Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CLASS 9TH - (CHAP 7 Cyber Safety)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

CLASS 9TH – COMPUTER APPLICATION

CHAPTER-7: CYBER SAFETY


SECTION 3: THEORY QUESTIONS (UNSOLVED)
1. We can protect the entry of virus in our computer by following the below mentioned steps:
a) Security Programs: Installing reliable anti-virus software is a must. The anti-virus should be
b) regularly updated. It should also be programmed to regularly scan and quarantine the system.
c) Installation of firewalls and restricting access to unwanted sites through appropriate settings in the browsers
should also be done as a mandatory act.
d) Secure Internet access: Be vigilant when accessing or uploading information on the Internet.
e) Only secure sites should be used for financial transactions and no personal information should be shared or saved
(even accidentally) on any website. Installation and download from un-authorized sources should be avoided.
f) Regular security updates: Keep your applications and operating system updated at all times.
g) Special attention should be paid to security updates and security bulletins for each software or application being
used.
h) Avoid Spams: Mails from un-wanted and un-warranted sources should be deleted without reading or
downloading.
i) Any attachments in such mails should never be downloaded or installed onto the system.
j) Scanning All Portable devices: Scan all portable storage devices before use as these are the most common sources
of infection in computers.
k) Disable cookies, if possible: For the safety of our personal information, we must disable cookies on our browser.
2. First Party Cookies: These kinds of cookies are generally used to store your login id, password, autofill information
etc. for the frequently visited websites. For example, when you use your card to recharge your phone, the site stores
all the login information and you only have to enter the password or CVC number.
Third Party Cookies: These are the cookies that websites store to get details of your search history and web browsing
history. These are most often used by advertising companies to track you across multiple websites that you visit.
3 Cybercrime refers to any online illegal activity facilitated by the use of electronic communication devices like mobile
phones, computers or through networks like the Internet. Some cybercrimes tend to harm the system resources (by
installing virus) while others are used to extract confidential information from the user.
4. The following ways can help you limit your data exposure online.
a) Exclude important personal information from your social media profiles. b) On any social website, be selective in
adding or not adding ‘friends’.
c) Check your social media privacy settings. d) Check your phone’s privacy settings.
e) Watch out for ‘phishing’ e-mails.
f) Keep your communication network secure. g) Check for the https://.
h) Monitor the posts you get online.
i) Protect your computer and smartphone with strong, up-to-date security software. j) Use two-factor authentication
whenever possible.
k) Stay away from public Wi-Fi.
5. A proxy server is a dedicated computer or a software system which acts as an intermediary between an endpoint device,
such as a computer, and another server from which a user or client is requesting a service. So, the tracking website
will get the information on the proxy server and you can still browse the site without disclosing your IP address or
location.
6. Cyber terrorism is the act of conducting terrorism through the use of computers and the internet in order to cause fear
and panic. Cyber terrorism involves large scale disruption of computers, telecommunication networks, or
information system so as to compel the government or its people to fulfill some social, religious, or political
objectives. Some cyber terrorists spread computer virus while others threaten people electronically. It may result in
violence against person or property.
Attacks on military installation, power plants, air traffic control, banks, etc. are some examples of cyber terrorism.
7. A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on
predetermined security rules. A firewall may be implemented using hardware, software, or a combination of both. It
safeguards our computer system and data from any unauthorized external source.
8. Phishing is the act of illegally acquiring personal and sensitive information such as, on line banking details, credit card
details, and other login details, of an individual by sending malicious e-mails or by creating web pages that can
collect this information as they appear to come from very famous organizations.
9. Always use the sites that start with ‘https:\\ ‘. The letter ‘s’ specifies that it is a safe site to be browsed. This should be
taken into consideration, especially when on line transactions are to be made. This helps in checking the credibility
of the website.
SECTION 5: APPLICATION BASED QUESTIONS (UNSOLVED)
1. Someone might have used her login details to enter her email account. Someone might have changed her password
too. She should have been more careful by not sharing her personal information online and by keeping a strong
password that could not be guessed.
2. Due to the third party cookies that websites store to get details of your search history and web browsing history. These
are most often used by advertising companies to track you across multiple websites that you visit.
3. Her system seems to have been affected by Trojan Horse malware. One should scan all portable storage devices before
use as these are the most common sources of infection in computers.
