0% found this document useful (0 votes)
67 views

Cyber Safety Computer

Cyber safety refers to the safe and responsible use of the internet to protect personal information. Websites can track users through their IP address, cookies, and other methods. Cookies come in different types, including first party cookies set by directly visited websites and third party cookies set by advertising networks to build user profiles. The HTTP referer and user agent can also reveal identifying information to websites unless anonymous or private browsing modes are used. Protecting identity and data requires understanding how websites track online activities and using privacy tools like VPNs or incognito browsing.

Uploaded by

Ishika Rajput
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views

Cyber Safety Computer

Cyber safety refers to the safe and responsible use of the internet to protect personal information. Websites can track users through their IP address, cookies, and other methods. Cookies come in different types, including first party cookies set by directly visited websites and third party cookies set by advertising networks to build user profiles. The HTTP referer and user agent can also reveal identifying information to websites unless anonymous or private browsing modes are used. Protecting identity and data requires understanding how websites track online activities and using privacy tools like VPNs or incognito browsing.

Uploaded by

Ishika Rajput
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Cyber

Safety
● Cyber safety
(Definition)
● Identity protection
while using Internet
● Types of browsing

Here is where our


presentation begins!
WHAT IS CYBER
SAFETY?
CYBER SAFETY refers to the safe and responsible use of
Internet, so as to ensure safety and security of personal
information, and not posing threat to anyone else's
information.
01 02 03
INTRODUCTION IP ADDRESS COOKIES AND TRACKING SCRIPTS

TABLE OF CONTENTS
How websites can track us? The unique address of our It is about the small pieces of
device when we connect to storage, that is, cookies,and

04 05 06
the internet. its types.

HTTP REFERRER SUPER COOKIES USER AGENT


The reference of our Even after we delete them, Agent of the website which
information to our VISITING they are COMEBACK cookies. tells about our browser and
linked website. operating system.
INTRODUCTION
We surf the Internet for a variety of reasons, from using social media, buying and selling goods, to sending
information. When we give out private data to businesses and other Internet users, we trust them to use that
information for useful purposes. But this isn't always the case though, and financial and personal data can be used
for harmful reasons like hacking, stalking, and identity fraud.

IDENTITY FRAUD is when personal details that have been accessed or stolen, are used to commit fraudulent acts
posing at someone else with stolen identity.

MANY WAYS WEBSITES TRACK US


Whenever we visit a website, our web browser may reveal our location via our device’s IP address. It can also provide
our search and browsing history, etc., which may be used by third parties, like advertisers or criminals. This way
website track us.

TRACKING IS GENERALLY USED BY ADVERTISING NETWORKS TO BUILD UP DETAILED PROFILES FOR PINPOINT
AD-TARGETING, EVEN TRACKING DOWN USERS FOR SPECIAL PURPOSE, LIKE EFFECTING THEIR POLITICAL CHOICES.
01 IP ADDRESS
It is a unique address of our device, when we
connect to the Internet. It's likely that our computer
shared our IP address with the other networked
devices in our house or office. From our IP address,
a website can determine our ROUGH GEOGRAPHICAL
LOCATION.
COOKIES AND
TRACKING SCRIPTS 02
Cookies are small pieces of information, through which
websites can store in our browser. They have plenty of
legitimate uses :
● To make websites remember our login
information.
● To store our settings of our current website, so
to be persisted across page loads and sessions.
WHAT ARE THE TYPES
OF COOKIES?
FIRST PARTY COOKIES :
These are the cookies that store our own login ID, passwords, auto
fill information, etc. for some websites that we frequently visit.
THIRD PARTY COOKIES :
These are the cookies that websites store to know about our
search history and web browsing history so as to place
advertisements as per our interests.
03 HTTP REFERER
When we click a link (Advertisement link), our
browser loads the webpage linked to it and tells
the website, where we came from, then the
linked website will get opened and internally
information about us (IP address, location, web
browser, machine type, etc.) will also be provided
to the linked website. This is known as HTTP
REFERER.
04 SUPER COOKIES
They are also cookies but these are persistent
cookies (They come back even after delete them).
They store cookie data in multiple places.

When a website notices that we have deleted part of


the super cookie, the information is repopulated
from the other location.
05 USER AGENT
Our browser also needs a user AGENT every
time we connect to a website. This tells
websites our browser and operating system,
providing another piece of data that can be
stored and used to target ads.
User agent may leak our identity
information to websites, and it may be
used against us.

Solution to this is :
ANONYMOUS BROWSING AND
PRIVATE BROWSING
ANONYMOUS BROWSING

It allows users to view websites without revealing any


personal information of them, like their IP address,
location, machine type, etc. It also let's users access
websites anonymously. It can be used as a tool for
governments, journalists, and every day
security-conscious surfers.
PRIVATE BROWSING
There are 3 other ways to use the Internet
without revealing our search history and
sharing our data :
● INCOGNITO BROWSING
● PROXY
● VIRTUAL PRIVATE NETWORK
INCOGNITO BROWSING

It opens up a version of the browser that


will not track our activity. It's particularly
useful if we are entering sensitive data like
bank details into the browser, as it can
minimize the risk of our information, being
saved to that computer.
PROXY
It works by acting as a middleman between
our computer and the website we want to
access. Now, the fracking website will get
the IP address and information that belongs
to the PROXY site, so we are effectively
getting the same content from another
source without getting it to know our
browsing details.
VIRTUAL PRIVATE NETWORK (VPN)
It is a method used to add security and
privacy and public networks, like Wi-Fi
hotspots and the Internet. It is most often
used by corporations to protect sensitive
data. Since it was originally meant for
business employees working offsite to gain
access to shared drives or networks, we can
set it up at home to protect ourselves from
hackers trying to access our sensitive
information.
THANK YOU!
CREDITS :
1. Ishika Singh
2. S. V. Anushree Warrier
CLASS : 11th
DIVISION : A

You might also like