3
Most read
4
Most read
8
Most read
CYBER PRIVACY &
PASSWORD PROTECTION
Online Assignment Submitted to
UNIVERSITY OF KERALA
In partial fulfilment of the requirements for the degree of Bachelor in Education
(EDU 03 - Technology and Communication in Education)
By
NIKHIL D.
Reg. No. 182203020013
S1. B.Ed. Physical Science
MAR THEOPHILUS TRAINING COLLEGE
Mar Ivanios Vidya Nagar, Nalanchira, Thiruvananthapuram
2020-2022
Cyber Privacy and Password Protection
Online Assignment
EDU 03: Technology and Communication in Education
Submitted By : Nikhil D
Reg. No. 18220302013
S1. B.Ed. Physical Science
Mar Theophilus Training College,
Trivandrum
Submitter To : Dr. Joju John
Assistant Professor
Mar Theophilus Training College
Trivandrum
Date of Submission : 10-02-2021
Cyber Privacy and Password Protection | Nikhil D.
1
Cyber Privacy and Password Protection
Introduction
Digital tools generate digital concerns. The ease with which digital tools can be used to
find, create, manipulate, and share information can be a boon to teaching and learning.
However, these same tools can be used to quickly and easily copy other people’s work, capture
inappropriate or unwanted images, or spread sensitive information across the globe.
Our civilisation has progressed through ages breaking all geographical barriers and the
most notable addition to the human civilization, in recent years, is the Internet, bringing the
whole world closer and turning it into a 'global village'. But this 'closest global village', the
cyberspace, is now a space with new risks, which challenge the very essence of individual
privacy.
Cyber Privacy
It is the level of privacy protection for an individual while has connected to the Internet.
It covers the amount of online security available for personal and financial data,
communications, and preferences.
The new technologies have enhanced the possibilities of invasion into the privacy of
individuals and provided new tools in the hands of eavesdroppers. Individual privacy is at a
greater stake than ever before.
Cyber-Privacy is a huge concern for civilians and especially for companies because of
the potential for crime. Such crimes includes Malware such as the use of malicious code which
can compromise a user's identity and/or information Denial of Service Attacks Block a user
from accessing his or her information. Computer Viruses can compromise user information as
well as identity. All of these crimes fall under the category or fraud, identity theft, phishing
scams and or information warfare.
Cyber Privacy and Password Protection | Nikhil D.
2
Cyber Privacy Hazards
The cyber world and its related crimes have no territorial barriers, and this makes
everything complex because evidence is very hard to come by. With the privacy issue at centre
stage, cookies, spamming, data mining, and hacking - are important areas of discussion where
insecurity from the technological front arises.
Cookies: - A cookie is information that a website puts on one's hard disk so that it can
remember something about him at a later time. Typically, a cookie records your preferences
when using a particular site. Cookies can be used to track people to gain statistics as they go
through the website. Because every time we visit a Web site, we leave a footprint of personal
information about ourselves like our preferences.
Web Bugs:- A Web bug, also known as a Web beacon, is a file object (usually a graphic image
such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor
user behaviour, functioning as a kind of spyware. A Web bug can send several pieces of
information to the server computer, and those includes, the IP address of the computer that
fetched the Web bug.
Hacking: - Hacking is an ‘unauthorised Access’ to a computer and refers to access to the whole
or any part of a computer system without permission. Hackers worldwide attempt to hack into
remote computer systems for multiple purposes like eavesdropping, data theft, fraud,
destruction of data, causing damage to computer systems, or for mere pleasure or personal
satisfaction.
One example of a hacking software is a Trojan horse program, in which malicious or
harmful code is contained inside apparently harmless programming or data in such a way that
it can get control and do its chosen form of damage, such as ruining the file allocation table on
a hard disk.
Spamming: - Spamming is another area of concern where cyber privacy is at stake. It the use
of messaging systems to send an unsolicited message to a large numbers of recipients for the
purpose of commercial advertising or for any prohibited purpose (like phishing)
Data Mining: - Data mining is the latest big business in the information. It is defined as a
process used to extract usable data from a larger set of any raw data. It implies analysing data
patterns in large batches of data using one or more software. Data mining has applications in
multiple fields, like science and research.
Cyber Privacy and Password Protection | Nikhil D.
3
Cyber Security
Cyber Security is the privacy and security level for the personal data published via the
internet. It is a broad term that refers to a variety of factors, techniques and technologies used
to protect sensitive and private data, communications and preferences.
