Skip to main content

                                    CYBER SAFETY


Introduction-Cyber Safety :-
Cyber safety is the safe and responsible use of Internet & ICT(Information & Communication Technology). Cyber safety is about to not only keeping information safe and secure, but also being responsible with that information, being respectful of other people online. As per Cyber safety peoples are advised to use good 'netiquette' (internet etiquettes).

Safely Browsing the Web :-

Viruses and malware spread, easily and quickly through websites/web browsing. Through clicking over the links found on web pages or in email mistakenly our computer may be infected. An infected computer can run slow, barrage us with pop-ups, download other programs without our permission, or allow our sensitive personal information to others. 
Tips for Safe Web Browsing
  Common sense-(never respond to spam & disclose personal information).
  Use an antivirus & Firewall-It provide realtime malware protection. 
Create strong passwords 
Mind your downloads -Be sure to review all pre-checked boxes prompted at download & un-check any extra applications which we don’t want to install. 
Stay updated- Update O.S.,Applications & Anti-virus.

Identity Protection:-

Protection against theft of personal information over Cyber Space without consent, usually for financial gain is known as Identity Protection.
Tips to Prevent Identity Theft
 Use strong passwords and PINs & Keep passwords and PINs safe.
 Create log-in passwords for all devices. 
 Beware of phishing scams.
 Restore old computers to factory settings. 
 Encrypt your hard drive 
 Check security when shopping online-check links authenticity which are received from an unsolicited email. 
 Take care when posting on social media-Check security settings on social media accounts, and avoid posting personal information publicly, or publicly "checking in" . 
 Secure your home Wi-Fi network& Avoid using insecure public Wi-Fi networks

Confidentiality of Information:- 

Allows authorized users to access sensitive and secured data maintains the Confidentiality of Information. 
Tips to Protect Information Confidential
 Build strong passwords 
 Use multifactor authentication- a computer user is granted access only after successfully presenting 2 or more pieces of evidence. 
 Masking -The free version of MaskMe creates an alternate e-mail address whenever a Web site asks for a user’s e-mail. E-mails from that site can be accessed via a MaskMe in-box or forwarded to a user’s regular e-mail account. 
 Private Browsing & Safe Browsing-Purpose of pvt browsing is to avoid leaving a history of one's browsing in the browser history on the computer we are using.Use updated brower for safe browsing & browse privately. 
 Encryption-Use https based sites,as HTTPS ensures data security over the network - mainly public networks like Wi-Fi. HTTP is not encrypted and is vulnerable to attackers. PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. 
 Avoide using public wifi and public computer

Cyber Safety – Social Networks

Facebook, MySpace, Twitter, LinkedIn, Digg,Ning, MeetUp etc….. -- the number of social networking sites and tools is exploding nowadays.These are becoming soft tool to attack & target for scam.
Tips to stay safe on social media
 Use a strong password 
 Use a different password for each social media 
 Password protect your devices if using social media apps 
 Be selective with friend requests. 
 Be careful while sharing something. 
 Become familiar with the privacy policies of the social media sites. 
 Install antivirus 
 log off when done 
 Create a smaller social network

Cyber trolls & Cyber bullying
 
Cyber trolling is internet slang for a person who intentionally starts arguments or upsets others by posting inflammatory remarks. The sole purpose of trolling is angering people. Purpose – to entertain,to argument,to upset victim,to get attention

Cyberbulling: Saying and/or doing mean things to the person online. It is a harm inflicted through using the Internet,ICT devices,or mobile phones. Purpose – to get revenge,to harass & threat, to humiliate

Cyberstalking: Doing research on every aspect of the person’s life. 

Cyberharrassment: Continuously contacting the person online, even though they don’t want you to.

Appropriate Usage of Social Network

Social Network refers to web and mobile technologies or their practices to share content, thoughts, ideas, opinions, experiences etc. online. Various examples of social networks are Facebook, Twitter, YouTube, LinkedIn, and blogging sites among many others.

