SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
CYBER PRIVACY &
PASSWORD PROTECTION
Online Assignment Submitted to
UNIVERSITY OF KERALA
In partial fulfilment of the requirements for the degree of Bachelor in Education
(EDU 03 - Technology and Communication in Education)
By
NIKHIL D.
Reg. No. 182203020013
S1. B.Ed. Physical Science
MAR THEOPHILUS TRAINING COLLEGE
Mar Ivanios Vidya Nagar, Nalanchira, Thiruvananthapuram
2020-2022
Cyber Privacy and Password Protection
Online Assignment
EDU 03: Technology and Communication in Education
Submitted By : Nikhil D
Reg. No. 18220302013
S1. B.Ed. Physical Science
Mar Theophilus Training College,
Trivandrum
Submitter To : Dr. Joju John
Assistant Professor
Mar Theophilus Training College
Trivandrum
Date of Submission : 10-02-2021
Cyber Privacy and Password Protection | Nikhil D.
1
Cyber Privacy and Password Protection
Introduction
Digital tools generate digital concerns. The ease with which digital tools can be used to
find, create, manipulate, and share information can be a boon to teaching and learning.
However, these same tools can be used to quickly and easily copy other people’s work, capture
inappropriate or unwanted images, or spread sensitive information across the globe.
Our civilisation has progressed through ages breaking all geographical barriers and the
most notable addition to the human civilization, in recent years, is the Internet, bringing the
whole world closer and turning it into a 'global village'. But this 'closest global village', the
cyberspace, is now a space with new risks, which challenge the very essence of individual
privacy.
Cyber Privacy
It is the level of privacy protection for an individual while has connected to the Internet.
It covers the amount of online security available for personal and financial data,
communications, and preferences.
The new technologies have enhanced the possibilities of invasion into the privacy of
individuals and provided new tools in the hands of eavesdroppers. Individual privacy is at a
greater stake than ever before.
Cyber-Privacy is a huge concern for civilians and especially for companies because of
the potential for crime. Such crimes includes Malware such as the use of malicious code which
can compromise a user's identity and/or information Denial of Service Attacks Block a user
from accessing his or her information. Computer Viruses can compromise user information as
well as identity. All of these crimes fall under the category or fraud, identity theft, phishing
scams and or information warfare.
Cyber Privacy and Password Protection | Nikhil D.
2
Cyber Privacy Hazards
The cyber world and its related crimes have no territorial barriers, and this makes
everything complex because evidence is very hard to come by. With the privacy issue at centre
stage, cookies, spamming, data mining, and hacking - are important areas of discussion where
insecurity from the technological front arises.
Cookies: - A cookie is information that a website puts on one's hard disk so that it can
remember something about him at a later time. Typically, a cookie records your preferences
when using a particular site. Cookies can be used to track people to gain statistics as they go
through the website. Because every time we visit a Web site, we leave a footprint of personal
information about ourselves like our preferences.
Web Bugs:- A Web bug, also known as a Web beacon, is a file object (usually a graphic image
such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor
user behaviour, functioning as a kind of spyware. A Web bug can send several pieces of
information to the server computer, and those includes, the IP address of the computer that
fetched the Web bug.
Hacking: - Hacking is an ‘unauthorised Access’ to a computer and refers to access to the whole
or any part of a computer system without permission. Hackers worldwide attempt to hack into
remote computer systems for multiple purposes like eavesdropping, data theft, fraud,
destruction of data, causing damage to computer systems, or for mere pleasure or personal
satisfaction.
One example of a hacking software is a Trojan horse program, in which malicious or
harmful code is contained inside apparently harmless programming or data in such a way that
it can get control and do its chosen form of damage, such as ruining the file allocation table on
a hard disk.
Spamming: - Spamming is another area of concern where cyber privacy is at stake. It the use
