SlideShare a Scribd company logo
1 of 18
Download to read offline
Chapter 17 :
Computer Science
Class XI ( As per
CBSE Board) Cyber
Safety
Visit : python.mykvs.in for regular updates
Introduction-Cyber Safety
Visit : python.mykvs.in for regular updates
Cyber safety is the safe and responsible use of Internet
& ICT(Information & Communication Technology).
Cyber safety is about to not only keeping information
safe and secure, but also being responsible with that
information, being respectful of other people online. As
per Cyber safety peoples are advised to use good
'netiquette' (internet etiquettes).
Safely Browsing the Web
Visit : python.mykvs.in for regular updates
Viruses and malware spread, easily and quickly through
websites/web browsing. Through clicking over the links found on
web pages or in email mistakenly our computer may be infected.
An infected computer can run slow, barrage us with pop-ups,
download other programs without our permission, or allow our
sensitive personal information to others.
Tips for Safe Web Browsing
๏ƒ˜ Common sense-(never respond to spam & disclose
personal information).
๏ƒ˜ Use an antivirus & Firewall-It provide realtime malware
protection.
๏ƒ˜ Create strong passwords
๏ƒ˜ Mind your downloads -Be sure to review all pre-checked
boxes prompted at download & un-check any extra
applications which we donโ€™t want to install.
๏ƒ˜ Stay updated- Update O.S.,Applications & Anti-virus.
Identity Protection
Visit : python.mykvs.in for regular updates
Protection against theft of personal information over Cyber
Space without consent, usually for financial gain is known as
Identity Protection.
Tips to Prevent Identity Theft
๏ƒ˜ Use strong passwords and PINs & Keep passwords and
PINs safe.
๏ƒ˜ Create log-in passwords for all devices.
๏ƒ˜ Beware of phishing scams.
๏ƒ˜ Restore old computers to factory settings.
๏ƒ˜ Encrypt your hard drive
๏ƒ˜ Check security when shopping online-check links authenticity
which are received from an unsolicited email.
๏ƒ˜ Take care when posting on social media-Check security settings
on social media accounts, and avoid posting personal information publicly, or
publicly "checking in" .
๏ƒ˜ Secure your home Wi-Fi network& Avoid using insecure public Wi-Fi
networks
Confidentiality of Information
Visit : python.mykvs.in for regular updates
Allows authorized users to access sensitive and secured
data maintains the Confidentiality of Information.
Tips to Protect Information Confidential
๏ƒ˜ Build strong passwords
๏ƒ˜ Use multifactor authentication- a computer user is granted access
only after successfully presenting 2 or more pieces of evidence.
๏ƒ˜ Masking -The free version of MaskMe creates an alternate e-mail address
whenever a Web site asks for a userโ€™s e-mail. E-mails from that site can be
accessed via a MaskMe in-box or forwarded to a userโ€™s regular e-mail account.
๏ƒ˜ Private Browsing & Safe Browsing-Purpose of pvt browsing is to
avoid leaving a history of one's browsing in the browser history on the
computer we are using.Use updated brower for safe browsing & browse privately.
๏ƒ˜ Encryption-Use https based sites,as HTTPS ensures data security over the
network - mainly public networks like Wi-Fi. HTTP is not encrypted and is
vulnerable to attackers. PGP is a popular program used to encrypt and
decrypt email over the Internet, as well as authenticate messages with digital
signatures and encrypted stored files.
๏ƒ˜ Avoide using public wifi and public computer
Cyber Safety โ€“ Social Networks
Visit : python.mykvs.in for regular updates
Facebook, MySpace, Twitter, LinkedIn, Digg,Ning, MeetUp
etcโ€ฆ.. -- the number of social networking sites and tools is
exploding nowadays.These are becoming soft tool to attack
& target for scam.
Tips to stay safe on social media
๏ƒ˜ Use a strong password
๏ƒ˜ Use a different password for each social media
๏ƒ˜ Password protect your devices if using social media apps
๏ƒ˜ Be selective with friend requests.
๏ƒ˜ Be careful while sharing something.
๏ƒ˜ Become familiar with the privacy policies of the social
media sites.
๏ƒ˜ Install antivirus
๏ƒ˜ log off when done
๏ƒ˜ Create a smaller social network
Cyber trolls & Cyber bullying
Visit : python.mykvs.in for regular updates
Cyber trolling is internet slang for a person who
intentionally starts arguments or upsets others by posting
inflammatory remarks. The sole purpose of trolling is
angering people. Purpose โ€“ to entertain,to argument,to
upset victim,to get attention
