Chapter 15&16& 17 Cyber Safety,Online Access and Computer Security & Social Law n ethics(Combined Notes)
Cyber Safety
Cyber safety refers to the safe and responsible use of internet to ensure safety and security of personal information.
Safe Browing Web
Safely browsing the web: Protecting yourself by securing your devices, software and connections is important, but making the
right choices when doing things on the web can make a huge difference to your safety online. There are potential risks involved
in doing
things online, but by making smart choices you can reduce that risk.
Identity Theft
Identity protection is a type of fraud that involves using someone else’s identity to steal money or gain other benefits. Online
identity theft refers to act of stealing someone’s personal information such as name ,login details etc. and then posting as that
person online.
With online identity theft happens one can gain access to other personal information(name,login,details,Adhar number,credit
card information etc) and use this information for illegal activities such as harassing others or stalking others or conducting
cybercrimes etc.
Social networks: Social networking is playing a huge role in our life. Now a days businesses heavily rely on social media for
their promotions and sale of their products. But on the other hand lot of frauds are being done using social media. Person
shouldn't accept any random request. There are lot of fake accounts on social media which might be hackers they might
intrude in your PC. Facebook , MySpace, Twitter, LinkedIn,Instagram etc the number of socialnetworking sites and tools is
exploding nowadays.These are becomings often tool to attack&target for scam.
Cyber Trolling: Trolling is internet slang for a person who intentionally starts arguments or upsets others by posting
saracastic,demeaning or insulting comments . The sole purpose of trolling is angering people. Purpose of trolling is To be a
source of entertainment for the troller, To be offensive and argumentative, To derive pleasure from annoying the hell out of
others. To get attention, To feel powerful, To gain recognition, To upset the victim.
Cyber bullying: Cyber bullying is online deliberate and repeated harm inflicted through using online tools such as the
Internet, email, instant messages, chat room ,social networking sites etc
Purpose
* To get revenge
* To feel empowered
*To gain popularity
* To harass and threaten
* To be offensive
* To humiliate
* To upset the victim
Appropriate use of social Network
1.Be honest about your identity and never pose as authorized person of an institution or organization.
2.Be Secure: While creating social media accounts make strong password using chracters-Aplhabets( capital n small)digits
and special characters .
3.Never use same password over multiple social media accounts.
4.Be careful while giving comments if you are associated to any organization or institutions(student,faculty or staff).Use
a disclaimer to make clear that these are your personal views and you donot represent any institution or organization.
5.Do not use fake names or never pretend to be someone else because modern tracking tools can easily track
anonymous posts n identity.
6.Never share you full name,parents’ details ,home address or telephone no online.The scam artist or identity thieves
keep looking for such things and can use your information to conduct some fraud or crime.
7.Respect always others privacy and be considerate for topics that may considered sensitive-such as politics and
religion.Never post anything that may compromise someone’s privacy or hurt someone’s sentiments.
Digital Footprint are the records and traces of individuals activities as they use the internet .Digital footprints are
permanently stored. Your interactions on social media ,your friend circle on social media sites,sites you visit,online
purchases,locations visited through facebook check ins etc all make up your digital footprints.
Computer Security Threats
Malware: Malware is unwanted software that infect the computer making it behave in a way ,which we do not
approve of. Malware could be computer viruses,worms,Trojan horses,spyware,and adware etc.
Computer virus: It is a small piece of software that can spread from one infected computer to another. It can
corrupt, or delete files on your computer/harddrive ,slow down the system etc
Worms: A worm is self replicating program which eats up the entire disk space or memory.A worm keeps on
creating its copies until all the disk space or memory is filled.
Trojan horse: It is a program that appears harmless (such text editor or utility program) but actually performs
malicious functions such as deleting or damaging file and even can do any thing from record your passwords by
logging keystrokes (known as a keylogger) to hijacking your webcam to watch and record your every move.
Adware:are programs that deliver unwanted ads to your computer(generally in Pop-Ups form).They consume
bandwidth.It get installed with your consent while installing softwares. so always read installation agreement
before you allow any installation of software.
Preventive measures of security threats(Malwares):
1.Use Antivirus to detect ,remove and stop intrusions.
2.Keep System up to date.
3.Download file from reputed websites by looking for sign such as a privacy statement, full contact information and
check padlock in the lower right corner in address bar of your website which you access.
4.Don’t download or open unsolicited email attachment.
5.Disable cookies if possible.
