3. What is cyber safety?
Cyber safety refers to the safe and
responsible use of internet to insure
safety and security of personal
information and not posing thread to
anyone else information.
4.
5. Confidentiality of information
PRACTICES TO ENSURE CONFIDENTIALITY OF INFORMATION
1) use firewall wherever possible
2)control browser setting to block tracking
3)browser privately wherever possible
4)be careful while posting on internet
5)ensure safe sites while entering crucial information
6)carefully handle emails
7)do not give sensitive information on wireless networks
8)avoid using public computers
6.
7. Identity protection while using internet
MANY WAY WEBSITES TRACK YOU
a)Ip address
b)Cookies and tracking scripts
c)HTTP referrer
d)Super cookies
e)User agent
PRIVATE BROWSING AND ANONYMOUS BROWSING
Anonymous browsers allow users to view websites without revealing any personal info of users
like their ip address , machine type, location,etc
Private browsing includes a)incognito browsing b)proxy c)virtual private network
8.
9. Cybercrime: is any criminal offence that is facilitated by ,or
involves the use of, electronic communications or information
systems, including any electronic device, computer or the
internet.
A) cyber trolls and bulling: derogatory messages or comments posted
online targeting people are called cyber trolls.
B) cyber bullying: harassing, demeaning, someone using modern tech. like
internet, cell phones ,etc is called cyber bulling.
C) cyber stalking: this is kind of online harrassement wherein victim is
subjected to a barrage of online messages and emails.
D) spreading rumours online: is a cybercrime and is a punishable offence.
REPORTING CRIME : if any cybercrime happens, one must report it firstly
to parents , school authorities and then to police.
10. Appropriate usage of social networks.
WHAT YOU SHOULD KNOW?
Digital footprints: are the records and traces individuals activities as they use the internet.
Digital footprints are permanently stored.
Privacy settings: always set-up privacy settings yourself by using account settings. You
can control: a)who can see what you posted b)who can send requests. C)what all information
about you is visible to others, even to your contacts etc.
DO- USAGE WHAT YOU SHOULD RULES
1) Be authentic: represent yourself in clear and honest way, without boasting.
2) Use a disclaimer: share your personal views about something, do make it clear that these
are your personal views and you do not represent any institution here.
3) Don’t pick fights online: sometimes people may respond your post in bad way.it is advised
that not to pick fights online.
11. Online access and computer security
THREADS TO COMPUTER SECURITY
1) COMPUTER VIRUSES: are the malicious codes/programs that cause damage to data
and files on a system. There are similar programs that cause virus like affects: worms and
Trojan horses.
Damages caused by viruses: a)damage or delete files. b)slow down your computers.
c)invade your email program.
2) SPYWARE: is a software which is installed on your computer to spy on your activities
and report this data to people willing to pay for it.
Damages caused by spyware: a)compromises your data, computing habits, and
identity. b) alters PC settings c) slows down your PC
12. 3)Adware: This are the program that deliver unwanted ads to your computer .they consume your network bandwidth.
DAMAGE CAUSED BY ADWARE :a)Adware tracks information just like spyware b)Displays arrays of annoying
advertising c)slows down your PC
4)Spamming: refers to the sending of bulk mail by an identified or unidentified source. In non malicious form bulk
advertising mail is sent to many account.
DAMAGE CAUSED BY SPAMMING: a)spam reduces productivity b)spam eats up your time c)spam can lead to
worse things.
5)Intrusion: every pc connected to the internet is a potential target for hackers. Pc intrusion can occur in any of the
following form:
a) Sweeper attack b)denial of services c)password guessing.
6)Eavesdropping: unauthorized, monitoring of other people’s communications is called eavesdropping.
7)Phishing and pharming: in phishing, an imposter uses an authentic looking email or web site to trick recipients
into giving out sensitive personal information.in pharming, an attacks in which a hacker attempts to redirect a websites
traffic to another, bogus website.
8)Cookies: includes a)session data b)tracking information c)public computers.
13. Solutions to viruses, adware and spyware.
There are two types of solutions:
A)active protection b)preventive measures
Solutions to viruses ,adware and spyware.
Active protection: a)use anti-virus and anti-spyware software.
b)Download updates regularly. C)run frequent full-system scans.
Preventative measures: a)keep your system up-to-date.
b)Use caution when downloading files on the internet. C)be careful with email.
D)disable cookies, if possible.
14. Solutions to spam, eavesdropping
Active protection: a)use anti-spam software.it includes:
1)Sender filtering: this method allows only messages from your approved sender list to
reach your inbox. sender filtering is done on the basis of digital certificates and digital
signatures.
2)Keyword filtering: this method filters out email messages that contain certain
keywords or phrases, which are defined by you or others.
preventive measures: a) keep your email address private.
1)Always avoid conducting online transactions or using online banking services on
public networks or public internet facilities.
2)Install personal firewall on computers connected to the internet so as keep a check
on incoming and outgoing information and connections.
3)Install personal firewall on computers connected to the internet.
15. Solutions to PC intrusion.
Active protection: a) Authorization: asking the user a legal
login-id performs authorization. b) Authentication: is also termed
as password-protection as the authorized user is asked to provide
a valid password. c) firewall: a system designed to prevent
unauthorized access to form a private network is called firewall.
Preventive measures: a)use proper file access permissions
when sharing files on the internet-file access permissions refer to
privileges that allow a user to read, write or execute a file. File
permissions are given for three sets of users: owner, group and
others.
b)disconnect from the internet when away:
16. Solutions to phishing and pharming.
Active protection: a)take the computer offline. b)backup all files on the
hand drive. C) list the information given to phishing scammers. D) run anti-
virus software. E)contact credit agencies to report any possibilities of
identity scammers.
Preventive measures: a) don’t open emails from unknown sources or
click on links embedded in suspect messages.
b)check the security guidelines of websites such as pay pal so that you can
distinguish between legitimate and bogus emails.
c) also, rather than on clicking on the link embedded in an email , you can
type the general link in your web browser
d) Most important, when in doubt, do not click.
17. firewall-an important solution for
computer security.
An internet firewall is a device or software that is designed to protect your
computer data and viruses that you do not want.
A firewall is a network security system, either hardware or software –based,
that controls incoming and outgoing network traffic based on a set of
rules.
Firewalls can be implemented in two forms:
Software firewall.
Hardware firewall.
18. What is software firewall and hardware firewall?
Software firewall:
A software firewall is a special type of computer software running on a computer.it
protects your computer from outside attempts to control or gain access, and
depending on your choice of software firewall, it could also provide protection against
the most common Trojan programs or email worms.
Hardware firewall:
It is physical piece of equipment designed to perform firewall duties. Firewall keep out
malevolent hackers and people who intended to do damage and take over other
peoples servers