Protecting one's privacy means protection of right to control how personal information
is collected and promulgated. Protection of privacy also includes protection against identify
theft, or the use of an individual's personal information for fraudulent purposes.
Firewalls assist in blocking dangerous programs, viruses or spyware before they
infiltrate your system. Also, nowadays, several search engines are accompanied by cyber
security plugins. The HTTPS (Hyper Text Transfer Protocol Secure) protects personal and
financial data (Credit/debit cards details, OTPs) from fraudsters. Also, several other plugins
like, disconnect, blur etc. associated with Mozilla based browsers, Opera, Safari enhances the
protection of the private and personal information’s.
VPN (Virtual Private Network)
A Virtual Private Network is a way to create a secure tunnel between browsers and web
servers. Data packets are encrypted before they are sent to a destination server, which also
results in IP addresses and your location becoming hidden. VPN can also be used to change
the Geo-location of the user. VPNs are not a silver bullet for security; far from it, but they can
help mask your online presence. It is worth noting, however, that VPN usage is banned in some
countries.
Cyber Privacy and Password Protection | Nikhil D.
4
Password Protection
Password protection is a security process that protects information accessible via
computers that needs to be protected from certain users. Password protection allows only those
with an authorized password to gain access to certain information. Passwords are used
commonly to gain entry to networks and into various Internet accounts in order to authenticate
the user accessing the website.
Usage of alphanumeric and special character combination in password creations
provides more security the e-contents while using like this, disables the possibility of
replications and unauthorised entries.
Two-factor authentication (2FA), also known as two-step verification, is a widely-
implemented method of adding an extra layer of security to your accounts and services after
you have submitted a password.
The most common methods are via an SMS message, a biometric marker such as a
fingerprint or iris scan, a PIN number, pattern etc. Using 2FA creates an additional step to
access your accounts and data, can help protect your accounts and Information.
In modern devices, along with patterns, password, Biometric authentication options like
face recognition, iris scanning, and fingerprints were found.
Cyber Privacy and Password Protection | Nikhil D.
5
HOW TO CREATE A STRONG PASSWORD
1. Think them, as essentials
2. Use a password manager.
A good password manager creates strong, unique passwords for all of your accounts.
That means, if one of your passwords does get caught up in a data breach, criminals won't have
the keys to the rest of your online services.
3. Go long.
Despite what all those prompts for unique characters and uppercase letters might have
you believe, length matters more than complexity. Once you get into the 12-15 character range,
it becomes way harder for a hacker to brute force, much less guess, your password.
Eg."g0be@r$"
4. Keep them separated.
If you want to deploy special characters against a password manager lots of input fields
will force you to bunch them all together at the beginning or end. That’s what everyone else
does, which means that’s hackers are looking for. Instead, space them out throughout your
password to make the guesswork extra tricky.
5. Single-serve only.
Don’t reuse passwords across different accounts.
6. Don’t trust your browser.
Usually we let our browser to remember all those passwords, or getting a paid password
manager.
7. Add two-factor authentication
Two-factor authentication, or 2FA, is a method of verifying your identity that adds a
second layer of security to your account password like a PIN number, password, or pattern an
ATM or credit card, mobile phone, or security token. It combines your physical card and your
PIN a biometric form of authentication, such as your fingerprint, your voice, or your face
8. Do not use personal information
• Don’t use your name or names of family members or pets in your passwords.
• Don’t use numbers like your address, phone number, or birthdays, either.
Cyber Privacy and Password Protection | Nikhil D.
6
9. Do not use real words
Password cracking tools help attackers to guess password. These programs can process
every word in the dictionary, plus letter and number combinations, until a match is found. So
don’t use clear, real words from the dictionary or proper nouns or names. Instead, use special
characters by combining uppercase and lowercase letters with numbers and special characters,
such as “&” or “$,” you can increase the complexity of your password and help decrease the
chances of someone potentially hacking into your account.
10. Don’t write them down
11. Change passwords on a regular basis
12. Never enter your password on another person’s computer.
13. When using your devices on public Wi-Fi, you should avoid visiting websites that require
you to log in to your account, such as online banking or shopping.
When you’re on an unsecured public network, your unencrypted data could be
intercepted by a nearby hacker. To protect yourself from these threats, you should always use
a virtual private network (VPN), like Norton Secure VPN, when on a public Wi-Fi connection.
Cyber Privacy and Password Protection | Nikhil D.
