Unit 4-1 Cyber Safety
Unit 4-1 Cyber Safety
.
O
C
&
19.1 Introduction 19.5 Confidentiality of Information
19.2
19.3
What is Cyber Safety ?
Safely Browsing the Web
AI 19.6
19.7
Cybercrime
Common Social Networking Sites
R
19.4 Identity Protection While Using Internet 19.8 Appropriate Usage of Social Networks
T
PA
CYBER SAFETY
19.1 INTRODUCTION
AN
Today’s age cannot be even thought of without Internet, even in dreams. Although Internet has
made many things easier but at the same time it has posed many security risks too, if not used in
a proper way. Thus, it is important to know about possible threats, challenges and risks of
H
working on Internet to ensure personal safety and information security. This chapter deals with
the same. It talks about possible risks and threats on Internet and the safety measures to avoid
D
them.
.19.1
19.2 SUPPORT MATERIAL
.
O
unknown dangers.
All this and more, we are covering in coming sections.
C
19.4 IDENTITY PROTECTION WHILE USING INTERNET
&
We surf the Internet for a variety of reasons, from using social media, buying and selling goods,
to sending information. When we give out private data to businesses and other Internet users
(such as while filling up some forms or making payments online), we trust them to use that
AI
information for legitimate purposes. This isn’t always the case
Identity theft
though and financial and personal data can be used for harmful
R
reasons like hacking, stalking and identity fraud. Identity Identity theft is a type of fraud
that involves using someone
fraud is when personal details that have been accessed or stolen else’s identity to steal money or
are used to commit fraudulent acts posing as someone else with
T
third parties, like advertisers or criminals. This way websites track you. Tracking is generally
D
used by advertising networks to build up detailed profiles for pinpoint ad-targeting even
tracking down users for special purpose such as effecting their political choices. Recall the data
tracking reported in US elections, Brazil elections and many more.
The type of information is compiled through your web usage patterns, and which websites
generally use for tracking you. This generally includes :
(a) IP Address
IP address is a unique address of your device when you connect to the Internet. It’s likely that
your computer shares your IP address with the other networked devices in your house or office.
From your IP address, a website can determine your rough geographical location.
(b) Cookies and Tracking Scripts
Cookies are small pieces of information websites can store in your browser. They have plenty of
legitimate uses – for example, when you sign into your online-banking website, a cookie
UNIT 4-1 : CYBER SAFETY 19.3
.
(ii) Third party cookies. These are the cookies that websites store to know about your
O
search history and web browsing history so as to place advertisements as per your
interests.
C
Third party cookies may result in many unwanted advertisements on your webpages.
(c) HTTP Referrer
&
When you click a link, your browser loads the web page linked to it and tells the website where
you came from. For example, if you clicked a link to an outside website on a webpage e.g., (see
AI
figure below) then the linked website will get opened and internally information about you
such as your IP address, location, your web browser, machine type etc. will also be provided to the
R
linked website – it is known as the HTTP referrer (e.g., see figure below).
T
PA
AN
.
access websites anonymously. It can be used as a tool for governments, journalists and
O
everyday security-conscious surfers.
C
There is another type of browsing – Private browsing.
Private Browsing
&
There are other ways to use the Internet without revealing your search history and sharing your
data. These are :
AI
m Incognito browsing opens up a version of the browser that will not track your activity.
It’s particularly useful if you’re entering sensitive data like bank details into the browser,
R
as it can minimise the risk of your information being saved to that computer. It can also be
used for purposes like – to look at surprise gifts for the family without leaving clues,
searching for hotel rooms for your vacation, filling examination forms etc. But this
T
information is still visible to your school, university or organization. You may also use
private browsers and search engines like DuckDuckgo.
PA
m Proxy works by acting as a middleman between your computer and the website you want
to access. Now the tracking website will get the IP address and information that belongs
to the proxy site, so you are effectively getting the same content from another source
AN
Similarly, on your computer system or in a private network, you would certainly want that
crucial information is protected and is not publically visible. Confidentiality of information
ensures that only authorized users get access to sensitive and protected data.
.
Your system must be secured such that only authentic users can connect to it. Firewall is one
O
very good solution for this. Firewall is a program that monitors all communications and traps
all illicit packets. Most operating systems now come with a firewall preinstalled. However,
C
some, such as the Windows Firewall, only block suspect incoming communications, leaving
completely open access to the Internet from your machine.
&
Thus, it is recommended that you install a firewall that can monitor both incoming and
outgoing communication and traps the illicit ones.
AI
2. Control browser settings to block tracking
You already know that websites can track your surfing on their site by IP address and related
R
system information, including system names and Internet network addresses that often
uniquely identify your computer. Search engines generally record your queries together with
T
especially third party cookies, since they can be used to build up detailed profiles of your
surfing patterns over time.
