0% found this document useful (0 votes)
118 views33 pages

Cyber Safety: Samarth Kumar

The document discusses cyber safety and security risks when using the internet. It notes that while the internet has made many things easier, it also poses security risks if not used properly. It defines cyber safety as the safe and responsible use of the internet to protect personal information and security. It provides tips for safely browsing the web, protecting identity online, and common ways websites can track users such as through IP addresses, cookies, and user agent information. The document also discusses cyber crimes like identity theft, cyber bullying, cyber stalking and spreading rumors online. It advises on reporting cyber crimes and safe practices for social media use.

Uploaded by

Nipermag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views33 pages

Cyber Safety: Samarth Kumar

The document discusses cyber safety and security risks when using the internet. It notes that while the internet has made many things easier, it also poses security risks if not used properly. It defines cyber safety as the safe and responsible use of the internet to protect personal information and security. It provides tips for safely browsing the web, protecting identity online, and common ways websites can track users such as through IP addresses, cookies, and user agent information. The document also discusses cyber crimes like identity theft, cyber bullying, cyber stalking and spreading rumors online. It advises on reporting cyber crimes and safe practices for social media use.

Uploaded by

Nipermag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 33

CYBER SAFETY

SAMARTH KUMAR
TODAY’S AGE CANNOT BE EVEN THOUGHT OF
WITHOUT INTERNET ,EVEN IN DREAMS. ALTHOUGH
INTERNET HAS MADE MANY THINGS EASIER BUT AT
THE SAME TIME IT HAS POSED MANY SECURITY
RISKS TOO, IF NOT USED IN A PROPER WAY. THUS,
IT IS IMPORTANT TO KNOW ABOUT POSSIBLE
THREATS, CHALLENGES AND RISKS OF WORKING ON
INTERNET TO ENSURE PERSONAL SAFETY AND
INFORMATION SECURITY.
WHAT IS CYBER SAFETY ?

CYBER SAFETY REFERS TO THE SAFE AND RESPONSIBLE


USE OF INTERNET SO AS TO ENSURE SAFETY AND
SECURITY OF PERSONAL INFORMATION AND NOT
POSING AS A THREAT TO ANYONE ELSE’S INFORMATION.
IT INVOLVES GAINING KNOWLEDGE ABOUT POSSIBLE
THREATS TO PERSONAL SAFETY AND SECURITY RISKS
FOR THE INFORMATION ALONG WITH MEASURES TO
PREVENT AND COUNTER THEM.
SAFELY BROWSING THE
WEB

• WHAT ARE THE POSSIBLE DANGERS ?


• HOW TO AVOID THESE ?
• HOW TO VIRTUALLY CONDUCT YOURSELF
WHILE BROWSING WEB ?
IDENTITY PROTECTION
WHILE USING
THE INTERNET

WE SURF THE INTERNET FOR A VARIETY OF


REASONS, FROM USING SOCIAL MEDIA, BUYING
AND SELLING GOODS, TO SENDING INFORMATION.
IN THIS PROCESS WE GIVE OUT SOME SENSITIVE
INFORMATION WHICH CAN BE USED FOR IDENTITY
FRAUDS, HACKING, STALKING ETC.
IDENTITY FRAUD/THEFT

IDENTITY THEFT IS A TYPE OF FRAUD THAT INVOLVES USING SOMEONE ELSE’S


IDENTITY TO STEAL MONEY OR GAIN OTHER BENEFITS
ONLINE IDENTITY THEFT REFERS TO AN ACT OF STEALING SOMEONE’S PERSONAL
INFORMATION SUCH AS NAME, LOGIN DETAILS ETC. AND THEN POSING AS THAT
PERSON ONLINE.

