Unit:4
DIGITAL
SECURITY
AND PRIVACY
By assist prof.vaishali wankhede
Cyber security
Cyber security enable
organization to practice safe
security techniques to minimize
the number of successful cyber
security attacks.
Cyber security refers to the
technologies and processes
design to protect computer,
network and data from
unauthorized access,
vulnerabilities and attack
delivered via the internet by
cyber criminal.
Communication security
protecting organizing
communication media,
technology, and content.
Network security is the protecting
of networking components,
connection and contents.
Information security protecting of
information and its critical
elements, including the systems
and hardware that use, store or
transmit that information.
The first recorded cybercrime was
recorded in the year 1820.
The first spam email took place in 1978
when it was sent over the ARPANET. History
The first virus was installed on an Apple
computer in 1982.
Cyber crime includes…. 6
1 2 3
Illegal access Data interference Fraud
Illegal Interception Misuse of devices System interference
System interference
Protection …. 7
Read the privacy policy
carefully when you submit
the data through the
Internet.
Encryption: Many websites
use an SSL secure socket
layer to encrypt data.
Safety …. 8
Use antivirus software
Insert firewalls, pop-up blocker
Maintain backup
Use secure connection
Open attachment carefully
Use strong passwords.
Cybersecurity Threats 9
Malware
Malicious software like viruses, worms, and trojans.
Examples: WannaCry ransomware attack.
Phishing
Fraudulent attempts to obtain sensitive information.
Example: Fake emails pretending to be from banks.
Denial of Service (DoS) Attacks
Overloading a server to make it unavailable to users.
Example: Distributed DoS (DDoS) attacks using botnets.
10
Safe practices
Safe and online practice Protecting personal and
organizational
information online.
Password Security 11
Password Security
Use strong, unique passwords
for different accounts.
Enable multi-factor
authentication (MFA).
Avoid sharing passwords or
writing them down in
accessible places.
Recognizing Phishing Scams 12
Teach students to identify
suspicious emails, messages,
or websites.
.
Show real-world examples of
phishing attempts.
Emphasize verifying links
before clicking and reporting
fraudulent activities
Safe Browsing Habits 13
•Always use secure (HTTPS)
websites, especially for
transactions.
•Avoid downloading files or
software from unknown
sources.
•Use updated antivirus and ad-
blocker tools.
Social Media Responsibility
14
Maintain privacy by limiting
what you share.
Understand the implications of
over-sharing personal or
professional details.
Review and adjust privacy
settings regularly.
15
Advanced Persistent Threats (APTs)
An advanced persistent threat (APT) is a broad term used to describe
an attack campaign in which an intruder, or team of intruders,
establishes an illicit, long-term presence on a network in order to
mine highly sensitive data.
Long-term target sensitive data cyberattacks.
Example: Nation-state hacking groups.
Ethical Online Behavior
16
Follow copyright laws; avoid piracy or unauthorized use of
content.
Respect others' opinions, and avoid cyberbullying or
harassment.
Use online resources responsibly for academic and
professional purposes.
17
Tools and Technologies for Safe Online
Practices
VPNs (Virtual Private Networks) for secure connections on public
Wi-Fi.
Firewalls to block unauthorized access to your systems.
Anti-malware software to detect and remove malicious programs.
Browser extensions for safe web surfing, like privacy blockers.
VPNs (Virtual Private Networks) 18
A VPN (Virtual Private Network) is a technology that creates
a secure and encrypted connection between your device and a
remote server, effectively masking your online activity and
protecting your data from interception.
19
Privacy Protection: VPNs hide your IP address, making it difficult for third parties,
such as advertisers or hackers, to track your online activities.
Security: Encrypts your data, protecting it from being intercepted on public Wi-Fi or
other unsecured networks.
Access Control: Enables you to bypass geo-restrictions and censorship by making it
appear as though you're accessing the internet from a different location.
Anonymity: Maintains anonymity by routing traffic through servers that obscure your
identity.
Anti-malware software 20
In the digital world where everyone is interconnected digitally with the help of technology.
The chances for cyber threats to occur also increase. Malware which means "malicious
software" can enter our system in various ways. So, to defend our systems against these
malicious software we need robust security tools. In this article, we will be learning about
anti-malware, a program that guards our systems against this malware.
Anti Malware is the software designed for scanning, detecting, blocking and preventing
malicious programs from accessing our system. Malicious programs are called malware.
Malicious programs are harmful because of various software they include such as virus,
trojan, worms spyware etc. They can break security, steal data or disrupt the operation of
the system.
Browser extensions 21
An extension is a piece of software that adds a custom function
to your core browser. They can help you take notes, manage
passwords, block ads, and more. But extensions can also
introduce security risks.
Digital Privacy 22
Digital privacy in the modern era is a complex amalgamation of various
elements, including data privacy and individual privacy. It entails protecting
personal information that a user shares with other entities be it other individuals,
companies, or public bodies across digital platforms. It encompasses
safeguarding one's digital identity, ensuring confidentiality and security of
communications and transactions, and maintaining control over user-generated
data.
Cybersecurity and digital privacy 23
Cybersecurity and digital privacy, while distinct, are inextricably linked aspects of the
digital landscape. Cybersecurity primarily focuses on protecting the integrity and
confidentiality of data and systems from cyber threats such as malware and hacking.
Digital privacy, on the other hand, is about safeguarding personal information from
unlawful data collection and ensuring user control over personal data.
Cybersecurity threats that impede digital privacy are abundant and perpetually
evolving. These include viruses, ransomware, and phishing attacks, which could expose
sensitive personal data. More sophisticated threats like man-in-the-middle attacks and
Distributed Denial-of-Service (DDoS) attacks could disrupt systems and services,
potentially leading to data breaches.
Safely using browser extension 24
Is it made by a reputable source?
Are you downloading from an “official” place like the Chrome Web
Store?
When you search for the extension, do you find look-alike or
“clone” versions? Are you sure you’re installing the right one?
Does the extension have lots of downloads and positive reviews?
(Beware of a string of 5-star reviews, identical comments, or
comments all published on the same date.)
25
Thank you