Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

ROJECT ON CYBER SAFETY

RESENTED BY:
AAYUSH MAJHI
9”D”
31
CONTENT
TOPICS
STAYING SAFE ONLINE

SOCIAL NETWORKING

CYBER BULLYING AND STALKING

MALWARE

SOLUTIONS AND STRATEGIES


INTRODUCTION
INTERNET SAFETY OR ONLINE SAFETY OR CYBER SAFETY IS TRYING TO BE SAFE ON THE INTERNET
AND IS THE KNOWLEDGE OF MAXIMIZING THE USER'S PERSONAL SAFETY AND SECURITY RISKS TO 
PRIVATE INFORMATION AND PROPERTY ASSOCIATED WITH USING THE INTERNET, AND THE SELF-
PROTECTION FROM COMPUTER CRIME IN GENERAL.
AS THE NUMBER OF INTERNET USERS CONTINUES TO GROW WORLDWIDE, INTERNETS, GOVERNMENTS
AND ORGANIZATIONS HAVE EXPRESSED CONCERNS ABOUT THE SAFETY OF CHILDREN USING THE
INTERNET. SAFER INTERNET DAY IS CELEBRATED WORLDWIDE IN FEBRUARY TO RAISE AWARENESS ABOUT
INTERNET SAFETY. IN THE UK THE GET SAFE ONLINE CAMPAIGN HAS RECEIVED SPONSORSHIP FROM
GOVERNMENT AGENCY SERIOUS ORGANIZED CRIME AGENCY (SOCA) AND MAJOR INTERNET COMPANIES
SUCH AS MICROSOFT AND EBAY. ONLINE SAFETY IS REALLY IMPORTANT BECAUSE PEOPLE NEED TO KEEP
SAFE ON THE INTERNET.
STAYING SAFE ONLINE
INTERNET SAFETY IS THE TOPIC OF TEACHING PEOPLE HOW TO BE SAFE WHEN USING THE INTERNET. IT
IS PARTICULARLY IMPORTANT WHEN USING SOCIAL MEDIA, THROUGH WHICH PERSONAL INFORMATION IS
SHARED.
• INTERNET SAFETY IS MAINLY TAUGHT IN PRIMARY AND SECONDARY SCHOOLS AND FOCUSES ON MAKING
SURE CHILDREN KNOW THAT:
• YOU SHOULDN'T SHARE YOUR PERSONAL INFORMATION ON THE INTERNET,
• YOU SHOULD THINK BEFORE YOU WRITE COMMENTS ABOUT PEOPLE - HOW IT COULD EFFECT THEM,
• YOU SHOULD ALWAYS TELL AN ADULT IF THERE IS SOMETHING THAT UPSETS YOU,
• YOU SHOULDN'T MEET SOMEONE YOU HAVE TALKED TO ON THE INTERNET WITHOUT AN ADULT.
• CHOOSE A STRONG PASSWORD WITH DIFFERENT CHARACTERS AND NUMBERS.
THERE ARE MORE ANOTHER WAYS TO SECURE YOUR DEVICES WHEN SURFING THROUGH INTERNET ,YOU
CAN USE A VPN (VIRTUAL PRIVATE NETWORK) THEY ARE USUALLY MORE SECURE THEN SIMPLE , ALSO THEY
HELP TO UNLOCK MANY WEBSITES WHICH ARE BLOCKED BY YOUR SERVICE PROVIDER , IT IS USUALLY
RECOMMENDED TO USE A PAID SERVICE RATHER THAN USING FREE SERVICE. AND AN ANTI-VIRUS MUST
HAVE TO BE IN YOUR DEVICE IF YOU WANT A SECURE SURFING.
SOCIAL NETWORKING
A SOCIAL NETWORK IS A SOCIAL STRUCTURE MADE UP OF A SET OF SOCIAL ACTORS
(SUCH AS INDIVIDUALS OR ORGANIZATIONS), SETS OF DYADIC TIES, AND OTHER 
SOCIAL INTERACTIONS BETWEEN ACTORS. THE SOCIAL NETWORK PERSPECTIVE
PROVIDES A SET OF METHODS FOR ANALYZING THE STRUCTURE OF WHOLE SOCIAL
ENTITIES AS WELL AS A VARIETY OF THEORIES EXPLAINING THE PATTERNS OBSERVED IN
THESE STRUCTURES. THE STUDY OF THESE STRUCTURES USES 
SOCIAL NETWORK ANALYSIS TO IDENTIFY LOCAL AND GLOBAL PATTERNS, LOCATE
INFLUENTIAL ENTITIES, AND EXAMINE NETWORK DYNAMICS.
SOCIAL NETWORKS AND THE ANALYSIS OF THEM IS AN INHERENTLY INTERDISCIPLINARY
 ACADEMIC FIELD WHICH EMERGED FROM SOCIAL PSYCHOLOGY, SOCIOLOGY, STATISTICS,
