SlideShare a Scribd company logo
NAME- VARTIKA SINGH
CLASS-10TH ‘A’
TOPIC-COMPUTER & INTERNET SECURITY
SUBMITTED TO- MR. PRATHEESH
ACKNOWLEDGEMENT
I would like to convey my heartfelt gratitude to Mr. Pratheesh for his tremendous support and assistance in the
completion of my project. I would also like to thank our Principal, Mrs. Paramjeet Kaur , for providing me with
this wonderful opportunity to work on a project with the topic Computer & Internet Security . The completion of
the project would not have been possible without their help and insights.
Vartika Singh
CONTENT
 INTRODUCTION
 WHAT IS COMPUTER SECURITY
 INTERNET SECURITY
 WHO SHOULD BE CONCERNED ?
 WHY SHOULD I CARE ?
 BASIC APPROACH TO SECURITY
 SECURITY FOR MOBILE DEVICES AND SOCIAL NETWORKING
 MOBILE DEVICES AND RISKS
 MOBILE DEVICES-HOW ARE LOCATION SHARING TECHNOLOGIES ARE USED
 SECURITY GUIDELINES-MOBILE DEVICES
 SECURITY GUIDELINES-SOCIAL NETWORKING
INTRODUCTION
As technology changes, it becomes increasingly challenging for
businesses of all types to keep their personal and customer’s
information on the web secure.
Web security is important to keeping hackers and cyber-thieves
from accessing sensitive information. Without a proactive
security strategy, businesses risk the spread and escalation of
malware, attacks on other websites, networks, and other IT
infrastructures. If a hacker is successful, attacks can spread
from computer to computer, making it difficult to find the
origin.
Computer & Internet Security.pptx
Computer & Internet Security.pptx
INTERNET SECURITY
• INTERNET SECURITY CONSISTS OF A RANGE OF SECURITY TACTICS
FOR PROTECTING ACTIVITIES AND TRANSACTIONS CONDUCTED
ONLINE OVER THE INTERNET. THESE TACTICS ARE MEANT TO
SAFEGUARD USERS FROM THREATS SUCH AS HACKING INTO
COMPUTER SYSTEMS, EMAIL ADDRESSES, OR WEBSITES;
• INTERNET SECURITY IS A SPECIFIC ASPECT OF BROADER CONCEPTS
SUCH AS CYBERSECURITY AND COMPUTER SECURITY, BEING
FOCUSED ON THE SPECIFIC THREATS AND VULNERABILITIES OF
ONLINE ACCESS AND USE OF THE INTERNET.
Who should be concerned
 Anyone who uses
1. Computer
2. Mobile device
3. The Internet
4. E mail
5. Social networks
WHY SHOULD I CARE ?
 Keeping your computer secure helps you avoid malware and direct hacking attempts
designed to steal your personal information.
 The importance of computer security also extends to larger network security. A
compromised computer can be manipulated and made into an agent of a cyber crime ring.
Viruses and malware are often designed to hijack and exploit email address books.
BASICAPPROACH TO SECURITY
1. Keep software up-to-date
 Installing software updates for your operating system and programs is critical.
Always install the latest security updates for your devices:
 Turn on Automatic Updates for your operating system
2. Avoid Phishing scams - beware of suspicious emails and
phone calls
3. Install antivirus/anti-malware protection
4. Be careful what you click
5. Never leave devices unattended
6. Use mobile devices safely
SECURITY FOR MOBILE DEVICES ANDSOCIAL
NETWORKS
1. Mobile devices have become the device of choice for communicating and
connecting to the internet
 Smartphones
 Tablets
 Laptop
1. Social Networks
 Facebook
 Google
 Pinterest
 Twitter
MOBILE DEVICES ANDRISKS
1. Location sharing
 Location- aware applications deliver online
Content to users based on their physical
location
 Technologies employ GPS, cell phone
infrastructure or wireless access points to
identify where cell phones or laptop are
located and users can share that
information with location aware application.
MOBILE DEVICES-How are location sharing devices used
 Apps might provide you with
information on nearby,
restaurants, notify you of traffic
jams , or let your friends in a
social network know where you
are , prompting increased social
connectivity
SECURITY GUIDELINES-Mobile Devices
 Avoid Saving Passwords
 Protect Your Smartphone or Tablet With a Passcode
 Protect Your Smartphone or Tablet With a Passcode
 Attach a Label to your Devices
 Log Your Phone Data
 Encrypt the Data on Your Device
 Use Pulse to Attach to University Resources on Public Wi-Fi Networks
 Consider your Wi-Fi Carrier’s Data Service for Especially Sensitive
Communications
 Know What to Do if You Lose a Device
SECURITY GUIDELINES-Social Networks
 Be Cautious of Sharing Too Much
 Adjust Privacy Settings
 Limit Details About Work History
 Verify Who You're Connecting With
 Keep Control of Comments – Be Aware of Impersonators
 Check Out Your Own Account
STAY SAFE
Think before you click & try to be
Mysterious when online
Computer & Internet Security.pptx