Cyberbulling: Saying and/or doing mean things to the
person online. It is a harm inflicted through using the
Internet,ICT devices,or mobile phones. Purpose โ€“ to get
revenge,to harass & threat, to humiliate
Cyberstalking: Doing research on every aspect of the
personโ€™s life.
Cyberharrassment: Continuously contacting the person
online, even though they donโ€™t want you to.
Appropriate Usage of Social Network
Visit : python.mykvs.in for regular updates
Social Network refers to web and mobile technologies or
their practices to share content, thoughts, ideas, opinions,
experiences etc. online. Various examples of social
networks are Facebook, Twitter, YouTube, LinkedIn, and
blogging sites among many others.
Appropriate Usage of Social Network
Visit : python.mykvs.in for regular updates
Problems to Avoid
๏ƒ˜ Cyber trolling
๏ƒ˜ Cyberbulling
๏ƒ˜ Cyberstalking
๏ƒ˜ Cyberharrassment
๏ƒ˜ Stranger Danger-
Children's are advised to not to interact with strangers on
social networks as there are chances that many people on
social media are not who they say they are.
๏ƒ˜ Digital Footprint-
The history of a person's usage of digital devices, movie
search, programs watched, flight searched, websites
surfed, credit card transaction,cell phone calls,social
media messages sent, links clicked and Facebook pages
liked etc.Such information is being used to target ads to
consumers as these are digital footprint of such
consumers.
Appropriate Usage of Social Network
Visit : python.mykvs.in for regular updates
Problems to Avoid
๏ƒ˜ Spread of rumors -
A lie can travel halfway around the world before the truth has
got its boots, this phrase totally fits with rumors spread over social
media. On average, it takes more than 12 hours for a false claim to be
debunked online where as only 2 hours for true claim.
A standard model of rumor spreading is given by Daley and
Kendall ,which is called DK model.In this model there are N people in
total. Which are categorized into three groups: ignorants, spreaders
and stiflers, which are denoted as S, I, and R.
when a spreader meet an ignorant, the ignorant will become a
spreader.
when two spreaders meet with each other, one of them will
become a stifler.
when a spreader meet a stifler, the spreader will lose the
interest in spreading the rumor, so become a stifler.
So
Appropriate Usage of Social Network
Visit : python.mykvs.in for regular updates
๏ƒ˜Donโ€™t be rude or abusive
๏ƒ˜Donโ€™t spread rumors
๏ƒ˜You are what you write/tweet
๏ƒ˜Face your problems, donโ€™t Post/facebook your
problems.
๏ƒ˜Donโ€™t take it too seriously.
๏ƒ˜Donโ€™t use fake name
๏ƒ˜Protect your identity
๏ƒ˜Respect otherโ€™s sentiments
๏ƒ˜Donโ€™t fight online
๏ƒ˜Monitor comments
Visit : python.mykvs.in for regular updates
Malware: Malware could be computer viruses, worms, Trojan horses,
dishonest spyware, and malicious .
computer virus: It is a small piece of software that can spread from one
infected computer to another. It can corrupt, steal, or delete data on your
computer/hard drive.
Trojan horse: can do anything from record your passwords by logging
keystrokes (known as a keylogger) to hijacking your webcam to watch
and record your every move.
Computer worm: A computer worm is a software program that can copy
itself from one computer to another, without human interaction.
Spam: unwanted messages in your email inbox.
Phishing:Phishing are fraudulent attempts by cybercriminals to obtain
private information. For e.g.a message prompt your personal information
by pretending that bank/mail service provider is updating its website.
spyware: spyware is used to spy on their victims. An e.g. is keylogger
software that records a victimโ€™s every keystroke on his or her keyboard.
Adware : unwanted ads shown while surfing internet.
Eavesdropping : is the act of intercepting communications between two
points.
Computer Security Threats
Visit : python.mykvs.in for regular updates
Safely accessing web sites
๏ƒ˜ How to prevent/remove Adware/malware
๏‚ง Uninstall the malicious programs from Windows
๏‚ง Use antivirus program for malware and unwanted programs
๏‚ง Reset the browser settings to their original defaults
๏‚ง Scan for malicious programs antivirus/antimalware program
๏ƒ˜ How to prevent/remove virus
๏‚ง Beware of Fake Download Buttons
๏‚ง Use a Secure Browser
๏‚ง Avoid Public Torrent Sites
๏‚ง Donโ€™t Open Email Attachments Forwarded to You
๏‚ง Donโ€™t Use Your PCโ€™s Admin Account
๏‚ง Scan All New Files and Disks