Problems to Avoid:-
Cyber trolling 
 Cyberbulling 
 Cyberstalking 
 Cyberharrassment 

Stranger Danger- Children's are advised to not to interact with strangers on social networks as there are chances that many people on social media are not who they say they are. 

Digital Footprint- The history of a person's usage of digital devices, movie search, programs watched, flight searched, websites surfed, credit card transaction,cell phone calls,social media messages sent, links clicked and Facebook pages liked etc.Such information is being used to target ads to consumers as these are digital footprint of such consumers.

Spread of rumors - A lie can travel halfway around the world before the truth has got its boots, this phrase totally fits with rumors spread over social media. On average, it takes more than 12 hours for a false claim to be debunked online where as only 2 hours for true claim. A standard model of rumor spreading is given by Daley and Kendall ,which is called DK model.In this model there are N people in total. Which are categorized into three groups: ignorants, spreaders and stiflers, which are denoted as S, I, and R.

Appropriate Usage of Social Network

Don’t be rude or abusive
Don’t spread rumors 
You are what you write/tweet 
Face your problems, don’t Post/facebook your problems. 
Don’t take it too seriously. 
Don’t use fake name 
Protect your identity 
Respect other’s sentiments 
Don’t fight online 
Monitor comments

Computer Security Threats

Malware: Malware could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious 
computer virus: It is a small piece of software that can spread from one infected computer to another. It can corrupt, steal, or delete data on your computer/hard drive. 
Trojan horse: can do anything from record your passwords by logging keystrokes (known as a keylogger) to hijacking your webcam to watch and record your every move. 
Computer worm: A computer worm is a software program that can copy itself from one computer to another, without human interaction. 
Spam: unwanted messages in your email inbox. 
Phishing:Phishing are fraudulent attempts by cybercriminals to obtain private information. For e.g.a message prompt your personal information by pretending that bank/mail service provider is updating its website. 
spyware: spyware is used to spy on their victims. An e.g. is keylogger software that records a victim’s every keystroke on his or her keyboard. 
Adware : unwanted ads shown while surfing internet. Eavesdropping : is the act of intercepting communications between two points.

Safely accessing web sites

 How to prevent/remove Adware/malware 
 Uninstall the malicious programs from Windows 
 Use antivirus program for malware and unwanted programs 
 Reset the browser settings to their original defaults 
 Scan for malicious programs antivirus/antimalware program
 How to prevent/remove virus 
 Beware of Fake Download Buttons 
 Use a Secure Browser 
 Avoid Public Torrent Sites 
 Don’t Open Email Attachments Forwarded to You
 Don’t Use Your PC’s Admin Account 
 Scan All New Files and Disks
 How to prevent/remove Trojan 
 Never open unsolicited emails from unknown senders 
 Avoid downloading and installing programs unless you fully trust publisher 
 Use firewall software 
 Use a fully updated antivirus program

Safely Communicating data

 Secure Connections 
                  A secure connection refers to the connection which is encrypted by one or more security protocols for security of data flowing between two or more nodes. When it is not encrypted, it can be easily listened by anyone with the knowledge on how to do it.
 Secure Sockets Layer (SSL) 
                 is a computer networking protocol used for insecure network, between network application clients and servers .Due to various flaws, SSL was deprecated for use on the internet by the Internet Engineering Task Force (IETF) in 2015 by the Transport Layer Security (TLS) protocol. Both are not interoperable, TLS is backwards-compatible with SSL 3.0
 Transport Layer Security (TLS) encrypts data moving over the network or Internet to ensure that any body(hacker/evesdropper) will not be able to see what is transmitting. It is useful for private and sensitive information such as passwords, credit card numbers, and personal correspondence.

How it works:- 
TLS uses a combination of symmetric and asymmetric cryptography both for better security.With symmetric cryptography, data is encrypted and decrypted with a secret key known to both sender and recipient; typically 128 but preferably 256 bits in length (anything less than 80 bits is now considered insecure). Symmetric cryptography uses a common secret key ,which is shared a secure manner. Asymmetric cryptography uses 2 keys – a public key, and a private key. The public key of the recipient to be used by the sender to encrypt the data they wish to send to them, but that data can only be decrypted with the private key of the recipient.

