Learn All About Cyber Safety
By Durgesh
()
About this ebook
We all tend to share our personal information with people whom we trust and not with strangers. However, we share a lot of information online that affects our privacy, directly or indirectly.
With the ever-evolving technology and increased use of internet, it is important for every individual to create boundaries for the type of information shared online. Therefore it is extremely important to be careful about the information we reveal online.
This book we discuss in detail different types of risks involved and the ways to protect data we share online.
Durgesh
Major part of my career has been in the field of Education and Administration. I have a good command over my subject (computer science) and effective communication in English. I have written books in my subject and have represented Science Olympiad Foundation. I have been very adaptable to any kind of new environment and technologies. I have written a few computer science books for my students based on their syllabus.With lots of health issues cropping up with time, I recreated myself with the help of Yoga and Meditation. Which gave me a direction towards a happy mind and body.Thus, decided to share my experience in penning down the Good Health Technique with all.I am ever grateful to Guruji, Sri Sri Ravi Shankarji and to Swami Satyananda Saraswatiji for guidance towards ultimate physical and mental good health.Lately I have picked up a new hobby - the art of crocheting. While making some crochet related products, I have written a few amigurumi patterns. Sharing my new skill through this platform.
Read more from Durgesh
Learn Typing Rating: 0 out of 5 stars0 ratingsLearn C++ Rating: 4 out of 5 stars4/5C Language Programming Codes Rating: 0 out of 5 stars0 ratingsYoga (Pawanmuktasana) Rating: 3 out of 5 stars3/5Learn All about Evolution of Computers Rating: 0 out of 5 stars0 ratingsBasic Language Rating: 0 out of 5 stars0 ratingsOpen Source: Introduction & Outline of Office Suite Rating: 0 out of 5 stars0 ratingsLearning Open Office: Writer, Impress, Draw Rating: 0 out of 5 stars0 ratingsEnjoy with Computers Rating: 0 out of 5 stars0 ratingsHappiness with Meditation & Yoga Rating: 0 out of 5 stars0 ratingsLearning Open Office: Calc & Base Rating: 0 out of 5 stars0 ratingsAmigurumi Patterns of 2 Bunnies Rating: 0 out of 5 stars0 ratings
Related to Learn All About Cyber Safety
Related ebooks
Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsLearn Ethical Hacking: A Help Book of Ethical Hacking Rating: 0 out of 5 stars0 ratingsZero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsHacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsEthical Hacking Rating: 0 out of 5 stars0 ratingsEthical Hacking and Computer Securities for Beginners Rating: 0 out of 5 stars0 ratingsHacked: The Ultimate Guidence Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Effects of Cybercrime in the U.S. and Abroad Rating: 0 out of 5 stars0 ratingsCybersecurity Experts Rating: 0 out of 5 stars0 ratingsDetecting and Combating Malicious Email Rating: 0 out of 5 stars0 ratingsComputer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsSeven Deadliest Web Application Attacks Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Hacking Rating: 3 out of 5 stars3/5Common Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsOverview of Some Windows and Linux Intrusion Detection Tools Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsAVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsHack Rating: 0 out of 5 stars0 ratingsPenetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratings
Teaching Methods & Materials For You
Better Grammar in 30 Minutes a Day Rating: 3 out of 5 stars3/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5How to Think Like a Lawyer--and Why: A Common-Sense Guide to Everyday Dilemmas Rating: 3 out of 5 stars3/5Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5The Three Bears Rating: 5 out of 5 stars5/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5Grit: The Power of Passion and Perseverance Rating: 4 out of 5 stars4/5Weapons of Mass Instruction: A Schoolteacher's Journey Through the Dark World of Compulsory Schooling Rating: 4 out of 5 stars4/5How To Be Hilarious and Quick-Witted in Everyday Conversation Rating: 5 out of 5 stars5/5Jack Reacher Reading Order: The Complete Lee Child’s Reading List Of Jack Reacher Series Rating: 4 out of 5 stars4/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5The 5 Love Languages of Teenagers: The Secret to Loving Teens Effectively Rating: 4 out of 5 stars4/5The 5 Love Languages of Children: The Secret to Loving Children Effectively Rating: 4 out of 5 stars4/5Principles: Life and Work Rating: 4 out of 5 stars4/5Dumbing Us Down - 25th Anniversary Edition: The Hidden Curriculum of Compulsory Schooling Rating: 4 out of 5 stars4/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5Inside American Education Rating: 4 out of 5 stars4/5Why Are You Still Sending Your Kids to School? Rating: 5 out of 5 stars5/5The Success Principles(TM) - 10th Anniversary Edition: How to Get from Where You Are to Where You Want to Be Rating: 4 out of 5 stars4/5A Study Guide for S.E. Hinton's The Outsiders Rating: 0 out of 5 stars0 ratingsFrom 150 to 179 on the LSAT Rating: 4 out of 5 stars4/5The Chicago Guide to Grammar, Usage, and Punctuation Rating: 5 out of 5 stars5/5
Reviews for Learn All About Cyber Safety
0 ratings0 reviews
Book preview
Learn All About Cyber Safety - Durgesh
Learn All about Cyber Safety
For My Computer Sc. Students
By Durgesh
Contents
Cyber Safety
Browsing the Web safely
Cyber security breach
Cyber ethics
Laws against cybercrime
Reporting a cyber-crime
Introduction
We all tend to share our personal information with people whom we trust and not with strangers. However, we share a lot of information online that affects our privacy, directly or indirectly.
With the ever-evolving technology and increased use of internet, it is important for every individual to create boundaries for the type of information shared online. We spend enormous amount of time browsing the web and share a lot of information on social networking websites like Facebook, Twitter, LinkedIn, Instagram, etc. All the information we share online is particularly vulnerable to the dangers involved. Predators, hackers, cyber criminals, spammers, cyber stalkers, identity thieves and other criminals try to take advantage of the information we share online. Therefore it is extremely important to be careful about the information we reveal online.
Now, let us discuss in detail different types of risks involved and the ways to protect data we share online.
CYBER SAFETY
Cyber