0% found this document useful (0 votes)
20 views4 pages

Cyber Safety

The document discusses various aspects of cyber safety, security, and ethics, including the concept of digital footprints, data protection, and intellectual property rights. It outlines the importance of being a responsible netizen and the implications of cyber crimes such as hacking, phishing, and cyberbullying. Additionally, it emphasizes the need for preventive measures against cyber threats and the guidelines provided by the Indian Information Technology Act.

Uploaded by

chongasinghal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

Cyber Safety

The document discusses various aspects of cyber safety, security, and ethics, including the concept of digital footprints, data protection, and intellectual property rights. It outlines the importance of being a responsible netizen and the implications of cyber crimes such as hacking, phishing, and cyberbullying. Additionally, it emphasizes the need for preventive measures against cyber threats and the guidelines provided by the Indian Information Technology Act.

Uploaded by

chongasinghal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CYBER SAFETY / SECURITY / SOCIETY LAW AND ETHICS

Digital footprint •

A digital footprint is an impact you create on the Web through your online activity,
which incorporates browsing, interactions with others, and publication of content.
• In other words, it can be considered as the data trail – intentional and unintentional
- you leave behind while you surf the Web or Internet.
• Digital footprint or digital shadow refers to the trail of data left behind through the
utilization of the Web or on digital devices
Find some of the examples of digital footprints:
• Visiting Websites And Online Shopping
• Online Searching
• Posting on Social Media, blogs, etc.
• Online Image and Video Upload
• Communicating Online (Ex:- Chat, Email, etc.)
• Any activity you perform Online etc
Digital Society and and Netizen
• Anyone who uses digital technology along with Internet
is a digital citizen or a netizen. Being a good netizen means practicing safe, ethical and
legal use of digital technology. A responsible netizen must abide by net etiquettes,
communication etiquettes and social media etiquettes
Net Etiquettes:
o Be Ethical
o Be Respectful
o Be Responsible

Data Protection:
Elements of data that can cause substantial harm, embarrassment,
inconvenience and unfairness to an individual, if breached or compromised, is called
sensitive data. Examples of sensitive data include biometric information, health
information, financial information, or other personal documents, images or audios or
videos. All over the world, each country has its own data protection policies (laws).

Intellectual Property Rights(IPR)


Intellectuals Property refers to the inventions, literary and artistic
expressions, designs and symbols, names and logos. The ownership of such concepts lies
with the creator, or the holder of the intellectual property.

Copyright:
Copyright grants legal rights to creators for their original works like writing,
photograph, audio recordings, video, sculptures, architectural works, computer software,
and other creative works like literary and artistic work. Copyright law gives the copyright
holder a set of rights that they alone can avail legally. It prevents others from copying, using
or selling the work.

Patent:
A patent is usually granted for inventions. Unlike copyright, the inventor needs to
apply (file) for patenting the invention. When a patent is granted, the owner gets an
exclusive right to prevent others from using, selling, or distributing the protected invention.

Trademark:
Trademark includes any visual symbol, word, name, design, slogan, label,
etc., that distinguishes the brand or commercial enterprise, from other brands or commercial
enterprises. For example, no company other than Nike can use the Nike brand to sell shoes
or clothes.

Violation of IPR
Violation of intellectual property right may happen in one of the following
ways:
Plagiarism:
Presenting someone else’s idea or work as one’s own idea or work is called
plagiarism. If we copy some contents from Internet, but do not mention the source or the
original creator, then it is considered as an act of plagiarism.

Copyright Infringement:
Copyright infringement is when we use other person’s work without
obtaining their permission to use or we have not paid for it, if it is being sold.

Trademark Infringement: Trademark Infringement means unauthorised use of other’s


trademark on products and services.