MOST COMMMON SOLUTION TO THIS IS: PRIVATE


BROWSING OR ANONYMOUS BROWSING ON INTERNET.
For chrome- ctrl+Shift+N
For firefox- ctrl+shift+P
MANY WAYS WEBSITES CAN TRACK YOU

IP HTTP
COOKIES
ADDRESS REFERRER

SUPER USER
COOKIES AGENT
1. IP ADDRESS

IP ADDRESS IS A UNIQUE ADDRESS OF YOUR DEVICE WHEN YOU


CONNECT TO THE INTERNET.
IT’S LIKELY THAT YOUR COMPUTER SHARES YOUR IP ADDRESS WITH
OTHER NETWORKED DEVICES IN YOUR HOUSE OR OFFICE.
FROM YOUR IP ADDRESS, A WEBSITE CAN DETERMINE YOUR ROUGH
GEOGRAPHICAL LOCATION.
2. COOKIES OR TRACKING SCRIPTS

COOKIES ARE SMALL PIECES OF INFORMATION


RELATED TO YOUR ONLINE HABITS WEBSITES CAN
STORE IN YOUR BROWSER.
COOKIES HAVE A LOT OF LEGITIMATE USES BUT THEY
CAN USED TO IDENTIFY YOU AND TRACK YOUR
BROWSING HISTORY ACROSS A WEBSITE.
3. HTTP REFERRER

THIS MEANS THAT WHEN A USER CLICKS A HYPERLINK IN A WEB


BROWSER, THE BROWSER SENDS A REQUEST TO THE SERVER
HOLDING THE DESTINATION WEBPAGE. THE REQUEST INCLUDES
THE REFERER FIELD, WHICH INDICATES THE LAST PAGE THE USER
WAS ON (THE ONE WHERE THEY CLICKED THE LINK).
REFERER LOGGING IS USED TO ALLOW WEBSITES AND WEB
SERVERS TO IDENTIFY WHERE PEOPLE ARE VISITING THEM FROM,
FOR PROMOTIONAL OR STATISTICAL PURPOSES.
4. SUPER COOKIES

A SUPERCOOKIE IS A TYPE OF TRACKING COOKIE INSERTED INTO AN HTTP


HEADER BY AN INTERNET SERVICE PROVIDER (ISP) TO COLLECT DATA ABOUT A
USER'S INTERNET BROWSING HISTORY AND HABITS.
SUPERCOOKIES CAN BE USED TO COLLECT A WIDE ARRAY OF DATA ON USERS'
PERSONAL INTERNET BROWSING HABITS INCLUDING THE WEBSITES USERS
VISIT AND THE TIME THEY VISIT THEM. IT DOES NOT MATTER WHICH BROWSER
IS BEING USED OR IF USERS SWITCH BROWSERS. SUPERCOOKIES CAN ALSO
ACCESS INFORMATION COLLECTED BY TRADITIONAL TRACKING COOKIES --
INCLUDING LOGIN INFORMATION, CACHED IMAGES AND FILES AND PLUG-IN
DATA -- AND STORE THAT INFORMATION EVEN AFTER THE TRADITIONAL COOKIE
HAS BEEN DELETED. EACH SUPERCOOKIE CAN GET AS LARGE AS 100 KB.
5. USER AGENT

IN COMPUTING, A USER AGENT IS SOFTWARE (A SOFTWARE AGENT) THAT IS


ACTING ON BEHALF OF A USER. ONE COMMON USE OF THE TERM REFERS TO A
WEB BROWSER TELLING A WEBSITE INFORMATION ABOUT THE BROWSER AND
OPERATING SYSTEM. THIS ALLOWS THE WEBSITE TO CUSTOMIZE CONTENT FOR
THE CAPABILITIES OF A PARTICULAR DEVICE, BUT ALSO RAISES PRIVACY
ISSUES.
SPAM BOTS AND WEB SCRAPERS OFTEN USE FAKE USER AGENTS.
A RESULT OF USER AGENT SPOOFING MAY BE THAT COLLECTED STATISTICS OF
WEB BROWSER USAGE ARE INACCURATE.
PRACTICES TO ENSURE CONFIDENTIALITY OF
INFORMATION

