This PowerPoint will help the not only the students but also others to learn about Cyber Safety, Software Piracy and their types and Computer Viruses and their types also.
2. WHAT IS CYBER CRIME ?
‘Cyber Crime’ can be defined as Criminal Activity involving information technology
infrastructure, including illegal access and illegal interception of computer data to,
from or within a computer system, Data Inference (damaging, deletion, altering
computer data illegally), misuse of devices, Forgery (ID theft) and electronic fraud.
3. TYPES OF CYBER CRIMES
The following are the types of Cyber Crime:-
Theft Of Money
Theft Of Data
Fraud
4. THEFT OF MONEY
Commerce on Internet is mainly transacted through
debit/credit cards. Therefore, thieves have been very
active in obtaining stolen credit cards details to purchase
goods and services over Internet. This type of Cyber
Crime runs to millions of rupees per year.
5. THEFT OF DATA
Data and Information is the most Valuable Commodity
any business has. The Cost of creating data from
scratch can increase the cost of any hardware or
programs. Data can be stolen by physical Theft of
Hardware or through Unauthorized Access to the
System.
6. FRAUD
‘Fraud’ means trying to trick someone in order to gain an
advantage.
Some of these most common forms of computer frauds
includes:-
Posing as someone from an Official Organization such as
Bank or Electricity Board in order to get their Account
Details.
Sending E – Mails to get Personal or Account Detail.
Stealing Identity of someone, to Steal their Money or some
other criminal activity.
7. REPORTING A CYBER CRIME
On being the Victim of any Cyber Crime, the first step is to
report the crime to the Law Enforcement Agency (Cyber
Crime Branch or Police Station). Matters of Cyber Crime are
investigated by Law Enforcement Agency (LEA) on
registration of FIR. Further LEA approaches to Indian
Computer Emerging Response Team (CERT – IN) for
getting information related to technical analysis like details
of E – Mails, SMS, Facebook, etc.
8. UNETHICAL PRACTICES
The common Unethical Practices on Internet are:-
Plagiarism
Cyber Bullying
Cyber Stalking
Hacking
Phishing
Spamming
9. PLAGIARISM
‘Plagiarism’ deals with stealing of ideas and thoughts of other
people on Internet and projecting them as one’s own work
without permission of the original author.
Preventing Plagiarism –
If you use ideas, texts, information from a website. Always
acknowledge the website from where it is taken.
Seek written permission from the Author whose content you
are using for your work.
You can also put the contents in quotes for avoiding
Plagiarism.
10. CYBER BULLYING
‘Cyber Bullying’ refers to the act of threating, humiliating, torturing
or harassing someone on the Internet. This includes posting Negative
Comments about someone and uploading unwanted photos and
videos to hurt that person. This has become very common among
teenagers.
Preventing Cyber Bullying –
Never share your photos or videos publicly on Internet.
Keep your Password strong and never share them with others
except your parents.
Think twice before posting anything on Internet.
11. CYBER STALKING
‘Cyber Stalking’ refers to the act of harassing an individual
over the Internet. Stalkers collect personal information such
as name, contact details, social networking profile details,
daily routine, house address, date of birth, etc., of a targeted
person.
Preventing Cyber Stalking –
Keep a Low Profile.
Maintain a good Social Hygiene.
Always hide your IP Address from strangers.
If you are being stalked on the Social Media, reset your
Passwords.
12. HACKING
‘Hacking’ means to gain the access on the Remote Computer to
control it resources and information without any authorization
from the Owner. The Intention behind the access of the system is
to steal important data and corrupt it.
Preventing Hacking –
Never use Pirated Software downloaded over Internet.
Always update your Antivirus Software in your System.
Never open an Unknown E – Mail message.
Change your Passwords frequently.
13. PHISHING
The fraudulent practice of sending emails purporting to be from
reputable companies in order to induce individuals to reveal
personal information, such as passwords and credit card numbers
is called ‘Phishing’.
Preventing Phishing –
Never provide any personal detail like Social Media Passwords,
Bank Account Details, etc.
Never Access the Bank Website from the link provided in E –
Mail.
Never respond or open an E – Mail from Unknown ID.
14. SPAMMING
Spamming’ refers to unwanted E – Mails sent in bulk to
multiple users for promoting products or services. These
types of E – Mails are sent forcefully to the people, who
otherwise do not want to receive them.
Preventing Spamming –
Never provide email address unnecessarily on any website.
Do not reply the E – Mails received in Spam Folders.
15. SOFTWARE PIRACY
‘Software Piracy’ is the illegal copying, distributing, sharing, selling or use of software, whether
intentional or not.
The different types of Software Piracy are –
Counterfeiting – It means producing fake copies of a software, making it look authentic.
End-User Piracy – This occurs when an individual reproduces copies of software without
authorization.
Internet Piracy – This occurs when software is downloaded from the Internet.
Soft lifting – It is when someone purchases one version of the software and downloads it onto
multiple computers.
