SlideShare a Scribd company logo
1 of 8
ARE YOU SAFE WHILE USING NET ??
Yes I am
www.trialparv.wapka.mobi
Copy me!!!!
Or touch
me……
No, I am not !!
Computer hacking can be defined as intentionally
accesses a computer without authorization or
exceeds authorized access. Various state and federal
laws govern computer hacking.
Advantages :-
1.Can be used to recover lost information where the
computer password has been lost.
2.Hacking makes us aware about the possible
loopholes of the any system etc.
Disadvantages :-
-Criminals can use it to their advantage . It's Illegal.
Why I am hacked ??
There are 4 likely reasons for which you were hacked..
1. Picking your pocket:- is for quick financial gain….
2. Pummeling you with adware and spam:-malware
designed to place unwanted advertisements or
content in your computing pathway….
3. Stealing intellectual property:-stealing valuable
information from you or your company……
4. Turning you into a bot client:-Another common use of
your infected computer is as a client in a larger botnet
attack. In this scenario, your computer's CPU cycles
and network capacity are hijacked in an effort to send
service-denying content or malware to specific
targets.….
How to be safe from them ?
BELOW ARE SOME KEY STEPS TO PROTECTING YOUR COMPUTER :-
1) Keep Your Firewall Turned On: A firewall
helps protect your computer from hackers who might try to gain access to crash it,
delete information, or even steal passwords or other sensitive information.
2)Install or Update Your Antivirus Software: Antivirus software is designed to prevent
malicious software programs from embedding on your computer. If it detects
malicious code, like a virus or a worm, it works to disarm or remove it.
3)Install or Update Your Antispyware Technology: Spyware is just what it sounds
like—software that is surreptitiously installed on your computer to let others peer
into your activities on the computer.
4)Keep Your Operating System Up to Date: Computer operating systems are
periodically updated to stay in tune with technology requirements and to fix
security holes.
5)Be Careful What You Download: Carelessly downloading e-mail attachments can
circumvent even the most vigilant anti-virus software.
6)Turn Off Your Computer: With the growth of high-speed Internet connections, many
opt to leave their computers on and ready for action. The downside is that being
"always on" renders computers more susceptible.
Can I sue them ??
Computer hacking is illegal and carries a possible sanction of imprisonment. Computer
hacking has been thrown into the public eye recently with increasing allegations that
certain newspapers hired private investigators to hack into people’s phones and computers
in order to obtain stories that would sell.
• Computer Misuse Act :- Under the Computer Misuse Act it is an offence to hack into
somebody else’s computer or send them a form of virus that allows them to obtain
information from somebody else’s computer.
The reasoning for the introduction of this Act was the fear that individuals, in particular
private investigators.
• Targets of computer hacking :- A common target for computer hackers is the intellectual
property of a particular individual or company. Intellectual property is a form of original
creation which has the protection of a patent or copyright. But if another individual or
company can claim to have come up with the product without copying the original they
may well be able to sell it legally.
• Cyber attacks :- An increasing concern to all governments around the word is the role of
what is known as cyber attacks. Cyber attacks occur when an individual or group of
individuals hack into the computer system of a company, association or even government
department and attempts to paralyse the system.
The motivation for carrying out a cyber attack can be vast; groups can range from those
seeking information to sell on, to interest groups looking to bring down whole companies,
and even terrorist groups looking to paralyse government departments.
Types of hackers in the world!!
Conclusion
In this project my motive was to aware the people
about internet and web pages . my motive was not
to teach hacking or doing any illegal activity . I am
not telling hacking is bad or good .in some cases yes
it is and in some yes it is bad . So its just a
knowledge that how you react to it…….
Thank you very much

More Related Content

Similar to Internet Security

LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 

Similar to Internet Security (20)

CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Bi
BiBi
Bi
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hamza
HamzaHamza
Hamza
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 

Recently uploaded

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 

Recently uploaded (20)

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 

Internet Security

  • 1. ARE YOU SAFE WHILE USING NET ??
  • 2. Yes I am www.trialparv.wapka.mobi Copy me!!!! Or touch me……
  • 3. No, I am not !! Computer hacking can be defined as intentionally accesses a computer without authorization or exceeds authorized access. Various state and federal laws govern computer hacking. Advantages :- 1.Can be used to recover lost information where the computer password has been lost. 2.Hacking makes us aware about the possible loopholes of the any system etc. Disadvantages :- -Criminals can use it to their advantage . It's Illegal.
  • 4. Why I am hacked ?? There are 4 likely reasons for which you were hacked.. 1. Picking your pocket:- is for quick financial gain…. 2. Pummeling you with adware and spam:-malware designed to place unwanted advertisements or content in your computing pathway…. 3. Stealing intellectual property:-stealing valuable information from you or your company…… 4. Turning you into a bot client:-Another common use of your infected computer is as a client in a larger botnet attack. In this scenario, your computer's CPU cycles and network capacity are hijacked in an effort to send service-denying content or malware to specific targets.….
  • 5. How to be safe from them ? BELOW ARE SOME KEY STEPS TO PROTECTING YOUR COMPUTER :- 1) Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. 2)Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. 3)Install or Update Your Antispyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. 4)Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. 5)Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. 6)Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being "always on" renders computers more susceptible.
  • 6. Can I sue them ?? Computer hacking is illegal and carries a possible sanction of imprisonment. Computer hacking has been thrown into the public eye recently with increasing allegations that certain newspapers hired private investigators to hack into people’s phones and computers in order to obtain stories that would sell. • Computer Misuse Act :- Under the Computer Misuse Act it is an offence to hack into somebody else’s computer or send them a form of virus that allows them to obtain information from somebody else’s computer. The reasoning for the introduction of this Act was the fear that individuals, in particular private investigators. • Targets of computer hacking :- A common target for computer hackers is the intellectual property of a particular individual or company. Intellectual property is a form of original creation which has the protection of a patent or copyright. But if another individual or company can claim to have come up with the product without copying the original they may well be able to sell it legally. • Cyber attacks :- An increasing concern to all governments around the word is the role of what is known as cyber attacks. Cyber attacks occur when an individual or group of individuals hack into the computer system of a company, association or even government department and attempts to paralyse the system. The motivation for carrying out a cyber attack can be vast; groups can range from those seeking information to sell on, to interest groups looking to bring down whole companies, and even terrorist groups looking to paralyse government departments.
  • 7. Types of hackers in the world!!
  • 8. Conclusion In this project my motive was to aware the people about internet and web pages . my motive was not to teach hacking or doing any illegal activity . I am not telling hacking is bad or good .in some cases yes it is and in some yes it is bad . So its just a knowledge that how you react to it……. Thank you very much