SlideShare a Scribd company logo
1 of 26
CYBERSAFETY
CLASS – 9
WHAT IS CYBER CRIME ?
‘Cyber Crime’ can be defined as Criminal Activity involving information technology
infrastructure, including illegal access and illegal interception of computer data to,
from or within a computer system, Data Inference (damaging, deletion, altering
computer data illegally), misuse of devices, Forgery (ID theft) and electronic fraud.
TYPES OF CYBER CRIMES
The following are the types of Cyber Crime:-
 Theft Of Money
 Theft Of Data
 Fraud
THEFT OF MONEY
Commerce on Internet is mainly transacted through
debit/credit cards. Therefore, thieves have been very
active in obtaining stolen credit cards details to purchase
goods and services over Internet. This type of Cyber
Crime runs to millions of rupees per year.
THEFT OF DATA
Data and Information is the most Valuable Commodity
any business has. The Cost of creating data from
scratch can increase the cost of any hardware or
programs. Data can be stolen by physical Theft of
Hardware or through Unauthorized Access to the
System.
FRAUD
‘Fraud’ means trying to trick someone in order to gain an
advantage.
Some of these most common forms of computer frauds
includes:-
 Posing as someone from an Official Organization such as
Bank or Electricity Board in order to get their Account
Details.
 Sending E – Mails to get Personal or Account Detail.
 Stealing Identity of someone, to Steal their Money or some
other criminal activity.
REPORTING A CYBER CRIME
On being the Victim of any Cyber Crime, the first step is to
report the crime to the Law Enforcement Agency (Cyber
Crime Branch or Police Station). Matters of Cyber Crime are
investigated by Law Enforcement Agency (LEA) on
registration of FIR. Further LEA approaches to Indian
Computer Emerging Response Team (CERT – IN) for
getting information related to technical analysis like details
of E – Mails, SMS, Facebook, etc.
UNETHICAL PRACTICES
The common Unethical Practices on Internet are:-
 Plagiarism
 Cyber Bullying
 Cyber Stalking
 Hacking
 Phishing
 Spamming
PLAGIARISM
‘Plagiarism’ deals with stealing of ideas and thoughts of other
people on Internet and projecting them as one’s own work
without permission of the original author.
Preventing Plagiarism –
 If you use ideas, texts, information from a website. Always
acknowledge the website from where it is taken.
 Seek written permission from the Author whose content you
are using for your work.
 You can also put the contents in quotes for avoiding
Plagiarism.
CYBER BULLYING
‘Cyber Bullying’ refers to the act of threating, humiliating, torturing
or harassing someone on the Internet. This includes posting Negative
Comments about someone and uploading unwanted photos and
videos to hurt that person. This has become very common among
teenagers.
Preventing Cyber Bullying –
 Never share your photos or videos publicly on Internet.
 Keep your Password strong and never share them with others
except your parents.
 Think twice before posting anything on Internet.
CYBER STALKING
‘Cyber Stalking’ refers to the act of harassing an individual
over the Internet. Stalkers collect personal information such
as name, contact details, social networking profile details,
daily routine, house address, date of birth, etc., of a targeted
person.
Preventing Cyber Stalking –
 Keep a Low Profile.
 Maintain a good Social Hygiene.
 Always hide your IP Address from strangers.
 If you are being stalked on the Social Media, reset your
Passwords.
HACKING
‘Hacking’ means to gain the access on the Remote Computer to
control it resources and information without any authorization
from the Owner. The Intention behind the access of the system is
to steal important data and corrupt it.
Preventing Hacking –
 Never use Pirated Software downloaded over Internet.
 Always update your Antivirus Software in your System.
 Never open an Unknown E – Mail message.
 Change your Passwords frequently.
PHISHING
The fraudulent practice of sending emails purporting to be from
reputable companies in order to induce individuals to reveal
personal information, such as passwords and credit card numbers
is called ‘Phishing’.
Preventing Phishing –
 Never provide any personal detail like Social Media Passwords,
Bank Account Details, etc.
 Never Access the Bank Website from the link provided in E –
Mail.
 Never respond or open an E – Mail from Unknown ID.
SPAMMING
Spamming’ refers to unwanted E – Mails sent in bulk to
multiple users for promoting products or services. These
types of E – Mails are sent forcefully to the people, who
otherwise do not want to receive them.
Preventing Spamming –
 Never provide email address unnecessarily on any website.
 Do not reply the E – Mails received in Spam Folders.
SOFTWARE PIRACY
‘Software Piracy’ is the illegal copying, distributing, sharing, selling or use of software, whether
intentional or not.
The different types of Software Piracy are –
 Counterfeiting – It means producing fake copies of a software, making it look authentic.
 End-User Piracy – This occurs when an individual reproduces copies of software without
authorization.
 Internet Piracy – This occurs when software is downloaded from the Internet.
 Soft lifting – It is when someone purchases one version of the software and downloads it onto
multiple computers.
COMPUTER VIRUS
A ‘Computer Virus’ is a malicious piece of computer code designed to spread from device to
