CYBER SAFETY BY YOGESH

  • View
    113

  • Download
    3

  • Category

    Law

Preview:

DESCRIPTION

eASY TO STUDY WHAT WE DO FOR OUR CYBER SAFETY

Citation preview

Let’s Know Something New With Yog’s Prajapati

Roll NO : 13B082

. You Secure or not Yes or No

.

Did You know?

.

.

• .

Are you safe on internetOr

A under contol in key logger

.

How to stop a key logging hacker

How to stop a key logging hacker

How a key logging hacker works

How a key logging hacker works

How a key logging hacker works

How a key logging hacker works

How a key logging hacker works

How a key logging hacker works

Easy To safe on Social Networking

Cyber bullying

• Posting or forwarding a private text or embarrassing image to others

• Tricking someone into revealing embarrassing information and forwarding it to others

• Spreading malicious rumors• Stealing passwords

Malicious Files

Your computer may become infected with viruses and spyware through:– downloads– emails– peer-to-peer networking– infected websites

Keep Personal Information Private

• Never reveal:– Name– Address– Phone number– School name

• Don’t post or send photographs of yourself.

• Choose a nondescript screen name.

Facebook Privacy and Security

What is Facebook?• 500+ million active users• 30 billion pieces of content shared

each month• 70+ language translations available

.

Keep Your Information Safe

Rules to Live By

If you do not know someone, do not friend them

.

.

.

.

.

Questions ???

.

.

Thank You

You Can Ask Any Questions About Cyber Security

Yogesh Prajapati