๏ƒ˜ How to prevent/remove Trojan
๏‚ง Never open unsolicited emails from unknown senders
๏‚ง Avoid downloading and installing programs unless you fully trust
publisher
๏‚ง Use firewall software
๏‚ง Use a fully updated antivirus program
Visit : python.mykvs.in for regular updates
Safely Communicating data
๏ฑ Secure Connections
A secure connection refers to the connection which is encrypted by one
or more security protocols for security of data flowing between two or
more nodes. When it is not encrypted, it can be easily listened by
anyone with the knowledge on how to do it.
๏ƒ˜ Secure Sockets Layer (SSL) is a computer networking protocol used
for insecure network, between network application clients and
servers .Due to various flaws, SSL was deprecated for use on the
internet by the Internet Engineering Task Force (IETF) in 2015 by the
Transport Layer Security (TLS) protocol. Both are not interoperable,
TLS is backwards-compatible with SSL 3.0
Visit : python.mykvs.in for regular updates
Safely Communicating data
Secure Connections
๏ƒ˜ Transport Layer Security (TLS) encrypts data moving over the
network or Internet to ensure that any body(hacker/evesdropper) will
not be able to see what is transmitting. It is useful for private and
sensitive information such as passwords, credit card numbers, and
personal correspondence.
How it works
TLS uses a combination of symmetric and asymmetric cryptography
both for better security.With symmetric cryptography, data is encrypted
and decrypted with a secret key known to both sender and recipient;
typically 128 but preferably 256 bits in length (anything less than 80
bits is now considered insecure). Symmetric cryptography uses a
common secret key ,which is shared a secure manner.
Asymmetric cryptography uses 2 keys โ€“ a public key, and a private key.
The public key of the recipient to be used by the sender to encrypt the
data they wish to send to them, but that data can only be decrypted
with the private key of the recipient.
Visit : python.mykvs.in for regular updates
Safely Communicating data
Secure Connections
๏ƒ˜ Hyper Text Transfer Protocol Secure (HTTPS) is the secure version
of HTTP, the protocol over which data is sent between your browser
and the website server. HTTPS pages typically use one of two
secure protocols to encrypt communications - SSL (Secure Sockets
Layer) or TLS (Transport Layer Security).
๏ฑ Eavesdropping-eavesdropping in a man in middle attack and the
message is passing from the client to server. The solutions to this
problem are:
๏ƒผ to encrypt the message
๏ƒผ to encrypt the channel
Both are appropriate in different situations. To prevent
Eavesdropping in any kind of communication channel can be achieved
by usage of "Secure Tunneling" of your channel data.
Visit : python.mykvs.in for regular updates
Safely Communicating data
๏ฑ Phishing-Phishing are fraudulent attempts by cybercriminals to
obtain private information. For e.g.a message prompt your personal
information by pretending that bank/mail service provider is
updating its website.
There are various phishing techniques used by attackers:
o Embedding a link in an email to redirect to an unsecure website that
requests sensitive information
o Installing a Trojan via a malicious email attachment
o Spoofing the senderโ€™s address in an email to appear as a reputable
source and request sensitive information
o Attempting to obtain information over the phone by impersonating a
known company vendor.
Few steps to protect against phishing-
Deploy a SPAM filter, Keep all systems current with the latest security
patches and updates, Install an antivirus solution, Develop a security
policy, Deploy a web filter to block malicious websites, Encrypt all
sensitive information.
Visit : python.mykvs.in for regular updates
Safely Communicating data
๏ฑ Identity verification methods
๏ƒ˜ Knowledge-Based Authentication (KBA)-by asking them to
answer specific security questions
๏ƒ˜ Two Factor Authentication (2FA)-not only a password and
username, but also something that the user has with them
๏ƒ˜ Database Solutions-behavioral patterns to detect if an online ID is
authentic, a fraudster or a bot.
๏ƒ˜ Online Identity Verification-A mix of artificial intelligence, computer vision,
and verification experts to determine if a government-issued ID is
authentic and belongs to the user.
๏ƒ˜ Biometric verification -by which a person can be uniquely identified by
evaluating one or more distinguishing biological traits.

