0% found this document useful (0 votes)
59 views26 pages

Cyber Security

The document discusses cyber safety and security. It covers topics like types of cyber threats like phishing, financial security, cyber bullying, importance of using HTTPS and avoiding public WiFi for payments, best practices like using strong passwords and multi-factor authentication. The document emphasizes the importance of protecting personal information and being aware of potential cyber threats. It highlights how individuals should avoid sharing confidential details with unknown persons or websites and contact authorities if they face any cyber crime issues. Mental health impacts of cyber bullying are also covered through a case study example.

Uploaded by

AnimeshArya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views26 pages

Cyber Security

The document discusses cyber safety and security. It covers topics like types of cyber threats like phishing, financial security, cyber bullying, importance of using HTTPS and avoiding public WiFi for payments, best practices like using strong passwords and multi-factor authentication. The document emphasizes the importance of protecting personal information and being aware of potential cyber threats. It highlights how individuals should avoid sharing confidential details with unknown persons or websites and contact authorities if they face any cyber crime issues. Mental health impacts of cyber bullying are also covered through a case study example.

Uploaded by

AnimeshArya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

CYBER SAFETY &

SECURITY
Resource Person – A
DATE - 1 TIME – 5 Hr
CYBER SAFETY &
SECURITY
What we will learn today

What is Cyber Safety and


security? 01 04 Best Practice for Cyber Safety and
Security

Importance of Cyber Safety


02 05 Mental health while using Mobile

Types of Cyber Threats


03 06 Conclusion & Assessment
Introduction

Cyber Safety and Security refer


to the protection of personal
and confidential information,
as well as systems and
networks, from unauthorized
access, theft, and damage.
Protection of personal and confidential information

Personal Information is your Digital Identity.

Eg – Account Number, UPI ID, Email ID,


Passwords, Net-Banking Identity

Personal
Information
Why should we protect our
Digital Identity?
• Financial Security
• Identity Crisis/ Identity theft/
reputational damage
• Cyber bullying
• Malware Software
• Phishing
• Ransomware
• Internet of Things Attacks
Financial
Security
How Cyber Security is related to Financial Security

Sir I am calling from your


bank, apka ATM block kr
deya gya hai…….

Sir, I am calling from KBC, Apko


10 lakh ka lottery laga hai Apka 5 lakh ka loan pass
Whatsapp pr……. ho gya hai, jiske leye
apko ek OTP jayega……
How to be safe?
Never Share your OTP

Never do Payments on a Public Network

Don’t Pickup International Calls or


Company Number

Never share your personal details


like ATM number, CVV, your
Phone number Online to Unknown
websites
Websites

WWW.G00GLE.COM
WWW.FACEB00K.COM
WWW.BANKOFINDIA1.COM
WWW.FLIPCART.COM

WHICH WEBSITE IS SAFE TO SHARE DATA?


HTTPS VS HTTP

Hypertext Transfer Protocol - a protocol


used to transfer data over the internet. It is the
standard protocol used for communication
between a web server and a web browser.

HTTPS
Hypertext Transfer Protocol Secure
HTTPS uses a secure encrypted connection between the
web server and the web browser. This encryption helps to
protect sensitive information, such as login credentials,
credit card numbers, and other personal information from
being intercepted and accessed by unauthorized third
parties.
Cyber bullying

The use of technology, such as the internet,


social media, or mobile devices, to harass,
intimidate, or bully someone.
This can include sending threatening messages,
spreading rumors, sharing embarrassing photos
or videos, or making hurtful comments online.

Serious consequences
• Mental health,
• Social life, and
• Academic or Professional performance.
Case Study
Jack is a 16-year-old high school student who loves playing
video games and posting his gameplay on social media. Jack
has a small but loyal following, and he enjoys interacting with
his fans. However, Jack recently became the target of
cyberbullying after he posted a video that received some
negative comments. The comments started off as harmless
criticisms of Jack's gameplay, but soon escalated into personal
attacks on his appearance, personality, and family.
Jack tried to ignore the comments, but they kept coming. He
felt anxious and depressed, and he started to avoid social media
and gaming altogether. His grades started to suffer, and he
became more withdrawn from his friends and family. Jack
didn't know what to do, and he felt like there was no escape
from the constant harassment.
One day, Jack's parents found him unresponsive in his room.
He had taken his own life.
Case Study
 What type of cybercrime was did Jack
face?
 What is the role of society in such case?
 How this can be stopped?
 As teachers can we do something?

Each Table should discuss the following Questions and overcome


them with a solution.

Each group should suggest their solution and discuss it with


others.
Phishing
Phishing

STEP 2
Will try to convince STEP 3
you to click the All data your OTP, Banking
LINK Password your Email
Password Will be copied to
another computer

STEP 1
STEP 4
Fasle Mail/ SMS or
Your all date is
Links compromised
IOT – INTERNET OF
THINGS
The Internet of things describes
physical objects with sensors,
processing ability, software, and
other technologies that connect and
exchange data with other devices
and systems over the Internet or
other communications networks.
INTERNET OF THINGS

ASSISTANTS AUTOPILOT
WHO PROVIDE
USER-BASED
PRODUCTS

AUTO DRIVE CARS


DATA IS THE NEW OIL

Have you ever experienced whenever


you are going through the internet, for
example - you want to buy a Bag or
any product from Flipkart, and you
selected it but didn’t buy it for some
cause…….What happens then?
The computer knows
your brain better
than you know your
brain
You are never alone

● Your every touch on any website is being monitored


● Your screen time on the Internet is monitored
● Which type of video do you like
● What you don’t like !!!!
Example: - YOUTUBE suggestion, it will show you only that
type of video which you like
How this can be solved

Don’t install Try to reduce Screen Time


unknown apps

Don’t give permission after


installing the apps

25+ Y/O 25- Y/O


Best practice for Cyber Safety and Security
Use good Passwords which can’t be easily
predicted
• Never do payments on HTTP
• Use Upper Case websites try to use HTTPS

• Use Symbols Like @ ,# , $, % etc. • Never click on unknown links

• Change your banking password or ATM Pin


every 3 months
Best practice for Cyber Safety and Security
If you are in some trouble, Cyber Crime
department is always there to help….

Cyber crime police station in Ranchi


Best practice for Cyber Safety and Security
• If you have lost your CARD, imitating contact
your Bank and block your ATM Card

• Never ever share your OTP with anyone

• Never share your CVV with anyone

• Never talk to an unknown phone number or


unknown Customer Care OR anyone in social
media. They are most probably FRAUDS.
Conclusion

In this digital Era, we must know how to


remain digitally safe.
Internet safety week – 10th-17th Feb

You might also like