Nitin Cber Ppt
Nitin Cber Ppt
Nitin Cber Ppt
& ETHICS
•MADE BY:-
•NITIN KUMAR
•CLASS:- XI 'A'
•ROLL NO. :- 18
INTODUCTION OF CYBER SECURITY
CYBER ETHICS
CYBERSECURITY MEASURES
INDEX
IMAPCT OF CYBER CRIME ON
SOCIETY
CASE STUDIES
E T H I C A L I S S U E S I N C Y B E R S PA C E
R E V O LV E A R O U N D T H E R E S P O N S I B L E
U S E O F T E C H N O L O G Y. P R I V A C Y I S A
M A J O R C O N C E R N , A S P E R S O N A L D ATA
IS OFTEN COLLECTED WITHOUT
C O N S E N T. P L A G I A R I S M A N D
C O P Y R I G H T V I O L AT I O N S H I G H L I G H T
INTELLECTUAL PROPERTY
C H A L L E N G E S . D I G I TA L A D D I C T I O N
A F F E C T S M E N T A L H E A LT H , E S P E C I A L LY
I N Y O U T H , A S P E O P L E I N C R E A S I N G LY
DEPEND ON TECHNOLOGY FOR
E N T E RTA I N M E N T A N D S O C I A L
INTERACTION. ADDRESSING THESE
E T H I C A L D I L E M M A S I S V I TA L F O R A
B A L A N C E D A N D FA I R D I G I T A L W O R L D .
Cyber
Ethics
CYBER ETHICS ARE THE PRINCIPLES
G U I D I N G R E S PO N S I B L E B E H AV I O R I N
T H E D I G I T A L E N V I R O N M E N T. E T H I C A L
PRACTICES INCLUDE RESPECTING
O T H E R S ’ P R I V A C Y, A V O I D I N G
HARMFUL ACTIVITIES LIKE
C Y B E R B U L LY I N G , A N D E N S U R I N G
T R A N S PA R E N C Y I N O N L I N E A C T I O N S .
F O R I N S TA N C E , S H A R I N G
C O P Y R I G H T E D M AT E R I A L W I T H O U T
PERMISSION BREACHES ETHICAL
S TA N D A R D S . BY P R O M O T I N G A
C U LT U R E O F I N T E G R I T Y O N L I N E ,
CYBER ETHICS BUILD TRUST AND A
S E N S E O F S E C U R I T Y I N T H E D I G I TA L
ECOSYSTEM.
Cybersecurity
Measures
C Y B E R S E C U R I T Y I N V O LV E S
PROTECTING SYSTEMS, NETWORKS,
A N D D ATA F R O M U N A U T H O R I Z E D
A C C E S S O R AT TA C K S . S I M P L E
MEASURES LIKE USING STRONG
PA S S W O R D S , E N A B L I N G T W O - FA C T O R
A U T H E N T I C AT I O N , A N D AV O I D I N G
SUSPICIOUS LINKS ENHANCE ONLINE
S A F E T Y. R E G U L A R U P D A T E S T O
SOFTWARE AND ANTIVIRUS PROGRAMS
A L S O P R O T E C T A G A I N S T E V O LV I N G
T H R E AT S . C Y B E R S E C U R I T Y I S N ’ T J U S T
A TECHNICAL REQUIREMENT BUT A
SHARED RESPONSIBILITY AMONG
USERS, BUSINESSES, AND
GOVERNMENTS TO ENSURE A SAFE
D I G I TA L S PA C E .
Impact of
Cyber
Crimes
on
Society C Y B E R C R I M E S C A U S E S I G N I F I C A N T H A R M A T M U LT I P L E
L E V E L S . F I N A N C I A L LY, B U S I N E S S E S L O S E B I L L I O N S
A N N U A L LY T O F R A U D A N D D A T A B R E A C H E S . S O C I A L LY,
M I S I N F O R M AT I O N S P R E A D S D I S T R U S T A N D C H A O S ,
W H I L E C Y B E R B U L LY I N G H A R M S M E N T A L W E L L - B E I N G .
P S Y C H O L O G I C A L LY, V I C T I M S E X P E R I E N C E F E A R ,
A N X I E T Y, A N D L O S S O F P R I V A C Y. T H E S E
CONSEQUENCES UNDERSCORE THE NEED FOR
STRINGENT LAWS, PUBLIC AWARENESS, AND ROBUST
CYBERSECURITY PRACTICES TO MINIMIZE DAMAGE.
Case
Studies
WANNACRY RANSOMWARE (2017): A
GLOBAL ATTACK THAT ENCRYPTED
FILES ON AFFECTED SYSTEMS,
DEMANDING RANSOM PAYMENTS. IT
CAUSED BILLIONS IN DAMAGES.