More Related Content

What's hot

presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
ย 
Cybersecurity
CybersecurityCybersecurity
CybersecurityForam Gosai
ย 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
ย 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
ย 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber TerrorismShivam Lohiya
ย 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
ย 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
ย 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07Habib Siddiqui
ย 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimezahid_ned
ย 
Cybercrime
CybercrimeCybercrime
CybercrimeVansh Verma
ย 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
ย 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
ย 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awarenessRishab garg
ย 

What's hot (20)

presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
ย 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ย 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
ย 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
ย 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
ย 
Cyber security
Cyber securityCyber security
Cyber security
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
ย 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
ย 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
ย 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
ย 
cyber security
cyber securitycyber security
cyber security
ย 
Haking PPT
Haking PPTHaking PPT
Haking PPT
ย 
Hacking
HackingHacking
Hacking
ย 
Cybercrime
CybercrimeCybercrime
Cybercrime
ย 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
ย 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
ย 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
ย 

Similar to cyber safety.pdf

โ€œIn 2024 Guide to Cyber Security: Protect Your Data Todayโ€
โ€œIn 2024  Guide to Cyber Security: Protect Your Data Todayโ€โ€œIn 2024  Guide to Cyber Security: Protect Your Data Todayโ€
โ€œIn 2024 Guide to Cyber Security: Protect Your Data Todayโ€tunzida045
ย 
โ€œIn 2024 Guide to Cyber Security: Protect Your Data Todayโ€
โ€œIn 2024  Guide to Cyber Security: Protect Your Data Todayโ€โ€œIn 2024  Guide to Cyber Security: Protect Your Data Todayโ€
โ€œIn 2024 Guide to Cyber Security: Protect Your Data Todayโ€tunzida045
ย 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
ย 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
ย 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
ย 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
ย 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
ย 
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyberambessador
ย 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
ย 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
ย 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
ย 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
ย 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
ย 
Computer security
Computer securityComputer security
Computer securityEktaVaswani2
ย 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptxJoselitoJMebolos
ย 
cyber_security
cyber_securitycyber_security
cyber_securityJana Baxter
ย 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
ย 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
ย 

Similar to cyber safety.pdf (20)

โ€œIn 2024 Guide to Cyber Security: Protect Your Data Todayโ€
โ€œIn 2024  Guide to Cyber Security: Protect Your Data Todayโ€โ€œIn 2024  Guide to Cyber Security: Protect Your Data Todayโ€
โ€œIn 2024 Guide to Cyber Security: Protect Your Data Todayโ€
ย 
โ€œIn 2024 Guide to Cyber Security: Protect Your Data Todayโ€
โ€œIn 2024  Guide to Cyber Security: Protect Your Data Todayโ€โ€œIn 2024  Guide to Cyber Security: Protect Your Data Todayโ€
โ€œIn 2024 Guide to Cyber Security: Protect Your Data Todayโ€
ย 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
ย 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
ย 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
ย 
techalpha07
techalpha07techalpha07
techalpha07
ย 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
ย 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
ย 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
ย 
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | Cybersecurity
ย 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
ย 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ย 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
ย 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
ย 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
ย 
Computer security
Computer securityComputer security
Computer security
ย 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
ย 
cyber_security
cyber_securitycyber_security
cyber_security
ย 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
ย 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
ย 

Recently uploaded

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7Call Girls in Nagpur High Profile Call Girls
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Call Girls in Nagpur High Profile
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .DerechoLaboralIndivi
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
ย 

