Sie sind auf Seite 1von 24

HH

- BY SHUBH KUMAR
CONTENTS OF PRESENTATION
WHAT IS CYBER SAFETY ?
WHAT IS ONLINE IDENTITY ?
ANONYMOUS BROWSING
PRIVATE BROWSING
CONFIDENTIALITY OF INFORMATION
ONLINE SAFETY
DAMAGE CAUSED BY MALWARE
CYBERCRIME
CYBER LAW
INTRODUCTION …..
INTERNET IS ONE OF THE LARGEST INFORMATION
DATABASES AVAILABLE TO US TODAY AND HAS
BECOME A VITAL PART OF OUR LIFE.WE MAY GET
A LOT OF BENEFITS FROM INTERNET WITHOUT ANY
RISK , IF WE SURF AND VISIT TRUSTWORTHY LINKS
WITH AWARENESS . IT IS GOOD TO BE TECHNO
SAVVY BUT IT IS EQUALLY IMPORTANT TO BE SAFE
ONLINE. THE UNPRECEDENTED INCREASE IN THE USE
OF INTERNET AND RELATED SERVICES HAS
EXPOSED OUR INFORMATION TO SEVERAL THREATS .
SENSATIVE INFORMATION LOSS , ONLINE FRAUDS ,
SCAMS AND CRIMES HAVE BECOME A COMMON
CAUSE OF CONCERN .
WHAT IS CYBER SAFETY ?
WHEN YOU ACCESS THE INTERNET , YOU KEY – IN A
LOT OF PERSONAL INFORMATION ON THE WEBSITES
YOU VISIT AND THE SOCIAL NETWORKING WEBSITES
THAT YOU ARE A PART OF . THOUGH THIS
IFORMATION AND DETAILS ARE PASSWORD
PROTECTED , YET A LOT OF THEM CAN BE
ACCESSED BY OTHER PEOPLE. THIS UNSECURED
IFORMATION AND DETAILS CAN BE STOLEN AND
MISUSED BY THIEVES ON THE INTERNET . THIS IS
CALLED CYBER THEFT . TO PREVENT CYBER THEFT ,
YOU NEED TO KEEP MOST OF OUR PERSONAL ,
FINANCIAL INFORMATION’ AND ONLINE DATA SAFE .
THIS IS KNOWN AS CYBER SAFETY .
WHAT IS ONLINE IDENTITY ?
WHAT IS THE FIRST STEP TO JOIN ANY SOCIAL
MEDIA LIKE TWITTER , FACEBOOK ,OR INSTAGRAM ?
YOU FIRST HAVE TO CREATE A LOG IN , WHICH
REQUIRES TO KEY–IN A LOT OF PERSONAL
INFORMATION SUCH AS , YOUR NAME, DATE OF
BIRTH , ADDRESS , ETC.
THIS INFORMATION CREATES YOUR ONLINE IDENTITY
OR SOCIAL IDENTITY ON THE INTERNET . PEOPLE
ACTUALLY LOOK AT YOUR ONLINE IDENTITY WHEN
THEY SEE YOUR PROFILE ON THE SOCIAL
NETWORKING SITES. WE HAVE TO E VERY CAREFUL
AS TO WHAT AND WITH WHOM WE ARE
EXCHANGING THE INFORMATION ONLINE .
IDENTITY THEFT
WHEN SOMEONE ELSE USES YOUR ONLINE
IDENTITY TO CREATE FRAUDULENT MESSAGES
OR COMMIT CRIMES , IT IS KNOWN AS IDENTITY
THEFT . IN OTHER WORDS , YOU CAN SAY THAT
IDENTITY THEFT IS ANY KIND OF DECEPTION ,
SCAM, OR CRIME THAT RESULTS IN LOSS OF
PERSONAL DATA , INCLUDING LOSS OF
USERNAMES , PASSWORDS , BANKING
INFORMATION , AADHAR ID ETC. , WHICH THEN IS
USED WITHOUT YOUR PERMISSION TO COMMIT
FRAUD AND OTHER CRIMES .
IDENTITY PROTECTION WHILE
USING INTERNET
LISTED BELOW ARE SOME OF THE WAYS IN
WHICH YOU CAN BE A VICTIM OF IDENTITY
THEFT .
