CYBER SAFETY BY YOGESH
-
Upload
yogesh-prajapati -
Category
Law
-
view
110 -
download
3
description
Transcript of CYBER SAFETY BY YOGESH
![Page 1: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/1.jpg)
Let’s Know Something New With Yog’s Prajapati
Roll NO : 13B082
![Page 2: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/2.jpg)
. You Secure or not Yes or No
![Page 3: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/3.jpg)
.
![Page 4: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/4.jpg)
Did You know?
![Page 5: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/5.jpg)
.
![Page 6: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/6.jpg)
.
• .
Are you safe on internetOr
A under contol in key logger
![Page 7: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/7.jpg)
.
![Page 8: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/8.jpg)
How to stop a key logging hacker
![Page 9: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/9.jpg)
How to stop a key logging hacker
![Page 10: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/10.jpg)
How a key logging hacker works
![Page 11: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/11.jpg)
How a key logging hacker works
![Page 12: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/12.jpg)
How a key logging hacker works
![Page 13: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/13.jpg)
How a key logging hacker works
![Page 14: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/14.jpg)
How a key logging hacker works
![Page 15: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/15.jpg)
How a key logging hacker works
![Page 16: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/16.jpg)
Easy To safe on Social Networking
![Page 17: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/17.jpg)
Cyber bullying
• Posting or forwarding a private text or embarrassing image to others
• Tricking someone into revealing embarrassing information and forwarding it to others
• Spreading malicious rumors• Stealing passwords
![Page 18: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/18.jpg)
Malicious Files
Your computer may become infected with viruses and spyware through:– downloads– emails– peer-to-peer networking– infected websites
![Page 19: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/19.jpg)
Keep Personal Information Private
• Never reveal:– Name– Address– Phone number– School name
• Don’t post or send photographs of yourself.
• Choose a nondescript screen name.
![Page 20: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/20.jpg)
Facebook Privacy and Security
What is Facebook?• 500+ million active users• 30 billion pieces of content shared
each month• 70+ language translations available
![Page 21: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/21.jpg)
.
Keep Your Information Safe
![Page 22: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/22.jpg)
Rules to Live By
If you do not know someone, do not friend them
![Page 23: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/23.jpg)
.
![Page 24: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/24.jpg)
.
![Page 25: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/25.jpg)
.
![Page 26: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/26.jpg)
.
![Page 27: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/27.jpg)
.
![Page 28: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/28.jpg)
Questions ???
![Page 29: CYBER SAFETY BY YOGESH](https://reader035.fdocuments.us/reader035/viewer/2022081420/558d35cbd8b42a4d098b46b9/html5/thumbnails/29.jpg)
.
.
Thank You
You Can Ask Any Questions About Cyber Security
Yogesh Prajapati