CYBER SAFETY
It is the safe and responsible use of
information & communication technology. It
is not only about keeping information safe &
Secure but also about being responsible with
that information.
In general, it means the collective mechanism
& process by which valuable information &
servives are protected from publication,
tampering, or an assortment of unauthorized
activities.
SAFELY BROWSING THE WEB
Protecting yourself by securing your devices, software and connections is
important but making the right choices when doing things on the web can make a
huge difference.
1. Before you start – update your software
2. Protect your web browser( let your browser will protect you)
3. Observe safe online behaviour
use strong unique password online
download files & application only from those websites that you trust.
pause and think before clicking on links in email, messages or social
networking
Beware of offers that seem too good to be true. Leave websites that ask
tor your personal or banking details
4. Online transaction handling :
check if the site is reputed and has a refund policy.
if it look suspicious, do not proceed.
malware can be delivered through malicious ads.
5. Cookies and security: they are small text files – left on your computer by
websites you have visited which let them ‘remember’ things about you.
6. Bookmark important sites: if there are sites you visit regularly, it is good idea to
bookmark them in you browser.
IDENTITY PROTECTION WHILE USING INTERNET
Identity theft is a type of fraud that involves using someone else’s identity to steal
money or gain other benefits. Online identity theft refers to an act of stealing
someone’s personal information such as name,login details, credit card details, etc.
WAYS TO TRACK YOUR IDENTITY
1. IP ADDRESS: it is a unique address of your device when you connect to the
internet. When you share your IP address on the network with other devices, a
website can determine your geographical location.
2. Cookies & tracking scripts: cookies as explained earlier, are small text files on
your computer storing small pieces of information related to your online
habit/text. 2 Types:
3. First Party Cookies: These are cookies that stores your login id, password and
autofill information, etc.
4. Third Party Cookies: cookies that websites store to know about your search
history and web browsing.
5. HTTP Referrer: it is an HTTP header field that identifies the address of the web
page from which the resources has been requested by the user.
6. Super Cookies: these are presistent cookies. They come back even after being
deleted. They store cookie data at multiple places.
7. User Agent: your browser also sends a user agent every time you connect to a
website. This tells websites about your browsers and operating system, providing
another piece of data that can be stored and used to target ads.
CONFIDENTIALITY OF INFORMATION
It is the term used to prevent disclosure of information to unauthorized individuals
or systems. Data should be kept secret. i.e only authorized users get access to
sensitive and protected data.
Maintained by observing the following practices:
1. Prevention by encrypting the data and by limiting the places where
it might appear.
2. Using firewall wherever possible.
3. Controlling browser settings to block tracking.
4. Taking care while posting on social media.
5. Ensuring safe sites while entering crucial information.
6. Ensuring that the address contains HTTPS and a padlock sign.
7. Browsing privately wherever possible.
8. Carefully handling emails.
9. Not giving sensitive information on wireless networks.
10. Avoiding use of public computers.
CYBER CRIME
Any criminal act that is facilitated by the use of electronic gadgets such as computer,
smartphone, laptop,etc. involving communication or information systems through
internet is referred to as CYBERCRIME.
Cyber Trolls: it is a person who starts quarrels or upsets people on the internet
by posting inflammatory digressive, extraneous or off-topic messages to an
online community. More often these cyber trolls end up an cyber bullies.
CyberBullying: it is an attack on an individual or a group through the use of
electronic means such as instant messaging and social media, email.
TYPES :
Doxing- publishing personal information about an individual for defaming
Harrassment: posting hurtful,vulgar messages online to someone.
Impersonation: creating false account & posting things to damage victims
image
Hacking the victim’s violence
Threatening to commit acts of violence
Stalking by means of call, messages, etc.
Threats of child pronography
Cyber Trolling:
CHILD PRONOGRAPHY
Child Pornography is publishing and transmitting obscene
material about children in electronic form. it has increased
due to easy access to the internet and easy availability of
online videos.
Safeguards for students:
1.Never share your address with people whom you do not know.
2.Never publish your personal information on public sites.
3. Do not open suspicious emails
4. Best safety option on Facebook is the “only friends” option.
Tips for parents:
1.Explain to your children the importance of keeping personal information private.
2. Inform them about identity theft and how they can prevent it.
3. Set some internet rules pertaining to websites a child is allowed to access.
4. Obtain identity theft program that protects your computer’s privacy.
Tips for educators:
1. Teach students the importance of keeping their personal information private.
2. Monitor the websites that students have access to.
3. Teach students the dangers of viruses and opening suspicious emails
Reporting cybercrime
In case of any cybercrime involving a child or a student is
detected, it should be brought to the notice of the parents
and school authorities and then reported to the police. The
procedures to be adopted are :
1. The local police station can be approached for filing
complaints which have designated cybercrime cells.
2. A complaint can also be registered by filing an E-FIR
which is very convenient. This facility is available in
many states.
3. Recently, ministry of Home Affairs has also launched a
website for online registration of crimes against women
and children and also cybercrimes.
CYBER FORENSICS
Cyber forensics is an electronic discovery technique used to
determine and reveal technical criminal evidence. It is
gaining traction as a visible way of interpreting evidence.
