100% found this document useful (2 votes)
86 views51 pages

A Seminar ON Cyber Crime and Safety G.S.S.S Shergarh, Kaithal

The document discusses cyber crime and safety, covering topics like evaluating websites, managing digital footprints, protecting accounts, identity theft, phishing, and online scams. It provides tips on creating strong passwords, using privacy settings, being wary of sharing personal information online, and ensuring online purchases are safe.

Uploaded by

Deepa kathr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
86 views51 pages

A Seminar ON Cyber Crime and Safety G.S.S.S Shergarh, Kaithal

The document discusses cyber crime and safety, covering topics like evaluating websites, managing digital footprints, protecting accounts, identity theft, phishing, and online scams. It provides tips on creating strong passwords, using privacy settings, being wary of sharing personal information online, and ensuring online purchases are safe.

Uploaded by

Deepa kathr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 51

A

SEMINAR
ON

CYBER CRIME AND SAFETY

G.S.S.S SHERGARH, KAITHAL


Cyber crime
Cybercrime, also called computer
crime, is any illegal activity that
involves a computer or network-
connected device, such as a
mobile phone
Session #1

Become an online sleuth


Evaluating a website

• Investigate the source

• Who holds the copyright?

• What do they want you to


believe?
Detecting Lies and Staying True

•Don’t be fooled by cool and professional looking


websites

•Decipher the intent and investigate the source

•Follow the “rule of 3”: compare 3 sources of


information. Remember to include one source
with an opposing viewpoint

•Always check the facts you find


Session #2

Manage your
digital footprint
Tip 1

Think
before
you share
Forwarded
Copied & Shared
Good to Know

What you share can take on a life of its


own:

Forwarded Copied Found


Steps to Safety

Search your name and evaluate your reputation.

Keep personal information private.

Use the grandma rule when posting anything online


Tip #2

Protect
your stuff
Weak Passwords

12345 welcome
11111passw abc123
ord letmein
hello
Strong Passwords

8+ characters

Mix letters, numbers, & symbols

Different for every site

Use 2 Step Verification

Essential

Keep your recovery options updated


Let’s practice

Mercy Memorial School Delhi→MmsD20!5

Don’t Be Evil! → D0n’tBe3vil!


1 in 3 teens
has shared
a password
o0ps
Good to Know

Create strong passwords


Don’t share your password
Game Time

TRUE FALSE
True or False:
Only 25% of people have
their phone on autolock.
TRUE
True or False:
50% of people under 25 have had
their cell phones lost or stolen.
TRUE
True or False:
Closing out of a browser
automatically logs you out
of your account.
FALSE
But there’s
more than
just passwords
Good to Know

Lock your device and screen


Log out of public computers
Use Incognito mode when using a
public computer
Tip #3

Know and use


your settings
MORE TIPS
STAYING SAFE ONLINE
Webcam Safety
• Never do random chat
• Only chat with family and
friends
• Never do anything on a
webcam you don’t want
to see
• Think before commenting
on anything
Be “Scam Smart”
• Don’t open strange emails
• Beware “free” downloads
• To Block spam calls use true-caller app but
it is not 100% accurate
• If you receive a scam mail - Do Not Reply,
Do not click any link and Do Not open any
attachment

STAYING SAFE ONLINE


Keep It in the Family
• Don’t share family photos
without permission
• Use privacy settings
• Do not make personal
pictures public
• Ask before uploading

STAYING SAFE ONLINE


Guard Your Information

School
Address Phone Password
Number

Sports
teams

City Parent’s
Workplace

STAYING SAFE ONLINE


RULES FOR THE
REAL WORLD VS. THE NET
• Stranger Danger • Never meet someone in
• Say you’re sorry when you person you’ve met in the
cyber world.
hurt someone
• Limit time on the computer.
• Go to bed on time Have a social life.
• Share your toys and take • Never give out personal
turns playing a game. information
• Don’t answer the door • Don’t respond to messages
when Mom’s absent that are threatening or
obscene.
ARE YOU REALLY YOU?

• Some of your online Gee, you sound


really cute and we
“friends may not be have the same
who they say they birthday! We must be
destined to meet!
are.
• Someone who tells
you “she” is a
teenager could be a
40-year old man Well, I don’t mind admitting I was
posing as a teenager. homecoming queen and maybe we could
celebrate our birthdays together.
Dealing with bullies – What is
my role

•I will save evidences

•I will not respond and retaliate

•I will report the incident to elders or officials

•I will block such people from your social networking


pages and email
MAKE STUDENTS AWARE
Cyber Crime Punishments
Cyber Stalking 3 years, or with fine up to 2 lakh
Cyber Pornography 10 years and with fine may
including Child Pornography extends to 10 Lakh

Intellectual 3 years, or with fine up to 2 lakh


Property Crimes

Cyber Terrorism Imprisonment for a term, may


extend to 7 years

Cyber Hacking 3 years, or with fine up to 2 lakh


Phishing 3 years, or with fine up to 2 lakh
Invading Privacy 2 years, or with fine up to 1 lakh
GOOD TO KNOW - STUDENTS
● Students should inform teacher about anything that makes you
feel uncomfortable online
● If you are threaten with harm you should inform police about
this
● Don’t post any personal information online – like your address,
email address or mobile number.
● Think carefully before posting pictures or videos of yourself.
● Keep your privacy settings as high as possible
● Never give out your passwords
● Don’t befriend people you don’t know
● Don’t meet up with people you’ve met online
● Think carefully about what you say before you post something
online
Identity Theft

a type of crime in which your private


information is stolen and used for criminal
activity
Name

Date & place of birth


Addresses and phone
numbers

Personal identifiable
Info (PIIs)

Account numbers
and the companies
where you hold
accounts

Passwords
Sell your details

Impersonate you

Trick and steal from you


Phishing

someone trying to get your personal


information online through fake sites,
spam emails, and other trickery
Online Scams – What
to do
Don’t respond to suspicious posts or
emails
Don’t respond to requests for your
password
When in doubt, ask a parent or
guardian
ENSURE YOUR ONLINE PURCHASES ARE
SAFE
• HTTPS://
• Be careful while shopping in public
• Never give out your password
• Use OTP and E-SECURE Password instead of “password”
• Disable automatic transfers to linked accounts
• Look into your statements regularly
• Use chip based cards
• Use incognito mode for net banking
• Set up account alerts. Most banks let customers set up alerts,
generally sent via email or text, that tell customers if certain
types of transactions are made.
• Keep your anti-virus software up-to-date:
• Trust your instinct: If a website seems fake, don’t use it.
DANGERS OF HACKING

What can computer hackers and predators do to me?


1. Hijack your usernames and passwords
2. Steal your money and open credit card and bank
accounts in your name
3. Request new account Personal Identification
Numbers (PINs) or additional credit cards
THANK YOU

You might also like