device. Virus stands for ‘Vital Information Resources Under Siege’. Viruses spread when the
software or documents are transferred using a network, a disk, file sharing methods, infected e-
mail attachments.
Some of the Computer Viruses are:-
 Boot Sector Viruses
 File Viruses
 Trojan Horses
 Macro Viruses
 E – Mail Viruses
Spyware
Malware
CYBER SECURITY
‘Cyber Security’ refers to the body of technologies, processes and practices designed to protect
data, networks, information, devices and programs.
It is important because Government, Military, Corporates, Financial and Medical Corporation
collects, processes and store huge amount of data on computers and other devices.
COMPUTER ETHICS
The following Computer Ethics has to be remembered, while using Internet: -
 Respect the Privacy of Others on Internet and never try to Access their personal
information without their concern.
 Never use the information which is protected by the Copyrights.
 Do not post negative information on the Internet because it can harm many people.
 Always use Original Software.
 Never use technology to keep an eye on other’s system.
 Be respectful to others while Communicating on the Internet.
RIGHT TO PRIVACY
‘Privacy’ is one of the Individual’s right to keep his/her
Personal Information secret from others an reveal it to only
the Selective Ones. Accessing one’s personal data without
his/her consent is Unethical and Illegal.
Protecting Privacy –
 Never share your Account Details like Login ID or
Passwords with others.
 Cookies stored in your system from different websites
can cause leakage of information.
 Avoid of keeping Confidential Details in your System, if
not required.
IT ACT 2000
The Information Technology Act 2000, of the Indian Parliament notified on 17th October 2000. It
is the primary law in India dealing with cybercrime and electronic commerce. The Act provides a
legal framework for electronic governance by giving recognition to electronic records and digital
signatures. It also defines cyber crimes and prescribes penalties for them. The Act directed the
formation of a Controller of Certifying Authorities to regulate the issuance of digital signatures. It
also established a Cyber Appellate Tribunal to resolve disputes rising from this new law.
INTELLECTUAL PROPERTY RIGHT
‘Intellectual Property Rights’ (IPRs) are legal rights that protect creations and/or inventions
resulting from intellectual activity in the industrial, scientific, literary or artistic fields. The most
common IPRs include patents, copyrights, marks and trade secrets.
The acts which are regarded to IPRs are –
 Copyright Act
 Industrial Property Rights
 Patent
 Trademark
GENERAL NETIQUETTES
‘Netiquette’ is a combination of the words Network and Etiquette and is defined as a set of rules
for acceptable online behavior.
Some of the General Netiquettes are:-
 Obey Copyright Laws – While copying text or pictures, obey copyright laws. Don’t steal.
 Be Aware of Cyberbullying – If you are targeted by cyberbullying do not respond. Keep all the
records, with dates and time if possible. Talk to your parents about the Issue.
 Respect Others – Do not post any abusive words about any person on the Internet.
 Be Tolerant and Careful – Be open to understand the point of views of others on the Internet.
Don’t jump into conclusions.
SOCIAL NETWORKING NETIQUETTES
‘Social Networking’ is the use of Internet-based social media sites to stay connected with friends,
family, colleagues, customers, or clients.
Some of the basic Social Networking Netiquettes are:-
 Screen Name – When creating your screen name, do not include your personal information.
 Password – Do not share your passwords with anyone except your parents.
 Personal Information – Don’t give your personal information to anyone on the Internet
without your parents permission.
 Online Friends – Do not agree to meet your any online friend without the consent of your
parents.
E – MAIL NETTIQUETTES
Some of the basic E – Mail Netiquettes are:-
 Do Not Shout – Don’t capitalize all your letters, no matter how urgent your email is, as you
will look aggressive – it’s like shouting over email.
 Pay Attention to Spellings – Grammar, spelling and punctuation should be one of the top
concerns in writing emails.
 Think Before You Speak – Never use offensive language in your E – Mails.
 Take a Look Before Sending a Message – Always remember to go through the E – Mail before
sending it.
SAFETY MEASURES WHILE USING INTERNET
The Safety Measures which you have to keep in mind, while using Internet:-
 Don’t share your personal information.
 Double-check any links before you click.
 Use secure public Wi-Fi networks.
 Use a VPN with your Wi-Fi connection.
 Only log into sites that start with “https://”.
 Use antivirus and antimalware software.
 Create and use complex passwords.
HOW TO PROTECT COMPUTER ?
 STEP 1 Use Updated Antivirus Software:
Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer.
 Advantages- Protection from viruses and their transmission, Block spam and ads, Defense
against hackers and data thieves, etc.
 STEP 2 – Keep Your Firewall Turned On:
A Firewall is a network security device that monitors incoming and outgoing network traffic.
 STEP 3 – Keep the Operating System Updated:
Software Updates are important because they often include critical patches to security holes.

