maya seminar technology

14
WELCOME

Transcript of maya seminar technology

Page 1: maya seminar technology

WELCOME

Page 2: maya seminar technology
Page 3: maya seminar technology

A SEMINAR ON

CYBER PRIVACY AND

PASSWORD PROTECTIONBY

mayamalayalam

Page 4: maya seminar technology

Cyber-Privacy is mostly defined by the services used by individuals. Whatever agreements individuals agree to when they sign up for a service usually signs away their right to privacy.

Page 5: maya seminar technology

In other cases the reasonable expectation of privacy is not reasonable if the behaviors or communications in question were knowingly exposed to public view.

Page 6: maya seminar technology

Crimes involving cyber privacy

Page 7: maya seminar technology
Page 8: maya seminar technology

-Malware (such as the use of malicious code which can compromise a user's identity and/or information)·        -Denial of Service Attacks (block a user from accessing his or her information)·        -Computer Viruses (can compromise user information as well as identity)·        All of these crimes fall under the category or fraud, identity theft, phishing scams and or information warfare.·        The Cyber-Privacy Project attempts to raise public awareness and promote the education of Cyber Privacy to prevent crimes from happening.

Page 9: maya seminar technology
Page 10: maya seminar technology

PASSWORD PROTECTION

Page 11: maya seminar technology

We live in a password-driven world, where between four and 20 characters are the difference makers in whether you're able to access your data, communicate with friends, or make your online purchases. The problem is that passwords should be different everywhere you use them, and that can make it difficult to remember them all. And, if a password is truly strong, that makes it even more difficult.

Page 12: maya seminar technology

Follow these tips and tricks to take total control of your terms for access.

Use Different Passwords EverywhereRemember the Underwear MemeAvoid Common Passwords

Page 13: maya seminar technology

How to Build StrengthTo create a strong password, you should use a string of text that mixes numbers, letters that are both lowercase and uppercase, and special characters. It should be eight characters, preferably many more

Page 14: maya seminar technology