This PowerPoint will help the not only the students but also others to learn about Cyber Safety, Software Piracy and their types and Computer Viruses and their types also.
Size: 11.38 MB
Language: en
Added: Oct 24, 2021
Slides: 26 pages
Slide Content
CYBER SAFETY CLASS – 9
WHAT IS CYBER CRIME ? ‘ Cyber Crime ’ can be defined as Criminal Activity involving information technology infrastructure, including illegal access and illegal interception of computer data to, from or within a computer system, Data Inference (damaging, deletion, altering computer data illegally), misuse of devices, Forgery (ID theft) and electronic fraud.
TYPES OF CYBER CRIMES The following are the types of Cyber Crime:- Theft Of Money Theft Of Data Fraud
THEFT OF MONEY Commerce on Internet is mainly transacted through debit/credit cards. Therefore, thieves have been very active in obtaining stolen credit cards details to purchase goods and services over Internet. This type of Cyber Crime runs to millions of rupees per year.
THEFT OF DATA Data and Information is the most Valuable Commodity any business has. The Cost of creating data from scratch can increase the cost of any hardware or programs. Data can be stolen by physical Theft of Hardware or through Unauthorized Access to the System .
FRAUD ‘ Fraud ’ means trying to trick someone in order to gain an advantage. Some of these most common forms of computer frauds includes:- Posing as someone from an Official Organization such as Bank or Electricity Board in order to get their Account Details . Sending E – Mails to get Personal or Account Detail . Stealing Identity of someone, to Steal their Money or some other criminal activity.
REPORTING A CYBER CRIME On being the Victim of any Cyber Crime , the first step is to report the crime to the Law Enforcement Agency ( Cyber Crime Branch or Police Station ). Matters of Cyber Crime are investigated by Law Enforcement Agency ( LEA ) on registration of FIR . Further LEA approaches to Indian Computer Emerging Response Team ( CERT – IN ) for getting information related to technical analysis like details of E – Mails, SMS, Facebook, etc.
UNETHICAL PRACTICES The common Unethical Practices on Internet are:- Plagiarism Cyber Bullying Cyber Stalking Hacking Phishing Spamming
PLAGIARISM ‘ Plagiarism ’ deals with stealing of ideas and thoughts of other people on Internet and projecting them as one’s own work without permission of the original author. Preventing Plagiarism – If you use ideas, texts, information from a website. Always acknowledge the website from where it is taken. Seek written permission from the Author whose content you are using for your work. You can also put the contents in quotes for avoiding Plagiarism.
CYBER BULLYING ‘ Cyber Bullying ’ refers to the act of threating, humiliating, torturing or harassing someone on the Internet. This includes posting Negative Comments about someone and uploading unwanted photos and videos to hurt that person. This has become very common among teenagers. Preventing Cyber Bullying – Never share your photos or videos publicly on Internet. Keep your Password strong and never share them with others except your parents. Think twice before posting anything on Internet.
CYBER STALKING ‘ Cyber Stalking ’ refers to the act of harassing an individual over the Internet. Stalkers collect personal information such as name, contact details, social networking profile details, daily routine, house address, date of birth, etc., of a targeted person. Preventing Cyber Stalking – Keep a Low Profile. Maintain a good Social Hygiene. Always hide your IP Address from strangers. If you are being stalked on the Social Media, reset your Passwords.
HACKING ‘ Hacking ’ means to gain the access on the Remote Computer to control it resources and information without any authorization from the Owner . The Intention behind the access of the system is to steal important data and corrupt it. Preventing Hacking – Never use Pirated Software downloaded over Internet. Always update your Antivirus Software in your System. Never open an Unknown E – Mail message. Change your Passwords frequently.
PHISHING The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers is called ‘ Phishing ’. Preventing Phishing – Never provide any personal detail like Social Media Passwords , Bank Account Details , etc. Never Access the Bank Website from the link provided in E – Mail. Never respond or open an E – Mail from Unknown ID .
SPAMMING ‘ Spamming ’ refers to unwanted E – Mails sent in bulk to multiple users for promoting products or services. These types of E – Mails are sent forcefully to the people, who otherwise do not want to receive them. Preventing Spamming – Never provide email address unnecessarily on any website. Do not reply the E – Mails received in Spam Folders .
SOFTWARE PIRACY ‘ Software Piracy ’ is the illegal copying, distributing, sharing, selling or use of software, whether intentional or not. The different types of Software Piracy are – Counterfeiting – It means producing fake copies of a software, making it look authentic. End-User Piracy – This occurs when an individual reproduces copies of software without authorization. Internet Piracy – This occurs when software is downloaded from the Internet. Soft lifting – It is when someone purchases one version of the software and downloads it onto multiple computers.