AND GRAPH THEORY. GEORG SIMMEL AUTHORED EARLY STRUCTURAL THEORIES IN
SOCIOLOGY EMPHASIZING THE DYNAMICS OF TRIADS AND "WEB OF GROUP
AFFILIATIONS". JACOB MORENO IS CREDITED WITH DEVELOPING THE FIRST SOCIOGRAMS
 IN THE 1930S TO STUDY INTERPERSONAL RELATIONSHIPS. THESE APPROACHES WERE
MATHEMATICALLY FORMALIZED IN THE 1950S AND THEORIES AND METHODS OF SOCIAL
NETWORKS BECAME PERVASIVE IN THE SOCIAL AND BEHAVIORAL SCIENCES BY THE
1980S. SOCIAL NETWORK ANALYSIS IS NOW ONE OF THE MAJOR PARADIGMS IN
CONTEMPORARY SOCIOLOGY, AND IS ALSO EMPLOYED IN A NUMBER OF OTHER SOCIAL
AND FORMAL SCIENCES. TOGETHER WITH OTHER COMPLEX NETWORKS, IT FORMS PART
OF THE NASCENT FIELD OF NETWORK SCIENCE.
CYBER BULLYING
CYBERBULLYING IS A FORM OF BULLYING OR HARASSMENT USING ELECTRONIC MEANS.
CYBERBULLYING IS ALSO KNOWN AS ONLINE BULLYING. IT HAS BECOME INCREASINGLY COMMON,
ESPECIALLY AMONG TEENAGERS. CYBERBULLYING IS WHEN SOMEONE, TYPICALLY TEENS, BULLY OR
HARASS OTHERS ON THE INTERNET, PARTICULARLY ON SOCIAL MEDIA SITES. HARMFUL BULLYING
BEHAVIOR CAN INCLUDE POSTING RUMORS, THREATS, SEXUAL REMARKS, A 
VICTIMS' PERSONAL INFORMATION, OR PEJORATIVE LABELS (I.E. HATE SPEECH). BULLYING OR
HARASSMENT CAN BE IDENTIFIED BY REPEATED BEHAVIOR AND AN INTENT TO HARM. VICTIMS MAY
EXPERIENCE LOWER SELF-ESTEEM, INCREASED SUICIDAL IDEATION, AND A VARIETY OF NEGATIVE
EMOTIONAL RESPONSES, INCLUDING BEING SCARED, FRUSTRATED, ANGRY, AND DEPRESSED.
AWARENESS IN THE UNITED STATES HAS RISEN IN THE 2010S, DUE IN PART TO HIGH-PROFILE
CASES. SEVERAL US STATES AND OTHER COUNTRIES HAVE LAWS SPECIFIC TO CYBERBULLYING. SOME
ARE DESIGNED TO SPECIFICALLY TARGET TEEN CYBERBULLYING, WHILE OTHERS USE LAWS
EXTENDING FROM THE SCOPE OF PHYSICAL HARASSMENT. IN CASES OF ADULT CYBERHARASSMENT,
THESE REPORTS ARE USUALLY FILED BEGINNING WITH LOCAL POLICE.
RESEARCH HAS DEMONSTRATED A NUMBER OF SERIOUS CONSEQUENCES OF CYBERBULLYING
VICTIMIZATION.
INTERNET TROLLING IS A COMMON FORM OF BULLYING OVER THE INTERNET IN AN 
ONLINE COMMUNITY (SUCH AS IN ONLINE GAMING OR SOCIAL MEDIA) IN ORDER TO ELICIT A
REACTION, DISRUPTION, OR FOR SOMEONE'S OWN PERSONAL AMUSEMENT. CYBERSTALKING IS
ANOTHER FORM OF BULLYING OR HARASSMENT THAT USES ELECTRONIC COMMUNICATIONS TO 
STALK A VICTIM; THIS MAY POSE A CREDIBLE THREAT TO THE VICTIM.
NOT ALL NEGATIVE INTERACTION ONLINE OR ON SOCIAL MEDIA CAN BE ATTRIBUTED TO
CYBERBULLYING. RESEARCH SUGGESTS THAT THERE ARE ALSO INTERACTIONS ONLINE THAT RESULT
IN PEER PRESSURE, WHICH CAN HAVE A NEGATIVE, POSITIVE, OR NEUTRAL IMPACT ON THOSE
INVOLVED.
CYBER STALKING
CYBERSTALKING IS THE USE OF THE INTERNET OR OTHER ELECTRONIC
MEANS TO STALK OR HARASS AN INDIVIDUAL, GROUP, OR ORGANIZATION. IT
MAY INCLUDE FALSE ACCUSATIONS, DEFAMATION, SLANDER AND LIBEL. IT MAY
ALSO INCLUDE MONITORING, IDENTITY THEFT, THREATS, VANDALISM,
SOLICITATION FOR SEX, OR GATHERING INFORMATION THAT MAY BE USED TO