of messaging systems to send an unsolicited message to a large numbers of recipients for the
purpose of commercial advertising or for any prohibited purpose (like phishing)
Data Mining: - Data mining is the latest big business in the information. It is defined as a
process used to extract usable data from a larger set of any raw data. It implies analysing data
patterns in large batches of data using one or more software. Data mining has applications in
multiple fields, like science and research.
Cyber Privacy and Password Protection | Nikhil D.
3
Cyber Security
Cyber Security is the privacy and security level for the personal data published via the
internet. It is a broad term that refers to a variety of factors, techniques and technologies used
to protect sensitive and private data, communications and preferences.
Protecting one's privacy means protection of right to control how personal information
is collected and promulgated. Protection of privacy also includes protection against identify
theft, or the use of an individual's personal information for fraudulent purposes.
Firewalls assist in blocking dangerous programs, viruses or spyware before they
infiltrate your system. Also, nowadays, several search engines are accompanied by cyber
security plugins. The HTTPS (Hyper Text Transfer Protocol Secure) protects personal and
financial data (Credit/debit cards details, OTPs) from fraudsters. Also, several other plugins
like, disconnect, blur etc. associated with Mozilla based browsers, Opera, Safari enhances the
protection of the private and personal information’s.
VPN (Virtual Private Network)
A Virtual Private Network is a way to create a secure tunnel between browsers and web
servers. Data packets are encrypted before they are sent to a destination server, which also
results in IP addresses and your location becoming hidden. VPN can also be used to change
the Geo-location of the user. VPNs are not a silver bullet for security; far from it, but they can
help mask your online presence. It is worth noting, however, that VPN usage is banned in some
countries.
Cyber Privacy and Password Protection | Nikhil D.
4
Password Protection
Password protection is a security process that protects information accessible via
computers that needs to be protected from certain users. Password protection allows only those
with an authorized password to gain access to certain information. Passwords are used
commonly to gain entry to networks and into various Internet accounts in order to authenticate
the user accessing the website.
Usage of alphanumeric and special character combination in password creations
provides more security the e-contents while using like this, disables the possibility of
replications and unauthorised entries.
Two-factor authentication (2FA), also known as two-step verification, is a widely-
implemented method of adding an extra layer of security to your accounts and services after
you have submitted a password.
The most common methods are via an SMS message, a biometric marker such as a
fingerprint or iris scan, a PIN number, pattern etc. Using 2FA creates an additional step to
access your accounts and data, can help protect your accounts and Information.
In modern devices, along with patterns, password, Biometric authentication options like
face recognition, iris scanning, and fingerprints were found.
Cyber Privacy and Password Protection | Nikhil D.
5
HOW TO CREATE A STRONG PASSWORD
1. Think them, as essentials
2. Use a password manager.
A good password manager creates strong, unique passwords for all of your accounts.
That means, if one of your passwords does get caught up in a data breach, criminals won't have
the keys to the rest of your online services.
3. Go long.
Despite what all those prompts for unique characters and uppercase letters might have
you believe, length matters more than complexity. Once you get into the 12-15 character range,
it becomes way harder for a hacker to brute force, much less guess, your password.
Eg."g0be@r$"
4. Keep them separated.
If you want to deploy special characters against a password manager lots of input fields
will force you to bunch them all together at the beginning or end. That’s what everyone else
does, which means that’s hackers are looking for. Instead, space them out throughout your
password to make the guesswork extra tricky.
5. Single-serve only.
Don’t reuse passwords across different accounts.
