Cyber Safety
Cyber Safety
Digital footprint •
A digital footprint is an impact you create on the Web through your online activity,
which incorporates browsing, interactions with others, and publication of content.
• In other words, it can be considered as the data trail – intentional and unintentional
- you leave behind while you surf the Web or Internet.
• Digital footprint or digital shadow refers to the trail of data left behind through the
utilization of the Web or on digital devices
Find some of the examples of digital footprints:
• Visiting Websites And Online Shopping
• Online Searching
• Posting on Social Media, blogs, etc.
• Online Image and Video Upload
• Communicating Online (Ex:- Chat, Email, etc.)
• Any activity you perform Online etc
Digital Society and and Netizen
• Anyone who uses digital technology along with Internet
is a digital citizen or a netizen. Being a good netizen means practicing safe, ethical and
legal use of digital technology. A responsible netizen must abide by net etiquettes,
communication etiquettes and social media etiquettes
Net Etiquettes:
o Be Ethical
o Be Respectful
o Be Responsible
Data Protection:
Elements of data that can cause substantial harm, embarrassment,
inconvenience and unfairness to an individual, if breached or compromised, is called
sensitive data. Examples of sensitive data include biometric information, health
information, financial information, or other personal documents, images or audios or
videos. All over the world, each country has its own data protection policies (laws).
Copyright:
Copyright grants legal rights to creators for their original works like writing,
photograph, audio recordings, video, sculptures, architectural works, computer software,
and other creative works like literary and artistic work. Copyright law gives the copyright
holder a set of rights that they alone can avail legally. It prevents others from copying, using
or selling the work.
Patent:
A patent is usually granted for inventions. Unlike copyright, the inventor needs to
apply (file) for patenting the invention. When a patent is granted, the owner gets an
exclusive right to prevent others from using, selling, or distributing the protected invention.
Trademark:
Trademark includes any visual symbol, word, name, design, slogan, label,
etc., that distinguishes the brand or commercial enterprise, from other brands or commercial
enterprises. For example, no company other than Nike can use the Nike brand to sell shoes
or clothes.
Violation of IPR
Violation of intellectual property right may happen in one of the following
ways:
Plagiarism:
Presenting someone else’s idea or work as one’s own idea or work is called
plagiarism. If we copy some contents from Internet, but do not mention the source or the
original creator, then it is considered as an act of plagiarism.
Copyright Infringement:
Copyright infringement is when we use other person’s work without
obtaining their permission to use or we have not paid for it, if it is being sold.
Eavesdropping;
It is the act of secretly listening to a private conversation of others without
their consent. The main purpose of eavesdropping is to steal data.
Phishing: • It is the way in which an authentic looking webpage or website is created to get
sensitive information of users which may include their name, password, phone number,
email address and bank details. • So you must look at address bar of web browser to verify
the name of website where you are providing your information .
Ransomware: • Ransom ware is a malware that hold data of persons at ransom. This data
is encrypted and the user is unable to access his personal files or organizational files. The
user has to pay a ransom price in order to get back his files and data.
Preventing Cyber Crime Following points can be considered as safety measures to reduce
the risk of cyber crime:
Take regular backup of important data.
Use an antivirus software and keep it updated always.
Avoid installing pirated software. Always download software from known and secure
(HTTPS) sites.
Always update the system software which include the Internet browser and other
application software.
Do not visit or download anything from untrusted websites.
Cyber Safety Important:
One of the prime reasons for implementing Cyber Safety is the
protection of confidential data. Cyber Safety can protect these data to a great extent. These
data protection go a long way, especially in cases of government-related data