7
Conclusion
As "cyberspace" has become central to the global information and communication
infrastructure, the security of cyberspace has now become a more urgent priority for
corporations and governments around the world. At the same time, the online environment has
increasingly been subjected to sophisticated and targeted threats; our ever-increasing reliance
on cyberspace is creating new and significant vulnerabilities. Privacy protection and cyber
security should be thought of as interconnected: as more and more personal information is
processed or stored online, privacy protection increasingly relies on effective cyber security
implementation by organizations to secure personal data both when it is in transit and at rest.
Strategies should include a comprehensive compliance process, management of internal
privacy, employee training and awareness, self-regulatory efforts, corporate interface with
privacy awareness organisations, litigation support and alternative dispute resolution.
Furthermore, every e-organization's privacy practices should be bench marked against national
and international standards for privacy and fair information practices to meet the emerging
challenges.
It is not impossible to protect yourself from the malicious content on the internet, but it
does take some time and effort. Reading privacy policies, checking privacy settings, and
keeping an eye on what content comes up in search engines about you. The best protection is
not allowing anything at all, but limiting the amount of information you share, or using only
one credit card for example will provide better control if anything does go wrong. Privacy is
not dead, but you do have to bury your head in the ground to stay safe.
Cyber Privacy and Password Protection | Nikhil D.
8
Reference
[1] Katherine S. Cennamo, John D. Ross, Peggy A. Ertmer, Techonology Integration for
Meaningful Classroom, Wadsworth, USA, 2010
[2] http://14.139.60.114:8080/jspui/bitstream/123456789/722/14/Cyber%20Privacy.pdf
dated 08-02-2021
[3] https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-
hackers-spies-and-the-government/
dated 08-02-2021
[4] https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-
research/2014/cs_201412/
dated 08-02-2021
[5] https://www.slideshare.net/bavijesh/cyber-law-and-password-protection
dated 08-02-2021
[6] https://economictimes.indiatimes.com/definition/data-mining
dated 08-02-2021
[7] https://en.wikipedia.org/wiki/Spamming
dated 08-02-2021
[8] https://legalbeagle.com/7640133-legal-ethical-issues-technology.html
dated 08-02-2021

More Related Content

PPTX
Grade 7 Chap 10 Cyber Threats and Security
PPTX
Cyber Security for 5th and 6th Graders
PPT
Cyber Ethics
PPT
cyber ethics
PPTX
Cyber ethics
PPTX
Cyber ethics(CBSE Class X), Computer Application
PPTX
An Introduction to Cyber Ethics
PPTX
Cyber Security for Teenagers/Students
Grade 7 Chap 10 Cyber Threats and Security
Cyber Security for 5th and 6th Graders
Cyber Ethics
cyber ethics
Cyber ethics
Cyber ethics(CBSE Class X), Computer Application
An Introduction to Cyber Ethics
Cyber Security for Teenagers/Students

What's hot (20)

PPTX
Cyber privacy and password protection
PPTX
Role of teacher in giving guidelines for the proper use of internet
PDF
Misuse of internet
PPTX
Interactive Whiteboards Presentation
PPTX
Educational blogs
DOCX
EDU0.3.Computer managed instruction
PPTX
E content
PPTX
CONCEPT AND IMPORTANCE OF ICT IN EDUCATION.pptx
PPTX
It@school
PPTX
Year plan
PPTX
Correlation in physical science
PDF
Role of education to curb social evils like corruption, terrorism,anti nation...
PPTX
Hardware software approach of Educational Technology
PPTX
Role of education to Curb-Drug abuse and Alcoholism.pptx
PPTX
Multi Sensory Approach in Education Technology
PDF
B.ed syllabus 3.7. 2019
PPTX
PPT
Cyber law and password protection
PPTX
3.b.ed class-scope of ict
PPTX
Year plan
Cyber privacy and password protection
Role of teacher in giving guidelines for the proper use of internet
Misuse of internet
Interactive Whiteboards Presentation
Educational blogs
EDU0.3.Computer managed instruction
E content
CONCEPT AND IMPORTANCE OF ICT IN EDUCATION.pptx
It@school
Year plan
Correlation in physical science
Role of education to curb social evils like corruption, terrorism,anti nation...
