Safety and Security in The Cyber World: Digital Footprint Is
Safety and Security in The Cyber World: Digital Footprint Is
Safety and Security in The Cyber World: Digital Footprint Is
Digital footprint is
the information
about a particular
person that exists
on the Internet as a
result of their online
activity even after its
Fig. 7.1: Cyber World deletion.
2019-20
Chapter 7.indd 93 28-Feb-19 3:40:50 PM
Internet, all of us have also become a part of a cyber
world wherein we share and access resources, connect
and interact with many people. Just like real world we
need to be cautious and alert while working in this cyber
world as well.
We all use email to send and receive information and
messages but one needs to be careful while using email
as many a times one may find emails which are from
unknown source saying that you are a lucky winner
or asking you to provide personal information. These
mails will tempt you to follow the instructions written
in the contents of the mail. Such emails are called spam
mails and are sent with malicious intent to get you
into trouble.
Let’s look at some of the examples of spam mails.
94 ICT Textbook — Class IX
2019-20
Chapter 7.indd 94 28-Feb-19 3:40:50 PM
In the Fig. 7.2 given above, you can find some common
signals that you would usually find in a spam email.
Assume there is another email in your inbox asking you
to download a popular game for free which otherwise
costs `3,500/- as shown in Fig. 7.3.
Activity 1
In the Fig. 7.3 given above, which one of the following
proves that it is a fake email? Choose the option from
the list given below.
• The offer is valid only for the next 48 hours.
• Incorrect spelling of FIFA in the email ID in ‘From’
Box.
• The cost of the game mentioned in the mail is not
correct.
2019-20
Chapter 7.indd 95 28-Feb-19 3:40:50 PM
Fig. 7.4: Sample email-3
Activity 2
Identify the URL(s) which are indicative of a fake
Phishing is an
website?
attempt to obtain
sensitive information http://www.uiidai.gov.in/
such as username, http://www.incometakindiaefilling.gov.in/
password and credit https://onlinesbi.com
card details etc. for
malicious reasons,
The above scenarios are examples of fraudulent emails.
by osing as a
trustworthy source in You need to be cautious before proceeding with any of
email. the instructions given in the email.
2019-20
Chapter 7.indd 96 28-Feb-19 3:40:51 PM
Protection from email fraud
• Do not reply to emails from unknown senders even if
it looks like a genuine email.
• Do not provide personal information like name, date
of birth, school name, address, parent’s names or any
other information.
• Do not fall for lucrative offers/discounts as they might
be coming from unknown source and it may not be
reliable. Ignore/delete those mails.
• Do not open attachments or click on links from
unknown senders, since they may contain
malicious files that might affect your device. Only
click the links and downloads from websites that
you trust.
• Beware of phishing websites — check the URL to
confirm if the website is secure.
• Do not forward spam or suspicious emails to others.
• Do not send excessive forwards as it might be
distracting to the receiver.
Activity 3
Can you think of ways to share your event with a larger
audience?
2019-20
Chapter 7.indd 97 28-Feb-19 3:40:51 PM
Activity 4
Search and write the names of any three social
networking sites
1. ____________________________________________________
2. ____________________________________________________
3. ____________________________________________________
2019-20
Chapter 7.indd 98 28-Feb-19 3:40:51 PM
• Avoid posting your plans and activities on
Identity theft is
networking sites
the deliberate use
• Do not create fake profiles for yourself on any of someone else’s
social networking sites identity to obtain
• If you suspect that your social networking account credit and benefits
details have been compromised or stolen, report in the name of
another person or
immediately to the support team of networking
to sometimes even
site
defame that person.
• Do not forward anything that you read on social It is one of the
media without verifying it from a trusted source. most common cyber
• Always avoid opening links and attachment crimes. It poses a
through social networking sites severe threat to a
person’s reputation,
• Never leave your account unattended after login, unlike the real world
log out immediately when you are not using it the cyber world has
a far larger reach,
The photographs and the resources you share might
hence it is essential
get you positive feedback and comments. However, at that we exercise the
times you might face instances of cyber bullying. Cyber following precautions
bullying includes: to prevent any such
• nasty comments on your posts or posts about you. incident:
• someone creating a fake profile in your name and • Never share
trying to defame you. password with
anyone
• threatening or abusive messages online or on the
• Keep strong
mobile phone.
passwords
• being excluded from online groups and forums. • Do not divulge
• embarrasing photographs put online without your your personal
permission. information
• rumors and lies about you on a site.
• stealing your account password and sending
unwanted/inappropriate messages from your
account.
• offensive chat. Cyber bullying
• fake online profiles created with an intent to includes sending,
posting or sharing
defame you.
negative, harmful,
If you become a Victim of Cyberbullying, do the following: false or mean
information and
• Do not Respond content about
If someone is cyber bullying you, do not respond or someone. It is a
retaliate by doing the same thing back. Responding or serious offence which
retaliating to cyber bullying may make matters worse or is punishable under
even get you into trouble. Cyber Law.
2019-20
Chapter 7.indd 99 28-Feb-19 3:40:51 PM
• Screenshot
Take a screenshot of anything that you think
could be cyber bullying and keep a record
of it.
• Block and Report
Most online platforms have this feature, if
someone bothers you, make sure you block
and report the offender to the social media
platform.
• Talk About It
Cyber bullying may affect you in many
different ways. Dont feel that you are alone.
Let your parents and teachers know what is
going on. Never keep it to yourself.
• Be Private
Keep your social media privacy settings high and do not
connect with anybody who you do not know offline. You
would not talk to random people on the street, so why
do it online?
• Be Aware
Remain updated with all the preventive and security
measures in the cyber world.
Exercises
1. Fill in the blanks
a. ______________ often directs users to a fake website
whose look and feel are almost identical to the
actual website.
2019-20
Chapter 7.indd 100 28-Feb-19 3:40:53 PM
b. Undesired or illegal email messages are often known
as ______________.
c. The protection of internet connected systems
including hardware, software and data from cyber
attacks is termed as _____________________.
d. A __________________ is a form of malicious software
program which can corrupt or destroy systems
or data.
2. Match the following
1 Malware a. Email
2 Spamming b. Virus
3 Cyber law c. Stealing data
4 Phishing d. Cyber crime
3. Identity whether the following statements are True
or False
a. Hacking is a cybercrime.
b. Phishing is a type of attack which is capable of
stealing your password or credit card number.
c. Social networking sites are used to share passwords
and other secret information.
d. When you are receiving harmful messages on your
computer, you may block or delete them.
2019-20
Chapter 7.indd 101 28-Feb-19 3:40:53 PM