Recently uploaded (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 

cyber safety.pdf

  • 1. Chapter 17 : Computer Science Class XI ( As per CBSE Board) Cyber Safety Visit : python.mykvs.in for regular updates
  • 2. Introduction-Cyber Safety Visit : python.mykvs.in for regular updates Cyber safety is the safe and responsible use of Internet & ICT(Information & Communication Technology). Cyber safety is about to not only keeping information safe and secure, but also being responsible with that information, being respectful of other people online. As per Cyber safety peoples are advised to use good 'netiquette' (internet etiquettes).
  • 3. Safely Browsing the Web Visit : python.mykvs.in for regular updates Viruses and malware spread, easily and quickly through websites/web browsing. Through clicking over the links found on web pages or in email mistakenly our computer may be infected. An infected computer can run slow, barrage us with pop-ups, download other programs without our permission, or allow our sensitive personal information to others. Tips for Safe Web Browsing ๏ƒ˜ Common sense-(never respond to spam & disclose personal information). ๏ƒ˜ Use an antivirus & Firewall-It provide realtime malware protection. ๏ƒ˜ Create strong passwords ๏ƒ˜ Mind your downloads -Be sure to review all pre-checked boxes prompted at download & un-check any extra applications which we donโ€™t want to install. ๏ƒ˜ Stay updated- Update O.S.,Applications & Anti-virus.
  • 4. Identity Protection Visit : python.mykvs.in for regular updates Protection against theft of personal information over Cyber Space without consent, usually for financial gain is known as Identity Protection. Tips to Prevent Identity Theft ๏ƒ˜ Use strong passwords and PINs & Keep passwords and PINs safe. ๏ƒ˜ Create log-in passwords for all devices. ๏ƒ˜ Beware of phishing scams. ๏ƒ˜ Restore old computers to factory settings. ๏ƒ˜ Encrypt your hard drive ๏ƒ˜ Check security when shopping online-check links authenticity which are received from an unsolicited email. ๏ƒ˜ Take care when posting on social media-Check security settings on social media accounts, and avoid posting personal information publicly, or publicly "checking in" . ๏ƒ˜ Secure your home Wi-Fi network& Avoid using insecure public Wi-Fi networks
  • 5. Confidentiality of Information Visit : python.mykvs.in for regular updates Allows authorized users to access sensitive and secured data maintains the Confidentiality of Information. Tips to Protect Information Confidential ๏ƒ˜ Build strong passwords ๏ƒ˜ Use multifactor authentication- a computer user is granted access only after successfully presenting 2 or more pieces of evidence. ๏ƒ˜ Masking -The free version of MaskMe creates an alternate e-mail address whenever a Web site asks for a userโ€™s e-mail. E-mails from that site can be accessed via a MaskMe in-box or forwarded to a userโ€™s regular e-mail account. ๏ƒ˜ Private Browsing & Safe Browsing-Purpose of pvt browsing is to avoid leaving a history of one's browsing in the browser history on the computer we are using.Use updated brower for safe browsing & browse privately. ๏ƒ˜ Encryption-Use https based sites,as HTTPS ensures data security over the network - mainly public networks like Wi-Fi. HTTP is not encrypted and is vulnerable to attackers. PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. ๏ƒ˜ Avoide using public wifi and public computer
  • 6. Cyber Safety โ€“ Social Networks Visit : python.mykvs.in for regular updates Facebook, MySpace, Twitter, LinkedIn, Digg,Ning, MeetUp etcโ€ฆ.. -- the number of social networking sites and tools is exploding nowadays.These are becoming soft tool to attack & target for scam. Tips to stay safe on social media ๏ƒ˜ Use a strong password ๏ƒ˜ Use a different password for each social media ๏ƒ˜ Password protect your devices if using social media apps ๏ƒ˜ Be selective with friend requests. ๏ƒ˜ Be careful while sharing something. ๏ƒ˜ Become familiar with the privacy policies of the social media sites. ๏ƒ˜ Install antivirus ๏ƒ˜ log off when done ๏ƒ˜ Create a smaller social network
