Short Notes- Cyber Safety – NCERT – Class 9
Identity Protection:
◆Identity theft is a significant concern in the digital age. Cybercriminals may use stolen identities to commit fraud, access financial accounts, or engage in other illegal activities.
◆Protect your identity by being cautious about the information you share online. Avoid oversharing personal details on social media platforms or public forums.
◆Use privacy settings to limit who can view your profile and posts on social networks. Regularly review and adjust these settings to maintain control over your online presence.
◆Be skeptical of requests for personal information, especially from unknown sources or suspicious websites. Verify the legitimacy of requests before providing sensitive data.
◆Consider using pseudonyms or alternate email addresses for online accounts to minimize the risk of identity theft.
Proper Usage of Passwords:
◆Passwords are the first line of defense against unauthorized access to your accounts. Strong passwords are essential for protecting sensitive information and preventing unauthorized access.
◆Create unique, complex passwords for each online account. Avoid using easily guessable passwords such as “password” or “123456.”
◆Use a mix of uppercase and lowercase letters, numbers, and special characters in your passwords to increase their strength.
◆Avoid using personal information such as your name, birthdate, or common words as passwords. Cybercriminals may use automated tools to crack passwords based on known information.
◆Consider using a password manager to securely store and generate strong passwords for your accounts. Password managers can help you create and manage complex passwords without the need to memorize them.
Privacy and Confidentiality of Information:
◆Protecting your privacy online is essential for safeguarding sensitive information and maintaining control over your personal data.
◆Be mindful of the information you share online, including on social media platforms, forums, or public websites. Avoid posting sensitive information such as your address, phone number, or financial details.
◆Review and adjust privacy settings on social networks and online accounts to control who can view your profile, posts, and personal information.
◆Use encryption tools and secure communication methods to protect sensitive data from unauthorized access or interception. Encrypting emails, messages, and files can help ensure confidentiality and privacy.
◆Be cautious when sharing personal information with third-party websites or services. Read privacy policies and terms of service carefully to understand how your data will be used and protected.
Cyber Stalking:
◆Cyberstalking involves using electronic communications, such as email, social media, or online forums, to harass, intimidate, or threaten individuals.
◆Recognize the signs of cyberstalking, including receiving excessive or unwanted messages, threats, or harassment online. Cyberstalkers may also monitor your online activities or attempt to gather personal information about you.
◆Take steps to protect yourself from cyberstalking by blocking or unfriending individuals who engage in harassing behavior. Use privacy settings to control who can contact you or view your profile on social media platforms.
◆Keep evidence of cyberstalking incidents, including screenshots, emails, or messages, to document the behavior and report it to authorities if necessary. Report cyberstalking incidents to the appropriate authorities, such as law enforcement agencies or internet service providers.
Reporting Cybercrimes:
◆Reporting cybercrimes is essential for holding perpetrators accountable and preventing further harm to victims.
◆If you are a victim of cybercrime, such as identity theft, online harassment, fraud, or hacking, report the incident to the appropriate authorities immediately.
◆Use online reporting platforms provided by law enforcement agencies, government organizations, or internet service providers to report cybercrimes. Provide detailed information about the incident, including dates, times, and any evidence or documentation you have.
◆Work with law enforcement and other authorities to provide information and assistance in the investigation and prosecution of cybercriminals. Be prepared to provide additional evidence or testimony as needed to support the case.
Malware:
Viruses: Viruses are malicious programs that infect computer systems by attaching themselves to legitimate files or programs. They can spread through email attachments, infected websites, or removable storage devices. Once infected, viruses can damage files, steal sensitive information, or disrupt system operations.
Adware: Adware is software that displays unwanted advertisements or pop-up windows on a user’s computer. It often comes bundled with free software downloads and can be difficult to remove. Adware can slow down system performance, track user activities, and compromise privacy by displaying targeted ads based on browsing habits.
Spyware: Spyware is malicious software designed to secretly monitor and gather information about a user’s online activities. It can track web browsing history, capture keystrokes, and record login credentials without the user’s knowledge. Spyware can compromise privacy, security, and confidentiality by transmitting sensitive data to third parties.
Ransomware: Ransomware is a type of malware that encrypts files on a victim’s computer or network, rendering them inaccessible until a ransom is paid. Ransomware attacks often target businesses, government agencies, or individuals with valuable data. Victims may be asked to pay a ransom in cryptocurrency to decrypt their files and regain access to their systems.
Trojans: Trojans are malicious programs that masquerade as legitimate software or files to trick users into downloading and executing them. Once installed, Trojans can perform a variety of malicious actions, including stealing sensitive information, installing additional malware, or providing remote access to attackers. Trojans are often distributed through email attachments, fake software downloads, or compromised websites.
Worms: Worms are self-replicating malware that spread across computer networks by exploiting vulnerabilities in operating systems or network protocols. Unlike viruses, worms do not require user interaction to spread and can propagate rapidly across large networks. Worms can consume network bandwidth, overload servers, or launch distributed denial-of-service (DDoS) attacks.