it's clear that cyber safety is a topic that deeply resonates with all of us.
Remember, the journey towards a safer online space is continuous. Don't hesitate to keep the
conversation going! If you have any further questions or concerns, please feel free to reach
out to me at [your email address or preferred communication method].
I'm always happy to offer additional information, discuss specific scenarios, or simply
connect with you on this vital subject. Thanks again for your engagement, and let's keep
building a more secure and responsible digital world together!

You might also like