Cyber Security
Cyber Security
SECURITY
Resource Person – A
DATE - 1 TIME – 5 Hr
CYBER SAFETY &
SECURITY
What we will learn today
Personal
Information
Why should we protect our
Digital Identity?
• Financial Security
• Identity Crisis/ Identity theft/
reputational damage
• Cyber bullying
• Malware Software
• Phishing
• Ransomware
• Internet of Things Attacks
Financial
Security
How Cyber Security is related to Financial Security
WWW.G00GLE.COM
WWW.FACEB00K.COM
WWW.BANKOFINDIA1.COM
WWW.FLIPCART.COM
HTTPS
Hypertext Transfer Protocol Secure
HTTPS uses a secure encrypted connection between the
web server and the web browser. This encryption helps to
protect sensitive information, such as login credentials,
credit card numbers, and other personal information from
being intercepted and accessed by unauthorized third
parties.
Cyber bullying
Serious consequences
• Mental health,
• Social life, and
• Academic or Professional performance.
Case Study
Jack is a 16-year-old high school student who loves playing
video games and posting his gameplay on social media. Jack
has a small but loyal following, and he enjoys interacting with
his fans. However, Jack recently became the target of
cyberbullying after he posted a video that received some
negative comments. The comments started off as harmless
criticisms of Jack's gameplay, but soon escalated into personal
attacks on his appearance, personality, and family.
Jack tried to ignore the comments, but they kept coming. He
felt anxious and depressed, and he started to avoid social media
and gaming altogether. His grades started to suffer, and he
became more withdrawn from his friends and family. Jack
didn't know what to do, and he felt like there was no escape
from the constant harassment.
One day, Jack's parents found him unresponsive in his room.
He had taken his own life.
Case Study
What type of cybercrime was did Jack
face?
What is the role of society in such case?
How this can be stopped?
As teachers can we do something?
STEP 2
Will try to convince STEP 3
you to click the All data your OTP, Banking
LINK Password your Email
Password Will be copied to
another computer
STEP 1
STEP 4
Fasle Mail/ SMS or
Your all date is
Links compromised
IOT – INTERNET OF
THINGS
The Internet of things describes
physical objects with sensors,
processing ability, software, and
other technologies that connect and
exchange data with other devices
and systems over the Internet or
other communications networks.
INTERNET OF THINGS
ASSISTANTS AUTOPILOT
WHO PROVIDE
USER-BASED
PRODUCTS