Hardware software approach of Educational Technology
Role of education to Curb-Drug abuse and Alcoholism.pptx
Multi Sensory Approach in Education Technology
B.ed syllabus 3.7. 2019
Cyber law and password protection
3.b.ed class-scope of ict
Year plan
Ad

Similar to Cyber Privacy & Password Protection (20)

PDF
EDU 01SEMINAR.pdf
PPTX
Online privacy & security
PPTX
SAFETY, SECURITY AND ETHICS.ppttttttxxxx
PPTX
Understanding Internet and Cyber Security Presentation .pptx
PDF
Computer security
PPTX
INTERNET PRIVACY
PPT
Unit-4 Cybercrimes-II Mobile and Wireless Devices.ppt
PDF
Be Cyber Smart! (DLH 10/25/2019)
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PPTX
LEARNING OUTCOME 5Apply cybersecurity skills.pptx
PPTX
Introduction to intelligence cybersecurity_2
PPTX
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
PPT
CyberSecurity.ppt
PPT
Security Training 2008
PPTX
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
PDF
Steps and Tips to Protect Yourself and your Private Information while Online....
PPTX
Internet Threats
PPTX
TheCyberThreatAndYou2_deck.pptx
PPTX
Computer / Internet Security WHPL
PDF
Edu 3 arya. s 24 Cyber privacy
EDU 01SEMINAR.pdf
Online privacy & security
SAFETY, SECURITY AND ETHICS.ppttttttxxxx
Understanding Internet and Cyber Security Presentation .pptx
Computer security
INTERNET PRIVACY
Unit-4 Cybercrimes-II Mobile and Wireless Devices.ppt
Be Cyber Smart! (DLH 10/25/2019)
Cyber Security and Data Privacy in Information Systems.pptx
LEARNING OUTCOME 5Apply cybersecurity skills.pptx
Introduction to intelligence cybersecurity_2
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
CyberSecurity.ppt
Security Training 2008
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
Steps and Tips to Protect Yourself and your Private Information while Online....
Internet Threats
TheCyberThreatAndYou2_deck.pptx
Computer / Internet Security WHPL
Edu 3 arya. s 24 Cyber privacy
Ad

Recently uploaded (20)

PPTX
Designing Adaptive Learning Paths in Virtual Learning Environments
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PDF
Hospital Case Study .architecture design
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
PDF
Compact First Student's Book Cambridge Official
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PPT
hemostasis and its significance, physiology
PPTX
Q2 Week 1.pptx Lesson on Kahalagahan ng Pamilya sa Edukasyon
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
African Communication Research: A review
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PPTX
IT infrastructure and emerging technologies
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
Designing Adaptive Learning Paths in Virtual Learning Environments
UNIT_2-__LIPIDS[1].pptx.................
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
Hospital Case Study .architecture design
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
Compact First Student's Book Cambridge Official
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
hemostasis and its significance, physiology
Q2 Week 1.pptx Lesson on Kahalagahan ng Pamilya sa Edukasyon
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
The TKT Course. Modules 1, 2, 3.for self study
African Communication Research: A review
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Power Point PR B.Inggris 12 Ed. 2019.pptx
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
IT infrastructure and emerging technologies
faiz-khans about Radiotherapy Physics-02.pdf
Diabetes Mellitus , types , clinical picture, investigation and managment
PLASMA AND ITS CONSTITUENTS 123.pptx

Cyber Privacy & Password Protection

  • 1. CYBER PRIVACY & PASSWORD PROTECTION Online Assignment Submitted to UNIVERSITY OF KERALA In partial fulfilment of the requirements for the degree of Bachelor in Education (EDU 03 - Technology and Communication in Education) By NIKHIL D. Reg. No. 182203020013 S1. B.Ed. Physical Science MAR THEOPHILUS TRAINING COLLEGE Mar Ivanios Vidya Nagar, Nalanchira, Thiruvananthapuram 2020-2022
  • 2. Cyber Privacy and Password Protection Online Assignment EDU 03: Technology and Communication in Education Submitted By : Nikhil D Reg. No. 18220302013 S1. B.Ed. Physical Science Mar Theophilus Training College, Trivandrum Submitter To : Dr. Joju John Assistant Professor Mar Theophilus Training College Trivandrum Date of Submission : 10-02-2021
  • 3. Cyber Privacy and Password Protection | Nikhil D. 1 Cyber Privacy and Password Protection Introduction Digital tools generate digital concerns. The ease with which digital tools can be used to find, create, manipulate, and share information can be a boon to teaching and learning. However, these same tools can be used to quickly and easily copy other people’s work, capture inappropriate or unwanted images, or spread sensitive information across the globe. Our civilisation has progressed through ages breaking all geographical barriers and the most notable addition to the human civilization, in recent years, is the Internet, bringing the whole world closer and turning it into a 'global village'. But this 'closest global village', the cyberspace, is now a space with new risks, which challenge the very essence of individual privacy. Cyber Privacy It is the level of privacy protection for an individual while has connected to the Internet. It covers the amount of online security available for personal and financial data, communications, and preferences. The new technologies have enhanced the possibilities of invasion into the privacy of individuals and provided new tools in the hands of eavesdroppers. Individual privacy is at a greater stake than ever before. Cyber-Privacy is a huge concern for civilians and especially for companies because of the potential for crime. Such crimes includes Malware such as the use of malicious code which can compromise a user's identity and/or information Denial of Service Attacks Block a user from accessing his or her information. Computer Viruses can compromise user information as well as identity. All of these crimes fall under the category or fraud, identity theft, phishing scams and or information warfare.