  • 7. Cyber trolls & Cyber bullying Visit : python.mykvs.in for regular updates Cyber trolling is internet slang for a person who intentionally starts arguments or upsets others by posting inflammatory remarks. The sole purpose of trolling is angering people. Purpose โ€“ to entertain,to argument,to upset victim,to get attention Cyberbulling: Saying and/or doing mean things to the person online. It is a harm inflicted through using the Internet,ICT devices,or mobile phones. Purpose โ€“ to get revenge,to harass & threat, to humiliate Cyberstalking: Doing research on every aspect of the personโ€™s life. Cyberharrassment: Continuously contacting the person online, even though they donโ€™t want you to.
  • 8. Appropriate Usage of Social Network Visit : python.mykvs.in for regular updates Social Network refers to web and mobile technologies or their practices to share content, thoughts, ideas, opinions, experiences etc. online. Various examples of social networks are Facebook, Twitter, YouTube, LinkedIn, and blogging sites among many others.
  • 9. Appropriate Usage of Social Network Visit : python.mykvs.in for regular updates Problems to Avoid ๏ƒ˜ Cyber trolling ๏ƒ˜ Cyberbulling ๏ƒ˜ Cyberstalking ๏ƒ˜ Cyberharrassment ๏ƒ˜ Stranger Danger- Children's are advised to not to interact with strangers on social networks as there are chances that many people on social media are not who they say they are. ๏ƒ˜ Digital Footprint- The history of a person's usage of digital devices, movie search, programs watched, flight searched, websites surfed, credit card transaction,cell phone calls,social media messages sent, links clicked and Facebook pages liked etc.Such information is being used to target ads to consumers as these are digital footprint of such consumers.
  • 10. Appropriate Usage of Social Network Visit : python.mykvs.in for regular updates Problems to Avoid ๏ƒ˜ Spread of rumors - A lie can travel halfway around the world before the truth has got its boots, this phrase totally fits with rumors spread over social media. On average, it takes more than 12 hours for a false claim to be debunked online where as only 2 hours for true claim. A standard model of rumor spreading is given by Daley and Kendall ,which is called DK model.In this model there are N people in total. Which are categorized into three groups: ignorants, spreaders and stiflers, which are denoted as S, I, and R. when a spreader meet an ignorant, the ignorant will become a spreader. when two spreaders meet with each other, one of them will become a stifler. when a spreader meet a stifler, the spreader will lose the interest in spreading the rumor, so become a stifler. So
  • 11. Appropriate Usage of Social Network Visit : python.mykvs.in for regular updates ๏ƒ˜Donโ€™t be rude or abusive ๏ƒ˜Donโ€™t spread rumors ๏ƒ˜You are what you write/tweet ๏ƒ˜Face your problems, donโ€™t Post/facebook your problems. ๏ƒ˜Donโ€™t take it too seriously. ๏ƒ˜Donโ€™t use fake name ๏ƒ˜Protect your identity ๏ƒ˜Respect otherโ€™s sentiments ๏ƒ˜Donโ€™t fight online ๏ƒ˜Monitor comments
  • 12. Visit : python.mykvs.in for regular updates Malware: Malware could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious . computer virus: It is a small piece of software that can spread from one infected computer to another. It can corrupt, steal, or delete data on your computer/hard drive. Trojan horse: can do anything from record your passwords by logging keystrokes (known as a keylogger) to hijacking your webcam to watch and record your every move. Computer worm: A computer worm is a software program that can copy itself from one computer to another, without human interaction. Spam: unwanted messages in your email inbox. Phishing:Phishing are fraudulent attempts by cybercriminals to obtain private information. For e.g.a message prompt your personal information by pretending that bank/mail service provider is updating its website. spyware: spyware is used to spy on their victims. An e.g. is keylogger software that records a victimโ€™s every keystroke on his or her keyboard. Adware : unwanted ads shown while surfing internet. Eavesdropping : is the act of intercepting communications between two points. Computer Security Threats
  • 13. Visit : python.mykvs.in for regular updates Safely accessing web sites ๏ƒ˜ How to prevent/remove Adware/malware ๏‚ง Uninstall the malicious programs from Windows ๏‚ง Use antivirus program for malware and unwanted programs ๏‚ง Reset the browser settings to their original defaults ๏‚ง Scan for malicious programs antivirus/antimalware program ๏ƒ˜ How to prevent/remove virus ๏‚ง Beware of Fake Download Buttons ๏‚ง Use a Secure Browser ๏‚ง Avoid Public Torrent Sites ๏‚ง Donโ€™t Open Email Attachments Forwarded to You ๏‚ง Donโ€™t Use Your PCโ€™s Admin Account ๏‚ง Scan All New Files and Disks ๏ƒ˜ How to prevent/remove Trojan ๏‚ง Never open unsolicited emails from unknown senders ๏‚ง Avoid downloading and installing programs unless you fully trust publisher ๏‚ง Use firewall software ๏‚ง Use a fully updated antivirus program
