2. Cyber safety
Cyber safety refers to the safe and responsible use of internet to ensure safety
and security of personal information. It also includes not creating threat for
anyone else’s information.
Safely browsing the web
We can safely browse the web by keeping following
things in mind:
Try to avoid opening websites which are not secure
(without HTTPS).
Don’t provide your email, contact number , credit
card/debit card information , address and other such
information on websites/apps you are not fully sure
of.
Don’t download softwares or other files from every
website.
3. Identity theft
It is the process of stealing someone else’s identity to steal
money or gain other benefits. Identity theft may include using
name, photograph, email id or login details of someone else
without his/her consent.
4. Identity protection while using internet
There are two methods to protect identity on internet.
•Anonymous Browsing: Users can view websites without providing
any personal information like IP address and location of user.
•Private Browsing: There are different methods of private browsing.
Most common methods of private browsing are:
•Incognito Browsing: It opens web browser in such a way that it will
not track your activities on internet. Most of the modern web browsers
like Mozilla Firefox, Google Chrome provide this feature.
•Proxy: It is a computer on a network that acts as computer middle man
between your computer and the website. So your IP address and other
information is never shared. Information about Proxy is only shared.
•VPN (Virtual Private Network): It is a technique to add security
and privacy to your network. It never shares IP address, location and
other details of your computer.
5. Confidentiality of Information
• Internet is a public platform. The sites you visit, the products you search, the
posts that you put on social media are all visible to public.
• Confidentiality of information ensures that only authorized users get access to
sensitive and protected data
Practices to Ensure Confidentiality of Information:
1. Use Firewall wherever possible.
2. Control browser setting to block tracking
3. Browse privately wherever possible:
4. Be Careful while posting on Internet
5. Ensure Safe sites while entering crucial Information
6. Carefully handle emails
7. Do not give sensitive information on wireless networks
8. Avoid public computers
6. Cybercrime
Cybercrime is a crime that involves a computer and
a network. The computer may have been used to commit the
crime and in many cases, it is also the target. Cybercrime may
threaten a person or a nation’s security and financial health.
7. Cyber trolls & Cyber bullying
Cyber trolling is internet slang for a person who intentionally
starts arguments or upsets others by posting inflammatory
remarks. The sole purpose of trolling is angering people.
Purpose – to entertain, to argue, to upset victim, to get
attention
8. Cyber bullying: Saying and/or doing mean things to the person online. It is a
harm inflicted through using the Internet, ICT devices, Or mobile phones.
Purpose – to get revenge , To harass & threat, to humiliate
Cyber stalking: Doing research on every aspect of the person’s life.
Cyber harassment: Continuously contacting the person online, even though they
don’t want you to.
10. Spreading rumours: (fake information) using internet is a
cyber crime.
Online fraud-
Online fraud refers to fraudulent activities such as identity
theft and financial frauds that are committed by using the
Internet.
•Non-delivered goods
•Non-Existent companies
•Stealing information
•Fraudulent payments
11. Information theft
It is the process of stealing someone else's identity to steal money or
gain other benefits. Identity theft may include using name, photograph, email
id or login details of someone else without his/her consent.
Scams
A scam is a deceptive scheme or trick used to
cheat someone out of something, especially
money. Scam is also a verb meaning to cheat
someone in such a way. Example: Banks will
never call you asking for your credit card
number or social security number over the
phone.
12. Illegal downloads
Illegal downloading is a process of getting/downloading data(like
documents, images, videos, audio, etc.) that you are not allowed to use
on the internet. Or, in other words, illegal downloads are a way in which
user/users download files without having any legal right to download
them.
Child Pornography
child pornography, in criminal law, any visual depiction of a minor (a person
who has not reached the age of consent) engaging in sexually explicit activity.
In the federal criminal code of the United states, child pornography is partly
defined as “any photograph, film, video, picture, or computer or computer-
generated image” that depicts actual or simulated sexually explicit activity by
a minor—where, in the latter case, the simulation is indistinguishable from
actual sexually explicit activity.
13. Reporting Cyber Crime
• File complaint to the local police station
•Provisions are made for filing of ‘E-FIR’ in most of the states
•The Ministry of Home Affairs launched a website for registering crimes
against women and children
14. Various common social networking sites
Most popular social networking sites are :
Facebook: It is a platform where we can share posts. These
posts may contain text, pictures, videos and links to websites.
We can also view, like and post comment for posts of our
friends and groups.
Twitter: It is a microblogging websites to post small
messages with maximum limit of 280 characters.
Linkedin: It is platform where you can create resumes and
share work related information.
Instagram: It is a platform for sharing pictures and videos
15. Cyber Law
•Cyber law, also known as cybercrime law, is legislation focused on the acceptable
behavorial use of technology including computer hardware and software, the
internet, and networks.
•Cyber law helps protect users from harm by enabling the investigation and
prosecution of online criminal activity.
•It applies to the actions of individuals, groups, the public, government, and
private organizations.
Overview of Indian IT ACT
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is
an Act of the Indian Parliament notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce.
A major amendment was made in 2008 and now it is called the IT (Amendment)
Act 2008.
16. Social Media etiquettes
1. Be Authentic
2. Be secure
3. Be reliable
4. Don’t pick fights online
5. Don’t use fake names or pseudonyms
6. Protect your Identity
7. Respect your audience
8. Respect other’s Sentiments
9. Monitor Comments