Secure Connections
 Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website server. HTTPS pages typically use one of two secure protocols to encrypt communications - SSL (Secure Sockets Layer) or TLS (Transport Layer Security).

 Eavesdropping-eavesdropping in a man in middle attack and the message is passing from the client to server. 
The solutions to this problem are: 
 to encrypt the message 
 to encrypt the channel Both are appropriate in different situations. To prevent Eavesdropping in any kind of communication channel can be achieved by usage of "Secure Tunneling" of your channel data.

 Phishing-Phishing are fraudulent attempts by cybercriminals to obtain private information. For e.g.a message prompt your personal information by pretending that bank/mail service provider is updating its website. There are various phishing techniques used by attackers: o Embedding a link in an email to redirect to an unsecure website that requests sensitive information o Installing a Trojan via a malicious email attachment o Spoofing the sender’s address in an email to appear as a reputable source and request sensitive information o Attempting to obtain information over the phone by impersonating a known company vendor. 
Few steps to protect against phishing-
 Deploy a SPAM filter, Keep all systems current with the latest security patches and updates, Install an antivirus solution, Develop a security policy, Deploy a web filter to block malicious websites, Encrypt all sensitive information.

 Identity verification methods 
 Knowledge-Based Authentication (KBA)-by asking them to answer specific security questions 
 Two Factor Authentication (2FA)-not only a password and username, but also something that the user has with them 
 Database Solutions-behavioral patterns to detect if an online ID is authentic, a fraudster or a bot. 
 Online Identity Verification-A mix of artificial intelligence, computer vision, and verification experts to determine if a government-issued ID is authentic and belongs to the user. 
 Biometric verification -by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.

Comments

Popular posts from this blog

  IMPORTANT PYTHON PROGRAMS FOR CLASS 11th 1.  """ Program to Calculate Simple Interest """  p = eval(input("Enter Principle? ")) r = eval(input("Enter Rate? ")) t = eval(input("Enter Time? ")) si = p *r * t/100 print("Simple interest = ", si)  2.  """  Program to Calculate Compound Interest """  p = eval(input("Enter Principle? ")) r = eval(input("Enter Rate? ")) t = eval(input("Enter Time? ")) A = p * (1 + r/100) ** t CI = A - p print("compund interest = ", CI)  3.   """ Area of Triangle"""  import math a = eval(input("Enter first side? ")) b = eval(input("Enter second side? ")) c = eval(input("Enter third side? ")) s = (a + b + c) / 2 area = math.sqrt(s *(s-a)*(s-b)*(s-c))  print("Area = ", area) 4. """To check number is even or ...

Data Management {CLASS XI}

Q: What is a Database? The collection of data is usually referred to as the DATABASE. The database maintains the information that help to the decision-making process in an organization. The same data in a database may serve many application. e.g.: A database of employees of an organization, Database of students of a school, etc. Database System It is basically a computer based record keeping system. The Relational Data Model In Relational data model, the data is organized into tables ( i.e. rows & cols). These tables are called relations. A row in a table represents a relationship among a set of values. Terminology in RDBMS The different terms used in the relational model are: 1.Relation 2.Tuples 3.Attributes 4.Degree 5.Cardinality 6.Domain 1. Relation A Relation is a table (i.e rows & cols) In above example (STUDENT) is a relation that has 4 rows (records) and 3 columns (fields). 2. Tuples The rows of a relation are gener...

PYTHON FUNDAMENTALS

                  Python Character Set                                                                              Tokens     Keyword      Identifiers (Names)   Literals   Operators   Punctuators                                       Keywords A keyword is a word having special meaning reserved by the programming language.                               More on keywords…. ¨ We cannot use a keyword as  variable name ,  function  name or any other identifier . ¨ In Python, keywords are case sensitive...

