0% found this document useful (0 votes)
58 views25 pages

Digital Security and Privacy 1st Semunit 4

The document discusses digital security and privacy, emphasizing the importance of cybersecurity in protecting organizations from cyber threats. It covers various aspects of cybercrime, safe online practices, and tools like VPNs and anti-malware software to enhance security. Additionally, it highlights the relationship between cybersecurity and digital privacy, stressing the need for user awareness and responsible online behavior.

Uploaded by

namdevarun179
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views25 pages

Digital Security and Privacy 1st Semunit 4

The document discusses digital security and privacy, emphasizing the importance of cybersecurity in protecting organizations from cyber threats. It covers various aspects of cybercrime, safe online practices, and tools like VPNs and anti-malware software to enhance security. Additionally, it highlights the relationship between cybersecurity and digital privacy, stressing the need for user awareness and responsible online behavior.

Uploaded by

namdevarun179
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Unit:4

DIGITAL
SECURITY
AND PRIVACY
By assist prof.vaishali wankhede
Cyber security

Cyber security enable


organization to practice safe
security techniques to minimize
the number of successful cyber
security attacks.
Cyber security refers to the
technologies and processes
design to protect computer,
network and data from
unauthorized access,
vulnerabilities and attack
delivered via the internet by
cyber criminal.
Communication security
protecting organizing
communication media,
technology, and content.

Network security is the protecting


of networking components,
connection and contents.

Information security protecting of


information and its critical
elements, including the systems
and hardware that use, store or
transmit that information.
The first recorded cybercrime was
recorded in the year 1820.
The first spam email took place in 1978
when it was sent over the ARPANET. History
The first virus was installed on an Apple
computer in 1982.
Cyber crime includes…. 6

1 2 3

Illegal access Data interference Fraud


Illegal Interception Misuse of devices System interference
System interference
Protection …. 7

Read the privacy policy


carefully when you submit
the data through the
Internet.
Encryption: Many websites
use an SSL secure socket
layer to encrypt data.
Safety …. 8

Use antivirus software


Insert firewalls, pop-up blocker
Maintain backup
Use secure connection
Open attachment carefully
Use strong passwords.
Cybersecurity Threats 9

Malware

Malicious software like viruses, worms, and trojans.


Examples: WannaCry ransomware attack.

Phishing

Fraudulent attempts to obtain sensitive information.


Example: Fake emails pretending to be from banks.

Denial of Service (DoS) Attacks

Overloading a server to make it unavailable to users.


Example: Distributed DoS (DDoS) attacks using botnets.
10

Safe practices
Safe and online practice Protecting personal and
organizational
information online.
Password Security 11

Password Security
Use strong, unique passwords
for different accounts.
Enable multi-factor
authentication (MFA).
Avoid sharing passwords or
writing them down in
accessible places.
Recognizing Phishing Scams 12

Teach students to identify


suspicious emails, messages,
or websites.
.
Show real-world examples of
phishing attempts.
Emphasize verifying links
before clicking and reporting
fraudulent activities
Safe Browsing Habits 13

•Always use secure (HTTPS)


websites, especially for
transactions.
•Avoid downloading files or
software from unknown
sources.
•Use updated antivirus and ad-
blocker tools.
Social Media Responsibility
14

Maintain privacy by limiting


what you share.
Understand the implications of
over-sharing personal or
professional details.
Review and adjust privacy
settings regularly.
15

Advanced Persistent Threats (APTs)

An advanced persistent threat (APT) is a broad term used to describe


an attack campaign in which an intruder, or team of intruders,
establishes an illicit, long-term presence on a network in order to
mine highly sensitive data.
Long-term target sensitive data cyberattacks.
Example: Nation-state hacking groups.
Ethical Online Behavior
16

Follow copyright laws; avoid piracy or unauthorized use of


content.
Respect others' opinions, and avoid cyberbullying or
harassment.
Use online resources responsibly for academic and
professional purposes.
17

Tools and Technologies for Safe Online


Practices

VPNs (Virtual Private Networks) for secure connections on public


Wi-Fi.
Firewalls to block unauthorized access to your systems.
Anti-malware software to detect and remove malicious programs.
Browser extensions for safe web surfing, like privacy blockers.
VPNs (Virtual Private Networks) 18

A VPN (Virtual Private Network) is a technology that creates


a secure and encrypted connection between your device and a
remote server, effectively masking your online activity and
protecting your data from interception.
19

Privacy Protection: VPNs hide your IP address, making it difficult for third parties,
such as advertisers or hackers, to track your online activities.

Security: Encrypts your data, protecting it from being intercepted on public Wi-Fi or
other unsecured networks.

Access Control: Enables you to bypass geo-restrictions and censorship by making it


appear as though you're accessing the internet from a different location.

Anonymity: Maintains anonymity by routing traffic through servers that obscure your
identity.
Anti-malware software 20

In the digital world where everyone is interconnected digitally with the help of technology.
The chances for cyber threats to occur also increase. Malware which means "malicious
software" can enter our system in various ways. So, to defend our systems against these
malicious software we need robust security tools. In this article, we will be learning about
anti-malware, a program that guards our systems against this malware.
Anti Malware is the software designed for scanning, detecting, blocking and preventing
malicious programs from accessing our system. Malicious programs are called malware.
Malicious programs are harmful because of various software they include such as virus,
trojan, worms spyware etc. They can break security, steal data or disrupt the operation of
the system.
Browser extensions 21

An extension is a piece of software that adds a custom function


to your core browser. They can help you take notes, manage
passwords, block ads, and more. But extensions can also
introduce security risks.
Digital Privacy 22

Digital privacy in the modern era is a complex amalgamation of various


elements, including data privacy and individual privacy. It entails protecting
personal information that a user shares with other entities be it other individuals,
companies, or public bodies across digital platforms. It encompasses
safeguarding one's digital identity, ensuring confidentiality and security of
communications and transactions, and maintaining control over user-generated
data.
Cybersecurity and digital privacy 23

Cybersecurity and digital privacy, while distinct, are inextricably linked aspects of the
digital landscape. Cybersecurity primarily focuses on protecting the integrity and
confidentiality of data and systems from cyber threats such as malware and hacking.
Digital privacy, on the other hand, is about safeguarding personal information from
unlawful data collection and ensuring user control over personal data.

Cybersecurity threats that impede digital privacy are abundant and perpetually
evolving. These include viruses, ransomware, and phishing attacks, which could expose
sensitive personal data. More sophisticated threats like man-in-the-middle attacks and
Distributed Denial-of-Service (DDoS) attacks could disrupt systems and services,
potentially leading to data breaches.
Safely using browser extension 24

Is it made by a reputable source?


Are you downloading from an “official” place like the Chrome Web
Store?
When you search for the extension, do you find look-alike or
“clone” versions? Are you sure you’re installing the right one?
Does the extension have lots of downloads and positive reviews?
(Beware of a string of 5-star reviews, identical comments, or
comments all published on the same date.)
25

Thank you

You might also like