6. Don’t trust your browser.
Usually we let our browser to remember all those passwords, or getting a paid password
manager.
7. Add two-factor authentication
Two-factor authentication, or 2FA, is a method of verifying your identity that adds a
second layer of security to your account password like a PIN number, password, or pattern an
ATM or credit card, mobile phone, or security token. It combines your physical card and your
PIN a biometric form of authentication, such as your fingerprint, your voice, or your face
8. Do not use personal information
• Don’t use your name or names of family members or pets in your passwords.
• Don’t use numbers like your address, phone number, or birthdays, either.
Cyber Privacy and Password Protection | Nikhil D.
6
9. Do not use real words
Password cracking tools help attackers to guess password. These programs can process
every word in the dictionary, plus letter and number combinations, until a match is found. So
don’t use clear, real words from the dictionary or proper nouns or names. Instead, use special
characters by combining uppercase and lowercase letters with numbers and special characters,
such as “&” or “$,” you can increase the complexity of your password and help decrease the
chances of someone potentially hacking into your account.
10. Don’t write them down
11. Change passwords on a regular basis
12. Never enter your password on another person’s computer.
13. When using your devices on public Wi-Fi, you should avoid visiting websites that require
you to log in to your account, such as online banking or shopping.
When you’re on an unsecured public network, your unencrypted data could be
intercepted by a nearby hacker. To protect yourself from these threats, you should always use
a virtual private network (VPN), like Norton Secure VPN, when on a public Wi-Fi connection.
Cyber Privacy and Password Protection | Nikhil D.
7
Conclusion
As "cyberspace" has become central to the global information and communication
infrastructure, the security of cyberspace has now become a more urgent priority for
corporations and governments around the world. At the same time, the online environment has
increasingly been subjected to sophisticated and targeted threats; our ever-increasing reliance
on cyberspace is creating new and significant vulnerabilities. Privacy protection and cyber
security should be thought of as interconnected: as more and more personal information is
processed or stored online, privacy protection increasingly relies on effective cyber security
implementation by organizations to secure personal data both when it is in transit and at rest.
Strategies should include a comprehensive compliance process, management of internal
privacy, employee training and awareness, self-regulatory efforts, corporate interface with
privacy awareness organisations, litigation support and alternative dispute resolution.
Furthermore, every e-organization's privacy practices should be bench marked against national
and international standards for privacy and fair information practices to meet the emerging
challenges.
It is not impossible to protect yourself from the malicious content on the internet, but it
does take some time and effort. Reading privacy policies, checking privacy settings, and
keeping an eye on what content comes up in search engines about you. The best protection is
not allowing anything at all, but limiting the amount of information you share, or using only
one credit card for example will provide better control if anything does go wrong. Privacy is
not dead, but you do have to bury your head in the ground to stay safe.
Cyber Privacy and Password Protection | Nikhil D.
8
Reference
[1] Katherine S. Cennamo, John D. Ross, Peggy A. Ertmer, Techonology Integration for
Meaningful Classroom, Wadsworth, USA, 2010
[2] http://14.139.60.114:8080/jspui/bitstream/123456789/722/14/Cyber%20Privacy.pdf
dated 08-02-2021
[3] https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-
hackers-spies-and-the-government/
dated 08-02-2021
[4] https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-
research/2014/cs_201412/
dated 08-02-2021
[5] https://www.slideshare.net/bavijesh/cyber-law-and-password-protection
dated 08-02-2021
[6] https://economictimes.indiatimes.com/definition/data-mining
dated 08-02-2021
[7] https://en.wikipedia.org/wiki/Spamming
dated 08-02-2021
[8] https://legalbeagle.com/7640133-legal-ethical-issues-technology.html
dated 08-02-2021

