The document discusses cyber safety, which involves practices to protect individuals and organizations from online threats such as identity theft, malware, and cybercrime. It explains concepts like online identity, tracking methods, and the importance of strong passwords, as well as the role of cyber law in regulating online activities. Overall, it emphasizes the need for awareness and proactive measures to ensure online safety.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
3 views27 pages
Payal
The document discusses cyber safety, which involves practices to protect individuals and organizations from online threats such as identity theft, malware, and cybercrime. It explains concepts like online identity, tracking methods, and the importance of strong passwords, as well as the role of cyber law in regulating online activities. Overall, it emphasizes the need for awareness and proactive measures to ensure online safety.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27
Name: Payal Sharma
Class :9 –b
Topic : cyber safety
What is cyber safety ? Cyber safety, also known as online safety, encompasses the practices and policies that reduce harm caused by the use of information and communication technology, including the internet and digital devices. It focuses on safeguarding individuals and organizations from various cyber threats and risks. This includes protecting against viruses, scams, cyberbullying, and other malicious activities. What is online identity? Online identity, also known as digital identity, is the collection of information that represents an individual online, including usernames, profiles, and any personal data shared in digital spaces. It's the way we are perceived and the information we make available about ourselves in the online world. Identity theft Identity theft refers to the unauthorized use of someone else's personal information to commit fraud or other crimes. This can involve stealing information like names, addresses, Social Security numbers, and financial account details to open accounts, make purchases, or obtain credit in the victim's name. Essentially, it's using someone else's identity to benefit oneself without their permission. IDENTITY THEFT CAN BE DONE THROUGH: PHISHING: Phishing is a type of online scam where criminals trick people into giving them sensitive information like usernames, passwords, etc… • DUMPSTER DIVING: Dumpster diving in cyber security refers to the act of extracting information from discarded physical or digital waste . • SHOULDER SURFING : A shoulder surfing attack describes a situation where the attacker can physically view the device screen and keypad to obtain personal TRACKING SCRIPT : A tracking script is a piece of code, often JavaScript, embedded into a website's HTML to monitor user behavior and activities. It records things like which pages a user visits, how long they spend on each page, their device and browser, and potentially their location. This information is used for analytics, marketing, and website optimization. WAYS BY WHICH WEBSITES CAN TRACK YOU: IP ADDRESS: An IP address, short for Internet Protocol address, is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It's essentially a device's "online home address". IP addresses are crucial for devices to identify each other and communicate across the internet. COOKIES: cookies aresmall text files that a website stores on your computer or device when you visit it, They help the website remember information about your visit, such as your login details or preferences. These small files are like a digital memory, allowing websites to personalize your experience and make it easier to use. TYPES OF COOKIES First-Party Cookies: These are set by the website the user is currently visiting. Third-Party Cookies: These are set by a different domain than the one the user is visiting, often for tracking and advertising purposes. Session Cookies: These are temporary and are deleted when the user closes their browser. PRIVATE BROWSING: Private browsing (also known as incognito mode or private mode) isa feature in web browsers that allows you to browse the internet with increased privacy, It creates a temporary, isolated session where browsing history, cookies, and other data are not saved on your device once the session ends. PROXY SERVER: A proxy server acts as an intermediary between a user and the internet, routing internet traffic to and from the user's device. It can enhance speed, improve security, and provide access to websites or services that might be blocked in certain locations. VIRTUAL PRIVATE NETWORK: Also known as VPN, which stands for virtual private network , establishes a digital connection between your computer and a remote server owned by a VPN provider, creating a point-to-point tunnel that encrypts your personal data, masks your IP address, and lets you sidestep website blocks and firewalls on the internet. VPN. PASSWORD: In the context of computers and cybersecurity, a password is a secret string of characters, like a word, phrase, or combination of letters and numbers, used to verify a user's identity and grant them access to a system, network, or application. It's designed to be known only to the user and is typically used alongside a username to authenticate a user's access. To protect your passwords online , follow these tips to make them strong At least 12 characters long but 14 or more is better. A combination of uppercase letters, lowercase letters, numbers, and symbols. Think of your User ID as a secondary password. ... Use a pass phrase instead of a password. ... Significantly different from your previous passwords. Online safety Online Safety is being aware of the nature of the possible threats that you could encounter whilst engaging in activity through the Internet. These could be security threats, protecting and managing your personal data, online reputation management, and avoiding harmful or illegal content. Types of malware programs: Viruses: Attach themselves to legitimate files and spread when executed, potentially corrupting data or slowing down systems. Worms: Self-replicate and spread across networks without requiring user action, often overloading networks and compromising multiple devices. Trojans: Disguise themselves as legitimate software to trick users into installing them, creating backdoors for attackers to gain unauthorized access. Ransomware: Encrypts a user's files and demands a ransom payment for the decryption key, potentially locking critical data. Spyware: Secretly monitors user activity and collects information without their knowledge, potentially exposing passwords, financial details, or personal data. Adware: Displays or downloads unwanted advertisements, potentially slowing down system performance and exposing users to other threats. Rootkits: Hide deep within systems, granting attackers persistent access and making detection difficult. Cybercrime Cybercrimes refer to illegal activities conducted using computers and the internet, These crimes encompass a wide range of activities, including hacking, data theft, financial fraud, and malware attacks. Essentially, it's any crime that leverages digital technology to commit or facilitate an illegal act. Cybercrime examples includeidentity theft, phishing, ransomware attacks, hacking, and cyberstalking, These activities use computers and networks to commit illegal acts, ranging from stealing personal information to disrupting systems and causing financial harm. Cyber law : Cyber law encompasses the legal framework governing online activities and interactions, including online privacy, data protection, cybersecurity, e-commerce, and intellectual property rights in the digital space. It aims to ensure the safe and fair use of the internet and digital technologies. Cyber law addresses a wide range of issues, from cybercrimes like hacking and data theft to online contracts and digital communications. Importance of cyber law: Cyber law is crucial in the digital age, providing a legal framework for online activities and safeguarding individuals and organizations. It helps regulate e-commerce, protects intellectual property, ensures data privacy, and combats cybercrimes. In essence, cyber law establishes order and security in the digital world. It covers a large range of issues, including online communication, e-commerce, digital privacy, and the prevention and prosecution of cybercrimes.