Computer Science

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

ST. ANDREWS SCOTS SR. SEC.

SCHOOL
9th Avenue, I.P. Extension, Patparganj, Delhi-110092
Subject – Computer Science
Chapter– Cyber Safety
Class - XI

Introduction-

Cyber safety is the safe and responsible use of Internet & ICT(Information &
Communication Technology). Cyber safety is about to not only keeping information
safe and secure, but also being responsible with that information, being respectful of
other people online. As per Cyber safety peoples are advised to use good 'netiquette'
(internet etiquettes).

Safely Browsing the Web

Viruses and malware spread, easily and quickly through websites/web browsing.
Through clicking over the links found on web pages or in email mistakenly our
computer may be infected. An infected computer can run slow, barrage us with pop-ups,
download other programs without our permission, or allow our sensitive personal
information to others.

Tips for Safe Web Browsing 

--Common sense-(never respond to spam & disclose personal information).

 Use an antivirus & Firewall-It provide real-time malware protection.

 Create strong passwords

 Mind your downloads -Be sure to review all pre-checked boxes prompted at
download & un-check any extra applications which we don’t want to install.

 Stay updated- Update O.S., Applications & Anti-virus.

Identity Protection

Protection against theft of personal information over Cyber Space without consent,
usually for financial gain is known as Identity Protection.
Tips to Prevent Identity Theft

 Use strong passwords and PINs & Keep passwords and PINs safe.

 Create log-in passwords for all devices.

 Beware of phishing scams.

 Restore old computers to factory settings.

 Encrypt your hard drive

 Check security when shopping online-check links authenticity which is received from
an unsolicited email.

Confidentiality of Information

Allows authorized users to access sensitive and secured data maintain the
Confidentiality of Information.

Tips to Protect Information Confidential

 Build strong passwords

 Use multifactor authentication- a computer user is granted access only after


successfully presenting 2 or more pieces of evidence.

 Masking -The free version of MaskMe creates an alternate e-mail address whenever
a Web site asks for a user’s e-mail. E-mails from that site can be accessed via a
MaskMe in-box or forwarded to a user’s regular e-mail account.

 Private Browsing & Safe Browsing

Purpose of pvt browsing is to avoid leaving a history of one's browsing in the browser
history on the computer we are using. Use updated Brower for safe browsing & browses
privately.

 Encryption

Use https based sites,as HTTPS ensures data security over the network - mainly public
networks like Wi-Fi. HTTP is not encrypted and is vulnerable to attackers. PGP is a
popular program used to encrypt and decrypt email over the Internet, as well as
authenticate messages with digital signatures and encrypted stored files.
 Avoid using public wifi and public computer

Cyber Safety – Social Networks

Facebook, MySpace, Twitter, LinkedIn, Digg,Ning, MeetUp etc….. -- The number of


social networking sites and tools is exploding nowadays. These are becoming soft tool
to attack & target for scam. Tips to stay safe on social media  Use a strong password
 Use a different password for each social media  Password protect your devices if
using social media apps  Be selective with friend requests.  Be careful while sharing
something.

Cyber trolls & Cyber bullying

Cyber trolling is internet slang for a person who intentionally starts arguments or upsets
others by posting inflammatory remarks. The sole purpose of trolling is angering
people. Purpose – to entertain, to argument, to upset victim, to get attention Cyber
bulling: Saying and/or doing mean things to the person online. It is a harm inflicted
through using the Internet, CT devices, or mobile phones. Purpose – to get revenge, to
harass & threat, to humiliate

Cyber stalking: Doing research on every aspect of the person’s life. Cyberharrassment:
Continuously contacting the person online, even though they don’t want you to.

Appropriate Usage of Social Network

Social Network refers to web and mobile technologies or their practices to share
content, thoughts, ideas, opinions, experiences etc. online. Various examples of social
networks are Facebook, Twitter, YouTube, LinkedIn, and blogging sites among many
others.

Appropriate Usage of Social Network

Problems to Avoid

 Cyber trolling

 Cyber bulling

 Cyber stalking

 Cyber harassment
 Stranger Danger Children’s are advised to not to interact with strangers on social
networks as there are chances that many people on social media are not who they say
they are.

 Digital Footprint

The history of a person's usage of digital devices, movie search, programs watched,
flight searched, websites surfed, credit card transaction, cell phone calls, social media
messages sent, links clicked and Facebook pages liked etc. Such information is being
used to target ads to consumers as these are digital footprint of such consumers.

Appropriate Usage of Social Network

Don’t be rude or abusive

Don’t spread rumors

You are what you write/tweet

Face your problems, don’t Post/Facebook your problems.

Don’t take it too seriously.

Don’t use fake name

Protect your identity

Computer Security Threats

Malware: Malware could be computer viruses, worms, Trojan horses, dishonest


spyware, and malicious. Computer virus: It is a small piece of software that can spread
from one infected computer to another. It can corrupt, steal, or delete data on your
computer/hard drive.

Trojan horse: can do anything from record your passwords by logging keystrokes
(known as a key logger) to hijacking your webcam to watch and record your every
move.

Computer worm: A computer worm is a software program that cans copy itself from
one computer to another, without human interaction. Spam: unwanted messages in your
email inbox.
Phishing: Phishing are fraudulent attempts by cybercriminals to obtain private
information. For e.g. a message prompt your personal information by pretending that
bank/mail service provider is updating its website.

Spyware: spyware is used to spy on their victims. An e.g. is key logger software that
records a victim’s every keystroke on his or her keyboard.

Adware: unwanted ads shown while surfing internet.

Safely communicating data

Secure Connections

A secure connection refers to the connection which is encrypted by one or more


security protocols for security of data flowing between two or more nodes. When it is
not encrypted, it can be easily listened by anyone with the knowledge on how to do it.

Secure Sockets Layer (SSL)

It is a computer networking protocol used for insecure network, between network


application clients and servers .Due to various flaws, SSL was deprecated for use on the
internet by the Internet Engineering Task Force (IETF) in 2015 by the Transport Layer
Security (TLS) protocol. Both are not interoperable, TLS is backwards-compatible with
SSL 3.0

Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the
protocol over which data is sent between your browser and the website server. HTTPS
pages typically use one of two secure protocols to encrypt communications - SSL
(Secure Sockets Layer) or TLS (Transport Layer Security).

Eavesdropping-eavesdropping in a man in middle attack and the message is passing


from the client to server. The solutions to this problem are:  to encrypt the message 
to encrypt the channel Both are appropriate in different situations.

Safely Communicating data

Identity verification methods


Knowledge-Based Authentication (KBA)-by asking them to answer specific security
questions

Two Factor Authentication (2FA)-not only a password and username, but also
something that the user has with them  Database Solutions-behavioral patterns to
detect if an online ID is authentic, a fraudster or a bot.  Online Identity Verification-A
mix of artificial intelligence, computer vision, and verification experts to determine if a
government-issued ID is authentic and belongs to the user.  Biometric verification -by
which a person can be uniquely identified by evaluating one or more distinguishing
biological traits.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy