Salient Features of India constitution especially power and functions
Cyber ethics cbse class xi
1.
2. INTRODUCTION
Cyberethics is the philosophic study of ethics pertaining to computers,
encompassing user behavior and what computers are programmed to do,
and how this affects individuals and society. For years, various governments
have enacted regulations while organizations have defined policies about
3.
4. TIPS TO SAFE BROWSING
1. Install and use antivirus software.
2. Use a firewall.
3. Strong passwords are your friend.
4. Update your security software.
5. Be wary of clicking links in email or instant messages.
6. In fact, be wary of clicking links, period.
7. Bookmark important sites.
9. WAYS ,WEBSITES TRACK YOU
IP Addresses
The most basic way of identifying you is by your IP
address. Your IP address identifies you on the
Internet. These days, it’s likely that your computer
shares an IP address with the other networked
devices in your house or office. From your IP
address, a website can determine your rough
geographical location – not down to street level, but
generally your city or area. If you’ve ever seen a
spammy ad that tries to look legitimate by
mentioning your location, this is how the ad does it.
10. WAYS ,WEBSITES TRACK YOU
HTTP Referrer
When you click a link, your browser loads the web page you clicked and tells the
website where you came from. For example, if you clicked a link to an outside
website on How-To Geek, the outside website would see the address of the
How-To Geek article you came from. This information is contained in the
HTTP referrer header.
The HTTP referrer is also sent when loading content on a web page. For
example, if a web page includes an ad or tracking script, your browsers tells
the advertiser or tracking network what page you’re viewing.
“Web bugs,” which are tiny, one-by-one pixel, invisible images, take advantage of
the HTTP referrer to track you without appearing on a web page. They’re also
used to track emails you open, assuming your email client loads images.
11. WAYS ,WEBSITES TRACK YOU
Cookies & Tracking Scripts
Cookies are small pieces of information websites
can store in your browser. They have plenty of
legitimate uses – for example, when you sign
into your online-banking website, a cookie
remembers your login information. When you
change a setting on a website, a cookie stores
that setting so it can persist across page loads
and sessions.
12. WAYS ,WEBSITES TRACK YOU
Super Cookies
You can clear your browser’s cookies — in fact, we’ve got a guide to clearing
your browser’s cookies. However, clearing your cookies isn’t necessarily a
solution – “super cookies” are increasingly common. One such super cookie
is evercookie. Super cookie solutions like evercookie store cookie data in
multiple places – for example, in Flash cookies, Silverlight storage, your
browsing history, and HTML5 local storage. One particularly clever tracking
method is assigning a unique color value to a few pixels every time a new
user visits a website. The different colors are stored in each user’s browser
cache and can be loaded back – the color value of the pixels is a unique
identifier that identifies the user.
When a website notices that you’ve deleted part of the super cookie, the
information is repopulated from the other location. For example, you might
clear your browser cookies and not your Flash cookies, so the website will
copy the value of the Flash cookie to your browser cookies. Super cookies
are very resilient.
13. WAYS ,WEBSITES TRACK YOU
User Agent
Your browser also sends a user agent every time you
connect to a website. This tells websites your
browser and operating system, providing another
piece of data that can be stored and used to target
ads. For more information about user agents, check
out our explanation of what a browser user agent
is.
14. WAYS ,WEBSITES TRACK YOU
Browser Fingerprinting
Browsers are actually pretty unique. Websites
can determine your operating system,
browser version, installed plug-ins and their
versions, your operating system’s screen
resolution, your installed fonts, your time
zone, and other information. If you’ve
disabled cookies entirely, that’s another
piece of data that makes your browser
unique.
15. WAYS ,WEBSITES TRACK YOU
There are surely other ways that
websites can track you. There’s big
money in it, and people are
brainstorming new ways to track
every day – just see evercookie
above for evidence of that.
16. HOW TYPES OF COMPUTER COOKIES AFFECT
YOUR ONLINE PRIVACY
First-party cookies are created by the host domain – the
domain the user is visiting. These types of cookies are
generally considered good; they help provide a better
user experience and keep the session open. This
basically means the browser is able to remember key
pieces of information, such as which items you add to
shopping carts, your username and passwords, and
language preferences.
First-party cookies are stored by the domain (website)
you are visiting directly. ...
17. HOW TYPES OF COMPUTER COOKIES AFFECT
YOUR ONLINE PRIVACY
Third-Party Cookies
Third-party cookies, also referred to as tracking cookies, collect
data based on your online behavior. When you visit a
website, third-party cookies collect various types of data that
are then passed on or sold to advertisers by the website that
created the cookie. Tracking your interests, location, age, and
search trends, these cookies collect information so that
marketers can provide you with custom
advertisements. These are the ads that appear on websites
you visit and display content relevant to your interests.
By tracking your habits and providing targeted ads, third-party
cookies serve a useful purpose for marketers but can seem
pesky and intrusive to internet users. That’s why you have
the option to block them.
18.
19. PRIVATE BROWSING OVERVIEW
As day by day the use of internet browsing
has been increasing, people are getting
aware about their privacy and protecting
personal information. No one wants to
disclose what sites they are browsing
and the local data associated with it,
which can be used to retrieve personal
sensitive information.
20. PRIVATE BROWSING
Private Browsing:
Private Browsing is a concept of disabling the browser’s history, removing
cookies and not storing the web cache.
Private Browsing doesn’t make you anonymous as your Internet Service Provider
(ISP) will still be able to track you. Also, it is a common myth that it will protect
user from keyloggers or spywares, but it will not.
21. 3 TIPS FOR ANONYMOUS BROWSING
1. Log out from search engines and their
tools
You might not be aware of it, but every time
you log into Gmail or Google’s other free
online tools, your searches are monitored,
and a profile is built specifically for you. This
Google the opportunity to target ads directly
related to your browsing experiences.