 PHISHING
 DUMPSTER DIVING
 SHOULDER SURFING
 EMPLOYMENT SCAM
 PRETEXTING
ONLINE TRACKING
WHEN YOU SURF INTERNET , THE WEBSITES
KEEP A TRACK OF YOUR ACTIVITIES AND USE
THE DATA YOU SHARE , TO TRACK YOU . THESE
WEBSITES ALSO COLLECTS ABOUT THE TYPE OF
WEBSITES AND PAGES YOU ARE VISITING ,
YOUR LOCATION , WHAT YOU USUALLY READ
OR SEARCH FOR ON THE INTERNET , ETC . THIS
BASICALLY CAN BE TERMD AS ONLINE
TRACKING .
TRACKING BY MANY
WAYS
IP ADDRESS
COOKIES
PERSISTENT COOKIES
HTTP REFERRER
USER AGENT
PROTECTION OF PERSONAL
INFORMATION
PRIVATE BROWSING
PRIVATE BROWSING IS ALSO KNOWN AS INCOGNITO MODE .
BY ENABLING THIS IN OUR WEB BROESERS , WE CAN
PREVENT :
 SAVING OF OUR DETAILS S IN THE AUTOFILL FEATURE .
 ACCIDENTAL SAVING OF USERNAME AND PASSWORDS
 SAVING OF BROWSING HISTORY WHEN ACCESSING THE
WEB FROM A PUBLIC DOMAIN
 SAVING OF DATA IN COOKIES
 LOCATION TRACKING
ANONYMOUS BROWSING
BY USING ANONYMOUS BROWSING , WE ELIMINATE MANY
FACTORS AND BROWSE THE NET WITHOUT REVEALING
ANY PERSONAL INFORMATION OR INTEREST .
HOW TO PROTECT OUR
ONLINE DATA
EXCLUDE IMPORTANT PERSONAL INFORMATION FROM
YOUR SOCIAL MEDIA PROFILES
CHECK YOUR SOCIAL MEDIA PRIVACY SETTINGS
PROTECT YOUR ONLINE PASSWORDS AND STRENGTHEN
THEM TOO
CHECK PRIVACY SETTINGS OF YOUR PHONE
WATCH OUT FOR PHISHING E- MAILS
KEEP YOUR COMMUNICATION NETWORK SECURE
CHECK FOR THE HTTPS://
MONITOR THE POSTS YOU GET ONLINE
PROTECT YOUR COMPUTER WITH STRONG , UP-TO-DATE
SECURITY SOFTWARE
STAY AWAY FROM PUBLIC WI-FI
PASSWORD
A PASSWORD IS JUST LIKE A KEY TO YOUR
PERSONAL INFORMATION . IT GUARDS YOUR
PERSONAL INFORMATION FROM POTENTIAL
ONLINE RISKS . YOUR SECURE PRESENCE IN THE
CYBER SPACE IS COMPLETELY ATTRIBUTED TO
THE STRENGTH OF YOUR PASSWORDS AND YOUR
ABILITY TO KEEP THEM SAFE . SEVERAL
MEANS BESIDES PHISHING AND SPYWARE ARE
USED TO GAIN ACCESS TO YOUR SECURE
PASSWORDS .
WHAT IS PASSWORD
STRENGTH ?
PASSWORD STRENGTH IS THE MEASURE OF A
PASSSWORD ’S EFFICIENCY TO RESIST PASSWORD
CRACKING ATTACKS .ITE STRENGTH IS
DETERMINED BY :
LENGTH : THE NO. OF CHARACTERS THE
PASSWORD CONTAINS.
COMPLEXITY : THE USE OF COMBINATION OF
LETTERS , NUMBERS , AND SYMBOLS .
UNPREDICTABILITY : LEVEL OF DIFFICULTY THAT
THE ATTACKER CANNOT GUESS IT EASILY .
CRACKING A PASSWORD
THE MOST COMMON CRACKING TECHNIQUES USED
ARE :
DICTIONARY ATTACK
BRUTE FORCE ATTACK
RAINBOW TABLE ATTACK
PHISHING
SPIDERING
BEST PRACTICES TO PROTECT YOUR
CONFIDENTIAL INFORMATION
BUILT STRONG PASSWORDS .
USE MULTIFACTOR AUHHENTICATION .
BE SUSPICIOUS OF UNSOLICITED E-MAIL .
BE AWARE OF YOUR ONLINE POSTING .
PROTECT YOUR MOBILE DEVICES .
ENGAGE IN SAFE WEB BROWSING .
USE SAFE SITES TO SURF THE INTERNET .
USE FIREWALL .