Contenu connexe

Tendances

Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...
Jincy24
 
Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...
Jincy24
 

Tendances (20)

Edusat
EdusatEdusat
Edusat
 
E-content Features : Concept, Scope ppt presentation
E-content Features : Concept, Scope ppt presentationE-content Features : Concept, Scope ppt presentation
E-content Features : Concept, Scope ppt presentation
 
NME-ICT PPT
NME-ICT PPTNME-ICT PPT
NME-ICT PPT
 
Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...
 
E content
E contentE content
E content
 
Resource Centers for Educational Technology - CIET,SIET, AVRC, EMRC, SITE, CE...
Resource Centers for Educational Technology - CIET,SIET, AVRC, EMRC, SITE, CE...Resource Centers for Educational Technology - CIET,SIET, AVRC, EMRC, SITE, CE...
Resource Centers for Educational Technology - CIET,SIET, AVRC, EMRC, SITE, CE...
 
Victers
VictersVicters
Victers
 
Mcq on Science Methodology
Mcq on Science MethodologyMcq on Science Methodology
Mcq on Science Methodology
 
Presentation on science library
Presentation on science libraryPresentation on science library
Presentation on science library
 
Methods of teaching - Heuristic method
Methods of teaching - Heuristic methodMethods of teaching - Heuristic method
Methods of teaching - Heuristic method
 
E-learning
E-learningE-learning
E-learning
 
Role of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internetRole of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internet
 
Computer assisted instructions B.Ed course cose 8620
Computer assisted instructions B.Ed course cose 8620Computer assisted instructions B.Ed course cose 8620
Computer assisted instructions B.Ed course cose 8620
 
techno-pedagogue.pptx
techno-pedagogue.pptxtechno-pedagogue.pptx
techno-pedagogue.pptx
 
The exclusion of a school subject from the curriculum
The exclusion of a school subject from the curriculum The exclusion of a school subject from the curriculum
The exclusion of a school subject from the curriculum
 
Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...
 
Place of science in school curriculum
Place of science in school curriculumPlace of science in school curriculum
Place of science in school curriculum
 
School induction program report
School induction program reportSchool induction program report
School induction program report
 
SIET
SIETSIET
SIET
 
E twinning pdf
E twinning pdfE twinning pdf
E twinning pdf
 

Similaire à Cyber Privacy & Password Protection

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 

Similaire à Cyber Privacy & Password Protection (20)

Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
techalpha07
techalpha07techalpha07
techalpha07
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cyber security best practices power point presentation
Cyber security best practices power point presentationCyber security best practices power point presentation
Cyber security best practices power point presentation
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Task 3
Task 3Task 3
Task 3
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 

Dernier

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Cyber Privacy & Password Protection