  • 4. Cyber Privacy and Password Protection | Nikhil D. 2 Cyber Privacy Hazards The cyber world and its related crimes have no territorial barriers, and this makes everything complex because evidence is very hard to come by. With the privacy issue at centre stage, cookies, spamming, data mining, and hacking - are important areas of discussion where insecurity from the technological front arises. Cookies: - A cookie is information that a website puts on one's hard disk so that it can remember something about him at a later time. Typically, a cookie records your preferences when using a particular site. Cookies can be used to track people to gain statistics as they go through the website. Because every time we visit a Web site, we leave a footprint of personal information about ourselves like our preferences. Web Bugs:- A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behaviour, functioning as a kind of spyware. A Web bug can send several pieces of information to the server computer, and those includes, the IP address of the computer that fetched the Web bug. Hacking: - Hacking is an ‘unauthorised Access’ to a computer and refers to access to the whole or any part of a computer system without permission. Hackers worldwide attempt to hack into remote computer systems for multiple purposes like eavesdropping, data theft, fraud, destruction of data, causing damage to computer systems, or for mere pleasure or personal satisfaction. One example of a hacking software is a Trojan horse program, in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on a hard disk. Spamming: - Spamming is another area of concern where cyber privacy is at stake. It the use of messaging systems to send an unsolicited message to a large numbers of recipients for the purpose of commercial advertising or for any prohibited purpose (like phishing) Data Mining: - Data mining is the latest big business in the information. It is defined as a process used to extract usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software. Data mining has applications in multiple fields, like science and research.
  • 5. Cyber Privacy and Password Protection | Nikhil D. 3 Cyber Security Cyber Security is the privacy and security level for the personal data published via the internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications and preferences. Protecting one's privacy means protection of right to control how personal information is collected and promulgated. Protection of privacy also includes protection against identify theft, or the use of an individual's personal information for fraudulent purposes. Firewalls assist in blocking dangerous programs, viruses or spyware before they infiltrate your system. Also, nowadays, several search engines are accompanied by cyber security plugins. The HTTPS (Hyper Text Transfer Protocol Secure) protects personal and financial data (Credit/debit cards details, OTPs) from fraudsters. Also, several other plugins like, disconnect, blur etc. associated with Mozilla based browsers, Opera, Safari enhances the protection of the private and personal information’s. VPN (Virtual Private Network) A Virtual Private Network is a way to create a secure tunnel between browsers and web servers. Data packets are encrypted before they are sent to a destination server, which also results in IP addresses and your location becoming hidden. VPN can also be used to change the Geo-location of the user. VPNs are not a silver bullet for security; far from it, but they can help mask your online presence. It is worth noting, however, that VPN usage is banned in some countries.
  • 6. Cyber Privacy and Password Protection | Nikhil D. 4 Password Protection Password protection is a security process that protects information accessible via computers that needs to be protected from certain users. Password protection allows only those with an authorized password to gain access to certain information. Passwords are used commonly to gain entry to networks and into various Internet accounts in order to authenticate the user accessing the website. Usage of alphanumeric and special character combination in password creations provides more security the e-contents while using like this, disables the possibility of replications and unauthorised entries. Two-factor authentication (2FA), also known as two-step verification, is a widely- implemented method of adding an extra layer of security to your accounts and services after you have submitted a password. The most common methods are via an SMS message, a biometric marker such as a fingerprint or iris scan, a PIN number, pattern etc. Using 2FA creates an additional step to access your accounts and data, can help protect your accounts and Information. In modern devices, along with patterns, password, Biometric authentication options like face recognition, iris scanning, and fingerprints were found.