COMPUTERS, NETWORKING, INTERNET- THESE ALL ARE INEVITABLE; YOU


CAN’T AVOID THESE AS THESE ARE MODERN AGE TOOLS. BUT YOU SURELY
CAN FOLLOW CERTAIN PRACTICES TO SAFEGAURD YOUR DATA AND
ENSURE ITS CONFIDENTIALITY.
USE FIREWALL
WHEREVER
POSSIBLE
CONTROL
BROWSER
SETTINGS TO
BLOCK TRACKING
BROWSE
PRIVATELY
WHEREVER
POSSIBLE
BE CAREFUL
WHILE POSTING
ON THE
INTERNET
ENSURE SAFE SITES
WHILE ENTERING
CRUCIAL
INFORMATION
CAREFULLY
HANDLE E-MAILS
DO NOT GIVE
SENSITIVE
INFORMATION ON
WIRELESS NETWORKS
AVOID USING
PUBLIC
COMPUTERS
CYBER CRIME

ANY CRIMINAL OFFENSE THAT IS


FACILITATED BY, OR INVOLVES THE USE OF,
ELECTRONIC COMMUNICATIONS OR
INFORMATION SYSTEMS, INCLUDING ANY
ELECTRONIC DEVICE, COMPUTER, OR THE
INTERNET IS REFERRED TO AS CYBERCRIME.
CYBER TROLLS

DEROGATORY MESSAGES OR
COMMMENTS POSTED ONLINE
TARGETING PEOPLE ARE CALLED CYBER
TROLLS.
TROLLING IS A CYBER CRIME AND IS
CLOSELY RELATED TO CYBER BULLYING.
IN FACT, IT IS A FORM OF CYBER
BULLYING
CYBER BULLYING

HARASSING, DEMEANING, EMBARRASSING,


DEFAMING OR INTIMIDATING SOMEONE
USING MODERN TECHNOLOGIES LIKE
INTERNET, CELL PHONES, INSTANT
MESSENGERS, SOCIAL NETWORKS ETC., IS
CALLED CYBER BULLYING
CYBER STALKING

THIS IS A KIND OF ONLINE HARASSMENT


WHEREIN THE VICTIM IS SUBJECTED TO A
BARRAGE OF ONLINE MESSAGES AND E-
MAILS.
A CYBER STALKER RELIES UPON THE
ANONYMITY AFFORDED BY THE INTERNET TO
ALLOW THEM TO STALK THEIR VICTIM
WITHOUT BEING DETECTED.
SPREADING
RUMOURS
ONLINE
People often think that they can make a fake profile with some different name and do anything online
and never be caught. Through such fake profiles, people sometimes indulge in posting false
information on social media, or comments that could hurt others or spread rumours that may trigger
panic or hurt religious sentiments of other people resulting into clashes and even riots etc.

Spreading rumours online is a cybercrime and is a punishable offence. As per information Technology
Act of India, Punishable/circulation of Rumours, especially hurting religious sentiments is a
cybercrime and it may invite a fine with imprisonment extendable up to three years.
REPORTING CYBERCRIME

• The local police stations can be approached for filing


complaints just as the cybercrime cells specially designated
with the jurisdiction to register complaint.
• In addition, provisions have now been made for filing of ‘E-FIR’
in most states of India.
• In addition, the Ministry of Home Affairs is also launching a
website for registering crimes against women and children
online including cybercrimes.
The Information Technology Act categorically provides that a
cybercrime has global jurisdiction, meaning that the crime may
be reported in the Cyber Crime Units of any city, irrespective of
the place where the act was committed.
SOCIAL NETWORKING

A social networking site is a web


application or online platform
where people can setup their public
profile and make connections with
other people called online friends.
DIGITAL FOOTPRINTS

Digital Footprints are the records and traces


individuals’ activities as they use the Internet.
Digital Footprints are permanently stored.
PRIVACY SETTINGS

When you start using social media , you should not go


with default privacy settings. Rather it is always a
good idea to set-up privacy settings yourself by using
Account Settings. Through privacy settings, you can
control:
• Who can see what you have posted
• Who all can send requests to you
• What all information about you is visible to others,
even to your contacts etc.
In short, you should always set-up privacy settings for
all types of social media yourself.
SOCIAL MEDIA
USAGE RULES
1) Be Authentic
2) Use a Disclaimer
3) Don’t pick fights online
4) Don’t use Fake names or
Pseudonyms
5) Protect your Identity
6) Post appropriate content online
7) Respect your Audience
8) Respect other’s sentiments
9) Monitor Comments
THANK YOU
A POWERPOINT™ PRESENTATION BY SAMARTH KUMAR

You might also like