  • 1. CYBER PRIVACY & PASSWORD PROTECTION Online Assignment Submitted to UNIVERSITY OF KERALA In partial fulfilment of the requirements for the degree of Bachelor in Education (EDU 03 - Technology and Communication in Education) By NIKHIL D. Reg. No. 182203020013 S1. B.Ed. Physical Science MAR THEOPHILUS TRAINING COLLEGE Mar Ivanios Vidya Nagar, Nalanchira, Thiruvananthapuram 2020-2022
  • 2. Cyber Privacy and Password Protection Online Assignment EDU 03: Technology and Communication in Education Submitted By : Nikhil D Reg. No. 18220302013 S1. B.Ed. Physical Science Mar Theophilus Training College, Trivandrum Submitter To : Dr. Joju John Assistant Professor Mar Theophilus Training College Trivandrum Date of Submission : 10-02-2021
  • 3. Cyber Privacy and Password Protection | Nikhil D. 1 Cyber Privacy and Password Protection Introduction Digital tools generate digital concerns. The ease with which digital tools can be used to find, create, manipulate, and share information can be a boon to teaching and learning. However, these same tools can be used to quickly and easily copy other people’s work, capture inappropriate or unwanted images, or spread sensitive information across the globe. Our civilisation has progressed through ages breaking all geographical barriers and the most notable addition to the human civilization, in recent years, is the Internet, bringing the whole world closer and turning it into a 'global village'. But this 'closest global village', the cyberspace, is now a space with new risks, which challenge the very essence of individual privacy. Cyber Privacy It is the level of privacy protection for an individual while has connected to the Internet. It covers the amount of online security available for personal and financial data, communications, and preferences. The new technologies have enhanced the possibilities of invasion into the privacy of individuals and provided new tools in the hands of eavesdroppers. Individual privacy is at a greater stake than ever before. Cyber-Privacy is a huge concern for civilians and especially for companies because of the potential for crime. Such crimes includes Malware such as the use of malicious code which can compromise a user's identity and/or information Denial of Service Attacks Block a user from accessing his or her information. Computer Viruses can compromise user information as well as identity. All of these crimes fall under the category or fraud, identity theft, phishing scams and or information warfare.
  • 4. Cyber Privacy and Password Protection | Nikhil D. 2 Cyber Privacy Hazards The cyber world and its related crimes have no territorial barriers, and this makes everything complex because evidence is very hard to come by. With the privacy issue at centre stage, cookies, spamming, data mining, and hacking - are important areas of discussion where insecurity from the technological front arises. Cookies: - A cookie is information that a website puts on one's hard disk so that it can remember something about him at a later time. Typically, a cookie records your preferences when using a particular site. Cookies can be used to track people to gain statistics as they go through the website. Because every time we visit a Web site, we leave a footprint of personal information about ourselves like our preferences. Web Bugs:- A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behaviour, functioning as a kind of spyware. A Web bug can send several pieces of information to the server computer, and those includes, the IP address of the computer that fetched the Web bug. Hacking: - Hacking is an ‘unauthorised Access’ to a computer and refers to access to the whole or any part of a computer system without permission. Hackers worldwide attempt to hack into remote computer systems for multiple purposes like eavesdropping, data theft, fraud, destruction of data, causing damage to computer systems, or for mere pleasure or personal satisfaction. One example of a hacking software is a Trojan horse program, in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on a hard disk. Spamming: - Spamming is another area of concern where cyber privacy is at stake. It the use of messaging systems to send an unsolicited message to a large numbers of recipients for the purpose of commercial advertising or for any prohibited purpose (like phishing) Data Mining: - Data mining is the latest big business in the information. It is defined as a process used to extract usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software. Data mining has applications in multiple fields, like science and research.
  • 5. Cyber Privacy and Password Protection | Nikhil D. 3 Cyber Security Cyber Security is the privacy and security level for the personal data published via the internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications and preferences. Protecting one's privacy means protection of right to control how personal information is collected and promulgated. Protection of privacy also includes protection against identify theft, or the use of an individual's personal information for fraudulent purposes. Firewalls assist in blocking dangerous programs, viruses or spyware before they infiltrate your system. Also, nowadays, several search engines are accompanied by cyber security plugins. The HTTPS (Hyper Text Transfer Protocol Secure) protects personal and financial data (Credit/debit cards details, OTPs) from fraudsters. Also, several other plugins like, disconnect, blur etc. associated with Mozilla based browsers, Opera, Safari enhances the protection of the private and personal information’s. VPN (Virtual Private Network) A Virtual Private Network is a way to create a secure tunnel between browsers and web servers. Data packets are encrypted before they are sent to a destination server, which also results in IP addresses and your location becoming hidden. VPN can also be used to change the Geo-location of the user. VPNs are not a silver bullet for security; far from it, but they can help mask your online presence. It is worth noting, however, that VPN usage is banned in some countries.
