Chp-15 Cyber Safety ppt-std 11.pptx

15,288 views 55 slides Aug 14, 2022
Slide 1
Slide 1 of 55
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55

About This Presentation

Class 11 cyber safety and security for this modern world


Slide Content

CYBER SAFETY CHAPTER 15

Cyber Safety Cyber safety refers to safe and responsible use of Internet, to ensure safety and security of personal information and not posing threat to anyone else’s information.

Safely Browsing The Web These days we must know the threats while browsing the web. Safe browsing on web needs you to know many things like: What are possible dangers? H ow to avoid these? H ow to virtually conduct yourself while browsing web You must remember, not every site you visit is safe. Whatever you post or do online is visible to others. Not everything you see or is promised online is true.

Identity Protection while using Internet We surf internet for a variety of reasons, from using social media, buying and selling goods, to exchanging information. W h en w e g iv e pr i va t e da t a t o b usinesses a n d o th e r Int e r n et u s ers (such a s w hile f i l l in g onl i n e f o r m or making payment online), we trust them to use that information for legitimate purposes. These information can be used for harmful reasons like hacking, stalking an identify fraud. Identity fraud is when personal details that have been accessed or stolen are used to commit fraudulent acts posing as someone else with stolen identity

Solution of Identity Fraud Most common solution to this is : Private Browsing Or Anonymous Browsing Before we understand this, let us talk about what happens when we browse the internet…

Anonymous Browsing All the ways discussed earlier of identity leakage is resolved by either ANONYMOUS OR PRIVATE BROWSING . ANONYMOUS BROWSING : allows users to view websites without revealing any personnel information of user like IP address, machine type, location. An anonymous browser lets users access websites anonymously. It can also be as a tool for government, journalists and everyday security-conscious surfers.

Private Browsing There are other ways to use internet without revealing our search history and sharing our data : Incognito Browsing : opens up a version of the browser that will not track you activity. Its particularly useful if you are entering sensitive data like bank details into the browser as it can minimise the risk of our information being saved to that computer. In Google chrome, just press : CTRL + SHIFT + N to open in incognito mode

Private Browsing Proxy : act as a middlemen between your computer and the website you want to access. Now the tracking website will get the IP address and information that belongs to the proxy site, so you are effectively getting the same content from another source without getting to know your browsing details . Virtual Private Network (VPN) : is a method to add security and privacy to private and public networks like Wi-Fi hotspot and the Internet. VPNs are most often used by corporation to protect sensitive data. VPN were originally meant for business employees working offsite to gain access to shared drive.

Confidentiality of Information Internet is a public platform. The sites you visit, the products you search, the posts that you put on social media are all visible to public. But there must be some information like Credit Card Details, Bank Details which you do not want to make public i.e. you want to keep this information confidential. Confidentiality of information ensures that only authorized users get access to sensitive and protected data

Practices to Ensure Confidentiality of Information 1. Use Firewall wherever possible : we must secure our system such that only authentic users can connect to it. Firewall is one very good solution for this. Firewall is a program/hard ware that mo n i t or s a l l communications and traps al l illicit packets. Most OS now comes with firewall preinstalled. We must install Firewall that can monitor both incoming and outgoing communication and traps the illicit ones.

2. Control browser setting to block tracking : A s we know that website can track our surfing on their site by IP address, to minimise these threats we can turn our default settings to exclude third party cookies since they can be used to build up detailed profiles of our surfin g pattern over time. In Google Chrome : Open settings, -> Privacy and Security -> Content Settings-> Cookies -> “Enable” Block Third party cookie. Practices to Ensure Confidentiality of Information

Browse privately wherever possible: to avoid the tracking as discussed earlier try to browse anonymously or privately. Be Careful while posting on Internet : When you post anything to public Internet such as social networking site like Instagram or Facebook etc. newgroup, mailing list or chat room you generally give up rights to the content and any expectation or privacy or confidentiality is useless. So never post crucial information like you personal details such as address, mobile phone numbers, bank details, credit card details. Etc. on public internet sites. Practices to Ensure Confidentiality of Information

5. Ensure Safe sites while entering crucial Information : while entering or giving crucial information like Passwords, Bank Details always ensure the website is working on https not on http. https means website is Secure i.e. Secure Socket Layer. For e.g. (next slide) Practices to Ensure Confidentiality of Information