General Public License(GPL):


GPL is primarily designed for providing public licence to a software.
GNU GPL is another free software license, which provides end users the freedom to run,
study, share and modify the software, besides getting regular updates.
Creative Commons(CC):
CC is used for all kind of creative works like websites, music, film,
literature, etc. CC enables the free distribution of an otherwise copyrighted work. It is used
when an author wants to give people the right to share, use and build upon a work that they
have created
Apache: The Apache License is a permissive free software license written by the Apache
Software Foundation (ASF).
Cyber crime: Cybercrime is a crime that involves a computer and a network. The computer
may have been used to commit the crime and in many cases, it is also the target.
Cybercrime may threaten a person or a nation’s security and financial health..
Hacking:
An effort to attack a computer system or a private network inside a computer
is known as hacking. Simply, it is unauthorized access to or control of computer network
security systems with the intention of committing a crime
Cyber trolls & Cyber bullying
Cyber trolling is internet slang for a person who intentionally starts arguments
or upsets others by posting inflammatory remarks. The sole purpose of trolling is angering
people. Purpose – to entertain, to argument, to upset victim, to get attention Cyber bulling:
Saying and/or doing mean things to the person online.
Cyber stalking: Doing research on every aspect of the person’s life.
Cyberharrassment: Continuously contacting the person online, even though they don’t want
you to.

Eavesdropping;
It is the act of secretly listening to a private conversation of others without
their consent. The main purpose of eavesdropping is to steal data.
Phishing: • It is the way in which an authentic looking webpage or website is created to get
sensitive information of users which may include their name, password, phone number,
email address and bank details. • So you must look at address bar of web browser to verify
the name of website where you are providing your information .

Ransomware: • Ransom ware is a malware that hold data of persons at ransom. This data
is encrypted and the user is unable to access his personal files or organizational files. The
user has to pay a ransom price in order to get back his files and data.

Preventing Cyber Crime Following points can be considered as safety measures to reduce
the risk of cyber crime:
Take regular backup of important data.
Use an antivirus software and keep it updated always.
Avoid installing pirated software. Always download software from known and secure
(HTTPS) sites.
Always update the system software which include the Internet browser and other
application software.
Do not visit or download anything from untrusted websites.
Cyber Safety Important:
One of the prime reasons for implementing Cyber Safety is the
protection of confidential data. Cyber Safety can protect these data to a great extent. These
data protection go a long way, especially in cases of government-related data

Types of Cyber Attacks


Malware: Malware could be computer viruses, worms, Trojan horses, dishonest spyware,
and malicious. Computer
virus: It is a small piece of software that can spread from one infected computer to
another. It can corrupt, steal, or delete data on your computer/hard drive.
Trojan horse: can do anything from record your passwords by logging keystrokes (known
as a key logger) to hijacking your webcam to watch and record your every move.
Computer worm: A computer worm is a software program that cans copy itself from one
computer to another, without human interaction. Spam: unwanted messages in your email
inbox.
Phishing:
Phishing are fraudulent attempts by cybercriminals to obtain private
information. For e.g. a message prompt your personal information by pretending that bank/
mail service provider is updating its website.
Spyware: spyware is used to spy on their victims. An e.g. is key logger software that records
a victim’s every keystroke on his or her keyboard.
Adware: unwanted ads shown while surfing internet.

Indian Information Technology Act(IT Act)


The Government of India’s Information Technology Act,
2000 (also known as IT Act), amended in 2008, provides guidelines to the user on the
processing, storage and transmission of sensitive information.
Safely Browsing the Web
Install and use antivirus software.
Use a Firewall.
Use strong passwords.
Update your security software.
What is Cyber Safety?
Cyber safety is the security protocol that is curated by cyber security experts. Users
must follow cyber safety rules to use the internet. Several organisations have their
own cyber safety rules.
What is Cyber Ethics?
Cyber ethics is a set of morally correct rules. It is also a security protocol that decides a code
of behaviour. It must be followed and taken care of while using the online environment. A
responsible citizen must follow these rules while using the internet.

You might also like