Safety and Security in The Cyber World: Digital Footprint Is

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Safety and Security

Chapter in the Cyber World


7

Since childhood our parents and elders have been


guiding and suggesting us to take care of our eating
habits, practice hygiene, be wary of strangers,
communicate effectively and so on to ensure that we
develop into confident, strong and positive individuals
who are able to cope up with the competition and
complexities of the real world. With the advent of

Digital footprint is
the information
about a particular
person that exists
on the Internet as a
result of their online
activity even after its
Fig. 7.1: Cyber World deletion.

2019-20
Chapter 7.indd 93 28-Feb-19 3:40:50 PM
Internet, all of us have also become a part of a cyber
world wherein we share and access resources, connect
and interact with many people. Just like real world we
need to be cautious and alert while working in this cyber
world as well.
We all use email to send and receive information and
messages but one needs to be careful while using email
as many a times one may find emails which are from
unknown source saying that you are a lucky winner
or asking you to provide personal information. These
mails will tempt you to follow the instructions written
in the contents of the mail. Such emails are called spam
mails and are sent with malicious intent to get you
into trouble.
Let’s look at some of the examples of spam mails.

Fig. 7.2 : Sample email-1

94 ICT Textbook — Class IX

2019-20
Chapter 7.indd 94 28-Feb-19 3:40:50 PM
In the Fig. 7.2 given above, you can find some common
signals that you would usually find in a spam email.
Assume there is another email in your inbox asking you
to download a popular game for free which otherwise
costs `3,500/- as shown in Fig. 7.3.

Fig. 7.3: Sample email‑2

Activity 1
In the Fig. 7.3 given above, which one of the following
proves that it is a fake email? Choose the option from
the list given below.
• The offer is valid only for the next 48 hours.
• Incorrect spelling of FIFA in the email ID in ‘From’
Box.
• The cost of the game mentioned in the mail is not
correct.

Assume there is another email in your inbox which


contains links asking you to provide account details
for verification purpose. If you click on such links or
download any attachments, they may lead you to a
phishing website or install harmful malware (malicious
software) on your device, as shown in Fig. 7.4.

Safety and Security in the Cyber World 95

2019-20
Chapter 7.indd 95 28-Feb-19 3:40:50 PM
Fig. 7.4: Sample email-3

Activity 2
Identify the URL(s) which are indicative of a fake
Phishing is an
website?
attempt to obtain
sensitive information http://www.uiidai.gov.in/
such as username, http://www.incometakindiaefilling.gov.in/
password and credit https://onlinesbi.com
card details etc. for
malicious reasons,
The above scenarios are examples of fraudulent emails.
by osing as a
trustworthy source in You need to be cautious before proceeding with any of
email. the instructions given in the email.

96 ICT TEXTBOOK — CLASS IX

2019-20
Chapter 7.indd 96 28-Feb-19 3:40:51 PM
Protection from email fraud
• Do not reply to emails from unknown senders even if
it looks like a genuine email.
• Do not provide personal information like name, date
of birth, school name, address, parent’s names or any
other information.
• Do not fall for lucrative offers/discounts as they might
be coming from unknown source and it may not be
reliable. Ignore/delete those mails.
• Do not open attachments or click on links from
unknown senders, since they may contain
malicious files that might affect your device. Only
click the links and downloads from websites that
you trust.
• Beware of phishing websites — check the URL to
confirm if the website is secure.
• Do not forward spam or suspicious emails to others.
• Do not send excessive forwards as it might be
distracting to the receiver.

You have learnt how to use email for sharing information


and what safety precautions to be taken while using
email. Through email you can reach out to people only
if you have their email ID.

Activity 3
Can you think of ways to share your event with a larger
audience?

The Internet allows us to exchange and share


information, connect with people online across the
world and create our own networks through social
networking sites.
In order to create an account on a social networking site
you need to use your email ID as username.

