Cyber Safety File
Cyber Safety File
Jeacher'6
S.No Jofics Page No. Signature
Lulhot i Cybex Saety?
2 Challenges 2-3
Cy Secuiy
3 Type oCyor 4-6
Secwi Jhact
4ybex Sodety 7
5 Je Secuity Jchrologi 8
6 IT Act 2000
CYBER
SAFETY
Cohat Cuber afts
Cybere afety tolers to e safe and Jusonsibl
tetnet o as oAnslue satety n d
Secwi fwsonal Jnfonmation and t koing
treat anyon else dnfaximation. It wn
involve
volve
ounhq Rnouledg about hoslible Boeat o fwwsoral
And secnily isks ha Jnfakmalion alo
measuUOS ntand Cnd counte hem.
hem
Challenges
Cuben Secustty
Netwank Securiy
It s Consists rxactices adahted o rvanent cnd
montahk nauhokized accoss and denial
comhutv returonk .
Application Secvity
Most oarplication Secu isauos ave eausedl
due hoak coding fuuacticl uhich eacl to
foox atlication Codle
Crikical nxastuckue
t he oody byptens , notwakks nd
assets Bat C hsntial hat heire
continued ofwallOn J raawred to nswe he
Lecwili wn Vauon tsecoromly, and
he pealh and ax salty
.Data Secunity
Data meahs otecting digital data,
becwruly
Auch as dhos Jin dotebasl , rom nauthauized
CccoA.
Choud Seuwiky
holicis conbiols, aand
nd
Oheraional Becwnik
inckeudes ho foocosses And deisions
a hendling anod ootectinq data assets.
Pesvs onal
Doda
Type o
Cybest ecuit hneats
Phiaing
St s vactices to snding Akyware twth ju
link and any otwe
wdiy 4or steal sersitive
dota lke Checit cand Sand' login infoumation.
nsomwane
malicaws softwaa. It
desiqned oxtat money Wlocking ccls
oils He Combutek ystem
ansom haid..
>Malware
by combining wonds 'malicious' mtaning hauul
and stuove we get Hhe wond 'MaluiakeJhe tetm
Malware used o descuibe any maliious rOgHan
On a Comfut O mobile deuce Jhse HOqHams ane
installed Cuvithout he conseut users n d Cause
rumber ounhleasant
VIRUS
SPywARE
Logi
Paas
Maloae can se amany tyhus
Vimses Vuses ae malicaous codes1 rogyans
hat caluse dlamage to data Cnd ils on a system
ViuLes
Viuses Con
atack any avt comuuter'
rojan Ftorsss
Jrojan Abuojan foJAe isa UogHam
hat ahheans hamlessAuch os a textF edtor a
hat
dili 0gxamut actually wfonms malicious
unclas ALuch as delting ak damaging ls.
Botnet
ootnet is a number of Jntenet
connected dewices each o{ uhich uning
O CU ma kots. Botnctcan be usecd o
orfom Diabibuhd Deial- of - Sewice attacks
shal data , snd Kam nd olow he
attacko ko access he dewce and it Counecion.
SAL Jnjockion
An SaL (abuctwed Longuage
guey) Jnjection is cybur- attack
toke coubol Cd akeal dota
HOm a dotabose .
HOME
S o t u a n ev p d a d e
a v a i l o b l e
Cantel
Acce
New assuwoxd
VaibhavVi
leak
doo not
not orun mail attachnents HOm unkhow
sndes:
huse could be infectd wil malwae
Tdenne
Dnuanted a FIREWALL
ALLooee
RAVIRA
Norton antivi905 help
Decuted
Encnypted
CRYPTOGRAPHY
ECHNIQUES
T
6
IT Act 2000
te
Sections
Section 43
ccohdling
fwson wiwout onission changing
Systemand downlsading ws dn any
sons Combutex.
Acconding to Section 65
any wson ateals SOwe Code And
n0.
Temfrung docX.
Assessment:
Section 43
Llill e liable ak a unclty
mullons uhees Calses
.
Lcull max1
Ok2years.
Section 65
ulill e soycot om compuuter Systern u
tosaml Yeans ancl lso wille tenalty
lions o uwws nd causes o
joll
i l
max
yeas