Closed Lock Pad (Secure Connection)

6. Carefully handle emails : while opening emails, make sure you know the sender. Never open email of unknown or if by curiosity/accidentally opened the mail never click on any link inside it or open any attachment. It may lead to you fraudulent site, or trap for you or may be a Trojan, which will act as a Spy in you computer for sending information to the sender without your knowledge. Practices to Ensure Confidentiality of Information

7. Avoid using Public Computer : Always try not to use the public computer specially if you have to deal with your crucial data. But if it is an urgency then do remember: Browse privately Never save your login information (ID/Password) Avoid entering sensitive information Don’t leave computer unattended with sensitive information on screen Disable the features that stores passwords Properly logout before you leave the computer Erase history and traces of your work i.e. clear history and cookies Look for any suspicious device connected to computer Practices to Ensure Confidentiality of Information

Cyber Crime Is any criminal offense that is facilitated by, or involves use of electronic communications of information system including any electronic device, computer or the Internet. It involves the terms like : Phishing, Credit Card Frauds , illegal downloading, industrial espionage , child pornography, cyber bullying , cyber stalking, cyber terrorism , creation and /or distribution of viruses, spam and so on

Cyber Trolls and Bullying It refers to a person who purposely post opposing, sarcastic, demeaning or insulting- comments about something or someone with an aim of targeting a person online. The provocative messages posted this way are also called trolls. It is a cyber crime and is a form of cyber bullying.

Cyber Bullying H arassing , demeaning, em b ar r assin g , defaming, or intimidating someone using modern technologies like internet, cell phones, instant messengers, social networks etc. is called Cyber Bullying.

Cyber Stalking It is a kind of online harassment wherein the victim is subjected to barrage of online messages and emails. Typically these stalkers know their victims instead of resorting to offline stalking, they use the internet to stalk. A cyber stalker relies upon the anonymity afforded by the Internet to allow to stalk their victim without being detected

Cyber Stalking Cybe r Sta l ker s of ten d o this to trouble the i r victims: They collect all personal information about their victims The stalker may post this information on any obscene or illegal website posing as if the victim is posting this information People of all kind from nook and corner of the world, start calling the victim as his/her residence/workplace for many filthy/obscene reasons Some stalker subscribe the email account of victim to illegal websites because of which victim starts receiving such kind of unsolicited e-mails.

Cyber Stalking Cybe r Sta l ker s of ten d o this to trouble the i r victims: Some stalkers keep on sending repeated e-mails asking for various kinds of favors or threaten the victim. Stalkers follow their victim from board to board. Stalkers will almost always make contact with their victims through email having friendly or threatening content. The stalker many times uses multiple names when contacting the victim.

Spreading Rumors Online People often think that they can make a fake profile with some different name and do anything online and will not be caught. Through such fake profile, people sometimes indulge in posting false information on social media, or comment could hurt others or spread rumors that may trigger panic or hurt religious sentiments of other people resulting into clashes and even riots Spreading rumors online is a cyber crime and it may invite a fine with imprisonment extendable up to three years.

Reporting Cyber Crime If any cyber crime happens, one must report it firstly to parents, school authorities and then to police. The local police stations can be approached for filing complaints just as the cybercrime cells specially designation with the jurisdiction to register complaint In addition, provisions have now been made for filing of E-FIR in most of the states In addition, the ministry of tfome Affairs is also launching a website for registering crimes against women and children online including cybercrimes

Common Social Networking Sites Facebook : it is a platform where you can share your ideas in form of posts, share photos, videos etc. Twitter : micro blogging site which allows to post very small messages up to 280 char acters . Linkedln : social network for professionals. Provides features to make profiles look sort of detailed resumes, with sections for work experience, education, volunteer work, certifications, awards etc. Instagram : on of the most popular social networks for online photo sharing. Offer features like sharing real-time photos and short videos while on the go.

Appropriate usage of Social Networks Whatever we do online – post something or visit friends pages or search something etc leaves a permanent footprints called digital footprints and it remains for years storing trails of your online activities. We are using this platform for personal reasons and visible to anyone who looks for it, this might not cause any problem now BUT sometimes later it can pose potential problems when it comes to matter like – taking admissions in higher education or looking for job or even when looking for a life partner These days many universities look for digital footprints of applicant students before giving them admissions, similarly employers may look for digital footprint of candidates and so on.