CAMBRIDGE ANALYTICA SCANDAL
(2018): A MISUSE OF FACEBOOK
DATA TO INFLUENCE ELECTIONS,
HIGHLIGHTING THE LACK OF DATA
PRIVACY REGULATIONS.
THESE EXAMPLES REVEAL THE SCALE
OF CYBER THREATS AND THE
IMPORTANCE OF STRONG LEGAL AND
ETHICAL MEASURES TO PREVENT
SIMILAR INCIDENTS.
Role of
Individual
in
Promoting
Cyber E V E RY U S E R P L AY S A C R U C I A L R O L E I N F O S T E R I N G A
S A F E D I G I T A L W O R L D . T H I S I N V O LV E S S T AY I N G
INFORMED ABOUT CYBER RISKS AND USING
Ethics
T E C H N O L O G Y R E S P O N S I B L Y. F O R E X A M P L E ,
E D U C AT I N G P E E R S A B O U T T H E D A N G E R S O F
PHISHING OR REPORTING UNETHICAL ONLINE
ACTIVITIES HELPS BUILD AWARENESS. ENCOURAGING
ETHICAL PRACTICES LIKE RESPECTING COPYRIGHTS
A N D AVO I D I N G H A R M F U L B E H AV I O R S U C H A S
C Y B E R B U L L Y I N G E N S U R E S A H E A LT H I E R D I G I T A L
S O C I E T Y.
Future
of Cyber
Laws
and
THE RAPID DEVELOPMENT OF TECHNOLOGIES
LIKE ARTIFICIAL INTELLIGENCE (AI), INTERNET
O F T H I N G S ( I O T ) , A N D B I G D ATA P R E S E N T S
N E W C H A L L E N G E S . C Y B E R L A W S M U S T E V O LV E
Ethics
TO ADDRESS THESE CHANGES, FOCUSING ON
A R E A S L I K E E T H I C A L A I D E V E L O P M E N T, D A T A
PROTECTION, AND CROSS-BORDER
C O O P E R AT I O N . T H E F U T U R E R E Q U I R E S
I N T E R N AT I O N A L C O L L A B O R AT I O N T O
S TA N D A R D I Z E R E G U L AT I O N S A N D P R E V E N T
G L O B A L C Y B E R T H R E AT S , E N S U R I N G A S E C U R E
A N D E T H I C A L D I G I TA L E C O S Y S T E M .
Private Browsing
And Anonymous
Browsing
ANONYMOUS BROWSERS ALLOW USERS TO VIEW WEBSITES WITHOUT
R E V E A L I N G P E R S O N A L I N F O R M AT I O N O F U S E R . • I T C A N B E S U E D A S A
T O O L F O R G O V E R N M E N T S , J O U R N A L I S T S A N D E V E RY S E C U R I T Y C O N S C I O U S
S U R F E R S . • A P O P U L A R S O LU T I O N T O T H I S I S - P R I VAT E B R O W S I N G . •
I N C O G N I T O B R O W S I N G O P E N U P A V E R S I O N O F T H E B R O W S E R T H AT W I L L
N O T T R A C K Y O U R A C T I V I T Y. I T I S P A R T I C U L A R LY U S E F U L I F Y O U A R E
E N T E R I N G S E N S I T I V E D ATA L I K E B A N K D E TA I L S I N T O Y O U R B R O W S E R . •
PROXY WORKS AS A MIDDLEMAN BETWEEN YOUR COMPUTER AND THE
WEBSITE YOU WANT TO ACCESS. NOW THE TRACKING WEBSITE WILL GET
T H E I P A D D R E S S O F P R O X Y S I T E . • V I R T U A L P R I VAT E N E T W O R K ( V P N ) T H I S
I S A M E T H O D T O A D D S E C U R I T Y A N D P R I VA C Y T O P R I VAT E A N D P U B L I C
N E T W O R K S , L I K E W I F I H O T S P O T S A N D I N T E R N E T. I T I S O R I G I N A L LY M E A N T
F O R B U S I N E SS E M P LOY E E S W O R K I N G O F F S I T E T O G A I N AC C E SS T O S H A R E D
DRIVES OR NETWORKS.
What you
should do on
SOCIAL
NETWORKING
SITES Usage YOU SHOULD CONDUCT YOURSELF IN A
R E S P O N S I B L E W AY S O T H AT Y O U C A N E N J O Y
rules U S I N G I T. • B E A U T H E N T I C . • U S E A
DISCLAIMER. • DON’T PICK FIGHTS ONLINE. •
D O N ’ T U S E FA K E N A M E S O R P S E U D O N Y M S . •
P R O T E C T Y O U R I D E N T I T Y. • A L W A Y S T A K E
PUBLICITY TEST WHEN POST SOMETHING. •
RESPECT YOUR AUDIENCE. • RESPECT
OTHER'S SENTIMENTS. • MONITOR COMMENTS.
Thank You