smart-phone-with-chains-powerpoint-widescreen (1)

18
By: Tanvi Jindal , Parwinder Kaur

Upload: tanvi-jindal

Post on 22-Jan-2018

82 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

By: Tanvi Jindal ,Parwinder Kaur

Page 2: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

Introduction

The internet in India is growing rapidly. It has given rise to new

opportunities in every field we can think of— be it entertainment,

business, sports or education.

There are two sides of a coin. Internet also has its own

disadvantages as well as advantages. One of the major

disadvantages is Cyber crime — illegal activity committed on the

internet and the advantage is Cyber Security.

Page 3: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

Cyber Crimes

• It’s an unlawful act wherein the computer is either a tool or a target or both.

• Cyber space is a virtual space that has

become as important as real space for

business, politics, and communities

Page 4: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

What is cyber crime ?

• Using the Internet to commit a crime.

– Identity Theft

– Hacking

– Viruses• Facilitation of traditional criminal activity

– Stalking

– Stealing information

– Child Pornography

Page 5: Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Page 6: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

Cyber-safety is a

common term used

to describe a set of

practices, measures

or actions you can

take to protect personal

information and your

computer from

attacks.

WHAT IS CYBER-SAFETY?

Page 7: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

TOP FOUR CYBER-SAFETY ACTIONS

Faculty and staff should work with their technical support

coordinator before implementing these measures.

1. Run Anti-virus Software

2. Prevent Identity Theft

3. Turn on Personal Firewalls

4. Protect Passwords

Page 8: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

RUN ANTI-V IRUS SOFTWARE

To avoid computer problems caused by viruses, install and run

an anti-virus program.

Periodically, check to see if your anti-virus is up to date by

opening your anti-virus program and checking the

Last updated: date.

Anti-virus software removes viruses and repairs infected files,

and can help to prevent future viruses.

Page 9: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

PREVENT IDENTITY THEFT

Don't give out financial account numbers, Social

Security numbers, driver’s license numbers or other

personal identity information unless you know exactly

who's receiving it.

Protect other people’s information as you would your

own.

Never send personal or confidential information via

email or instant messages as these can be easily

intercepted.

Page 10: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

TURN ON PERSONAL

F IREWALLS

Check your computer's security settings for a built-in personal firewall. If you have one, turn it on. Microsoft Vista and Mac OSX have built-in firewalls

Firewalls act as protective barriers between computers and the internet.

Hackers search the Internet by sending outcalls to random computers and wait for responses. Firewallsprevent your computer from responding to these calls.

Page 11: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

PROTECT PASSWORDS

Do not share your passwords, and always make new

passwords difficult to guess by avoiding dictionary words.

mixing letters, numbers and punctuation.

Do not use one of these common passwords or any variation

of them.

Change your passwords periodically.

When choosing a password:

o Mix upper and lower case letters

o Use a minimum of 8 characters

o Use mnemonics to help you remember a difficult

password

Page 12: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

Avoid leaving your laptop unsupervised and in plain

view in the library or coffee house, or in your car, home.

Set up a user account and password to prevent

unauthorized access to your computer files.

Do not install unnecessary programs on your compute

r.

CYBER-SAFETY AT HOME

Page 13: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

Be sure to work with your technical support

coordinator before implementing new cyber-safety

measures.

Talk with your technical support coordinator about

what cyber-safety measures are in place in your

department.

Do not install unnecessary programs on your work

computer.

CYBER-SAFETY AT WORK

Page 14: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

IT ACT PROVISIONS

• Email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.

• Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.

• Digital signatures have been given legal validity and sanction in the Act.

Page 15: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

IT ACT PROVISIONS

• The Act now allows Government to issue

notification on the web thus indicating

e-governance

• statutory remedy in case if anyone breaks into

companies computer systems or network and

causes damages or copies data

Page 16: Smart-phone-with-Chains-PowerPoint-Widescreen (1)

Video

Page 17: Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Page 18: Smart-phone-with-Chains-PowerPoint-Widescreen (1)