Capabilities of cyber forensics are:
1. Recover deleted files.
2. Determine what programs have been run.
3. Recover web pages
4. Recover chat logs
5. Determine file server used.
6. Discover a document’s hidden history.
7. Find malware and data collected.
8. Recover emails and users who read them.
9. Recover phone records and text messages from mobile.
10.Finds external devices attached.
APPROPRIATE USAGE OF SOCIAL MEDIA
Social networking sites can support
participation, collaboration and community
building and prove a useful resource for term
based projects. Some prominent social media
platforms are
1. Facebook
2. X
3. You Tube
4. LinkedIn
5. Blogging Sites
Rules to be following while working on social
networking sites
1. Don’t give or post any personal information.
2. Never give your password to anyone except your parents or
guardian
3. Privacy issues should be considered.
4. Delete any unwanted messages, inappropriate comments
5. Add only those people as friends to your page when you know in
real life
6. Share but with care
7. Privacy matters
8. Respect privacy of others
9. Keep everything updated
10. Be aware of spams
11. Cyberbullying and harrassment
12. Keep your friends close & strangers at arm’s length
13. Check your reaction to trolls.
Networking security Threats
Network security measures are needed to protect data during their
transmission and to generate that data transmissions are authentic.
Denial of Service (DoS) Attacks.
1.Denial of Access to Information.
2.Denial of Access to Application
3.Denial of Access to Resources
4.Denial of Access to a Website
Malware – is a file or code, typically delivered over a network that
infects, explores, steals
Viruses- a program that copy themselves through a computer/network
Worms-a self replicating program the exploit security
Trojans-malware disguised to be legitimated s/w .
Zombie Computers-
Spyware-collects information about the usage of infected computer.
Adware- type of malware that displays unwanted advertisement
INFORMATION TECHNOLOGY ACT,2000
The IT ACT 2000, is an act of the Indian parliament notified on 17
October 2000. The IT ACT contained 94 sections, divided into 13
chapters and 4 schedules.
SECTION OFFENCE PENALTY
67A Publishing images containing sexual acts. 7 years & ₹ 10,00,000
67B Publishing child porn or predating children 5 years & ₹ 10,00,000 - I
online. 7 years & ₹ 10,00,000- II
67C Failure to maintain records 3 years & ₹ 2,00,000
68 Failure / refusal to comply with orders 7 years or possible fine
69 Failure /refusal to decrypt data 3 years & ₹ 1,00,000
70 Securing access or attempting to secure 10 years and /or fine
access to a protected system
71 Misrepresentation 3 years & ₹ 1,00,000
UNIQUE ID’S AND BIOMETRICS
Biometric is the science and technology of measuring and analysing
biological data such as DNA,finger prints. Eye retina and irises, voice
patterns, facial patterns and hand measurements for authentication
purpose.
FINGERPRINTS FACIAL RECOGNITION IRIS DNA
5- 9 seconds Non invasive Low false Establishes
processing collection acceptance rates familial
time relationship
Commonly Currently used Difficult to Commonly used
used in for passports replicate in law
border and national ID enforcement
management document
Also used in Two second Highly unique /
law processing time impossible to
enforcement replicate
IMPACT OF TECHNOLOGY CHANGE ON SOCIETY
Technological factors represent conditions created by man that have a
profound influence on their lives. It is product of civilization
Technology & Technology & urbanization Technology & unemployment
industrialization
Traditional skills Change from agri to Problem of
declined cities unemployment
Good number of Develops town into Machine replace men
artisan have lost cities
their jobs
Process affected Move to industrial
the nature, area for jobs
character, growth
of economy
E WASTE & ENVIRONMENTAL DEGRADATION
All electronic waste contain diverse material such as lead, cadimum,
beryllium, mercury and brominated flame retardation.
To some extent, E-waste is responsible for degradation of our
environment. If the e-waste is not disposed of in proper manner, it can
be extremely harmful to humans, plants, animals and the environment
in the following ways:
1. Acidification of soil.
2. Air pollution
3. Pollution of ground water.
4. Lung cancer
5. DNA damage
6. Asthmatic bronchitis
7. Chronic damage to the brain
8. Land fills with lead and heavy metals
PRECAUTION - E WASTE
Upgrade your computer instead of replacing it.
Format all your personal information from your product before
discarding it.
Take out the batteries from your gadgets before getting rid of
them.
E WASTE DISPOSAL TECHNIQUE
Give your electronic waste to a certified e waste recycler.
Sell off your outdated technology
Donate your outdated technology
Visit civic institutions
Give back to your electronic companies or leave at drop off
points
Safeguard both the environment and your sensitive
information
GENDER & DISABILITY ISSUES WHILE TEACHING &
USING COMPUTERS
Clinical categories of cognitive disabilities include
autism & down’s syndrome. It involve deficits
including
1. Problem solving
2. Memory
3. Visual comprehension
4. Linguistic
5. Attention
6. Math comprehension
7. Reading
8. Verbal comprehension
BENEFITS THAT ACCESS TO ICTS TO OVERCOME
LEARNING DISABILITIES
Improved handwriting: standard word
processor contain built in tools for checking
grammar, spell check and predictive typing.
Multimedia: the use of multimedia such as
graphics, sound & video can stimulate and encourage
interaction & some degree of learning for people.
Sensory stimulation: the use of switches,
combined with specialized software games, can
enable some people with profound and multiple
learning difficulties to play basic cause and effect
games.