What you should know ? While using social networking sites, you should know about what the right online behaviors are and what is considered a cybercrime If anyone thinks by making fake profile he/she can do such activity without being caught he/she is certainly mistaken. Modern technology tools can find anyone online using IP address, locations etc. So one must not indulge in these activities at all .

Digital Footprints Digital Footprints a re the records and traces individuals leave behind as they use the Internet . Digital Footprints are permanently stored. Your interaction on social media, your friend circle on social media sites, site you visits, online purchase, location visited through Facebook check-ins. etc. all make up your Digital Footprints.

Privacy Settings When you start social media, you should not go with default privacy settings. Rather it is always a good idea to set-up privacy settings yourself by using Account Settings. Through privacy settings you can control : Who all can see what you have posted Who all can send requests to you What all information about you is visible to others, even to you contacts etc.

What you should do – Usage Rules Be Authentic : Be honest about your identity Use a Disclaimer : if you are associated with any institution / organization and you are sharing you personal views about something, do make it clear that these are you personal vies and you do not represent any institution/organization. Don’t Pick Fights Online : don’t pick fight online if you do not like anyone's comments on your post.

What you should do – Usage Rules Don’t use Fake names or Pseudonyms : never pretends to be someone else. Protect Your Identity : while you should be honest about yourself, BUT you should never provide or post personal information online. These information can be used to conduct fraud or crime. Does your Information / Post pass the publicity test ? : if your post is not acceptable for face-to- face conversation, over the telephone then it is NOT ACCEPTABLE for a social networking site too.

What you should do – Usage Rules Respect you audience : sometimes school/college students talk in slang or use some abusive words which they find okay within their small group. But these things must not be posted online because it would not be acceptable in you connected world. Respect other’s Sentiments : you should always respects others’ privacy and be considerate for topics that may be considered sensitive – such as politics and religion.

What you should do – Usage Rules 9. Monitor Comment s : most people who maintain social media sites welcome comments – it builds credibility and community. You should prefer to review and approve comments before posting them on you site. This way you will ensure quality oF comments

Online Access and Computer Security Introduction Threats to Computer Security Solutions to Computer Security threats

Threats to Computer Security A threat is potential violation of security When a threat is actually executed, it becomes attack . Those who execute such actions, or cause them to be executed are called attackers.

Common threats Viruses ( Worms, Trojans ) Spyware Adware Spamming PC Intrusion ( Denial of Service, Sweeping, Password Guessing ) Phishing

Computer Viruses Are the malicious code/programs that cause damage to data and files on a system. It can attack any part of computer system like boot block, OS, system areas, files and applications. 2 other similar programs also cause virus like effects : Worms Trojans

Worms A worm is a self-replication programs which eats up the entire disk space or memory. A Worm keeps on creating its copies until all the disk space or memory is filled. Worms harm to a computer or a computer network by consuming bandwidth and slow down the network speed. After the worm has infected a system, it can propagate to other systems via internet or while copying files from one system to another without user interaction.

Trojan H orses Is a program that appears harmless (such as text editor or a utility program) but actually performs malicious functions such as deleting or damaging files. With help of Trojan, harm that could be done by hacker on target computer systems are: Data theft Installation of unwanted softwares Keystroke logging Downloading or uploading of files. And many more…

Damaged Caused by Viruses Damage or delete files : some viruses may delete or damage random documents or specific files that are crucial to you OS. Slow down your Computer Invade your email programs : some forms of viruses may wreak even more havoc by spreading themselves to the contact in your address book.

Spyware Is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it. Spyware mostly get installed on your PC without your consent. They gets installed when you visit any illegitimate website or download music, videos etc.

Damage caused by Spyware Compromise you data, computing habits and identity: it can monitor information about your computing habits like what websites you visit, record your keystroke (user name, password, credit card number) which in the end can lead to identity theft. Alter PC Settings: can alter settings like web browser home page, placement of desktop icons, which may be annoying Slows down you PC: can slows down system and Internet speed and become big problem when you are trying to use the programs on your PC , watch video online downloading large files.