TUPLES

The Python tuples are sequences that are used to store a tuple of values of any type. • Tuples are immutable. • Tuple is a type of sequence like string and list but it differs from them in way that lists are mutable but strings and tuples are immutable Creating and Accessing Tuples Tuples are depicted through parenthesis. () Empty tuple (1,2,3) Tuple of integers (2,3.5,6,7.5) Tuple of integer and float (‘ x’,’y’,’z ’) Tuples of characters Creating Tuples 1. Empty Tuple >>> t=tuple() >>> t () 2. Single Element >>> t=(1) >>> t 1 >>> t=3 , # to construct a tuple with one element just add comma >>> t (3,) 3. Long Tuples >>> t1=(11,22,33,44,55,66,77,88) >>> t1 (11, 22, 33, 44, 55, 66, 77, 88) >>> print (t1) (11, 22, 33, 44, 55, 66, 77, 88) 4. Nested Tuples : t=(11,22,(33,44),55) >>> t (11, 22, (33, 44), 55) Creating Tuple...

mysql connector

import mysql.connector import datetime mydb=mysql.connector.connect(host="localhost",\                              user="root",\                              passwd="root",\                              database="practicalexam") mycursor=mydb.cursor() def teacheradd():     L=[]     tno=int(input("Enter tno:"))     L.append(tno)     tname=input("Enter tname:")     L.append(tname)     tsalary=int(input("Enter tsalary:"))     L.append(tsalary)     value=L     value=(tno,tname,tsalary)     sql="insert into teacher(tno,tname,tsalary)values(%s,%s,%s)"     mycursor.execute(sql,value)     mydb.commit() def teachersearch():   ...

INTRODUCTION

Python is a general purpose interpreted , object oriented and high level programming language. It was created by  GUIDO VAN ROSSUM  in  FEBRUARY  1991. Python is based on or influenced with two programming languages : ABC Language Modula - 3 Features of python : Easy to learn Easy to read Easy to maintain Interactive mode Portable GUI Programming Some minuses of python : Not the fastest language Lesser libraries than C , Java , Perl Not strong on type-binding Not easily convertible List of companies using python for revenue generation : Google Youtube Torrent Intel Cisco HP IBM NASA Maya i-Robot
LIST (Class XI) • It is an ordered set of values enclosed in square brackets []. • Values in the list can be modified, i.e. it is mutable. • As it is set of values, we can use index in square brackets [] to identify a value belonging to it. • The values that make up a list are called its elements, and they can be of any type. . Its syntax is: Variable name [index] (variable name is name of the list). Let's look at some example of simple list: i) >>>L1 = [1, 2, 3, 4] # list of 4 integer elements. ii) >>>L2 = [“Delhi”, “Chennai”, “Mumbai”] #list of 3 string elements. iii) >>>L3 = [ ] # empty list i.e. list with no element iv) >>>L4 = [“ abc ”, 10, 20] # list with different types of elements v) >>>L5 = [1, 2, [6, 7, 8], 3] # A list containing another list known as nested list Creating and Accessing List • To create a list, put a number of expressions in square brackets. L=[] L=[value1, ...

queue

a=[] c= "y" while(c=="y"):     print("1. INSERT")     print("2. DELETE")     print("1. DISPLAY")     choice=int(input("Enter Your Choice:"))     if(choice==1):         b=input("Enter new number:")         a.append(b)     elif(choice==2):         if(a==[]):              print("Queue is Empty")         else:             print("Deleted value is:",a[0])             a.pop(0)     elif(choice==3):         length=len(a)         for i in range(0,length):      ...

stack

s=[] c="y" while(c=="y"):     print("1. PUSH")     print("2. POP")     print("3. DISPLAY")     choice=int(input("Enter your choice"))     if(choice==1):         a=input("Enter any number: ")         s.append(a)     elif (choice==2):         if(s==[]):             print("Stack Empty")         else:             print("Element Deleted is :",s.pop())      elif(choice==3):         l=len(s)         for i in range(l-1,-1,-1):             print(s[i])     else:  ...