  • 14. Visit : python.mykvs.in for regular updates Safely Communicating data ๏ฑ Secure Connections A secure connection refers to the connection which is encrypted by one or more security protocols for security of data flowing between two or more nodes. When it is not encrypted, it can be easily listened by anyone with the knowledge on how to do it. ๏ƒ˜ Secure Sockets Layer (SSL) is a computer networking protocol used for insecure network, between network application clients and servers .Due to various flaws, SSL was deprecated for use on the internet by the Internet Engineering Task Force (IETF) in 2015 by the Transport Layer Security (TLS) protocol. Both are not interoperable, TLS is backwards-compatible with SSL 3.0
  • 15. Visit : python.mykvs.in for regular updates Safely Communicating data Secure Connections ๏ƒ˜ Transport Layer Security (TLS) encrypts data moving over the network or Internet to ensure that any body(hacker/evesdropper) will not be able to see what is transmitting. It is useful for private and sensitive information such as passwords, credit card numbers, and personal correspondence. How it works TLS uses a combination of symmetric and asymmetric cryptography both for better security.With symmetric cryptography, data is encrypted and decrypted with a secret key known to both sender and recipient; typically 128 but preferably 256 bits in length (anything less than 80 bits is now considered insecure). Symmetric cryptography uses a common secret key ,which is shared a secure manner. Asymmetric cryptography uses 2 keys โ€“ a public key, and a private key. The public key of the recipient to be used by the sender to encrypt the data they wish to send to them, but that data can only be decrypted with the private key of the recipient.
  • 16. Visit : python.mykvs.in for regular updates Safely Communicating data Secure Connections ๏ƒ˜ Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website server. HTTPS pages typically use one of two secure protocols to encrypt communications - SSL (Secure Sockets Layer) or TLS (Transport Layer Security). ๏ฑ Eavesdropping-eavesdropping in a man in middle attack and the message is passing from the client to server. The solutions to this problem are: ๏ƒผ to encrypt the message ๏ƒผ to encrypt the channel Both are appropriate in different situations. To prevent Eavesdropping in any kind of communication channel can be achieved by usage of "Secure Tunneling" of your channel data.
  • 17. Visit : python.mykvs.in for regular updates Safely Communicating data ๏ฑ Phishing-Phishing are fraudulent attempts by cybercriminals to obtain private information. For e.g.a message prompt your personal information by pretending that bank/mail service provider is updating its website. There are various phishing techniques used by attackers: o Embedding a link in an email to redirect to an unsecure website that requests sensitive information o Installing a Trojan via a malicious email attachment o Spoofing the senderโ€™s address in an email to appear as a reputable source and request sensitive information o Attempting to obtain information over the phone by impersonating a known company vendor. Few steps to protect against phishing- Deploy a SPAM filter, Keep all systems current with the latest security patches and updates, Install an antivirus solution, Develop a security policy, Deploy a web filter to block malicious websites, Encrypt all sensitive information.
  • 18. Visit : python.mykvs.in for regular updates Safely Communicating data ๏ฑ Identity verification methods ๏ƒ˜ Knowledge-Based Authentication (KBA)-by asking them to answer specific security questions ๏ƒ˜ Two Factor Authentication (2FA)-not only a password and username, but also something that the user has with them ๏ƒ˜ Database Solutions-behavioral patterns to detect if an online ID is authentic, a fraudster or a bot. ๏ƒ˜ Online Identity Verification-A mix of artificial intelligence, computer vision, and verification experts to determine if a government-issued ID is authentic and belongs to the user. ๏ƒ˜ Biometric verification -by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.