Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Click to edit Master title style

CYBER SAFTY
S A F E LY A C C E S I N G W E B S I T E S
B Y : A A N YA S H A R M A 9 C

1
Click to edit Master title style
CONTENT

• Spyware
• Antivirus software
• Quiz
• Video link & the script link

2 2
Click to edit Master title style
SPYWARE

It is a computer program that secretly gathers information about the


user and relays it to advertisers and other interested parties.

It is also known as spybot or tracking software.

A spyware runs without the user's consent.

and by tracking their internet behavior and activity when:


The user downloads something from the internet.
When the user clicks some pop-up option while browsing.
•.
Spyware consumes a lot of computer memory, making the computer
slow and very difficult to work on.

3 3
Click to editSOFTWARE
ANTIVIRUS Master title style

An antivirus software is a program designed to detect and


remove malicious software i.e., virus, worms and trojan
horse.
Requirements that are necessary for an antivirus programs to
be effective:

It needs to always run in the background.

It should be updated regularly, so that it can identify new


versions of malicious software.

It should have the capability to scan emails attachments and


files as they are downloaded from the internet

User should run scans periodically.

Example: Quick heal, Norton etc….

4 4
Click to edit Master title style
QUIZ

• https://quizizz.com/admin/quiz/
5a80472cf21f740021ab116a

5 5
Click to edit Master title style

VIDEO LINK: (Intro Sattik)


https://drive.google.com/file/d/1I219Khk6krqvXf
lEuCORnh-Q7IIhXWix/view?usp=drivesdk

6
Click to edit Master title style

VIDEO LINK: (Sattik)


https://drive.google.com/file/d/1HtvDSSubBOu
BZtg9R4k7BHF0afArbcIF/view?usp=drivesdk
Topics: 1.Confidentiality of information.
2.Cyberstalking.

7
Click to edit Master title style

VIDEO LINK: (Vidushi)


https://drive.google.com/file/d/1iZz07IscmDtJX
DnVjwcBYv18-lFaid2j/view?usp=sharing
Topics: 1.Malware.
2.Types of viruses.
3.Precautions against malware.

8
Click to edit Master title style

VIDEO LINK: (Shashvat)


https://drive.google.com/file/d/1gXH6N2CiheR
DEFdqmUcwchHQIRNOVKaU/view?usp=shari
ng
Topics:1.Trojan Horse.
2.Worms.

9
Click to edit Master title style

VIDEO LINK: (Aanya)


https://drive.google.com/file/d/1npVwTCeCxxn
5Xj38cSyimgoADibYvCZ7/view?usp=sharing
Topics

10
Click to edit Master title style

THANK YOU!!

11

You might also like