22. 2. Use your browser’s privacy mode
All major internet browsers feature optional privacy
modes. These restrict your browser from saving
your web history in its cache while
disabling tracking cookies. Although this is a minor
improvement, your Internet Service Provider, or
ISP, along with governments, can still track your
online activity – to be more specific, every single
website you’re visiting.
23. 3. Use a VPN to hide your IP address and online
presence
When using a VPN, you benefit from a range of
privacy benefits. You can change IP address, route
your Internet activity through a remote third-party
server, conceal your search activity, and make
your traffic completely anonymous so hackers and
governments who’d like to snoop into your online
activities can’t know your identity
24. 4)Proxy
Using a web Proxy server allows you to
access content that may be blocked or
restricted by local governments. You can
use one to gain access to these websites
and content. It also allows you to surf the
web more privately meaning what
your browsing (in that tab only) cannot
be tracked
25. PRACTICES TO ENSURE CONFIDENTIALITY OF
INFORMATION
Don't leave sensitive information lying around. Documents like credit card
statements and billing invoices, even if they redact some information, can still
be used to obtain sensitive data via social engineering.
Shred documents in a secure way. When you no longer need a document with
confidential information on it, don't throw it away. Shred it. Keep shredded
materials locked up and hire a company to securely transport them away or
use a cross shredder to make sure they cannot be reconstructed.
Use anti-virus software. Installing an anti-virus and an anti-malware solution
can prevent your computer from becoming infected and from infecting other
computers on your network.
Install a firewall. An effective firewall is a staple of business Internet security. It
prevents intrusions into your company's network and, in some cases, can
also stop a malware-infected machine from pushing data out.
Password-protect important files and systems. Any files or systems
containing sensitive information should be password protected. If possible,
each user should have his or her own username and password so if a breach
does occur, your company can pinpoint the source of the breach.
Don't reuse passwords. If a hacker is able to obtain one password, the odds are
good they'll try to use the same password to access other sensitive areas of
your company's infrastructure. Use different passwords for all files and
systems.
Don't email confidential material. Most email systems are not secure. If you
27. Cybercrime, or computer-oriented
crime, is a crime that involves a
computer and a network. The
computer may have been used in
the commission of a crime, or it
may be the target.
29. In Internet slang, a troll is a person
who starts quarrels or upsets
people on the Internet to distract
and sow discord by posting
inflammatory and digressive,
extraneous, or off-topic messages
in an
31. CYBER BULLYING
Cyberbullying or cyberharassment is a
form of bullying or harassment using
electronic means. Cyberbullying and
cyberharassment are also known as
online bullying. It has become
increasingly common, especially
among teenagers.
33. CYBER STALKING
Cyberstalking is the use of the
Internet or other electronic means
to stalk or harass an individual,
group, or organization. It may
include false accusations,
defamation, slander and
34.
35.
36. The laws for cyber crime protects
citizens from dispensing sensitive
information to a stranger online. Ever
since the introduction to cyber laws
in India happened, IT Act 2000 was
enacted and amended in 2008
covering different types
of crimes under cyber law in India
37.
38. If you want to report something other
than Cybercrime cases or in case of
an emergency please contact your
local police by dialing 100. Complaints
reported on this portal are dealt by
respective police authorities of States/
UTs based on the information in the
complaints provided by the
complainants.
40. COMMON SOCIAL NETWORK
Social Networking App Monthly Active Users
WhatsApp (owned
by Facebook)
1,500,000,000
Messenger (owned
by Facebook)
1,300,000,000
WeChat 989,000,000
Instagram (owned
by Facebook)
800,000,000
op Social Networking Apps
41.
42. Twitter is an online news and social networking site where
people communicate in short messages called tweets.
Tweeting is posting short messages for anyone who follows
you on Twitter, with the hope that your messages are useful
and interesting to someone in your audience
43. 280 characters
The most common length of a tweet back
when Twitter only allowed
140 characters was 34 characters. Now
that the limit is 280 characters, the most
common length of a tweet is
33 characters. Historically, only 9%
of tweets hit Twitter's 140-character
limit, now it's 1%.
44.
45.
46. LinkedIn is an American business and
employment-oriented service that operates
via websites and mobile apps. Founded on
December 28, 2002, and launched on May
5, 2003, it is mainly used for professional
networking, including employers posting
jobs and job seekers posting their CVs.
47.
48. Instagram is a social media app that
allows users to share photos and
videos from their lives, add captions,
edit filters, tweak settings, engage with
others, explore and creep, and so, so
much more — you just have to know
what you're doing so you don't get
overwhelmed!
50. Here are our top 10 tips to stay safe on social media:
Use a strong password. The longer it is, the more secure it will be.
Use a different password for each of your social media accounts.
Set up your security answers. This option is available for most social media
sites.
If you have social media apps on your phone, be sure to password protect your
device.
Be selective with friend requests. If you don’t know the person, don’t accept their
request. It could be a fake account.
Click links with caution. Social media accounts are regularly hacked. Look out
for language or content that does not sound like something your friend would
post.
Be careful about what you share. Don’t reveal sensitive personal information ie:
home address, financial information, phone number. The more you post the
easier it is to have your identity stolen.
Become familiar with the privacy policies of the social media channels you use
and customize your privacy settings to control who sees what.
Protect your computer by installing antivirus software to safeguard. Also ensure
that your browser, operating system, and software are kept up to date.
52. DIGITAL FOOTPRINTS
A digital footprint is a trail of data
you create while using the
Internet. It includes the websites
you visit, emails you send, and
information you submit to online
services. A "passive digital
footprint" is a data trail you
unintentionally leave online