THREATEN, EMBARRASS OR HARASS.
CYBERSTALKING IS OFTEN ACCOMPANIED BY REAL-TIME OR OFFLINE
STALKING. IN MANY JURISDICTIONS, SUCH AS CALIFORNIA, BOTH ARE CRIMINAL
OFFENSES. BOTH ARE MOTIVATED BY A DESIRE TO CONTROL, INTIMIDATE OR
INFLUENCE A VICTIM. A STALKER MAY BE AN ONLINE STRANGER OR A PERSON
WHOM THE TARGET KNOWS. THEY MAY BE ANONYMOUS AND SOLICIT
INVOLVEMENT OF OTHER PEOPLE ONLINE WHO DO NOT EVEN KNOW THE
TARGET.
CYBERSTALKING IS A CRIMINAL OFFENSE UNDER VARIOUS STATE ANTI-
STALKING, SLANDER AND HARASSMENT LAWS. A CONVICTION CAN RESULT IN A
RESTRAINING ORDER, PROBATION, OR CRIMINAL PENALTIES AGAINST THE
ASSAILANT, INCLUDING JAIL.
MALWARE
MALWARE (A PORTMANTEAU FOR MALICIOUS SOFTWARE) IS ANY SOFTWARE INTENTIONALLY
DESIGNED TO CAUSE DAMAGE TO A COMPUTER, SERVER, CLIENT, OR COMPUTER NETWORK.[1]
MALWARE DOES THE DAMAGE AFTER IT IS IMPLANTED OR INTRODUCED IN SOME WAY INTO A
TARGET'S COMPUTER AND CAN TAKE THE FORM OF DIRECTLY EXECUTABLE CODE, SCRIPTS, SO-
CALLED "ACTIVE CONTENT" (MICROSOFT WINDOWS), AND OTHER FORMS OF DATA.[2] SOME KINDS
OF MALWARE ARE LARGELY REFERRED TO IN THE MEDIA AS COMPUTER VIRUSES, WORMS, 
TROJAN HORSES, RANSOMWARE, SPYWARE, ADWARE, AND SCAREWARE, AMONG OTHER TERMS.
MALWARE HAS A MALICIOUS INTENT, ACTING AGAINST THE INTEREST OF THE COMPUTER USER—
AND SO DOES NOT INCLUDE SOFTWARE THAT CAUSES UNINTENTIONAL HARM DUE TO SOME
DEFICIENCY, WHICH IS TYPICALLY DESCRIBED AS A SOFTWARE BUG.
PROGRAMS OFFICIALLY SUPPLIED BY COMPANIES CAN BE CONSIDERED MALWARE IF THEY
SECRETLY ACT AGAINST THE INTERESTS OF THE COMPUTER USER. FOR EXAMPLE, AT ONE POINT 
SONY MUSIC COMPACT DISCS SILENTLY INSTALLED A ROOTKIT ON PURCHASERS' COMPUTERS
RUNNING MICROSOFT WINDOWS WITH THE INTENTION OF PREVENTING ILLICIT COPYING; BUT
WHICH ALSO REPORTED ON USERS' LISTENING HABITS, AND UNINTENTIONALLY CREATED EXTRA
SECURITY VULNERABILITIES.[3]
ONE STRATEGY FOR PROTECTING AGAINST MALWARE IS TO PREVENT THE HARMFUL SOFTWARE
 FROM GAINING ACCESS TO THE TARGET COMPUTER. FOR THIS REASON, ANTIVIRUS SOFTWARE, 
FIREWALLS AND OTHER STRATEGIES ARE USED TO HELP PROTECT AGAINST THE INTRODUCTION
OF MALWARE, IN ADDITION TO CHECKING FOR THE PRESENCE OF MALWARE AND MALICIOUS
ACTIVITY AND RECOVERING FROM ATTACKS.
SOLUTIONS AND STRATEGIES
A CYBER ATTACK IS ANY TYPE OF OFFENSIVE ACTION THAT TARGETS
COMPUTER INFORMATION SYSTEMS, INFRASTRUCTURES, COMPUTER
NETWORKS OR PERSONAL COMPUTER DEVICES, USING VARIOUS METHODS TO
STEAL, ALTER OR DESTROY DATA OR INFORMATION SYSTEMS.
TODAY I’LL DESCRIBE THE 10 MOST COMMON CYBER ATTACK TYPES:
DENIAL-OF-SERVICE (DOS) AND DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATT
ACKS

MAN-IN-THE-MIDDLE (MITM) ATTACK


PHISHING AND SPEAR PHISHING ATTACKS
DRIVE-BY ATTACK
PASSWORD ATTACK
SQL INJECTION ATTACK
CROSS-SITE SCRIPTING (XSS) ATTACK
EAVESDROPPING ATTACK
BIRTHDAY ATTACK
MALWARE ATTACK
THANKYOU

You might also like