3. Browse privately wherever possible
AN
To avoid the tracking by websites, you should try to browse Internet privately wherever
possible. This way websites would not be able to store cookies on your computer, which give
information about your search pattern and surf history.
H
You should know that posting is public. When you post anything to a public Internet such as
social networking sites like Instagram or Facebook etc., newsgroup, mailing list, or chat room, you
generally give up the rights to the content and any expectation of privacy or confidentiality is
useless. In most countries, anything you post to a public space can be saved, archived,
duplicated, distributed, and published, even years later, by anyone in the same way as a
photograph taken in a public space like a city park.
So ensure that you never post your crucial information like your personal details such as
address, mobile phone number, bank details, credit card details etc. on public Internet sites.
5. Ensure Safe sites while entering crucial information
Sometimes, you have a need to provide your crucial information such as your personal details
or bank details etc. For example, you might be applying online to register for an entrance exam
through a legitimate site that asks for your personal details.
19.6 SUPPORT MATERIAL
Closed
pad
lock
.
O
C
&
AI
R
https:// in a URL means it is a secure connection and no one can see your private information.
T
When there is no https or the URL contains only http, then it is an insecure connection, which
means your private information may get leaked.
PA
While opening an email, make sure that you know the sender. Even if you open the email
message by accident, make sure not to open attachment in an email from unrecognized source.
Emails containing sensitive information should be deleted securely.
H
Also, your email might contain a link to legitimate looking website; never click on any link inside
an email to open it. The link might look legit but it may take you to a fraudulent site. Even if
D
you need to visit the linked website, type the URL of the website on your own in the address bar
of a web browser but never open any link by clicking inside an email or by copying its link.
7. Do not give sensitive information on wireless networks
Sometimes, you get access to some wireless connections such as the Wi-Fi connections available
on Airports or Railway stations. While using such Wi-Fi connections, make sure not to open any
personal email or provide any sensitive information on a website. The reason for this is that
most free wireless networks are not encrypted and hence information on it can be tapped and
used for fraudulent purposes.
8. Avoid using public computers
Always try not to use the public computer especially if you have to deal with your crucial data.
But if you need to work on a public computer, then make sure following things :
(a) Browse privately, first of all. (b) Don’t save your login information.
UNIT 4-1 : CYBER SAFETY 19.7
19.6 CYBERCRIME
Cybercrime is any criminal offense that is facilitated by, or Cybercrime
involves the use of, electronic communications or information
.
Any criminal offense that is
O
systems, including any electronic device, computer, or the facilitated by, or involves the use
Internet. The term, cybercrime, is a general term that covers of, electronic communications or
C
crimes like phishing, credit card frauds, illegal downloading, information systems, including
any electronic device, computer,
industrial espionage, child pornography, cyber bullying, cyber
or the Internet is referred to as
stalking, cyber terrorism, creation and/or distribution of viruses,
&
Cybercrime.
spam and so on.
Let us talk about some common cybercrimes. AI
Cyber Trolls and Bullying
R
Cyber troll refers to a person who purposely posts opposing-, sarcastic-, demeaning- or
insulting- comments about something or someone with an aim of targeting a person online. The
provocative messages posted this way are also called troll. So the word troll can refer to a
T
person also who is doing it and it may refers to the Cyber Trolls
PA
Cyber Bullying
Cyberbullying occurs when someone uses the Internet, a cell phone, email, instant messaging,
chat rooms, or social networks, such as Facebook, Twitter etc., to harass, demean, embarrass, or
H
intimidate someone else. It is commonly a crime committed by teens too, as their growing
access to electronic communication makes it possible to make fun of or ostracize others. The
D
problem spreads like wildfire as the bully can hide behind the anonymity of a login identity,
while encouraging other kids to join in the “fun” of harassing the victim.
Cyberbullying is a crime, garnering such criminal charges as Cyber Bullying
harassment, libel, assault, and even terrorism. In addition to Harassing, demeaning, embar-
criminal charges, cyberbullies may be held responsible for rassing, defaming or intimidating
the damage they do in a civil lawsuit, where they may be someone using modern techno-
logies like Internet, cell phones,
ordered to pay for it.
instant messengers, social networks
etc., is called Cyber Bullying.
Cyber Stalking
This is a kind of online harassment wherein the victim is subjected to a barrage of online
messages and emails. Typically, these stalkers know their victims and instead of resorting to
offline stalking, they use the Internet to stalk. A cyber stalker relies upon the anonymity
afforded by the Internet to allow them to stalk their victim without being detected.
19.8 SUPPORT MATERIAL
.
m Some stalkers keep on sending repeated e-mails asking for various kinds of favors or
O
threaten the victim.
m Stalkers follow their victim from board to board. They “hangout” on the same social
C
networking site as their victim, many times posting notes to the victim, making sure the
victim is aware that he/she is being followed.