More Related Content

What's hot (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber Safety Class 9

Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxJoelGautham
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 

Similar to Cyber Safety Class 9 (20)

Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber crime by riyaz mulla
Cyber crime by riyaz mullaCyber crime by riyaz mulla
Cyber crime by riyaz mulla
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 

More from NehaRohtagi1

Basics Of Computers | The Computer System
Basics Of Computers | The Computer SystemBasics Of Computers | The Computer System
Basics Of Computers | The Computer SystemNehaRohtagi1
 
Excretory Products And Their Elimination Class 11th
Excretory Products And Their Elimination Class 11thExcretory Products And Their Elimination Class 11th
Excretory Products And Their Elimination Class 11thNehaRohtagi1
 
A Letter to God Class - 10th
A Letter to God Class - 10thA Letter to God Class - 10th
A Letter to God Class - 10thNehaRohtagi1
 
Body Fluids And Circulation Class 11th
Body Fluids And Circulation Class 11thBody Fluids And Circulation Class 11th
Body Fluids And Circulation Class 11thNehaRohtagi1
 
Breathing and Exchange of Gases Class 11th
Breathing and Exchange of Gases Class 11thBreathing and Exchange of Gases Class 11th
Breathing and Exchange of Gases Class 11thNehaRohtagi1
 
Life processes "Part 1" " Class 10"
Life processes "Part 1" " Class 10"Life processes "Part 1" " Class 10"
Life processes "Part 1" " Class 10"NehaRohtagi1
 
The Voice of Rain Class 11th
The Voice of Rain Class 11thThe Voice of Rain Class 11th
The Voice of Rain Class 11thNehaRohtagi1
 
"Birth" Class 11.pdf
"Birth" Class 11.pdf"Birth" Class 11.pdf
"Birth" Class 11.pdfNehaRohtagi1
 
Motion Class 9 .pdf
Motion Class 9 .pdfMotion Class 9 .pdf
Motion Class 9 .pdfNehaRohtagi1
 
The Age Of Industrialization Class 10th
The Age Of Industrialization Class 10thThe Age Of Industrialization Class 10th
The Age Of Industrialization Class 10thNehaRohtagi1
 
The Laburnum Top Class - '11th'
The Laburnum Top Class - '11th'The Laburnum Top Class - '11th'
The Laburnum Top Class - '11th'NehaRohtagi1
 
Agriculture Class - 10th
Agriculture Class - 10thAgriculture Class - 10th
Agriculture Class - 10thNehaRohtagi1
 
The Voice Of Rain Class - '11th'
The Voice Of Rain Class - '11th'The Voice Of Rain Class - '11th'
The Voice Of Rain Class - '11th'NehaRohtagi1
 
Discovering Tut: The Saga Continues Class - '11th'
Discovering Tut: The Saga Continues Class - '11th'Discovering Tut: The Saga Continues Class - '11th'
Discovering Tut: The Saga Continues Class - '11th'NehaRohtagi1
 
Atoms And Molecules Class - 9th
Atoms And Molecules Class - 9thAtoms And Molecules Class - 9th
Atoms And Molecules Class - 9thNehaRohtagi1
 
Periodic Classification Of Elements Class 10th
Periodic Classification Of Elements Class 10thPeriodic Classification Of Elements Class 10th
Periodic Classification Of Elements Class 10thNehaRohtagi1
 