Safety and Security in the Cyber World 97

2019-20
Chapter 7.indd 97 28-Feb-19 3:40:51 PM
Activity 4
Search and write the names of any three social
networking sites
1. ____________________________________________________
2. ____________________________________________________
3. ____________________________________________________

Though social networking is very interesting as it gives


you a chance to get connected with people around
Social networking the world you should make sure you follow all safety
site is an online precautions while using social networking as it is
platform to connect
extremely difficult to judge and recognise a person
and network with
here. We only know them by the identity they choose to
people around the
world. One can also present.
send and exchange While creating an account on social networking sites,
messages and share you need to take care of the following:
photos, videos, • Avoid revealing too much of your personal
etc., through such
information like your age, address, contact details,
platforms.
school name, etc., as this can lead to identity theft
• Do your privacy settings very carefully on social
networking sites
Check your privacy Anyone on social networking, needs to take care of the
settings Make sure following:
you know what
• Never reveal your password to anyone other than
information is being
your parent or guardian
shared publicly.
• Change your password frequently
• Communicate and collaborate only with people
known to you
• Do not post anything which hurts others feelings
• Always be careful while posting photographs,
videos and any other sensitive information on
social networking sites as they leave digital
footprints which stay online forever
• Do not post your friends’ information on social
networking sites, which may possibly put them at
risk. Protect your friends’ privacy by not posting
the group photos, school names, locations,
age, etc.

98 ICT TEXTBOOK — CLASS IX

2019-20
Chapter 7.indd 98 28-Feb-19 3:40:51 PM
• Avoid posting your plans and activities on
Identity theft is
networking sites
the deliberate use
• Do not create fake profiles for yourself on any of someone else’s
social networking sites identity to obtain
• If you suspect that your social networking account credit and benefits
details have been compromised or stolen, report in the name of
another person or
immediately to the support team of networking
to sometimes even
site
defame that person.
• Do not forward anything that you read on social It is one of the
media without verifying it from a trusted source. most common cyber
• Always avoid opening links and attachment crimes. It poses a
through social networking sites severe threat to a
person’s reputation,
• Never leave your account unattended after login, unlike the real world
log out immediately when you are not using it the cyber world has
a far larger reach,
The photographs and the resources you share might
hence it is essential
get you positive feedback and comments. However, at that we exercise the
times you might face instances of cyber bullying. Cyber following precautions
bullying includes: to prevent any such
• nasty comments on your posts or posts about you. incident:
• someone creating a fake profile in your name and • Never share
trying to defame you. password with
anyone
• threatening or abusive messages online or on the
• Keep strong
mobile phone.
passwords
• being excluded from online groups and forums. • Do not divulge
• embarrasing photographs put online without your your personal
permission. information
• rumors and lies about you on a site.
• stealing your account password and sending
unwanted/inappropriate messages from your
account.
• offensive chat. Cyber bullying
• fake online profiles created with an intent to includes sending,
posting or sharing
defame you.
negative, harmful,
If you become a Victim of Cyberbullying, do the following: false or mean
information and
• Do not Respond content about
If someone is cyber bullying you, do not respond or someone. It is a
retaliate by doing the same thing back. Responding or serious offence which
retaliating to cyber bullying may make matters worse or is punishable under
even get you into trouble. Cyber Law.

SAFETY AND SECURITY IN THE CYBER WORLD 99

2019-20
Chapter 7.indd 99 28-Feb-19 3:40:51 PM
• Screenshot
Take a screenshot of anything that you think
could be cyber bullying and keep a record
of it.
• Block and Report
Most online platforms have this feature, if
someone bothers you, make sure you block
and report the offender to the social media
platform.
• Talk About It
Cyber bullying may affect you in many
different ways. Dont feel that you are alone.
Let your parents and teachers know what is
going on. Never keep it to yourself.

Fig. 7.5: Block

Fig. 7.6: Talk about it

• Be Private
Keep your social media privacy settings high and do not
connect with anybody who you do not know offline. You
would not talk to random people on the street, so why
do it online?
• Be Aware
Remain updated with all the preventive and security
measures in the cyber world.

Exercises
1. Fill in the blanks
a. ______________ often directs users to a fake website
whose look and feel are almost identical to the
actual website.

100 ICT Textbook — Class IX

2019-20
Chapter 7.indd 100 28-Feb-19 3:40:53 PM
b. Undesired or illegal email messages are often known
as ______________.
c. The protection of internet connected systems
including hardware, software and data from cyber
attacks is termed as _____________________.
d. A __________________ is a form of malicious software
program which can corrupt or destroy systems
or data.
2. Match the following
1 Malware a. Email
2 Spamming b. Virus
3 Cyber law c. Stealing data
4 Phishing d. Cyber crime
3. Identity whether the following statements are True
or False
a. Hacking is a cybercrime.
b. Phishing is a type of attack which is capable of
stealing your password or credit card number.
c. Social networking sites are used to share passwords
and other secret information.
d. When you are receiving harmful messages on your
computer, you may block or delete them.

Safety and Security in the Cyber World 101

2019-20
Chapter 7.indd 101 28-Feb-19 3:40:53 PM

You might also like