More Related Content

PPTX
TheInternetDigitalSecurityfddreeere.pptx
PDF
Cyber security and mobile devices
PDF
Cyber security notes or Mca/bca about security
PDF
Cybersecurity Awareness E-book by Propelled Technologies
PPTX
Network Security of Data Protection
PPTX
Network Security Basics in networking to learn
PPTX
A presentation on cyber security Introduction
PPTX
CYBERSECURITY.pptx
TheInternetDigitalSecurityfddreeere.pptx
Cyber security and mobile devices
Cyber security notes or Mca/bca about security
Cybersecurity Awareness E-book by Propelled Technologies
Network Security of Data Protection
Network Security Basics in networking to learn
A presentation on cyber security Introduction
CYBERSECURITY.pptx

Similar to Computer & Internet Security.pptx (20)

PPTX
CYBER SECURITY happy life pogi ako cyber
DOCX
A network security policy group project unit 4 (1) july 2015
PPTX
MOBILE SECURITY.pptx
PPTX
ppt on cybersecurity and why its necessary
PDF
Cybersecurity Awareness E-Book - WeSecureApp
PPTX
Cyber Security: A Hands on review
PDF
best coffee beans in the world, americano
PPT
Dos and Dont to be followed to protect information and technology
PDF
IRJET- Android Device Attacks and Threats
PPTX
UNIT_1_-_Introduction_to_Cyber_Security_Updated.pptx
PDF
The Network as a Sensor, Cisco and Lancope
PDF
What Are Some Ways to Secure Your Internet-Connected Devices Against Motivate...
PPTX
Mobile security in Cyber Security
PPTX
Digital Security and safety for journalists
PPTX
cyber security
PDF
Introduction to Cyber Security presentation
PDF
3 data leak possibilities that are easy to overlook
PPTX
Information Security Awareness Session -2020
PDF
880 st011
CYBER SECURITY happy life pogi ako cyber
A network security policy group project unit 4 (1) july 2015
MOBILE SECURITY.pptx
ppt on cybersecurity and why its necessary
Cybersecurity Awareness E-Book - WeSecureApp
Cyber Security: A Hands on review
best coffee beans in the world, americano
Dos and Dont to be followed to protect information and technology
IRJET- Android Device Attacks and Threats
UNIT_1_-_Introduction_to_Cyber_Security_Updated.pptx
The Network as a Sensor, Cisco and Lancope
What Are Some Ways to Secure Your Internet-Connected Devices Against Motivate...
Mobile security in Cyber Security
Digital Security and safety for journalists
cyber security
Introduction to Cyber Security presentation
3 data leak possibilities that are easy to overlook
Information Security Awareness Session -2020
880 st011
Ad

Recently uploaded (20)

PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
master seminar digital applications in india
PDF
Classroom Observation Tools for Teachers
PDF
01-Introduction-to-Information-Management.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Abdominal Access Techniques with Prof. Dr. R K Mishra
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Chinmaya Tiranga quiz Grand Finale.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
master seminar digital applications in india
Classroom Observation Tools for Teachers
01-Introduction-to-Information-Management.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Module 4: Burden of Disease Tutorial Slides S2 2025
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
O7-L3 Supply Chain Operations - ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Ad