The Story Of Cricket Class 9th
The Story Of Cricket Class 9th The Story Of Cricket Class 9th
The Story Of Cricket Class 9th NehaRohtagi1
 
Water Resources Class 10th
Water Resources Class 10th Water Resources Class 10th
Water Resources Class 10th NehaRohtagi1
 
Development Class - 10th Economics
Development Class - 10th Economics Development Class - 10th Economics
Development Class - 10th Economics NehaRohtagi1
 

More from NehaRohtagi1 (20)

Basics Of Computers | The Computer System
Basics Of Computers | The Computer SystemBasics Of Computers | The Computer System
Basics Of Computers | The Computer System
 
Excretory Products And Their Elimination Class 11th
Excretory Products And Their Elimination Class 11thExcretory Products And Their Elimination Class 11th
Excretory Products And Their Elimination Class 11th
 
A Letter to God Class - 10th
A Letter to God Class - 10thA Letter to God Class - 10th
A Letter to God Class - 10th
 
Body Fluids And Circulation Class 11th
Body Fluids And Circulation Class 11thBody Fluids And Circulation Class 11th
Body Fluids And Circulation Class 11th
 
Breathing and Exchange of Gases Class 11th
Breathing and Exchange of Gases Class 11thBreathing and Exchange of Gases Class 11th
Breathing and Exchange of Gases Class 11th
 
Life processes "Part 1" " Class 10"
Life processes "Part 1" " Class 10"Life processes "Part 1" " Class 10"
Life processes "Part 1" " Class 10"
 
The Voice of Rain Class 11th
The Voice of Rain Class 11thThe Voice of Rain Class 11th
The Voice of Rain Class 11th
 
"Birth" Class 11.pdf
"Birth" Class 11.pdf"Birth" Class 11.pdf
"Birth" Class 11.pdf
 
Motion Class 9 .pdf
Motion Class 9 .pdfMotion Class 9 .pdf
Motion Class 9 .pdf
 
The Age Of Industrialization Class 10th
The Age Of Industrialization Class 10thThe Age Of Industrialization Class 10th
The Age Of Industrialization Class 10th
 
The Laburnum Top Class - '11th'
The Laburnum Top Class - '11th'The Laburnum Top Class - '11th'
The Laburnum Top Class - '11th'
 
Agriculture Class - 10th
Agriculture Class - 10thAgriculture Class - 10th
Agriculture Class - 10th
 
The Voice Of Rain Class - '11th'
The Voice Of Rain Class - '11th'The Voice Of Rain Class - '11th'
The Voice Of Rain Class - '11th'
 
Discovering Tut: The Saga Continues Class - '11th'
Discovering Tut: The Saga Continues Class - '11th'Discovering Tut: The Saga Continues Class - '11th'
Discovering Tut: The Saga Continues Class - '11th'
 
THE SOLAR SYSTEM
THE SOLAR SYSTEM THE SOLAR SYSTEM
THE SOLAR SYSTEM
 
Atoms And Molecules Class - 9th
Atoms And Molecules Class - 9thAtoms And Molecules Class - 9th
Atoms And Molecules Class - 9th
 
Periodic Classification Of Elements Class 10th
Periodic Classification Of Elements Class 10thPeriodic Classification Of Elements Class 10th
Periodic Classification Of Elements Class 10th
 
The Story Of Cricket Class 9th
The Story Of Cricket Class 9th The Story Of Cricket Class 9th
The Story Of Cricket Class 9th
 
Water Resources Class 10th
Water Resources Class 10th Water Resources Class 10th
Water Resources Class 10th
 
Development Class - 10th Economics
Development Class - 10th Economics Development Class - 10th Economics
Development Class - 10th Economics
 

Recently uploaded

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 

Recently uploaded (20)

