0% found this document useful (0 votes)
3 views27 pages

Payal

The document discusses cyber safety, which involves practices to protect individuals and organizations from online threats such as identity theft, malware, and cybercrime. It explains concepts like online identity, tracking methods, and the importance of strong passwords, as well as the role of cyber law in regulating online activities. Overall, it emphasizes the need for awareness and proactive measures to ensure online safety.

Uploaded by

Saina Bano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views27 pages

Payal

The document discusses cyber safety, which involves practices to protect individuals and organizations from online threats such as identity theft, malware, and cybercrime. It explains concepts like online identity, tracking methods, and the importance of strong passwords, as well as the role of cyber law in regulating online activities. Overall, it emphasizes the need for awareness and proactive measures to ensure online safety.

Uploaded by

Saina Bano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Name: Payal Sharma

Class :9 –b

Topic : cyber safety


What is cyber safety ?
Cyber safety, also known as online safety, encompasses
the practices and policies that reduce harm caused by
the use of information and communication technology,
including the internet and digital devices. It focuses on
safeguarding individuals and organizations from
various cyber threats and risks. This includes protecting
against viruses, scams, cyberbullying, and other
malicious activities.
What is online identity?
Online identity, also known as digital
identity, is the collection of information that
represents an individual online, including
usernames, profiles, and any personal data
shared in digital spaces. It's the way we are
perceived and the information we make
available about ourselves in the online
world.
Identity theft
Identity theft refers to the unauthorized use of
someone else's personal information to commit
fraud or other crimes. This can involve stealing
information like names, addresses, Social
Security numbers, and financial account details
to open accounts, make purchases, or obtain
credit in the victim's name. Essentially, it's
using someone else's identity to benefit oneself
without their permission.
IDENTITY THEFT CAN BE DONE
THROUGH:
PHISHING: Phishing is a type of online scam
where criminals trick people into giving them
sensitive information like usernames,
passwords, etc…
• DUMPSTER DIVING: Dumpster diving in
cyber security refers to the act of extracting
information from discarded physical or digital
waste .
• SHOULDER SURFING : A shoulder surfing
attack describes a situation where the
attacker can physically view the device
screen and keypad to obtain personal
TRACKING SCRIPT :
A tracking script is a piece of code, often
JavaScript, embedded into a website's HTML
to monitor user behavior and activities. It
records things like which pages a user visits,
how long they spend on each page, their
device and browser, and potentially their
location. This information is used for
analytics, marketing, and website
optimization.
WAYS BY WHICH WEBSITES CAN TRACK YOU:
IP ADDRESS: An IP address, short for
Internet Protocol address, is a unique
numerical label assigned to each device
connected to a computer network that uses
the Internet Protocol for communication. It's
essentially a device's "online home
address". IP addresses are crucial for devices
to identify each other and communicate
across the internet.
COOKIES: cookies aresmall text files
that a website stores on your
computer or device when you visit
it, They help the website remember
information about your visit, such as
your login details or
preferences. These small files are
like a digital memory, allowing
websites to personalize your
experience and make it easier to
use.
TYPES OF COOKIES
First-Party Cookies: These are set by the
website the user is currently visiting.
Third-Party Cookies: These are set by a
different domain than the one the user is
visiting, often for tracking and advertising
purposes.
Session Cookies: These are temporary and
are deleted when the user closes their
browser.
PRIVATE BROWSING:
Private browsing (also known as incognito
mode or private mode) isa feature in web
browsers that allows you to browse the
internet with increased privacy, It creates
a temporary, isolated session where
browsing history, cookies, and other data
are not saved on your device once the
session ends.
PROXY SERVER:
A proxy server acts as an intermediary
between a user and the internet, routing
internet traffic to and from the user's
device. It can enhance speed, improve
security, and provide access to websites or
services that might be blocked in certain
locations.
VIRTUAL PRIVATE NETWORK:
Also known as VPN, which stands for virtual
private network , establishes a digital
connection between your computer and a
remote server owned by a VPN provider,
creating a point-to-point tunnel that encrypts
your personal data, masks your IP address, and
lets you sidestep website blocks and firewalls
on the internet. VPN.
PASSWORD:
In the context of computers and
cybersecurity, a password is a secret string of
characters, like a word, phrase, or
combination of letters and numbers, used to
verify a user's identity and grant them access
to a system, network, or application. It's
designed to be known only to the user and is
typically used alongside a username to
authenticate a user's access.
To protect your passwords online ,
follow these tips to make them strong
At least 12 characters long but 14 or more is
better.
A combination of uppercase letters,
lowercase letters, numbers, and symbols.
Think of your User ID as a secondary
password. ...
Use a pass phrase instead of a password. ...
 Significantly different from your previous
passwords.
Online safety
Online Safety is being aware of the nature of
the possible threats that you could encounter
whilst engaging in activity through the
Internet. These could be security threats,
protecting and managing your personal data,
online reputation management, and avoiding
harmful or illegal content.
Types of malware programs:
Viruses: Attach themselves to legitimate files
and spread when executed, potentially
corrupting data or slowing down systems.
Worms: Self-replicate and spread across
networks without requiring user action, often
overloading networks and compromising
multiple devices.
Trojans: Disguise themselves as legitimate
software to trick users into installing them,
creating backdoors for attackers to gain
unauthorized access.
Ransomware: Encrypts a user's files and
demands a ransom payment for the
decryption key, potentially locking critical
data.
Spyware: Secretly monitors user activity and
collects information without their knowledge,
potentially exposing passwords, financial
details, or personal data.
Adware: Displays or downloads unwanted
advertisements, potentially slowing down
system performance and exposing users to
other threats.
Rootkits: Hide deep within systems,
granting attackers persistent access and
making detection difficult.
Cybercrime
Cybercrimes refer to illegal activities conducted
using computers and the internet, These crimes
encompass a wide range of activities, including
hacking, data theft, financial fraud, and malware
attacks. Essentially, it's any crime that leverages
digital technology to commit or facilitate an illegal
act. Cybercrime examples includeidentity theft,
phishing, ransomware attacks, hacking, and
cyberstalking, These activities use computers and
networks to commit illegal acts, ranging from
stealing personal information to disrupting systems
and causing financial harm.
Cyber law :
Cyber law encompasses the legal framework
governing online activities and interactions,
including online privacy, data protection,
cybersecurity, e-commerce, and intellectual
property rights in the digital space. It aims to
ensure the safe and fair use of the internet
and digital technologies. Cyber law addresses
a wide range of issues, from cybercrimes like
hacking and data theft to online contracts
and digital communications.
Importance of cyber law:
Cyber law is crucial in the digital age, providing
a legal framework for online activities and
safeguarding individuals and organizations. It
helps regulate e-commerce, protects
intellectual property, ensures data privacy, and
combats cybercrimes. In essence, cyber law
establishes order and security in the digital
world. It covers a large range of issues,
including online communication, e-commerce,
digital privacy, and the prevention and
prosecution of cybercrimes.

You might also like