![Page 2: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/2.jpg)
![Page 3: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/3.jpg)
![Page 4: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/4.jpg)
MalwareHostile,intrusive or annoying software or
program code(“malicious” + "software“)
Includes computer viruses, worms Trojan horses
,bots, spyware, adware etc.
Software is considered malware based on the
intent of the creator rather than any particular
features
![Page 5: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/5.jpg)
![Page 6: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/6.jpg)
Adware
Advertising-supported software is any software
package which automatically plays, displays, or
downloads advertising material to a computer after the
software is installed on it or while the application is
being used.
Adware is software integrated into or bundled with a
program, typically as a way to recover programming
development costs through advertising income
![Page 7: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/7.jpg)
Spyware
A broad category of software designed to intercept or
take partial control of a computer's operation without
the informed consent of that machine's owner or
legitimate user
In simpler terms, spyware is a type of program that
watches what users do with their computer and then
sends that information over the internet
![Page 8: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/8.jpg)
![Page 9: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/9.jpg)
Phishing A criminal activity using Social Engineering
techniques.
An attempt to acquire sensitive data, such as
passwords and credit card details, by masquerading
as a trustworthy person or business in an electronic
communication.
Typically carried out using Email or an IM
![Page 10: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/10.jpg)
![Page 11: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/11.jpg)
Protect your Passwords
![Page 12: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/12.jpg)
Top 20 passwords of all time
![Page 13: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/13.jpg)
![Page 14: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/14.jpg)
CREATING A STRONG PASSORD THAT IS EASY TO REMEMBER
![Page 15: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/15.jpg)
WHAT TYPES OF PASSWORD TO AVOID
Dictionary word in any language
Word spelled backwards, common misspellings and
abbreviations.
Sequence or repeated characters Such as using a row
of adjacent letters or numbers on your keyboard.
Personal information such as your name,birthday
,Drivers License.
Cyber criminals use Advance tools for password cracking
![Page 16: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/16.jpg)
Tracks you Leave on the internet
![Page 17: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/17.jpg)
Protect your Lovable
![Page 18: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/18.jpg)
Turn off Sharing
![Page 19: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/19.jpg)
Avoid Automatically Connecting toWIFI
Hotspots
![Page 20: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/20.jpg)
Turn on Firewall
![Page 21: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/21.jpg)
VPN
![Page 22: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/22.jpg)
1.Use HTTPS
2. Use Two-Factor Authentication
3. Confirm the Network Name
4. Protect Your Passwords
5. Run Anti-Virus Software
![Page 23: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/23.jpg)
Tor – Onion Proxy
![Page 24: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/24.jpg)
How Tor Works
![Page 25: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/25.jpg)
![Page 26: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/26.jpg)
Thanks!
![Page 27: How to Keep Yourself secure while browsing internet pre null meet kolkata](https://reader031.vdocuments.site/reader031/viewer/2022020307/55a58d1a1a28ab3c528b460b/html5/thumbnails/27.jpg)