Computer & Internet Security.pptx

  • 1. NAME- VARTIKA SINGH CLASS-10TH ‘A’ TOPIC-COMPUTER & INTERNET SECURITY SUBMITTED TO- MR. PRATHEESH
  • 2. ACKNOWLEDGEMENT I would like to convey my heartfelt gratitude to Mr. Pratheesh for his tremendous support and assistance in the completion of my project. I would also like to thank our Principal, Mrs. Paramjeet Kaur , for providing me with this wonderful opportunity to work on a project with the topic Computer & Internet Security . The completion of the project would not have been possible without their help and insights. Vartika Singh
  • 3. CONTENT  INTRODUCTION  WHAT IS COMPUTER SECURITY  INTERNET SECURITY  WHO SHOULD BE CONCERNED ?  WHY SHOULD I CARE ?  BASIC APPROACH TO SECURITY  SECURITY FOR MOBILE DEVICES AND SOCIAL NETWORKING  MOBILE DEVICES AND RISKS  MOBILE DEVICES-HOW ARE LOCATION SHARING TECHNOLOGIES ARE USED  SECURITY GUIDELINES-MOBILE DEVICES  SECURITY GUIDELINES-SOCIAL NETWORKING
  • 4. INTRODUCTION As technology changes, it becomes increasingly challenging for businesses of all types to keep their personal and customer’s information on the web secure. Web security is important to keeping hackers and cyber-thieves from accessing sensitive information. Without a proactive security strategy, businesses risk the spread and escalation of malware, attacks on other websites, networks, and other IT infrastructures. If a hacker is successful, attacks can spread from computer to computer, making it difficult to find the origin.
  • 7. INTERNET SECURITY • INTERNET SECURITY CONSISTS OF A RANGE OF SECURITY TACTICS FOR PROTECTING ACTIVITIES AND TRANSACTIONS CONDUCTED ONLINE OVER THE INTERNET. THESE TACTICS ARE MEANT TO SAFEGUARD USERS FROM THREATS SUCH AS HACKING INTO COMPUTER SYSTEMS, EMAIL ADDRESSES, OR WEBSITES; • INTERNET SECURITY IS A SPECIFIC ASPECT OF BROADER CONCEPTS SUCH AS CYBERSECURITY AND COMPUTER SECURITY, BEING FOCUSED ON THE SPECIFIC THREATS AND VULNERABILITIES OF ONLINE ACCESS AND USE OF THE INTERNET.
  • 8. Who should be concerned  Anyone who uses 1. Computer 2. Mobile device 3. The Internet 4. E mail 5. Social networks
  • 9. WHY SHOULD I CARE ?  Keeping your computer secure helps you avoid malware and direct hacking attempts designed to steal your personal information.  The importance of computer security also extends to larger network security. A compromised computer can be manipulated and made into an agent of a cyber crime ring. Viruses and malware are often designed to hijack and exploit email address books.
  • 10. BASICAPPROACH TO SECURITY 1. Keep software up-to-date  Installing software updates for your operating system and programs is critical. Always install the latest security updates for your devices:  Turn on Automatic Updates for your operating system 2. Avoid Phishing scams - beware of suspicious emails and phone calls 3. Install antivirus/anti-malware protection 4. Be careful what you click 5. Never leave devices unattended 6. Use mobile devices safely
  • 11. SECURITY FOR MOBILE DEVICES ANDSOCIAL NETWORKS 1. Mobile devices have become the device of choice for communicating and connecting to the internet  Smartphones  Tablets  Laptop 1. Social Networks  Facebook  Google  Pinterest  Twitter
  • 12. MOBILE DEVICES ANDRISKS 1. Location sharing  Location- aware applications deliver online Content to users based on their physical location  Technologies employ GPS, cell phone infrastructure or wireless access points to identify where cell phones or laptop are located and users can share that information with location aware application.
  • 13. MOBILE DEVICES-How are location sharing devices used  Apps might provide you with information on nearby, restaurants, notify you of traffic jams , or let your friends in a social network know where you are , prompting increased social connectivity
  • 14. SECURITY GUIDELINES-Mobile Devices  Avoid Saving Passwords  Protect Your Smartphone or Tablet With a Passcode  Protect Your Smartphone or Tablet With a Passcode  Attach a Label to your Devices  Log Your Phone Data  Encrypt the Data on Your Device  Use Pulse to Attach to University Resources on Public Wi-Fi Networks  Consider your Wi-Fi Carrier’s Data Service for Especially Sensitive Communications  Know What to Do if You Lose a Device
  • 15. SECURITY GUIDELINES-Social Networks  Be Cautious of Sharing Too Much  Adjust Privacy Settings  Limit Details About Work History  Verify Who You're Connecting With  Keep Control of Comments – Be Aware of Impersonators  Check Out Your Own Account
  • 16. STAY SAFE Think before you click & try to be Mysterious when online