Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

CYBER SECURITY

Deepak Singh Bisht


CONTENT
INTRODUCTION
CYBER SECURITY
INTERNET THEFTS
PRECAUTIONS
CONSLUSION
What is cyber security?
In today's interconnected world, where our online activities are as essential as breathing,
cyber security serves as our digital shield. This chapter introduces the fundamentals of cyber
security, offering insights into how we can defend against online threats, secure our data, and
navigate the internet safely. Let's embark on this journey to understand the vital importance
of cyber security in protecting our digital lives.
Cybersecurity is the practice of protecting computers, networks, programs, and data from
digital attacks, damage, or unauthorized access. Its main goal is to ensure the confidentiality,
integrity, and availability of information in the digital world. It's all about keeping our
computers, phones, and online information safe from hackers and other cybercriminals.
Types of cyber crimes
HACKING
Cyber Fraud
Identity Theft
Phishing
Malware
Cyberbullying
Online Scams
Intellectual Property Theft
HACKING
Hacking: Hacking is the unauthorized access, manipulation, or misuse of computer systems,
networks, or data. It involves exploiting weaknesses in computer security to gain access to
information or control over systems without permission. Getting into someone else's computer or
network without permission. An example would be someone guessing your password and
accessing your email account. Hacking can take various forms, including:
Unauthorized Access: This involves breaking into a computer system or network without
permission. It could be done by exploiting software vulnerabilities, guessing weak passwords, or
using social engineering techniques to trick people into giving access.
Data Theft: Hackers may steal sensitive information stored on computers or networks, such as
personal data, financial records, or intellectual property. This stolen data can be used for various
malicious purposes, including identity theft or extortion.
Malicious Attacks: Hacking can also involve launching malicious attacks on computer systems or
networks, such as spreading viruses, worms, or ransomware to disrupt operations or cause
damage.
Cyber Fraud:
Cyber Fraud: Cyber fraud is a term used to describe crimes that cyberattackers commit using
the internet to illegally obtain and use a person's or business's sensitive information for financial
gain. Cyber fraud can target individuals, organizations, and even governments. Some examples
of cyber fraud include:
Phishing-Scammers send fraudulent emails or other forms of communication from a reputable
source to trick victims into revealing personal information, downloading malware, or giving
sensitive data.
Malware-Malicious software created by hackers to damage or disrupt a user's computer.
Identity theft-Stealing personal information like a person's name, social security number, birth
date, or credit card numbers.
Other types of cyber crimes include:
Email scams, Social media fraud, Banking fraud, eCommerce fraud, Ransomware, Cyber espionage,
and Data breaches.
CYBER BULLYING
Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging
platforms, gaming platforms and mobile phones.
Examples include:
spreading lies about or posting embarrassing photos or videos of someone on social media
sending hurtful, abusive or threatening messages, images or videos via messaging platforms.
What are the effects of cyberbullying?
UNICEF:
When bullying happens online it can feel as if you’re being attacked everywhere, even inside your own home. It
can seem like there’s no escape. The effects can last a long time and affect a person in many ways:
Mentally – feeling upset, embarrassed, stupid, even afraid or angry
Emotionally – feeling ashamed or losing interest in the things you love
Physically – tired (loss of sleep), or experiencing symptoms like stomach aches and headaches .
ONLINE SCAMS
Online scams, also known as internet fraud, are a type of cybercrime that uses the internet to
trick people into giving away money, property, or sensitive information. Cybercriminals often
pose as trustworthy people or businesses to gain their victims' trust. They may contact victims
through emails, social media, dating apps, or other online methods.
Some common types of online scams include:
Fake delivery OTP scam: Scammers ask for an OTP, claiming they need it for delivery.
Fake QR codes: Fake websites mimic online stores and use fake QR codes to trick users.
Lottery scams: Scammers contact victims and claim they have won a lottery prize, even though
the victim hasn't bought a ticket. They may ask the victim to pay a fee to process the winnings.
Intellectual Property Theft
Intellectual property (IP) theft is the unauthorized use, exploitation, or theft of creative works,
ideas, trade secrets, and information protected by intellectual property laws. IP theft can include
stealing copyrights, trademarks, or trade secrets, such as names, logos, symbols, inventions ETC.
Here are some examples of intellectual property:
Patents: An inventor creates a new and useful product, process, or design, such as a new type of
smartphone or a novel medical device. They apply for a patent, which grants them exclusive
rights to manufacture, use, or sell the invention for a certain period of time, typically 20 years.
Copyrights: A writer creates a novel, a musician composes a song, or an artist paints a picture.
They automatically hold the copyright to their work, which gives them the exclusive right to
reproduce, distribute, and publicly perform or display their creation.
Trademarks: A company designs a unique logo or symbol to represent its brand, such as the Nike
swoosh or the Coca-Cola logo. They register the trademark, which protects their brand identity
and prevents others from using similar marks that could cause confusion among consumers.
EXAMPLE
Example of intellectual property theft:
Imagine you're a graphic designer who creates a unique and eye-catching logo for a
new startup company. You spend hours brainstorming, sketching, and refining the
design until it perfectly captures the company's brand identity.
However, before you have a chance to officially register the logo as a trademark or
copyright it, someone sees your design and decides to use it for their own business
without your permission. They put it on their website, business cards, and
promotional materials, passing it off as their own creation.
In this scenario, the theft of your logo constitutes intellectual property theft. The
person has unlawfully appropriated your creative work for their own benefit.
PRECAUTIONS
Here are some precautions you can take to prevent cyber fraud:
Use strong passwords
Use a mix of uppercase and lowercase letters, numbers, and unique characters. Avoid using the
same password as your username, keyboard patterns, or default passwords. Passwords should
be at least 16 characters long, unique, and randomly generated. You can use a password
manager to store your passwords and keep your master password strong and memorable.
Keep your software and devices up to date
Make sure your operating system, web browser, and security software are up to date. You can
turn on automatic updates to receive the latest security fixes.
Be cautious online
Don't click on links or open attachments in spam emails or untrusted websites. Don't feel
pressured by emails and always check the source before clicking on a link or file. Don't give out
personal information unless it's secure.
Protect your identity
Set your social media profiles to private and check your security settings. Review your
bank and credit card statements regularly.
Secure your devices
On mobile devices, set up a PIN or passcode, facial recognition, and auto-lock
features. On computers, consider maintaining multiple profiles to apply restrictions to
specific accounts
THANK YOU

You might also like