  • 7. Cyber Privacy and Password Protection | Nikhil D. 5 HOW TO CREATE A STRONG PASSWORD 1. Think them, as essentials 2. Use a password manager. A good password manager creates strong, unique passwords for all of your accounts. That means, if one of your passwords does get caught up in a data breach, criminals won't have the keys to the rest of your online services. 3. Go long. Despite what all those prompts for unique characters and uppercase letters might have you believe, length matters more than complexity. Once you get into the 12-15 character range, it becomes way harder for a hacker to brute force, much less guess, your password. Eg."g0be@r$" 4. Keep them separated. If you want to deploy special characters against a password manager lots of input fields will force you to bunch them all together at the beginning or end. That’s what everyone else does, which means that’s hackers are looking for. Instead, space them out throughout your password to make the guesswork extra tricky. 5. Single-serve only. Don’t reuse passwords across different accounts. 6. Don’t trust your browser. Usually we let our browser to remember all those passwords, or getting a paid password manager. 7. Add two-factor authentication Two-factor authentication, or 2FA, is a method of verifying your identity that adds a second layer of security to your account password like a PIN number, password, or pattern an ATM or credit card, mobile phone, or security token. It combines your physical card and your PIN a biometric form of authentication, such as your fingerprint, your voice, or your face 8. Do not use personal information • Don’t use your name or names of family members or pets in your passwords. • Don’t use numbers like your address, phone number, or birthdays, either.
  • 8. Cyber Privacy and Password Protection | Nikhil D. 6 9. Do not use real words Password cracking tools help attackers to guess password. These programs can process every word in the dictionary, plus letter and number combinations, until a match is found. So don’t use clear, real words from the dictionary or proper nouns or names. Instead, use special characters by combining uppercase and lowercase letters with numbers and special characters, such as “&” or “$,” you can increase the complexity of your password and help decrease the chances of someone potentially hacking into your account. 10. Don’t write them down 11. Change passwords on a regular basis 12. Never enter your password on another person’s computer. 13. When using your devices on public Wi-Fi, you should avoid visiting websites that require you to log in to your account, such as online banking or shopping. When you’re on an unsecured public network, your unencrypted data could be intercepted by a nearby hacker. To protect yourself from these threats, you should always use a virtual private network (VPN), like Norton Secure VPN, when on a public Wi-Fi connection.
  • 9. Cyber Privacy and Password Protection | Nikhil D. 7 Conclusion As "cyberspace" has become central to the global information and communication infrastructure, the security of cyberspace has now become a more urgent priority for corporations and governments around the world. At the same time, the online environment has increasingly been subjected to sophisticated and targeted threats; our ever-increasing reliance on cyberspace is creating new and significant vulnerabilities. Privacy protection and cyber security should be thought of as interconnected: as more and more personal information is processed or stored online, privacy protection increasingly relies on effective cyber security implementation by organizations to secure personal data both when it is in transit and at rest. Strategies should include a comprehensive compliance process, management of internal privacy, employee training and awareness, self-regulatory efforts, corporate interface with privacy awareness organisations, litigation support and alternative dispute resolution. Furthermore, every e-organization's privacy practices should be bench marked against national and international standards for privacy and fair information practices to meet the emerging challenges. It is not impossible to protect yourself from the malicious content on the internet, but it does take some time and effort. Reading privacy policies, checking privacy settings, and keeping an eye on what content comes up in search engines about you. The best protection is not allowing anything at all, but limiting the amount of information you share, or using only one credit card for example will provide better control if anything does go wrong. Privacy is not dead, but you do have to bury your head in the ground to stay safe.
  • 10. Cyber Privacy and Password Protection | Nikhil D. 8 Reference [1] Katherine S. Cennamo, John D. Ross, Peggy A. Ertmer, Techonology Integration for Meaningful Classroom, Wadsworth, USA, 2010 [2] http://14.139.60.114:8080/jspui/bitstream/123456789/722/14/Cyber%20Privacy.pdf dated 08-02-2021 [3] https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from- hackers-spies-and-the-government/ dated 08-02-2021 [4] https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy- research/2014/cs_201412/ dated 08-02-2021 [5] https://www.slideshare.net/bavijesh/cyber-law-and-password-protection dated 08-02-2021 [6] https://economictimes.indiatimes.com/definition/data-mining dated 08-02-2021 [7] https://en.wikipedia.org/wiki/Spamming dated 08-02-2021 [8] https://legalbeagle.com/7640133-legal-ethical-issues-technology.html dated 08-02-2021