CONTENT INTRODUCTION CYBER SECURITY INTERNET THEFTS PRECAUTIONS CONSLUSION What is cyber security? In today's interconnected world, where our online activities are as essential as breathing, cyber security serves as our digital shield. This chapter introduces the fundamentals of cyber security, offering insights into how we can defend against online threats, secure our data, and navigate the internet safely. Let's embark on this journey to understand the vital importance of cyber security in protecting our digital lives. Cybersecurity is the practice of protecting computers, networks, programs, and data from digital attacks, damage, or unauthorized access. Its main goal is to ensure the confidentiality, integrity, and availability of information in the digital world. It's all about keeping our computers, phones, and online information safe from hackers and other cybercriminals. Types of cyber crimes HACKING Cyber Fraud Identity Theft Phishing Malware Cyberbullying Online Scams Intellectual Property Theft HACKING Hacking: Hacking is the unauthorized access, manipulation, or misuse of computer systems, networks, or data. It involves exploiting weaknesses in computer security to gain access to information or control over systems without permission. Getting into someone else's computer or network without permission. An example would be someone guessing your password and accessing your email account. Hacking can take various forms, including: Unauthorized Access: This involves breaking into a computer system or network without permission. It could be done by exploiting software vulnerabilities, guessing weak passwords, or using social engineering techniques to trick people into giving access. Data Theft: Hackers may steal sensitive information stored on computers or networks, such as personal data, financial records, or intellectual property. This stolen data can be used for various malicious purposes, including identity theft or extortion. Malicious Attacks: Hacking can also involve launching malicious attacks on computer systems or networks, such as spreading viruses, worms, or ransomware to disrupt operations or cause damage. Cyber Fraud: Cyber Fraud: Cyber fraud is a term used to describe crimes that cyberattackers commit using the internet to illegally obtain and use a person's or business's sensitive information for financial gain. Cyber fraud can target individuals, organizations, and even governments. Some examples of cyber fraud include: Phishing-Scammers send fraudulent emails or other forms of communication from a reputable source to trick victims into revealing personal information, downloading malware, or giving sensitive data. Malware-Malicious software created by hackers to damage or disrupt a user's computer. Identity theft-Stealing personal information like a person's name, social security number, birth date, or credit card numbers. Other types of cyber crimes include: Email scams, Social media fraud, Banking fraud, eCommerce fraud, Ransomware, Cyber espionage, and Data breaches. CYBER BULLYING Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. Examples include: spreading lies about or posting embarrassing photos or videos of someone on social media sending hurtful, abusive or threatening messages, images or videos via messaging platforms. What are the effects of cyberbullying? UNICEF: When bullying happens online it can feel as if you’re being attacked everywhere, even inside your own home. It can seem like there’s no escape. The effects can last a long time and affect a person in many ways: Mentally – feeling upset, embarrassed, stupid, even afraid or angry Emotionally – feeling ashamed or losing interest in the things you love Physically – tired (loss of sleep), or experiencing symptoms like stomach aches and headaches . ONLINE SCAMS Online scams, also known as internet fraud, are a type of cybercrime that uses the internet to trick people into giving away money, property, or sensitive information. Cybercriminals often pose as trustworthy people or businesses to gain their victims' trust. They may contact victims through emails, social media, dating apps, or other online methods. Some common types of online scams include: Fake delivery OTP scam: Scammers ask for an OTP, claiming they need it for delivery. Fake QR codes: Fake websites mimic online stores and use fake QR codes to trick users. Lottery scams: Scammers contact victims and claim they have won a lottery prize, even though the victim hasn't bought a ticket. They may ask the victim to pay a fee to process the winnings. Intellectual Property Theft Intellectual property (IP) theft is the unauthorized use, exploitation, or theft of creative works, ideas, trade secrets, and information protected by intellectual property laws. IP theft can include stealing copyrights, trademarks, or trade secrets, such as names, logos, symbols, inventions ETC. Here are some examples of intellectual property: Patents: An inventor creates a new and useful product, process, or design, such as a new type of smartphone or a novel medical device. They apply for a patent, which grants them exclusive rights to manufacture, use, or sell the invention for a certain period of time, typically 20 years. Copyrights: A writer creates a novel, a musician composes a song, or an artist paints a picture. They automatically hold the copyright to their work, which gives them the exclusive right to reproduce, distribute, and publicly perform or display their creation. Trademarks: A company designs a unique logo or symbol to represent its brand, such as the Nike swoosh or the Coca-Cola logo. They register the trademark, which protects their brand identity and prevents others from using similar marks that could cause confusion among consumers. EXAMPLE Example of intellectual property theft: Imagine you're a graphic designer who creates a unique and eye-catching logo for a new startup company. You spend hours brainstorming, sketching, and refining the design until it perfectly captures the company's brand identity. However, before you have a chance to officially register the logo as a trademark or copyright it, someone sees your design and decides to use it for their own business without your permission. They put it on their website, business cards, and promotional materials, passing it off as their own creation. In this scenario, the theft of your logo constitutes intellectual property theft. The person has unlawfully appropriated your creative work for their own benefit. PRECAUTIONS Here are some precautions you can take to prevent cyber fraud: Use strong passwords Use a mix of uppercase and lowercase letters, numbers, and unique characters. Avoid using the same password as your username, keyboard patterns, or default passwords. Passwords should be at least 16 characters long, unique, and randomly generated. You can use a password manager to store your passwords and keep your master password strong and memorable. Keep your software and devices up to date Make sure your operating system, web browser, and security software are up to date. You can turn on automatic updates to receive the latest security fixes. Be cautious online Don't click on links or open attachments in spam emails or untrusted websites. Don't feel pressured by emails and always check the source before clicking on a link or file. Don't give out personal information unless it's secure. Protect your identity Set your social media profiles to private and check your security settings. Review your bank and credit card statements regularly. Secure your devices On mobile devices, set up a PIN or passcode, facial recognition, and auto-lock features. On computers, consider maintaining multiple profiles to apply restrictions to specific accounts THANK YOU