Secure connections: A secure connection is a connection that is encrypted by one or more security protocols to ensure
the security of data flowing between two or more nodes.Encrypted connections are made possible through protocols like
Hypertext Transfer Protocol Secure(HTTPS) and secure shell(SSH) and offer better security to data being transmitted.
Firewalls and anti-virus software may also serve in creating secure connections in some form.
Eavesdropping-Eavesdropping in a man in middle attack.It is a passive attack in which an attacker gains access to the
communication medium through which some communication is taking pace and the listens to the communication and
gets information about the content of the message.It can be carried out through all communication devices and media of
today-telephone systems, emails, instant messaging, other internet services(e.g) chat rooms, social networking websites,
mobile devices etc.
Phishing-Phishing are fraudulent attempts by cyber criminals to obtain private information. For e.g.a message prompt
your personal information by pretending that bank/mail service provider is updating its website.
There are various phishing techniques used by attackers:
• Embedding a link in an email to redirect to an unsecure website that requests sensitive information
• Installing a Trojan via a malicious email attachment
• Spoofing the sender’s address in an email to appear as a reputable source and request sensitive information
• Attempting to obtain information over the phone by impersonating a known company vendor
Intellectual Property (IP) – is a property created by a person or group of persons using their own intellect for ultimate
use in commerce and which is already not available in the public domain. Examples of IP Property which are, an
invention relating to a product or any process, a new design, a literary or artistic work and a trademark (a word, a
symbol and / or a logo, etc.),
Intellectual Property Right (IPR) is the statutory right granted by the Government, to the owner(s) of the intellectual
property or applicant(s) of an intellectual property (IP) to exclude others from exploiting the IP commercially for a given
period of time, in lieu of the discloser of his/her IP in an IPR application.
In India, IPRs can be protected as per the act. Some of them are
1- The Patent Act, 1970,
2- The Designs Act, 2000,
3- The Trade Mark Act, 1999,
4- The Copyright Act, 1957,
5- Protection of Integrated Circuits Layout and Designs Act, 2000,
Plagiarism is “the act of presenting the words, ideas, images, sounds, or the creative expression of others as it is your
creation or your own.” Plagiarism is Academic theft!
Two Types of Plagiarism
• Intentional Plagiarism -Copying other’s work ,Borrowing/buying assignments , Cut , paste from electronic resources ,
Downloading essays/text from the Internet and presenting as our own work
• Unintentional Plagiarism -Not knowing how to acknowledge or incorporate sources of information through proper
paraphrasing, summarizing and quotation ,Careless copying or cutting and pasting from electronic databases ,Quoting
excessively , Failure to use our own “voice”.
How to avoid plagiarism
1: Use your own ideas
2: Cite the sources-When someone else's ideas are used, always acknowledge the sources and tell your reader WHERE THE
IDEAS ARE FROM.
3: Rewrite other's ideas in your own words
4: Take careful notes
5: Develop your writing skills
Cyber crime: Any crime that involves a computer and a network is called a “Computer Crime” or “Cyber Crime. Or in
other term ,it is a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool
to commit an offense (child pornography, hate crimes).
STEPS TO PROTECT YOURSELF AGAINST CYBER CRIME
1. Make sure your security software is current – and update it regularly.
2. Lock or log off your computer when you step away.
3. Go offline when you don’t need an internet connection.
4. Consider sharing less online.
5. Think twice about using public Wi-Fi.
6. When in doubt, don’t click.
Child pornography is considered to be any depiction of a minor or an individual who appears to be a minor who is
engaged in sexual or sexually related conduct. This includes pictures, videos, and computer-generated content. Even
altering an image or video so that it appears to be a minor can be considered child pornography.
Child pornography is a crime in India. IT Act, 2000 & Indian Penal Code, 1860 provides protection from child pornography.
The newly passed Information Technology Bill is set to make it illegal to not only create and transmit child pornography in
any electronic form, but even to browse it.
Cyber forensics is a way or an electronic discovery technique which is used to determine and reveal technical criminal
evidence. Various capabilities of cyber forensics are.
• Computer forensics
• Computer exams.
• Data analysis.
• Database study.
• Malware analysis.
• Mobile devices.
• Network analysis.
• Photography.
• Video analysis.
IT Act 2000
The Information Technology Act, 2000 provides legal recognition to the transaction done via an electronic exchange of
data and other electronic means of communication or electronic commerce transactions.Some of sections under it act
2000 are given below.