0% found this document useful (0 votes)
34 views11 pages

Data Security

Cyber security involves protecting data and systems from unauthorized access through measures like authentication, encryption, backups, and access control. Common online shopping frauds use tactics like fake stores, phishing scams, counterfeit goods, and identity theft. To protect yourself, verify website legitimacy, avoid too-good-to-be deals, use secure payment methods, and be wary of unsolicited messages. On social media, threats include account hacking, privacy exploitation, impersonation, and blackmail. Protect yourself by using strong unique passwords, enabling two-factor authentication, reviewing privacy settings, and monitoring accounts. When using lending apps, research the app, read terms carefully, avoid invasive permissions, verify licensing, and report fraud

Uploaded by

Utsav Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views11 pages

Data Security

Cyber security involves protecting data and systems from unauthorized access through measures like authentication, encryption, backups, and access control. Common online shopping frauds use tactics like fake stores, phishing scams, counterfeit goods, and identity theft. To protect yourself, verify website legitimacy, avoid too-good-to-be deals, use secure payment methods, and be wary of unsolicited messages. On social media, threats include account hacking, privacy exploitation, impersonation, and blackmail. Protect yourself by using strong unique passwords, enabling two-factor authentication, reviewing privacy settings, and monitoring accounts. When using lending apps, research the app, read terms carefully, avoid invasive permissions, verify licensing, and report fraud

Uploaded by

Utsav Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

CYBER

SECURITY AND
PRIVACY
Securing Digital
Dreams, Protecting
Privacy Streams.
Confidentiality Integrity
Ensuring that only authorized Guaranteeing the accuracy and
individuals or systems can reliability of data by preventing
access and view sensitive data. unauthorized modifications.
What is Cyber
Security?
Authentication Data Backups
Verifying the identity of users Regularly creating and storing
and systems to ensure that only copies of data to recover it in
authorized parties have access. case of loss, damage, or data
breaches.
Online Shopping
Frauds
02
Phishing Scams
Fake Online Stores
01
Fraudsters set up fake online stores that look Scammers send fake messages that appear to be
convincing. They may advertise products at from legitimate online stores, asking for sensitive
extremely low prices to lure shoppers. Once a information like your login credentials, credit card
victim places an order and makes a payment, the details, or personal information. These links lead to
scammer disappears, and the product is never fraudulent websites designed to steal your data.
delivered.

Counterfeit Goods
03 Identity Theft 04
Unscrupulous sellers list counterfeit or
imitation products on e-commerce Scammers set up fake websites or use
platforms, duping customers into buying phishing tactics to trick users into providing
what they believe to be genuine items. personal information, which they can use for
identity theft or other fraudulent activities.
Protecting Yourself from Online Shopping Fraud in
India:

• Verify the website's legitimacy before making a purchase.


• Avoid deals that seem too good to be true.
• Use secure and reputable payment methods.
• Be cautious with personal and financial information.
• Read customer reviews and check the seller's ratings.
• Be wary of unsolicited emails and messages.
• Use strong, unique passwords for your online accounts.
SOCIAL MEDIA
PRIVACY
S
METHODS OF SCAM
Impersonation Privacy Setting
Account Hacking and Exploitation Blackmail and
Unauthorized Access and Identity Theft Extortion

Scammers create fake Fraudsters may threaten


Cybercriminals use various Attackers exploit to release sensitive or
profiles that impersonate misconfigured or weak
methods, such as phishing, real individuals or entities. compromising
guessing weak passwords, or privacy settings on social information they've
They may use your personal media platforms to access
exploiting security loopholes, information or images, gathered from your social
to gain access to your social or misuse your personal media accounts unless
which they have obtained information.
media accounts. through social engineering you pay a ransom.
or hacking.
Protecting Yourself

• Use Strong, Unique Passwords: Create strong and unique passwords for each
of your social media accounts.
• Enable Two-Factor Authentication (2FA): Turn on 2FA to add an extra layer
of security.
• Regularly Review Privacy Settings: Make sure your privacy settings are
configured to limit who can access your information.
• Beware of Phishing: Be cautious about unsolicited messages and verify the
authenticity of requests before providing information or clicking on links.
• Regularly Monitor Your Accounts: Keep an eye on your social media
accounts for any suspicious activity.
Research the App: Check the app's reviews,
1
ratings, and legitimacy before downloading.

Read the Terms Carefully: Thoroughly review the


2 terms and conditions of the loan, including interest
rates and repayment terms.

Beware of Invasive Permissions: Do not grant


PRECAUTIO 3 access to unnecessary personal data or contacts.

NS 4
Verify Licensing: Ensure that the lending app is
registered and licensed by the appropriate
authorities.
Report Fraud: If you encounter a fraudulent
5 lending app, report it to the police and
regulatory authorities .

You might also like