SECTION 6: LONG ANSWER TYPE QUESTIONS (UNSOLVED)
1. Online identity is a social identity that an internet user establishes in online communities and websites. When someone
else uses your online identity to create fraudulent messages or commit crimes, it is known as identity theft. In other
words, you can say that Identity theft is any kind of deception, scam, or crime that results in the loss of personal data,
including the loss of usernames, passwords, banking information, credit card numbers, Aadhar ID or Unique Identity
Number (UID), which is then used without your permission to commit fraud and other crimes.
2. The best practices used to protect the confidential information, which will help you to safeguard your information
include:
a. Build strong passwords. It is important to create strong passwords for all your on line accounts.
b. Use multifactor authentication. A user ID and strong password alone are not sufficient to secure web accounts.
Multifactor authentication is one of the simplest and the most effective ways to secure data, which adds an extra
layer of protection.
c. Be suspicious of unsolicited e-mail. Be aware of nuisance ads and unsolicited e-mails from unknown sources. Try
not to open any attachments that are along with such messages and do not reply to such messages.
d. Be aware of your online posting. One should be very careful in what one is sharing on line. One should never post
any personal details or one’s location online.
e. Protect your mobile devices. Outdated software can leave our mobile devices open to security vulnerabilities.
Remember, to protect our device from an external attack, keep updating the mobile software on a regular basis.
f. Engage in safe web browsing. Just like our phone requires updates on a regular basis, so does our web browser. An
outdated browser can open up security gaps that cyber criminals may take advantage of in accessing our data.
g. Use safe sites to surf the internet. Always use the sites that start with ‘https:\\ ‘. The letter ‘s’ specifies that it is a
safe site to be browsed.
h. Use firewall. A firewall is a network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules. A firewall may be implemented using hardware, software, or a
combination of both.
i. Avoid using computers in public. Avoid using computers in public places like cyber cafe
or labs, to access private data like e-mails or sharing the private information like credit/debit card details.
3. Private browsing also known as “Incognito Mode”, is a means by which we can safeguard our identity and browsing
details when on line. By enabling incognito browsing mode in our web browsers, we can prevent:
a. Saving of our details as in the autofill feature b. Accidental saving of username and passwords
c. Saving of browsing history when accessing the web from a public domain d. Saving of data in cookies
e. Location tracking
Most of us book our flight tickets and hotel rooms online. When we search for the available flights or hotels on a
particular date for a particular destination, tracking cookies are generated. Suppose, due to some reason, you do not
book the tickets or the hotel room in that browsing session. So, the next time when you open the site to book the
tickets or the hotel, you see that the prices have increased.
4. Here are the two ways by which websites can track you:
a. IP Address: when the data is transferred from one computer to the other in a network, it is done with the help of a
unique numerical address assigned to the hardware (computer, router, printer, etc.) connected to the Internet. This is
called an IP Address. IP address is an acronym for Internet Protocol address. It is similar to our home or office
address Figure 7.3: IP Address which is unique. Whenever you visit a website, the device you use shares an IP
address with the website. With the help of this IP address, a website can roughly estimate your geographical location.
b. Cookies: Cookies are small data files, which are sent by the website you visit and are generated by your browser.
These are then stored on your device. Cookies are used to track your record of visit to a particular website/webpage.
A website recognises you with the help of cookies, when you again visit that website. Similarly, when you use your
credit card for any transaction, a cookie will store your login information. Different web browsers have different
privacy settings. You can go to your browser’s settings and choose private browsing. This will provide you control
over which kind of cookies you will accept. If you do not want to allow cookies, you may disable them.
5. Any malicious programme on a computer or mobile device, such as virus, worm, Trojan horse, Spyware, etc. are
collectively called Malware. Malware is a malicious program that enters into a computer and damages it without the
user’s knowledge. It not only interrupts the normal working of a computer, but also steals important information of
a user. There can be variety of malware programs.
Some common ones are: Adware, Spyware, Virus, Worm, Trojan Horse, Rootkit, etc. Safety measures to be taken
to prevent from Malware are:
a. Security Programs: Installing reliable anti-virus software is a must. The anti-virus should be
regularly updated. It should also be programmed to regularly scan and quarantine the system. Installation of firewalls
and restricting access to unwanted sites through appropriate settings in the browsers should also be done as a
mandatory act.
b. Secure Internet access: Be vigilant when accessing or uploading information on the Internet.
Only secure sites should be used for financial transactions and no personal information should be shared or saved
(even accidentally) on any website. Installation and download from un-authorized sources should be avoided.
c. Regular security updates: Keep your applications and operating system updated at all times.