  • 6. Cyber Privacy and Password Protection | Nikhil D. 4 Password Protection Password protection is a security process that protects information accessible via computers that needs to be protected from certain users. Password protection allows only those with an authorized password to gain access to certain information. Passwords are used commonly to gain entry to networks and into various Internet accounts in order to authenticate the user accessing the website. Usage of alphanumeric and special character combination in password creations provides more security the e-contents while using like this, disables the possibility of replications and unauthorised entries. Two-factor authentication (2FA), also known as two-step verification, is a widely- implemented method of adding an extra layer of security to your accounts and services after you have submitted a password. The most common methods are via an SMS message, a biometric marker such as a fingerprint or iris scan, a PIN number, pattern etc. Using 2FA creates an additional step to access your accounts and data, can help protect your accounts and Information. In modern devices, along with patterns, password, Biometric authentication options like face recognition, iris scanning, and fingerprints were found.
  • 7. Cyber Privacy and Password Protection | Nikhil D. 5 HOW TO CREATE A STRONG PASSWORD 1. Think them, as essentials 2. Use a password manager. A good password manager creates strong, unique passwords for all of your accounts. That means, if one of your passwords does get caught up in a data breach, criminals won't have the keys to the rest of your online services. 3. Go long. Despite what all those prompts for unique characters and uppercase letters might have you believe, length matters more than complexity. Once you get into the 12-15 character range, it becomes way harder for a hacker to brute force, much less guess, your password. Eg."g0be@r$" 4. Keep them separated. If you want to deploy special characters against a password manager lots of input fields will force you to bunch them all together at the beginning or end. That’s what everyone else does, which means that’s hackers are looking for. Instead, space them out throughout your password to make the guesswork extra tricky. 5. Single-serve only. Don’t reuse passwords across different accounts. 6. Don’t trust your browser. Usually we let our browser to remember all those passwords, or getting a paid password manager. 7. Add two-factor authentication Two-factor authentication, or 2FA, is a method of verifying your identity that adds a second layer of security to your account password like a PIN number, password, or pattern an ATM or credit card, mobile phone, or security token. It combines your physical card and your PIN a biometric form of authentication, such as your fingerprint, your voice, or your face 8. Do not use personal information • Don’t use your name or names of family members or pets in your passwords. • Don’t use numbers like your address, phone number, or birthdays, either.
  • 8. Cyber Privacy and Password Protection | Nikhil D. 6 9. Do not use real words Password cracking tools help attackers to guess password. These programs can process every word in the dictionary, plus letter and number combinations, until a match is found. So don’t use clear, real words from the dictionary or proper nouns or names. Instead, use special characters by combining uppercase and lowercase letters with numbers and special characters, such as “&” or “$,” you can increase the complexity of your password and help decrease the chances of someone potentially hacking into your account. 10. Don’t write them down 11. Change passwords on a regular basis 12. Never enter your password on another person’s computer. 13. When using your devices on public Wi-Fi, you should avoid visiting websites that require you to log in to your account, such as online banking or shopping. When you’re on an unsecured public network, your unencrypted data could be intercepted by a nearby hacker. To protect yourself from these threats, you should always use a virtual private network (VPN), like Norton Secure VPN, when on a public Wi-Fi connection.
  • 9. Cyber Privacy and Password Protection | Nikhil D. 7 Conclusion As "cyberspace" has become central to the global information and communication infrastructure, the security of cyberspace has now become a more urgent priority for corporations and governments around the world. At the same time, the online environment has increasingly been subjected to sophisticated and targeted threats; our ever-increasing reliance on cyberspace is creating new and significant vulnerabilities. Privacy protection and cyber security should be thought of as interconnected: as more and more personal information is processed or stored online, privacy protection increasingly relies on effective cyber security implementation by organizations to secure personal data both when it is in transit and at rest. Strategies should include a comprehensive compliance process, management of internal privacy, employee training and awareness, self-regulatory efforts, corporate interface with privacy awareness organisations, litigation support and alternative dispute resolution. Furthermore, every e-organization's privacy practices should be bench marked against national and international standards for privacy and fair information practices to meet the emerging challenges. It is not impossible to protect yourself from the malicious content on the internet, but it does take some time and effort. Reading privacy policies, checking privacy settings, and keeping an eye on what content comes up in search engines about you. The best protection is not allowing anything at all, but limiting the amount of information you share, or using only one credit card for example will provide better control if anything does go wrong. Privacy is not dead, but you do have to bury your head in the ground to stay safe.
  • 10. Cyber Privacy and Password Protection | Nikhil D. 8 Reference [1] Katherine S. Cennamo, John D. Ross, Peggy A. Ertmer, Techonology Integration for Meaningful Classroom, Wadsworth, USA, 2010 [2] http://14.139.60.114:8080/jspui/bitstream/123456789/722/14/Cyber%20Privacy.pdf dated 08-02-2021 [3] https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from- hackers-spies-and-the-government/ dated 08-02-2021 [4] https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy- research/2014/cs_201412/ dated 08-02-2021 [5] https://www.slideshare.net/bavijesh/cyber-law-and-password-protection dated 08-02-2021 [6] https://economictimes.indiatimes.com/definition/data-mining dated 08-02-2021 [7] https://en.wikipedia.org/wiki/Spamming dated 08-02-2021 [8] https://legalbeagle.com/7640133-legal-ethical-issues-technology.html dated 08-02-2021