HackPro_Awareness_Slides_4a35d4a9f0b152c2a34beeff368d697d.pptx

arjunpanditarjunpand 36 views 24 slides Sep 15, 2025
Slide 1
Slide 1 of 24
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24

About This Presentation

hacking


Slide Content

SECURING YOUR FUTURE...... CYBER SECURITY AWARENESS

CONTENTS Introduction Digital Footprinting Cyber threats Password Security Mobile Security Secure Internet Browsing Safe Online Shopping Safe Social Media Practices Phishing Online Gaming Cyber Bulling & Online Harassment Data Privacy & Data Protection Cyber Crime Reporting Career Opportunities

INTRODUCTION Welcome to our Cyber Security Awareness presentation! In today's digital age, technology has become an integral part of our lives, revolutionizing the way we work, communicate, and share information. However, with these advancements comes an increasing risk of cyber threats that can compromise our personal information, sensitive data, and even disrupt critical systems. WHY CYBER SECURITY IS IMPORTANT..? Cyber security is not just a concern for businesses and organizations; it's equally crucial for individuals. Cyber threats, such as malware, phishing, ransomware, and identity theft, are constantly evolving and becoming more sophisticated. Being aware of these risks and adopting best practices can significantly reduce the chances of falling victim to cyber attacks.

DIGITAL FOOTPRINTING Search Your Digital Footprint Set Alerts Delete Old or Unused Accounts Create a Secondary Email Address Limit Sharing of PII Data Restrict Settings Avoid Linking Accounts Stay Private Don’t overshare At least skim the terms and conditions Know that sending is like publishing–forever Use digital tools to manage your digital foot print

MALWARE: Malware is short for "malicious software," and it refers to any software or code that is specifically designed to harm, exploit, or gain unauthorized access to computer systems, networks, and data. Malware is typically created by cybercriminals with the intent of stealing sensitive information, causing damage, disrupting operations, or gaining control over targeted devices. There are various types of malware, each with different functionalities and objectives. HERE ARE SOME COMMON TYPES: 1.Viruses: Viruses are a type of malware that attach themselves to legitimate programs or files and spread by replicating and infecting other files or systems. When the infected file or program is executed, the virus can carry out its malicious activities. CYBER THREATS

CYBER THREATS 2. Trojans: Named after the Greek mythological "Trojan Horse," Trojans masquerade as legitimate software or files to trick users into executing them. Once activated, Trojans can create backdoors, steal data, or carry out other malicious actions.

CYBER THREATS 3.RANSOMEWARE: Normally loaded onto a computer via a download /attachment / link from an email or website. Will either lock the screen or encrypt your data. Once Ransomware is uploaded on your computer/tablet/phone it is very difficult to remove without removing all of the data Wannacry attack 2017-One of the biggest cyber attacks to occur. Is said to have hit 300,000 computers in 150 countries. Companies affected include; NHS, Renault, FedEx, Spanish telecoms and gas companies, German railways.

CYBER THREATS 4. SPYWARE: Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties.

5. KEYLOGGER: Keyboard loggers. Keyloggers are a type of system monitor that cybercriminals often use to steal PII, login credentials and sensitive enterprise data. Employers may also use keyloggers to observe employees' computer activities; parents to supervise their children's internet usage; device owners to track possible unauthorized activity on their devices; or law enforcement agencies to analyze incidents involving computer use. CYBER THREATS

PASSWORD SECURITY In this digital age, where our lives are intricately linked to the virtual world, protecting our personal and sensitive information is of paramount importance. One of the first lines of defense against unauthorized access is maintaining robust password security. Password security systems are used not just to protect data but also to verify and establish identity for personalized features and account access. Stolen credentials are commonly used by cyberattackers to deliver malware. For this reason, it's important to adopt password security best practices, such as two-factor authentication (2FA)

MOBILE SECURITY Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing Mobile security is also known as wireless security. Mobile security / Mobile phone security has become. increasingly important in mobile computing. It is of particular concern as it relates to the security of personal and business information now stored on smart phones.

SECURE INTERNET BROWSING Safe Browsing is a service, run by Google, that catalogs fraudulent or malicious websites. It’s integrated into several major browsers—including Brave, Chrome, Safari, and Firefox—so that they can warn you if you’re about to visit such a site. Edge uses a similar (though slightly different) service that’s run by Microsoft.

SAFE ONLINE SHOPPING When you shop online, you share sensitive information with retailers, including your bank or credit card details, contact information, and address. If hackers gain unauthorized access to an e-commerce website, there is a risk that your information could be exposed in the event of a data breach.

SAFE SOCIAL MEDIA PRACTICES Use security and privacy options provided by social media platforms viz: 2-Factor authentication system, access control. Connect our devices only to authorized wifi access, use privacy options provided by various mobile operating systems, use auto-lock features, and download apps only from authorized app stores.

PHISHING Is the attempt to obtain sensitive information by deception. They will be after your login credentials, payment card details or to upload malware to your computer. The email will normally impersonate a genuine company or person. HOW TO TACKLE THE PROBLEM: Don’t click any links on an email unless you can guarantee who its from. Use a trusted method of contacting the company via a phone number, app or website. Mark the email as spam and contact the organization.

ONLINE GAMING online gaming may involve both social risks and technological risks. Thus, many online gaming risks are similar to those computer users may have already encountered, but they may not have realized that the games pose another opportunity for the compromise of their privacy or computer security. Strong passwords for the win! Winners use long, complex, and unique passwords....

CYBER BULLING & ONLINE HARASSMENT Cyberbullying and cyber harassment are also known as online bullying. It has become increasingly common, especially among teenagers and adolescents, due to the communication technology advancements and young people's increased use of such technologies. Cyberbullying is when someone, typically a teenager, bullies or harasses others on the internet and other digital spaces, particularly on social media sites. Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims' personal information, or pejorative labels (i.e. hate speech). Bullying or harassment can be identified by repeated behavior and an intent to harm.Victims of cyberbullying may experience lower self-esteem, increased suicidal ideation, and various negative emotional responses, including being anxious, frustrated, angry, or depressed.

DATA PRIVACY & DATA PROTECTION Data Privacy :- Data Privacy refers to the proper handling of data means how a organization or user is determining whether or what data to be shared with third parties. Data privacy is important as it keeps some data secret from others/third parties. So we can say data privacy is all about authorized access. It is also called as Information privacy. Data Protection :- Data Protection refers to the process of keeping safe to important information. In simple it refers protecting data against unauthorized access which leads to no corruption, no compromise, no loss and no security issues of data. Data protection is allowed to all forms of data whether it is personal or data or organizational data.

CYBER CRIME REPORTING Cybercrime is a type of crime involving a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances. CONTACTS :- National Cyber Crime Reporting portal (Helpline Number -1930) Cybercrime Complaint Numbers 1930 Financial Frods 155260 National Police Helpline Number 100 National Women Helpline Number 181,1091 National Emergency Helpline Number 112

CYBER CRIME REPORTING WEBSITES :- https://cybercrime.gov.in/ https://cybervolunteer.mha.gov.in/Webform/Helpline.aspx https://ncrb.gov.in/en/node/2318 https://citizen.mahapolice.gov.in/Citizen/MH/index.aspx LOST / STOLEN MOBILES :- https://www.ceir.gov.in/Home/index.jsp

Career Opportunities

Any Questions ???

THANK YOU.....
Tags