You are on page 1of 35

ER

T
PU CT
OM JE
C RO
P
NAME: POOJA V. SHARMA
ROLL NO: 09
CLASS: 11TH SCIENCE
SCHOOL: BHASKARDYUTI VIDYALAYA
SOCIAL
NETWORKING
ABOUT

 The use of dedicated websites and applications to interact with


other users, or to find people with similar interests to one’s
own.
Social networking is the practice of
expanding the number of one’s
business and or social contacts by
making connections through
individuals often through social
media. Sites such as Facebook,
Twitter & Google+.
Based on the six layers of
separation concept, social
networking establishes
interconnected online communities
that help people make contacts that
would be good for them to know,
but that they wold be unlike to
have met otherwise.
 Depending on the social media platform,
members may be able to contact any other
member. In other cases, members can contact
anyone they have a connection to, and
subsequently anyone that contact ahs a
connection to, and so on . Some service require
members to have a preexisting connection to
contact other members.
 While social networking has gone on almost as long as
societies themselves have existed,unparalleled potential of the
web to facilitate such connections has led to an exponential
and ongoing expansion of that phenomenon. In addition to
social media platforms,the capacity of social interaction and
collaboration is increasingly built into business application.
SMART CYBER NETWORKS IS
DISTINCT COST EFFECTIVE
TELECOM SERVICE,
SOFTWARE AND LEADING
INTERNET SERVICE PROVIDER
COMPANY
SMART CYBER
 Smart Cyber Network is a Multinational Internet
Service Provider and also Multi Service Provider
based in India and have been working with data
centers to provide best of the breed solutions and
offer all kind of Public, Private & hybrid cloud
data solutions, internet access and data transport
network , along with calocation in data centers
delivering high-quality Internet , Ethernet and
colocation services which gives your business
more reliability and scalability in terms of your
online infrastructure .
 Smart Cyber Network is distinct cost effective telecom service,
software and leading ISD, ILD company. We are always on top
of it, all making solution for all your needs and generating
technologies that really reflect your needs. System integrator of
electronic security and surveillance products offering cost-
effective and adaptable Integrated Network Solutions enabling
companies make their communication faster and reliable.
The company has already
established itself by its dedication
to quality work. Smart Cyber
Networks provides full range of
IT services , with commitment to
quality , timely delivery and
expertise on the most
contemporary technologies.
What are the
popular websites?
WHAT ARE THE
ADVANTAGES AND
DISADVANTAGES OF
SOCIAL
NETWORKING ?
ADVANTAGES
 Worldwide connectivity
 Communality of interest

 Real time information sharing

 Targated advertising

 Increased news cycle speed


DISADVANTAGES
 Backlash
 Cyberbullying and crimes against children

 Risks of frander inentity theft

 Time waster

 Corporate invasion of privacy


Cyber
Crime
 Cyber crimes can be defined as the uniawful acts
where the computer is used either as a tool or target or
both. The term is a general term that covers crimes
like phishing, credit card frauds , bank robbery, illegal
dowloading, industrial espionage, kidnapping children
via chat rooms, scams , cyber terrorism, creation
and/or distribution of viruses, spam and so on. It also
covers the traditional crimes in which computers or
networks are used to enable the illicit activity.
EXAMPLE OF CYBER CRIME
 Unauthorized access and hacking
 Web hijacking

 Cyber stalking

 Denial of service attack

 Virus attacks
UNAUTHORIZED ACCESS AND
HACKING
 Unauthorized access means any kind of access without
the permission of either of the rightful or person in
charge of the computer, computer system or computer
network.
 Hacking means an illegal intrusion into a computer
system and/or network.
WEB HIJACKING
 Web hijacking means taking foreceful control of another
persons website. in this case the owner of the website
loses control over his website and its content.
CYBER STALKING
 Cyber stalking means repeated acts of harassment or
threat+ning behavior of the cyber criminal towards the
victim by using internet services. Both kind of stalkers
i.e., online and offline-have desire to control the victims
life. Stalking may be followed by serious violent acts
such as physical harm to the victim.
DENIAL OF SERVICE ATTACK
 This is an attack in which the criminal floods the
bandwith of the victim’s network or fills his e-mail box
with spam mail depriving him of the services he is
entitled to access or provide. This kind of attack is
designed to bring the network to crash by flooding it
with useless traffic.
VIRUS ATTACKS
 Viruses are the programs that have the capability to
infect other programs and make copies of itself and
spread into other program. Programs that multiply like
viruses but spread from computer to computer are called
worms.
CYBER
ETHICS
Cyberethics is the philosophic study of
ethics pertaining to computers ,
encompassing user behavior and what
computers are programmed to do,and how
this affects individuals and society.for
years ,various governments have enacted
regulations while organizations have
defined policies about cyberethics.
Cyber ethics is the study of ethics
pertaining to computers,covering user
behaviour and what computers are
programmed to do, and how this affects
individuals and society. For years, various
governments have enacted regulations
while organizations have explained
policies about cyber ethics.
CRIME AND PUNISHMENT
 Children do not believe that they will get into any real
problem from neglecting the use of cyber ethics. It has
become easy to track the origin of wrong activity over
the internet to an individual user . There is not much
anonymity as a child may trust .
HOW TO
SMARTLY USE
INTERNET
 Surf smart
 Choose email addresses and passwords that aren’t guessable

 Use anti virus software

 Use a software firewall

 Only download software from reputable sites

 Scan all downloaded files before opening

 Guard your email address

 Don’t fall for phisling emails


 Be careful opening email attachments
 Never open an email from a stranger

 Don’t unsubscribe to a spam email

 Use Bcc: when forwarding emails and tell others to do the


same
 Spoof your email

 Use anti spam program

 Set up message filters is your mail program


Thank
you…

You might also like