cyber safety by yogesh
DESCRIPTION
eASY TO STUDY WHAT WE DO FOR OUR CYBER SAFETYTRANSCRIPT
Let’s Know Something New With Yog’s Prajapati
Roll NO : 13B082
. You Secure or not Yes or No
.
Did You know?
.
.
• .
Are you safe on internetOr
A under contol in key logger
.
How to stop a key logging hacker
How to stop a key logging hacker
How a key logging hacker works
How a key logging hacker works
How a key logging hacker works
How a key logging hacker works
How a key logging hacker works
How a key logging hacker works
Easy To safe on Social Networking
Cyber bullying
• Posting or forwarding a private text or embarrassing image to others
• Tricking someone into revealing embarrassing information and forwarding it to others
• Spreading malicious rumors• Stealing passwords
Malicious Files
Your computer may become infected with viruses and spyware through:– downloads– emails– peer-to-peer networking– infected websites
Keep Personal Information Private
• Never reveal:– Name– Address– Phone number– School name
• Don’t post or send photographs of yourself.
• Choose a nondescript screen name.
Facebook Privacy and Security
What is Facebook?• 500+ million active users• 30 billion pieces of content shared
each month• 70+ language translations available
.
Keep Your Information Safe
Rules to Live By
If you do not know someone, do not friend them
.
.
.
.
.
Questions ???
.
.
Thank You
You Can Ask Any Questions About Cyber Security
Yogesh Prajapati