&
m Stalkers will almost always make contact with their victims through email having
friendly or threatening content. The stalker many times uses multiple names when
AI
contacting the victim.
false information on social media, or comments that could hurt others or spread rumours that
PA
may trigger panic or hurt religious sentiments of other people resulting into clashes and even
riots etc.
Spreading rumours online is a cybercrime and is a punishable offence. As per Information
AN
police. The procedure for reporting cybercrimes is more or less the same as for reporting any
other kind of offence.
That is, to report a cybercrime :
m The local police stations can be approached for filing complaints just as the cybercrime
cells specially designated with the jurisdiction to register complaint.
m In addition, provisions have now been made for filing of ‘E-FIR’ in most of the states.
m In addition, the Ministry of Home Affairs is also launching a website for registering
crimes against women and children online including cybercrimes.
The Information Technology Act categorically provides that a cybercrime has global
jurisdiction, meaning that the crime may be reported in the Cyber Crime Units of any city,
irrespective of the place where the act was committed.
UNIT 4-1 : CYBER SAFETY 19.9
.
(ii) Twitter. It is a microblogging site which allows to post very small messages (earlier
O
limit was 140 characters, now extended to 280 characters).
(iii) LinkedIn. It is a social network for professionals. It provides features to make profiles
C
look sort of detailed resumes, with sections for work experience, education, volunteer work,
certifications, awards and all sorts of other relevant work-related information.
&
(iv) Instagram. It is one of the most popular social networks for online photo sharing. It
offers features like sharing real-time photos and short videos while on the go.
AI
Some other popular social networking sites are Google+, Pinterest, SnapChat, Reddit etc.
R
19.8 APPROPRIATE USAGE OF SOCIAL NETWORKS
Social media is everywhere these days. From personal to professional front, we encounter social
T
media in multiple ways – directly or indirectly. And thus, this direct and indirect connectivity
with social media has made it too difficult to remain entirely anonymous these days. In fact, the
PA
openness that the Internet offers has resulted into a bigger challenge, sometimes danger that the
information we post online can be shared like never before.
Do you know that whatever you do online – post something or visit friends’ pages or search
AN
something etc. leaves a permanent foot print, called digital footprint and it remains for years
storing trails of your online activities. Although most of the times the social media that we use is
for personal reasons and most of the conversations here harmless, but still, once posted these
H
become part of public domain and hence are visible to anyone who looks for it. This might not
cause any problem now, BUT sometimes later it can pose potential problems when it comes to
D
matters like – taking admission in higher education or looking for a job or even when looking
for a life partner. This is because, these days, many universities look for digital footprint of
applicant students before giving them admission. Similarly employers also may look for digital
footprint of candidates and so on.
Thus appropriate usage of social networks is very important and you must be aware that it may
pose problems later if not used appropriately. In the following section we talk about what you
should know, what you should avoid and rules you should follow while using social media.
activities without getting caught, he/she is certainly mistaken. Modern technology tools can
find anyone online using IP address, location etc. So, one must not indulge in these activities at
all.
Other than that there are some dangers and possible traps that you must know about.
Digital Footprint
Digital footprints are the records and traces individuals Digital Footprints
leave behind as they use the Internet. Digital Footprints are the
Your interactions on social media, your friend circle on social records and traces individuals’
activities as they use the
media sites, sites you visit, online purchases, locations visited
Internet. Digital footprints are
through Facebook check-ins etc. all make up your digital
.
permanently stored.
O
footprints.
A common comparison to digital footprints is the footprints you leave behind you when walk
C
along a beach. Every step you take leaves an impression on the sandy surface that allows
another person to see the marks that your activity has made and offers the possibility for them
to follow your trail. Digital footprints are also referred to as “digital tattoos”.
&
Unlike a beach footprint which will eventually fade away, the Internet – and any electronic
‘event’ in general – doesn’t work the same way. It’s safe to assume that anything you do,
AI
publish or post online may be there permanently and won’t be ‘washed away’.
Mistakes aren’t as easy as they used to be because once we post anything online, it stays forever
R
and cannot be undone, Digital Footprints last forever, and colleges and jobs will look back at
them to see if you are what you portray and how you conduct yourself actually.
T
Privacy Settings
PA
When you start using social media, you should not go with default privacy settings. Rather it is
always a good idea to set-up privacy settings yourself by using Account settings. Through
privacy settings, you can control:
AN
In short, you should always set-up privacy settings for all types of social media yourself.
D
.
O
5. Protect Your Identity
While you should be honest about yourself, BUT you should never provide or post personal
C
information online. The scam artists or identity thieves keep looking for such things and can use
your information to conduct some fraud or crime.