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 

Cyber Safety Class 9

  • 2. WHAT IS CYBER CRIME ? ‘Cyber Crime’ can be defined as Criminal Activity involving information technology infrastructure, including illegal access and illegal interception of computer data to, from or within a computer system, Data Inference (damaging, deletion, altering computer data illegally), misuse of devices, Forgery (ID theft) and electronic fraud.
  • 3. TYPES OF CYBER CRIMES The following are the types of Cyber Crime:-  Theft Of Money  Theft Of Data  Fraud
  • 4. THEFT OF MONEY Commerce on Internet is mainly transacted through debit/credit cards. Therefore, thieves have been very active in obtaining stolen credit cards details to purchase goods and services over Internet. This type of Cyber Crime runs to millions of rupees per year.
  • 5. THEFT OF DATA Data and Information is the most Valuable Commodity any business has. The Cost of creating data from scratch can increase the cost of any hardware or programs. Data can be stolen by physical Theft of Hardware or through Unauthorized Access to the System.
  • 6. FRAUD ‘Fraud’ means trying to trick someone in order to gain an advantage. Some of these most common forms of computer frauds includes:-  Posing as someone from an Official Organization such as Bank or Electricity Board in order to get their Account Details.  Sending E – Mails to get Personal or Account Detail.  Stealing Identity of someone, to Steal their Money or some other criminal activity.
  • 7. REPORTING A CYBER CRIME On being the Victim of any Cyber Crime, the first step is to report the crime to the Law Enforcement Agency (Cyber Crime Branch or Police Station). Matters of Cyber Crime are investigated by Law Enforcement Agency (LEA) on registration of FIR. Further LEA approaches to Indian Computer Emerging Response Team (CERT – IN) for getting information related to technical analysis like details of E – Mails, SMS, Facebook, etc.
  • 8. UNETHICAL PRACTICES The common Unethical Practices on Internet are:-  Plagiarism  Cyber Bullying  Cyber Stalking  Hacking  Phishing  Spamming
  • 9. PLAGIARISM ‘Plagiarism’ deals with stealing of ideas and thoughts of other people on Internet and projecting them as one’s own work without permission of the original author. Preventing Plagiarism –  If you use ideas, texts, information from a website. Always acknowledge the website from where it is taken.  Seek written permission from the Author whose content you are using for your work.  You can also put the contents in quotes for avoiding Plagiarism.
  • 10. CYBER BULLYING ‘Cyber Bullying’ refers to the act of threating, humiliating, torturing or harassing someone on the Internet. This includes posting Negative Comments about someone and uploading unwanted photos and videos to hurt that person. This has become very common among teenagers. Preventing Cyber Bullying –  Never share your photos or videos publicly on Internet.  Keep your Password strong and never share them with others except your parents.  Think twice before posting anything on Internet.
  • 11. CYBER STALKING ‘Cyber Stalking’ refers to the act of harassing an individual over the Internet. Stalkers collect personal information such as name, contact details, social networking profile details, daily routine, house address, date of birth, etc., of a targeted person. Preventing Cyber Stalking –  Keep a Low Profile.  Maintain a good Social Hygiene.  Always hide your IP Address from strangers.  If you are being stalked on the Social Media, reset your Passwords.
  • 12. HACKING ‘Hacking’ means to gain the access on the Remote Computer to control it resources and information without any authorization from the Owner. The Intention behind the access of the system is to steal important data and corrupt it. Preventing Hacking –  Never use Pirated Software downloaded over Internet.  Always update your Antivirus Software in your System.  Never open an Unknown E – Mail message.  Change your Passwords frequently.
  • 13. PHISHING The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers is called ‘Phishing’. Preventing Phishing –  Never provide any personal detail like Social Media Passwords, Bank Account Details, etc.  Never Access the Bank Website from the link provided in E – Mail.  Never respond or open an E – Mail from Unknown ID.
  • 14. SPAMMING Spamming’ refers to unwanted E – Mails sent in bulk to multiple users for promoting products or services. These types of E – Mails are sent forcefully to the people, who otherwise do not want to receive them. Preventing Spamming –  Never provide email address unnecessarily on any website.  Do not reply the E – Mails received in Spam Folders.
  • 15. SOFTWARE PIRACY ‘Software Piracy’ is the illegal copying, distributing, sharing, selling or use of software, whether intentional or not. The different types of Software Piracy are –  Counterfeiting – It means producing fake copies of a software, making it look authentic.  End-User Piracy – This occurs when an individual reproduces copies of software without authorization.  Internet Piracy – This occurs when software is downloaded from the Internet.  Soft lifting – It is when someone purchases one version of the software and downloads it onto multiple computers.