16. COMPUTER VIRUS
A ‘Computer Virus’ is a malicious piece of computer code designed to spread from device to
device. Virus stands for ‘Vital Information Resources Under Siege’. Viruses spread when the
software or documents are transferred using a network, a disk, file sharing methods, infected e-
mail attachments.
Some of the Computer Viruses are:-
Boot Sector Viruses
File Viruses
Trojan Horses
Macro Viruses
E – Mail Viruses
Spyware
Malware
17. CYBER SECURITY
‘Cyber Security’ refers to the body of technologies, processes and practices designed to protect
data, networks, information, devices and programs.
It is important because Government, Military, Corporates, Financial and Medical Corporation
collects, processes and store huge amount of data on computers and other devices.
18. COMPUTER ETHICS
The following Computer Ethics has to be remembered, while using Internet: -
Respect the Privacy of Others on Internet and never try to Access their personal
information without their concern.
Never use the information which is protected by the Copyrights.
Do not post negative information on the Internet because it can harm many people.
Always use Original Software.
Never use technology to keep an eye on other’s system.
Be respectful to others while Communicating on the Internet.
19. RIGHT TO PRIVACY
‘Privacy’ is one of the Individual’s right to keep his/her
Personal Information secret from others an reveal it to only
the Selective Ones. Accessing one’s personal data without
his/her consent is Unethical and Illegal.
Protecting Privacy –
Never share your Account Details like Login ID or
Passwords with others.
Cookies stored in your system from different websites
can cause leakage of information.
Avoid of keeping Confidential Details in your System, if
not required.
20. IT ACT 2000
The Information Technology Act 2000, of the Indian Parliament notified on 17th October 2000. It
is the primary law in India dealing with cybercrime and electronic commerce. The Act provides a
legal framework for electronic governance by giving recognition to electronic records and digital
signatures. It also defines cyber crimes and prescribes penalties for them. The Act directed the
formation of a Controller of Certifying Authorities to regulate the issuance of digital signatures. It
also established a Cyber Appellate Tribunal to resolve disputes rising from this new law.
21. INTELLECTUAL PROPERTY RIGHT
‘Intellectual Property Rights’ (IPRs) are legal rights that protect creations and/or inventions
resulting from intellectual activity in the industrial, scientific, literary or artistic fields. The most
common IPRs include patents, copyrights, marks and trade secrets.
The acts which are regarded to IPRs are –
Copyright Act
Industrial Property Rights
Patent
Trademark
22. GENERAL NETIQUETTES
‘Netiquette’ is a combination of the words Network and Etiquette and is defined as a set of rules
for acceptable online behavior.
Some of the General Netiquettes are:-
Obey Copyright Laws – While copying text or pictures, obey copyright laws. Don’t steal.
Be Aware of Cyberbullying – If you are targeted by cyberbullying do not respond. Keep all the
records, with dates and time if possible. Talk to your parents about the Issue.
Respect Others – Do not post any abusive words about any person on the Internet.
Be Tolerant and Careful – Be open to understand the point of views of others on the Internet.
Don’t jump into conclusions.
23. SOCIAL NETWORKING NETIQUETTES
‘Social Networking’ is the use of Internet-based social media sites to stay connected with friends,
family, colleagues, customers, or clients.
Some of the basic Social Networking Netiquettes are:-
Screen Name – When creating your screen name, do not include your personal information.
Password – Do not share your passwords with anyone except your parents.
Personal Information – Don’t give your personal information to anyone on the Internet
without your parents permission.
Online Friends – Do not agree to meet your any online friend without the consent of your
parents.
24. E – MAIL NETTIQUETTES
Some of the basic E – Mail Netiquettes are:-
Do Not Shout – Don’t capitalize all your letters, no matter how urgent your email is, as you
will look aggressive – it’s like shouting over email.
Pay Attention to Spellings – Grammar, spelling and punctuation should be one of the top
concerns in writing emails.
Think Before You Speak – Never use offensive language in your E – Mails.
Take a Look Before Sending a Message – Always remember to go through the E – Mail before
sending it.
25. SAFETY MEASURES WHILE USING INTERNET
The Safety Measures which you have to keep in mind, while using Internet:-
Don’t share your personal information.
Double-check any links before you click.
Use secure public Wi-Fi networks.
Use a VPN with your Wi-Fi connection.
Only log into sites that start with “https://”.
Use antivirus and antimalware software.
Create and use complex passwords.
26. HOW TO PROTECT COMPUTER ?
STEP 1 Use Updated Antivirus Software:
Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer.
Advantages- Protection from viruses and their transmission, Block spam and ads, Defense
against hackers and data thieves, etc.
STEP 2 – Keep Your Firewall Turned On:
A Firewall is a network security device that monitors incoming and outgoing network traffic.
STEP 3 – Keep the Operating System Updated:
Software Updates are important because they often include critical patches to security holes.