0% found this document useful (0 votes)
66 views16 pages

Cyber Safety File

Sankat Mochan Public School's computer file discusses cyber safety and security. It outlines key cyber threats like phishing, malware, viruses, spyware, and hacking. It provides tips for staying safe such as updating software, using antivirus software, creating strong passwords, not opening attachments from unknown senders, and avoiding links in suspicious emails. The file also summarizes relevant sections of the Indian IT Act, 2000 regarding unlawful access to computer systems and penalties for cyber crimes.

Uploaded by

OVER PROVE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views16 pages

Cyber Safety File

Sankat Mochan Public School's computer file discusses cyber safety and security. It outlines key cyber threats like phishing, malware, viruses, spyware, and hacking. It provides tips for staying safe such as updating software, using antivirus software, creating strong passwords, not opening attachments from unknown senders, and avoiding links in suspicious emails. The file also summarizes relevant sections of the Indian IT Act, 2000 regarding unlawful access to computer systems and penalties for cyber crimes.

Uploaded by

OVER PROVE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

SANKAT MocHAN PuBLIC ScHooL

CoMPUTER PROTECT FILE


o
Name Vabhavi ol
o
Clam IX , A
o Rolno
oZubject eadheon2 hsuhlesh Ma'a
NDEX

Jeacher'6
S.No Jofics Page No. Signature
Lulhot i Cybex Saety?
2 Challenges 2-3
Cy Secuiy
3 Type oCyor 4-6
Secwi Jhact

4ybex Sodety 7

5 Je Secuity Jchrologi 8

6 IT Act 2000
CYBER
SAFETY
Cohat Cuber afts
Cybere afety tolers to e safe and Jusonsibl
tetnet o as oAnslue satety n d
Secwi fwsonal Jnfonmation and t koing
treat anyon else dnfaximation. It wn
involve
volve
ounhq Rnouledg about hoslible Boeat o fwwsoral
And secnily isks ha Jnfakmalion alo
measuUOS ntand Cnd counte hem.
hem
Challenges
Cuben Secustty
Netwank Securiy
It s Consists rxactices adahted o rvanent cnd
montahk nauhokized accoss and denial
comhutv returonk .

Application Secvity
Most oarplication Secu isauos ave eausedl
due hoak coding fuuacticl uhich eacl to
foox atlication Codle

Crikical nxastuckue
t he oody byptens , notwakks nd
assets Bat C hsntial hat heire
continued ofwallOn J raawred to nswe he
Lecwili wn Vauon tsecoromly, and
he pealh and ax salty
.Data Secunity
Data meahs otecting digital data,
becwruly
Auch as dhos Jin dotebasl , rom nauthauized
CccoA.

Choud Seuwiky
holicis conbiols, aand
nd

fooceduwe, COmbid with techuologiis hat wak


kogethor o ooteet data , inhasblwe, and
loud - beied
systems.

Jnternet of rings (zor) Secuwiky


IOT secuity Bho fechnolo9s a0a ROnceHnod
Luih Sadequading connected dewces Mnd
netwanks u interat o hings (IOT)..
AWouing devices o connect Jo he Jntenet
ofens mem uh fo a
nmbe oberious
vuWnekaubliins
they hot
fotectecd.

Oheraional Becwnik
inckeudes ho foocosses And deisions
a hendling anod ootectinq data assets.
Pesvs onal
Doda
Type o
Cybest ecuit hneats
Phiaing
St s vactices to snding Akyware twth ju
link and any otwe
wdiy 4or steal sersitive
dota lke Checit cand Sand' login infoumation.
nsomwane
malicaws softwaa. It
desiqned oxtat money Wlocking ccls
oils He Combutek ystem
ansom haid..

>Malware
by combining wonds 'malicious' mtaning hauul
and stuove we get Hhe wond 'MaluiakeJhe tetm
Malware used o descuibe any maliious rOgHan
On a Comfut O mobile deuce Jhse HOqHams ane
installed Cuvithout he conseut users n d Cause
rumber ounhleasant
VIRUS

SPywARE

Logi
Paas
Maloae can se amany tyhus
Vimses Vuses ae malicaous codes1 rogyans
hat caluse dlamage to data Cnd ils on a system

ViuLes
Viuses Con
atack any avt comuuter'

60tware Buch a Block", ofexciung System


suhtem Aeas, ils and alplicatin uoamackos

Woxms wOtm i a Sel rahlicating HOgHam


which sats u ha utin k shace O memau.
+ keehs on hecting ts CofuIs untilS
wam
he disk shace O meriou lLd.

rojan Ftorsss
Jrojan Abuojan foJAe isa UogHam
hat ahheans hamlessAuch os a textF edtor a
hat
dili 0gxamut actually wfonms malicious
unclas ALuch as delting ak damaging ls.

Spyware a BtwaUHA which is installed


ouyowr comfutr to y 0n youx acÜutues And
reron is data to wills o
tsccks he user's ehaiow And
JmokmaUon back to centnal sowce.Jhose
usedl to shy 0nome O aithoe
av illgol fwpae
Hduwae Jhese a u prioghams that
deli wnwcntd ads o o Coputer
Cgenerally din op- Ubs aum). hoy consune
w netuwok Kand uwidll. Adwave is inuilas
wwae however , may be installud
yaw conkent adised dhat
you
efoe
hohough
thahoughly Joad
yoau
installation agkesmort
dntallation asatwake.

Botnet
ootnet is a number of Jntenet
connected dewices each o{ uhich uning
O CU ma kots. Botnctcan be usecd o
orfom Diabibuhd Deial- of - Sewice attacks
shal data , snd Kam nd olow he
attacko ko access he dewce and it Counecion.

SAL Jnjockion
An SaL (abuctwed Longuage
guey) Jnjection is cybur- attack
toke coubol Cd akeal dota
HOm a dotabose .
HOME

S o t u a n ev p d a d e

a v a i l o b l e

Cantel

Acce

Windous Deender Quick e a l


Secure Sandbaw Mede cumity Simplií fed

New assuwoxd
VaibhavVi
leak

New o.ss wOXd


#V@ibh@vioi
Stong
Cben SafeTpe
Uhdatt yown satwa aand
nd
ofwaung stem
Ihis means yau vufit MOm u a t t secty
atchos.

Uke anti - Vs 6qtwake


Secwihy kolutions Dike Kasfvsky Sotal cuwiy
wl dtaot and Jemoves Horeata . Keep you
sotwake psatection
updattel ox tho est lovel af ootecton

Use stuong assuahcds:


ow assuwokdds ae not easily quussabe.

doo not
not orun mail attachnents HOm unkhow
sndes:
huse could be infectd wil malwae

Do not click on inks Jn Dmails ro unknoun


senders ak omilian website:
hi is a COmmon waly thaf malwa
Spraad
Trternal 15üvate Nekook

Tdenne
Dnuanted a FIREWALL
ALLooee

RAVIRA
Norton antivi905 help

Decuted
Encnypted

CRYPTOGRAPHY
ECHNIQUES
T

6
IT Act 2000
te
Sections
Section 43
ccohdling
fwson wiwout onission changing
Systemand downlsading ws dn any
sons Combutex.
Acconding to Section 65
any wson ateals SOwe Code And
n0.
Temfrung docX.

Assessment:
Section 43
Llill e liable ak a unclty
mullons uhees Calses
.
Lcull max1
Ok2years.
Section 65
ulill e soycot om compuuter Systern u
tosaml Yeans ancl lso wille tenalty
lions o uwws nd causes o

joll
i l

max
yeas

You might also like