COMPUTER VIRUS A ‘ Computer Virus ’ is a malicious piece of computer code designed to spread from device to device. Virus stands for ‘ Vital Information Resources Under Siege ’. Viruses spread when the software or documents are transferred using a network, a disk, file sharing methods, infected e-mail attachments. Some of the Computer Viruses are:- Boot Sector Viruses File Viruses Trojan Horses Macro Viruses E – Mail Viruses Spyware Malware
CYBER SECURITY ‘ Cyber Security ’ refers to the body of technologies, processes and practices designed to protect data, networks, information, devices and programs. It is important because Government , Military , Corporates , Financial and Medical Corporation collects, processes and store huge amount of data on computers and other devices.
COMPUTER ETHICS The following Computer Ethics has to be remembered, while using Internet: - Respect the Privacy of Others on Internet and never try to Access their personal information without their concern. Never use the information which is protected by the Copyrights. Do not post negative information on the Internet because it can harm many people. Always use Original Software. Never use technology to keep an eye on other’s system. Be respectful to others while Communicating on the Internet.
RIGHT TO PRIVACY ‘ Privacy ’ is one of the Individual’s right to keep his/her Personal Information secret from others an reveal it to only the Selective Ones. Accessing one’s personal data without his/her consent is Unethical and Illegal . Protecting Privacy – Never share your Account Details like Login ID or Passwords with others. Cookies stored in your system from different websites can cause leakage of information. Avoid of keeping Confidential Details in your System, if not required.
IT ACT 2000 The Information Technology Act 2000 , of the Indian Parliament notified on 17 th October 2000 . It is the primary law in India dealing with cybercrime and electronic commerce. The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures . It also defines cyber crimes and prescribes penalties for them. The Act directed the formation of a Controller of Certifying Authorities to regulate the issuance of digital signatures. It also established a Cyber Appellate Tribunal to resolve disputes rising from this new law.
INTELLECTUAL PROPERTY RIGHT ‘ Intellectual Property Rights ’ ( IPRs ) are legal rights that protect creations and/or inventions resulting from intellectual activity in the industrial, scientific, literary or artistic fields. The most common IPRs include patents, copyrights, marks and trade secrets. The acts which are regarded to IPRs are – Copyright Act Industrial Property Rights Patent Trademark
GENERAL NETIQUETTES ‘ Netiquette ’ is a combination of the words Network and Etiquette and is defined as a set of rules for acceptable online behavior. Some of the General Netiquettes are:- Obey Copyright Laws – While copying text or pictures, obey copyright laws. Don’t steal. Be Aware of Cyberbullying – If you are targeted by cyberbullying do not respond. Keep all the records, with dates and time if possible. Talk to your parents about the Issue. Respect Others – Do not post any abusive words about any person on the Internet. Be Tolerant and Careful – Be open to understand the point of views of others on the Internet. Don’t jump into conclusions.
SOCIAL NETWORKING NETIQUETTES ‘ Social Networking ’ is the use of Internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients. Some of the basic Social Networking Netiquettes are:- Screen Name – When creating your screen name, do not include your personal information. Password – Do not share your passwords with anyone except your parents. Personal Information – Don’t give your personal information to anyone on the Internet without your parents permission. Online Friends – Do not agree to meet your any online friend without the consent of your parents.
E – MAIL NETTIQUETTES Some of the basic E – Mail Netiquettes are:- Do Not Shout – Don’t capitalize all your letters, no matter how urgent your email is, as you will look aggressive – it’s like shouting over email. Pay Attention to Spellings – Grammar, spelling and punctuation should be one of the top concerns in writing emails. Think Before You Speak – Never use offensive language in your E – Mails. Take a Look Before Sending a Message – Always remember to go through the E – Mail before sending it.
SAFETY MEASURES WHILE USING INTERNET The Safety Measures which you have to keep in mind, while using Internet:- Don’t share your personal information. Double-check any links before you click. Use secure public Wi-Fi networks. Use a VPN with your Wi-Fi connection. Only log into sites that start with “ https://” . Use antivirus and antimalware software. Create and use complex passwords.
HOW TO PROTECT COMPUTER ? STEP 1 – Use Updated Antivirus Software: Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer. Advantages - Protection from viruses and their transmission, Block spam and ads, Defense against hackers and data thieves, etc. STEP 2 – Keep Your Firewall Turned On: A Firewall is a network security device that monitors incoming and outgoing network traffic. STEP 3 – Keep the Operating System Updated: Software Updates are important because they often include critical patches to security holes.