&
Thus, NEVER list your full name, parents’ details, home address or telephone number online. It
is a good idea to create a separate e-mail address that is used only with social media sites. Also,
AI
you should never share about your location online; thieves are always ready and love such
opportunities.
R
6. Does Your Information/Post Pass the Publicity Test ?
Before you post something online, perform Publicity test on
T
1. What make your online identity ? Ask yourself, would I want to see this published in the
2. What are cookies ? newspaper or posted on a billboard tomorrow or ten years
3. What are super cookies ? from now? If your answer is Yes, feel free to post it.
H
9. Monitor Comments
Most people who maintain social media sites welcome comments— it builds credibility and
community. You should prefer to review and approve comments before posting them on your
site. This way you will ensure the quality of comments. But this also needs that you should
respond in a timely way to comments so that comments posting happens in a stipulated
amount of time and is not delayed for unnecessarily long period.
With this we have come to the end of this chapter. Let us quickly revise what we have learnt so
far.
.
Let Us Revise
O
C
Ç Cyber Safety refers to the safe and responsible use of Internet so that to ensure safety and security of personal
information and not posing threat to anyone else’s information.
&
Ç Websites track you when you work online by tracking your IP address, search habits, shopping preferences etc.
Ç Cookies are small text files storing small piece of information related to your online habits.
Ç Persistent cookies are called supercookies.
AI
Ç A type of browsing wherein browser opens in incognito mode and does not store cookies about your online activity,
is called Private browsing.
R
Ç Confidentiality of information ensures that only authorized users get access to sensitive and protected data.
Ç Any criminal offense that is facilitated by, or involves the use of, electronic communications or information systems,
T
including any electronic device, computer, or the Internet is referred to as Cyber Crime.
PA
permanently stored.
Ç One must set-up privacy settings for a social media site oneself.
Ç While using a social networking site, one should follow usage rules like : Be authentic, don’t use fake names don’t
H
pick fights online, protect identity, test your post for ‘publicity test’, respect your audience etc.
D
Solved Problems
3. Is it all right to give your name, address and birth date when registering to use a Website online?
Solution. No. It is never a good idea to give out your birth date on the Internet. Most websites
request this as an option. Protect yourself from identity thieves and ignore this request.
4. Robin wanted to gift his friend a football or a wrist watch. So he searched for many sports items and wrist
watches online.
But after that everytime he goes online, his web browser shows him advertisements about sports items and
wrist watches.
(a) Why is this happening ? (b) How could have Robin avoided them ?
(c) How can Robin get rid of this now ?
.
Solution.
O
(a) This is happening because third party cookies saved his search preferences and now websites are
posting advertisements based on his preferences.
C
(b) Robin could have avoided this by privately browsing i.e., opening the web browser in incognito
mode before searching for such things.
&
(c) Now Robin can delete all the previous history and cookies stored on his computer. This would
stop websites posting advertisements.
5.
AI
Nivedita has recently shifted to new city and new school. She does not know many people in her new city and
school. But all of a sudden, someone is posting negative, demeaning comments on her social networking profile,
school site’s forum etc.
R
She is also getting repeated mails from unknown people. Everytime she goes online, she finds someone chasing
her online.
T
(a) What is this happening to Nivedita ? (b) What action should she taken to stop them ?
PA
Solution. (a) Nivedita has become a victim of cyber bullying and cyber stalking.
(b) She must immediately bring it into the notice of her parents and school authorities. And she must
report this cyber crime to local police with the help of her parents.
AN
Internet, email, instant messages, chat rooms or social networking sites etc. Cyber trolling, which
means posting of sarcastic-, demeaning- or insulting- comments about someone, is also considered
D
8. What measures should one take to avoid and maintain confidentiality of personal information?
Solution. Some common measures that one can take to protect one’s identity online are:
³ Never open suspicious texts or emails – always delete them.
³ Never send money or give credit card, online account details or copies of personal
documents to anyone you don’t know or trust.
³ Choose passwords that would be difficult for others to guess, and update them regularly.
Don’t use the same password for every account, and don’t share them with anyone.
³ Secure your networks and devices with anti-virus software and a good firewall.
³ Avoid using public computers or Wi Fi hotspots to access or provide personal information.
³ Be very careful about how much personal information you share on social network sites.
.
O
When making online payments, only pay for items using a secure payment service—look for a URL
starting with ‘https’ and a closed padlock symbol, or a payment provider such as PayPal.
C
Glossary
&
Cookie A small text files on a computer storing small piece of information related to online habits of the user
AI
Private A type of browsing wherein browser opens in incognito mode and does not store cookies about your online
Browsing activity
R
Cybercrime Any criminal offense involving the use of, electronic communications or information systems or Internet etc.
T
PA
Assignments
5. What is Private browsing ? Why is it considered a better way of browsing the Internet ?
D