1 of 13

NAVODAYA VIDYALAYA SAMITI� NOIDA

E-CONTENT

COMPUTER SCIENCE CLASS XI

2 of 13

SOCIETY LAW AND ETHICS (SLE-1)

CYBER SAFETY

-DESIGNED BY :-

B.KAVITHA,PGTIT

JNV VATTEM

MAHABUBNAGAR(DIST)

3 of 13

Introduction-Cyber Safety

  • Cyber safety is the safe and responsible use of Internet & ICT(Information & Communication Technology). Cyber safety is about to not only keeping information safe and secure, but also being responsible with that information, being respectful of other people online. As per Cyber safety peoples are advised to use good 'netiquette' (internet etiquettes).

4 of 13

Safely Browsing the Web

  • Viruses and malware spread, easily and quickly through websites/web browsing. Through clicking over the links found on web pages or in email mistakenly our computer may be infected. An infected computer can run slow, barrage us with pop-ups, download other programs without our permission, or allow our sensitive personal information to others.

  • Tips for Safe Web Browsing
  • Common sense : (never respond to spam & disclose personal information).
  • Use an antivirus & Firewall : It provide real time malware protection.
  • Create strong passwords
  • Mind your downloads : Be sure to review all pre-checked boxes prompted at download & un-check any extra applications which we don’t want to install.
  • Stay updated: Update O.S.Applications & Anti-virus.

5 of 13

Identity Protection

Protection against theft of personal information over Cyber Space without consent, usually for financial gain is known as Identity Protection.

Tips to Prevent Identity Theft

  • Use strong passwords and PINs & Keep passwords and PINs safe.
  • Create log-in passwords for all devices.
  • Beware of phishing scams.
  • Restore old computers to factory settings.
  • Encrypt your hard drive
  • Check security when shopping online-check links authenticity which are received from an unsolicited email.
  • Take care when posting on social media-Check security settings on social media accounts, and avoid posting personal information publicly, or publicly "checking in".
  • Secure your home Wi-Fi network& Avoid using insecure public Wi-Fi networks.

6 of 13

Confidentiality of Information

Allows authorized users to access sensitive and secured data maintains the Confidentiality of Information.

Tips to Protect Information Confidential

  • Use multifactor authentication- a computer user is granted access only after successfully presenting 2 or more pieces of evidence.
  • Masking -The free version of MaskMe creates an alternate e-mail address whenever a Web site asks for a user’s e-mail. E-mails from that site can be accessed via a MaskMe in-box or forwarded to a user’s regular e-mail account.
  • Private Browsing & Safe Browsing-Purpose of pvt browsing is to avoid leaving a history of one's browsing in the browser history on the computer we are using. Use updated browser for safe browsing & browse privately.
  • Encryption-Use https based sites,as HTTPS ensures data security over the network-mainly public networks like Wi-Fi. HTTP is not encrypted and is vulnerable to attackers. PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files

7 of 13

Cyber Safety – Social Networks

Facebook, MySpace, Twitter, LinkedIn, Digg,Ning, MeetUp etc….. -- the number of social networking sites and tools is exploding nowadays.These are becoming soft tool to attack & target for scam.

  • Use a strong password
  • Use a different password for each social media
  • Password protect your devices if using social media apps
  • Be selective with friend requests.
  • Be careful while sharing something.

  • Become familiar with the privacy policies of the social media sites.

  • Install antivirus

  • log off when done

  • Create a smaller social network

Tips to stay safe on social media

8 of 13

Cyber trolls & Cyber bullying

1. Cyber trolling: is internet slang for a person who intentionally starts arguments or upsets others by posting inflammatory remarks. The sole purpose of trolling is angering people.

Purpose to entertain, to argument, to upset victim, to get attention.

2. Cyberbullying: Saying and/or doing mean things to the person online. It is a harm inflicted through using the Internet, CT devices, or mobile phones.

Purpose to get revenge, to harass & threat, to humiliate.

3. Cyber stalking: Doing research on every aspect of the person’s life.

4. Cyber harassment: Continuously contacting the person online, even though they don’t want you to.

9 of 13

Appropriate Usage of Social Network

Social Network refers to web and mobile technologies or their practices to share content, thoughts, ideas, opinions, experiences etc. online. Various examples of social networks are Facebook, Twitter, YouTube, LinkedIn, and blogging sites among many others.

10 of 13

Appropriate Usage of Social Network

  • Digital Footprint-
  • The history of a person's usage of digital devices, movie programs watched, flight searched, websites surfed, credit card transaction cell phone calls, social media, messages sent, links clicked and Facebook pages liked etc. Such information is being used to target ads to consumers as these are digital footprint of such consumers.

Problems to Avoid

  1. Cyber trolling
  2. Cyberbullying
  3. Cyber stalking
  4. Cyber harassment
  5. Stranger Danger-

Children's are advised to not to interact with strangers on social media networks as there are chances that many people on not who they say they are.

11 of 13

Appropriate Usage of Social Network

When a spreader meet an ignorant, the ignorant will become a spreader.

When two spreaders meet with each other, one of them will become a stifler.

When a spreader meet a stifler, the spreader will lose the interest in spreading the rumor, so become a stifler.

Problems to Avoid

  • Spread of rumors

A lie can travel halfway around the world before the truth has got its boots, this phrase totally fits with rumors spread over social media. On average, it takes more than 12 hours for a false claim to be debunked online where as only 2 hours for true claim.

A standard model of rumor spreading is given by Daley and Kendall, which is called DK model. In this model there are N people in total. Which are categorized into three groups: ignorant, spreaders and stifles, which are denoted as S, I, and R.

12 of 13

Appropriate Usage of Social Network

COMMON USAGE OF SOCIAL MEDIA(FACEBOOK,TWITTER ETC..,)

  1. Don’t be rude or abusive
  2. Don’t spread rumors
  3. You are what you write/tweet
  4. Face your problems, don’t Post/ Facebook your problems.
  5. Don’t take it too seriously.
  6. Don’t use fake name
  7. Protect your identity
  8. Respect other’s sentiments
  9. Don’t fight online
  10. Monitor comments

13 of 13

BIBLIOGRAPHY:

1. Computer Science Textbook for class XI

by NCERT

2. Computer Science with Python

by Sumitha Arora

3. Computer Science with Python

by Preeti Arora