Special attention should be paid to security updates and security bulletins for each software or application being
used.
d. Avoid Spams: Mails from un-wanted and un-warranted sources should be deleted without reading or downloading.
Any attachments in such mails should never be downloaded or installed onto the system.
e. Backups: Taking backups regularly is a good practice. This not only protects us against data loss but also helps to
restore the integrity of the data. Make sure that the data is encrypted by using encryption software to protect from
unauthorized access.
f. Scanning All Portable devices: Scan all portable storage devices before use as these are the most common sources
of infection in computers.
g. Disable cookies, if possible: For the safety of our personal information, we must disable
cookies on our browser.
6. The most common types of cybercrimes are:
a) Cyber Stalking: It is a crime in which the attacker harasses a victim by using electronic communication, such as e-
mail, instant messaging, or messages posted to a website or a discussion group for reason of anger, revenge, or
control. A stalker may be an on line stranger or a person whom the target knows.
b) Cyber Bullying: It is an act of harming or harassing using information technology in a deliberate manner. This
includes insulting remarks and threatening messages sent by e-mail, spreading rumours about the person either by
e-mails or social networking sites, posting embarrassing photos and videos to hurt the person, derogatory remarks
against gender, race, religion, or nationality.
c) Cyber Espionage: It is the practice of using information technology to obtain secret information without permission
from its owners or holders. Cyber espionage is most often used to gain strategic, economic, political, or military
advantage, and is conducted using cracking techniques and malware.
d) Cyber Warfare: It involves using of information technology by nation-states to penetrate another nation’s networks
to cause damage or disruption. Through cyber warfare, countries can completely freeze the vital resources like
public transport, banking system, internet, and communication technology of another country. This can bring the
economy of the targeted country at complete stand still. Cyber warfare has emerged as a prominent threat to the
sovereignty of countries.
7. The information which cannot be shared with others due to security concerns is known as confidential information.
Information such as bank account statements, credit card numbers, business documents, identity proofs, etc. are very
important and personal. Protecting this information from unauthorized access comprises a major part of
confidentiality of information as leaking of this information can cause financial loss, identity loss, or privacy loss.
Confidentiality of information ensures that only authorized users can access the sensitive data.
Best practices to protect your confidential information:
The best practices used to protect the confidential information, which will help you to safeguard your information
include:
a. Build strong passwords. It is important to create strong passwords for all your on line accounts. A strong password:
• Should contain both uppercase and lowercase characters, as well as digits and punctuation.
• Should be at least eight characters long.
• Should not be a word in any language, slang, dialect, or jargon.
• Should not be based on personal information, names of family members, and so on.
• Should be hard to guess but easy to remember.
b. Use multifactor authentication. A user ID and strong password alone are not sufficient to secure web accounts.
Multifactor authentication is one of the simplest and the most effective ways to secure data, which adds an extra
layer of protection.
For example, when a user enters a UserlD and Password, the website sends an OTP to the user’s mobile device.
c. Be suspicious of unsolicited e-mail. Be aware of nuisance ads and unsolicited e-mails from unknown sources. Try
not to open any attachments that are along with such messages and do not reply to such messages.
8. User agent refers to the software program such as your browser or a session initiating application (E.g., Skype or any
other web-calling application). When you initiate a web session, these applications pass your information such as
application type, operating system used, software source, version, etc. This information can be tracked and stored by
web servers to determine the user’s web activities and behaviour.
9. To protect your passwords online from being hacked, follow these tips to make them strong:
• Make sure that the password is minimum eight characters long.
• Use a combination of upper and lower-case letters. Include at least one numeric character and one special character.
• Be creative. Use the first letter of each word of a memorable sentence or phrase, then make it even tougher by
changing some of the letters to numbers. For example, the phrase, “All that glitters is not gold” can be written as
AtGingOL$.
• Never use personal information like your name, birthday, driving license number or passport number.
• Do not repeat numbers (5555) and letters (bbbb). Do not include simple sequences (abcdefg or 56789) or letters that
appear in a row on your keyboard (qwerty), instead use complex sequence like a2b3c5d7qywert..
10. In case of any cybercrime, you should immediately report the matter to either parents or school authorities.
• Parents can visit a nearby police station and can lodge a complaint.
• The Information Technology Act has global jurisdiction. It means that you can lodge a complaint against the crime
from any state or city.
• To know more about cyber law or to register a complaint, you can visit the following link:
http://www.cybercrimehelpline.com/

You might also like