Chapter 14 Cyber Safety
Cyber safety refers to the safe and responsible use of the Internet, emphasizing the importance of not only protecting information but also being respectful and responsible while engaging online.
Viruses and malware can spread easily and quickly through web browsing. Clicking on links in web pages or emails can infect your computer, leading to issues such as slow performance, excessive pop-ups, and unauthorized downloads, which can expose sensitive personal information.
Identity fraud occurs when personal details are stolen and used to commit fraudulent acts while pretending to be the victim. There are several types of identity theft, including financial, criminal, and medical identity theft.
When visiting websites, your device’s IP address and browsing history may be accessed by third parties, including advertisers and criminals. Websites collect information through various means such as:
IP Address: A unique address for your device while connected to the internet.
Cookies and Tracking Scripts: Small pieces of information stored in your browser that can identify you and track your browsing activity. These include:
First Party Cookies: Store login IDs and passwords for frequently visited websites.
Third Party Cookies: Allow websites to access your browsing history for targeted advertisements.
HTTP Referrer: Information about you shared with a website when you click links.
Super Cookies: Also known as persistent cookies, they remain even after deletion by storing data in multiple locations.
User Agent: Information about your browser and operating system sent to a website.
Anonymous browsers enable users to access websites without sharing personal details, while private browsing prevents search history from being saved. Three methods for maintaining privacy include:
Incognito Browsing: A mode that prevents tracking and minimizes information retention, although it can be visible to organizations like schools or workplaces.
Proxy: Masks your IP address by using the proxy site’s information instead.
Virtual Private Network (VPN): Enhances security and privacy on public networks by changing your IP address, shielding you from potential hackers.
Cybercrime encompasses criminal offenses facilitated by electronic communications, including crimes such as phishing, cyberbullying, cyberterrorism, and the creation or distribution of viruses. Key elements include:
Cyber Trolling: Deliberately instigating arguments online to provoke others.
Cyber Stalking: Harassment through persistent online actions and messages.
Spreading Rumors Online: Creating fake profiles to disseminate harmful allegations.
Online Fraud: Involves scams such as non-delivery of goods and identity theft, notably credit card fraud.
Information Theft: Using deception to gather sensitive information, which includes:
Phishing: Getting confidential information through imitation websites.
Social Engineering/Pretexting: Posing as legitimate entities to obtain personal data.
Scams: Fraudulent schemes targeting naive individuals to steal money.
Illegal Downloads: Obtaining files unlawfully, including pirated materials.
Child Pornography: The illegal distribution of visual materials involving minors.
If you encounter cybercrime, it is crucial to report it to parents, school authorities, and subsequently to the police. Filing a complaint can involve traditional methods or submitting an ‘E-FIR’ online. Special platforms exist for reporting incidents involving women and children, initiated by the Ministry of Home Affairs.
Cyber safety refers to the safe and responsible use of the Internet, emphasizing the importance of not only protecting information but also being respectful and responsible while engaging online.
Viruses and malware can spread easily and quickly through web browsing. Clicking on links in web pages or emails can infect your computer, leading to issues such as slow performance, excessive pop-ups, and unauthorized downloads, which can expose sensitive personal information.
Identity fraud occurs when personal details are stolen and used to commit fraudulent acts while pretending to be the victim. There are several types of identity theft, including financial, criminal, and medical identity theft.
When visiting websites, your device’s IP address and browsing history may be accessed by third parties, including advertisers and criminals. Websites collect information through various means such as:
IP Address: A unique address for your device while connected to the internet.
Cookies and Tracking Scripts: Small pieces of information stored in your browser that can identify you and track your browsing activity. These include:
First Party Cookies: Store login IDs and passwords for frequently visited websites.
Third Party Cookies: Allow websites to access your browsing history for targeted advertisements.
HTTP Referrer: Information about you shared with a website when you click links.
Super Cookies: Also known as persistent cookies, they remain even after deletion by storing data in multiple locations.
User Agent: Information about your browser and operating system sent to a website.
Anonymous browsers enable users to access websites without sharing personal details, while private browsing prevents search history from being saved. Three methods for maintaining privacy include:
Incognito Browsing: A mode that prevents tracking and minimizes information retention, although it can be visible to organizations like schools or workplaces.
Proxy: Masks your IP address by using the proxy site’s information instead.
Virtual Private Network (VPN): Enhances security and privacy on public networks by changing your IP address, shielding you from potential hackers.
Cybercrime encompasses criminal offenses facilitated by electronic communications, including crimes such as phishing, cyberbullying, cyberterrorism, and the creation or distribution of viruses. Key elements include:
Cyber Trolling: Deliberately instigating arguments online to provoke others.
Cyber Stalking: Harassment through persistent online actions and messages.
Spreading Rumors Online: Creating fake profiles to disseminate harmful allegations.
Online Fraud: Involves scams such as non-delivery of goods and identity theft, notably credit card fraud.
Information Theft: Using deception to gather sensitive information, which includes:
Phishing: Getting confidential information through imitation websites.
Social Engineering/Pretexting: Posing as legitimate entities to obtain personal data.
Scams: Fraudulent schemes targeting naive individuals to steal money.
Illegal Downloads: Obtaining files unlawfully, including pirated materials.
Child Pornography: The illegal distribution of visual materials involving minors.
If you encounter cybercrime, it is crucial to report it to parents, school authorities, and subsequently to the police. Filing a complaint can involve traditional methods or submitting an ‘E-FIR’ online. Special platforms exist for reporting incidents involving women and children, initiated by the Ministry of Home Affairs.