Adware Programs that deliver unwanted ads to your computer generally in popups. They consume bandwidth. Similar to spyware but it may be installed with your consent. Damages are: Adware tracks information like spyware Display arrays of annoying advertising Slows down you PC

Spamming Means sending of bulk-mail by an identified or unidentified source. In non-malicious form, bulk advertising mail is sent to many accounts. In malicious form (email bombarding) the attackers keeps on sending bulk mail until the mail-server runs out of disk space. Damages are: Spam reduces productivity: billions of spam messages circulating across the Internet can disrupt email delivery, degrade system performance and reduce overall productivity

Spamming Spam eats up your time: deleting spam emails like the simple solutions, but it eats a significant amount of productivity Spam can lead to worse things: spam messages may contain offensive, fraudulent material and can even be used to spread viruses.

Eavesdropping Do you ever find that when you are talking to someone else, another person is secretly trying to listen to your talks? What that person is doing is 'eavesdropping '. tfave you ever tried to secretly listen to the conversation between two teachers regarding your class? If yes, then what you have done is 'eavesdropping '. In context of network security Eavesdropping refers to unauthorized access to another person's or organization's data while the data is on its way on the network.

Eavesdropping This may be done in a number of ways: By setting up parallel telephone lines. By installing some software (spyware) in the target computer. By installing some receiver which captures the data while on its way .

Phishing It is criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, credit card information, CVV number etc. In phishing an imposter uses an authentic looking email or web-site to trick recipients into giving out sensitive personal information. For example an email asking to update your bank details by clicking on a link or an email regarding lucky winner of some amount.

Pharming Is an attack in which a hacker attempts to redirect a website’s traffic to another bogus website. Through pharming attack, the attacker points you to malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to fake website.

Solutions to Computer Security Threats There are 2 ways of safeguarding our computer system: Active Protection: installing and properly using an antivirus software that includes internet security which include protection against threats such as viruses, Sypware and PC intrusions – is vital for proper protection against the hackers, intruders and wrongdoers Preventive Measures: even though security programs may actively detect and eliminate any threats your PC encounters, you should always help to prevent these issues from ever arising.

Solutions to Virus, Adware and Spyware Active Protection Preventive measures Use Anti-Virus and Anti- spyware software scan all you system for virus disconnect infected system immediately from you network Restore the infected system from clean backup Notify your antivirus vendors so it can ensure its signature database is up- to-date Download updates regularly Run frequent full system scan Keep you system up-to-date Use Caution when downloading files on the Internet Be Careful with email Don’t download or open unsolicited email attachments Don’t click on link in email rather type the URL on address bar Check for security alerts Disable running of scripts and cookies Disconnect from the internet when you are away Disable cookie if possible

Solutions to Spam, Eavesd ropping Active Protection Preventive measures Use Anti-Spam Software Sender Filtering: this method allows only messages from your approved sender list to reach you inbox- all other mail is quarantined for later review. It is done on the basis of Digital Certificates ( specially formatted d i gi tal information issued to website, are used to verify the identify of message sende r ) a n d D i gi tal Signatures ( are way of authenticating the identity of creators or producers of digital information. Key Filtering: this method filters out email messages that contain certain keywords or phrases, which are defined by you or others. Keep you email address private Use encrypted connection always if you have to provide sensitive information i.e. HTTPs Install personal firewall on computer connected to the Internet to check incoming and outgoing information and connections Avoid online transaction from public network or public Wi-Fi Install protection software such as Internet Security software

Solution to Phishing and Pharming Active Protection Preventive measures Take the computer offline (it may reduce the probability of infecting other devices in the same network with malware) Backup all files on the hard drive List the information given to p h ishin g s cammers (depending on what was leaked one may need to change password, block credit/debit card, BUT DON’T USE THE SAME COMPUTER TO CONTACT AGENCIES) Run Antivirus software Contact Credit agencies to report any possibilities of identify theft Don’t open emails from unknown sources or click on links embedded in suspect messages Check security guidelines of website such as PayPal so that you can distinguish between legitimate and bogus emails Also rather than clicking on link you can type general link on you web browser. If you are in double DON’T CLICK

Thank you…….