Download - maya seminar technology
![Page 1: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/1.jpg)
WELCOME
![Page 2: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/2.jpg)
![Page 3: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/3.jpg)
A SEMINAR ON
CYBER PRIVACY AND
PASSWORD PROTECTIONBY
mayamalayalam
![Page 4: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/4.jpg)
Cyber-Privacy is mostly defined by the services used by individuals. Whatever agreements individuals agree to when they sign up for a service usually signs away their right to privacy.
![Page 5: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/5.jpg)
In other cases the reasonable expectation of privacy is not reasonable if the behaviors or communications in question were knowingly exposed to public view.
![Page 6: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/6.jpg)
Crimes involving cyber privacy
![Page 7: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/7.jpg)
![Page 8: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/8.jpg)
-Malware (such as the use of malicious code which can compromise a user's identity and/or information)· -Denial of Service Attacks (block a user from accessing his or her information)· -Computer Viruses (can compromise user information as well as identity)· All of these crimes fall under the category or fraud, identity theft, phishing scams and or information warfare.· The Cyber-Privacy Project attempts to raise public awareness and promote the education of Cyber Privacy to prevent crimes from happening.
![Page 9: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/9.jpg)
![Page 10: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/10.jpg)
PASSWORD PROTECTION
![Page 11: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/11.jpg)
We live in a password-driven world, where between four and 20 characters are the difference makers in whether you're able to access your data, communicate with friends, or make your online purchases. The problem is that passwords should be different everywhere you use them, and that can make it difficult to remember them all. And, if a password is truly strong, that makes it even more difficult.
![Page 12: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/12.jpg)
Follow these tips and tricks to take total control of your terms for access.
Use Different Passwords EverywhereRemember the Underwear MemeAvoid Common Passwords
![Page 13: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/13.jpg)
How to Build StrengthTo create a strong password, you should use a string of text that mixes numbers, letters that are both lowercase and uppercase, and special characters. It should be eight characters, preferably many more
![Page 14: maya seminar technology](https://reader035.vdocument.in/reader035/viewer/2022062503/589c04391a28ab4f598b5933/html5/thumbnails/14.jpg)