AVOID USING COMPUTER IN PUBLIC .
ONLINE SAFETY
WHILE WORKING ONLINE , A SYSTEM MAY GET INFECTED WITH
VARIOUS HARMFUL PROGRAMS KNOEN AS MALWARE .IT NOT
ONLY INTERRUPTS THE NORMAL WORKING OF COMPUTER BUT
ALSO STEALS IMPORTANT USER INFORMATION . THERE CAN BE
A VARIETY OF MALWARE PROGRAMS . SOME COMMON ONES
ARE :
ADWARE
SPYWARE
VIRUS
WORM
TROJAN HORSE
ROOTKIT
BACKDOORS
KEYLOGGERS
RANSOMWARE ETC.
DAMAGES CAUSED BY
MALWARE
RESULTS IN FREQUENT FREEZING OR CRASHING
OF THE SYSTEM .
HARDWARE FAILURE
LOSS OF DATA
SLOWING DOWN THE NETWORK SPEED
ALTERS THE CONFIGURATION OF THE SYSTEM
MONITOR USER SURFING HABITS
STEALS SENSETIVE INFORMATION BY ALTERING
SECURITY SETTINGS
SECURITY PROGRAMS
SECURE INTERNET ACCESS
REGULAR SECURITY UPDATES
AVOID SAMS
BACKUPS
SCANNING ALL PORTABLE DEVICES
DISABLE COOKIES , IF POSSIBLE
NETIQUETTES
CYBERCRIME REFERS TO ANY ONLINE ILLEGAL ACTIVITY
FACILITATED BY THE USE OF ELECTRONIC
COMMUNICATION DEVICES LIKE MOBILE PHONES ,
COMPUTERS , OR THROUGH NETWORKS LIKE INTERNET .
THE MOST COMMON TYPES OF CYBERCRIME ARE AS
FOLLOWS :
CYBERSTALKING
CYBERBULLYING
CYBERESPIONAGE
CYBERWARFARE
CYBERTERRORISM
CYBER EXORTION
SEXTING
PARENTS CAN VISIT A NEARBY POLICE
STATION AND CAN LODGE A COMPLAINT .
THE ITC ACT HAS GLOBAL JURISDICTION. IT
MEANS THAT YOU CAN LODGE A COMPLAINT
AGAINST THE CRIME FROM ANY STATE OR
CITY .
TO KNOW MORE ABOUT CYBER LAW OR TO
REGISTER A COMPLAINT , YOU CAN VISIT THE
FOLLOWING LINK :
HTTP://WWW.CYBERCRIMEHELPLINE.COM/
CYBER LAW OR INTERNET LAW IS A TERM THAT
ENCAPSULATES THE LEGAL ISSUES RELATED TO
THE USE OF INTERNET . WITH THE INCREASE IN NO.
OF CRIMES RELATED TO INTERNET URGENT NEED
WAS FELT TO INTRODUCE AN ACT OF LAW
AGAINST SUCH CRIMES . THE INDIAN GOVERNMENT
INTRODUCED ITC ACT 2000 ALSO KNOWN AS ITA –
2000 . THE ACT WAS USED FOR ELECTRONIC
GOVERNANCE AND FOR CONTROLLING CYBERCRIMES
.THE PRIME PURPOSE OF THIS ACT WAS TO PROVIDE
LEGAL RECOGNITION TO TRANSACTIONS CARRIED
OUT BY MEANS OF ELECTRONIC COMMUNICATION
AND TO FACILITATE THE FILING OF ELECTRONICS
RECORDS WITH THE GOVERNMENT .
CYBER LAW IS IMPORTANT BECAUSE ALL THE
ASPECTS AND ACTIVITIES RELATED TO INTERNET
ARE COVERED UNDER IT . CYBER LAW DEALS WITH
CRIMES RELATED TO E - COMMERCE, DIGITAL
CONTRACTS , ELECTRONIC EVIDENCE , AND
CYBERSPACE .IT ALSO COVERS OTHER AREAS LIKE
INTELLECTUAL PROPERTY RIGHTS , DATA
PROTECTION , DATA SECURITY , DIGITAL
TRANSACTIONS , ELECTRONIC COMMUNICATION AND
ONLINE PRIVACY. CYBER LAWS CAN BE USED AS A
PROTECTION MEASURES AGAINST THREATS LIKE
CYBERTERRORISM , CYBERWARFARE , CYBER
EXORTION .

Das könnte Ihnen auch gefallen