  • 16. COMPUTER VIRUS A ‘Computer Virus’ is a malicious piece of computer code designed to spread from device to device. Virus stands for ‘Vital Information Resources Under Siege’. Viruses spread when the software or documents are transferred using a network, a disk, file sharing methods, infected e- mail attachments. Some of the Computer Viruses are:-  Boot Sector Viruses  File Viruses  Trojan Horses  Macro Viruses  E – Mail Viruses Spyware Malware
  • 17. CYBER SECURITY ‘Cyber Security’ refers to the body of technologies, processes and practices designed to protect data, networks, information, devices and programs. It is important because Government, Military, Corporates, Financial and Medical Corporation collects, processes and store huge amount of data on computers and other devices.
  • 18. COMPUTER ETHICS The following Computer Ethics has to be remembered, while using Internet: -  Respect the Privacy of Others on Internet and never try to Access their personal information without their concern.  Never use the information which is protected by the Copyrights.  Do not post negative information on the Internet because it can harm many people.  Always use Original Software.  Never use technology to keep an eye on other’s system.  Be respectful to others while Communicating on the Internet.
  • 19. RIGHT TO PRIVACY ‘Privacy’ is one of the Individual’s right to keep his/her Personal Information secret from others an reveal it to only the Selective Ones. Accessing one’s personal data without his/her consent is Unethical and Illegal. Protecting Privacy –  Never share your Account Details like Login ID or Passwords with others.  Cookies stored in your system from different websites can cause leakage of information.  Avoid of keeping Confidential Details in your System, if not required.
  • 20. IT ACT 2000 The Information Technology Act 2000, of the Indian Parliament notified on 17th October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes penalties for them. The Act directed the formation of a Controller of Certifying Authorities to regulate the issuance of digital signatures. It also established a Cyber Appellate Tribunal to resolve disputes rising from this new law.
  • 21. INTELLECTUAL PROPERTY RIGHT ‘Intellectual Property Rights’ (IPRs) are legal rights that protect creations and/or inventions resulting from intellectual activity in the industrial, scientific, literary or artistic fields. The most common IPRs include patents, copyrights, marks and trade secrets. The acts which are regarded to IPRs are –  Copyright Act  Industrial Property Rights  Patent  Trademark
  • 22. GENERAL NETIQUETTES ‘Netiquette’ is a combination of the words Network and Etiquette and is defined as a set of rules for acceptable online behavior. Some of the General Netiquettes are:-  Obey Copyright Laws – While copying text or pictures, obey copyright laws. Don’t steal.  Be Aware of Cyberbullying – If you are targeted by cyberbullying do not respond. Keep all the records, with dates and time if possible. Talk to your parents about the Issue.  Respect Others – Do not post any abusive words about any person on the Internet.  Be Tolerant and Careful – Be open to understand the point of views of others on the Internet. Don’t jump into conclusions.
  • 23. SOCIAL NETWORKING NETIQUETTES ‘Social Networking’ is the use of Internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients. Some of the basic Social Networking Netiquettes are:-  Screen Name – When creating your screen name, do not include your personal information.  Password – Do not share your passwords with anyone except your parents.  Personal Information – Don’t give your personal information to anyone on the Internet without your parents permission.  Online Friends – Do not agree to meet your any online friend without the consent of your parents.
  • 24. E – MAIL NETTIQUETTES Some of the basic E – Mail Netiquettes are:-  Do Not Shout – Don’t capitalize all your letters, no matter how urgent your email is, as you will look aggressive – it’s like shouting over email.  Pay Attention to Spellings – Grammar, spelling and punctuation should be one of the top concerns in writing emails.  Think Before You Speak – Never use offensive language in your E – Mails.  Take a Look Before Sending a Message – Always remember to go through the E – Mail before sending it.
  • 25. SAFETY MEASURES WHILE USING INTERNET The Safety Measures which you have to keep in mind, while using Internet:-  Don’t share your personal information.  Double-check any links before you click.  Use secure public Wi-Fi networks.  Use a VPN with your Wi-Fi connection.  Only log into sites that start with “https://”.  Use antivirus and antimalware software.  Create and use complex passwords.
  • 26. HOW TO PROTECT COMPUTER ?  STEP 1 Use Updated Antivirus Software: Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer.  Advantages- Protection from viruses and their transmission, Block spam and ads, Defense against hackers and data thieves, etc.  STEP 2 – Keep Your Firewall Turned On: A Firewall is a network security device that monitors incoming and outgoing network traffic.  STEP 3 – Keep the Operating System Updated: Software Updates are important because they often include critical patches to security holes.