Sei sulla pagina 1di 19

Cyber Safety

Cyber safety refers to the safe and responsible use of


Internet to ensure safety and security of personal information
and not posing threat to anyone else’s information.
Identity Theft
Identity theft is a type of fraud that involves using someone
else’s identity to steal money or gain benefits.
Online identity theft refers to an act of stealing someone’s
personal information such as name, login details etc. and
then posing as that person online
The type of information compiled through web usage
patterns are :
1. IP Address :
• IP Address is a unique address of your device when you
connect to Internet.
• From IP Address, a website can determine your rough
geographical location.
2. Cookies and Tracking Scripts
• Cookies are small text files created by web sites on your computer
storing small piece of information related to your online habits.
Cookies can be :
• First Party Cookies : These are the cookies that store your own
login id, passwords, auto fill information etc. for some websites that
you frequently visits.
• Third Party Cookies : These are the cookies that websites store to
know about your search history and web browsing history so as to
place advertisements as per your interests.
3. HTTP Referrer
If you click a link to an outside website on a webpage, then
the linked website will get opened and internally information
about you such as your IP Address, location, Your web
browser, machine tye etc will also be provided to the linked
website. This is known as HTTP Referrer.
4. Super Cookies
• Super cookies are also cookies but these are persistent
cookies i.e., they come back even after you delete them.
• Super cookies store cookie data in multiple places.
5. User Agent
• Your browser also sends a user agent every time you
connect to a website.
• This tells websites your browser and operating system,
providing another piece of data that can be store and
used to target ads.
Anonymous browser :
• It allow users to view websites without revealing any
personal information the user like their IP Address,
machine type, location etc.
• Anonymous browser lets users access websites
anonymously.
• The most well-known as anonymous browser is ‘The Tor
Browser’. Tor stands for ‘The Onion Router’.
Private browsing : A type of browsing wherein browser opens
in incognito mode or through proxy or VPN and does not
store cookies about your online activity, is called Private
Browsing.
 Incognito Browsing : It opens up a version of the browser
that will not track your activity. It’s particularly useful if you
are entering sensitive information data like bank details
into the browser.
Proxy :
 It works by acting as a middleman between your
computer and the website you want to access.
 The tracking website will get the IP Address and
information that belongs to the proxy site, not your device.
VPN (Virtual Private Network)
 VPN is a method used to add security and privacy to
private and public networks, like Wifi hotspots and the
Internet.
 VPNs are most often used by corporations to protect
sensitive data.
 You can set up a VN at home to protect yourself from
hackers trying to access your sensitive information.
Confidentiality : Confidentiality of information ensures that
only authorized users get access to sensitive and protected
data.
Best Practices used to ensure confidentiality are as follows :
1. Use firewall wherever possible :
• Firewall is a program that monitors all communications
and traps all illicit packets.
• So only authentic users can use your system.
2. Control browser setting block tracking :
• We can turn our browsing settings to exclude cookies,
especially third party cookies.

3. Browse privately wherever possible.


4. Be careful while posting on Internet.
5. Ensure safe sites while entering crucial information
• Type the URL of the website in the address bar.
• Ensure that the address contains https://.
6. Carefully handle emails
7. Do not give sensitive information on wireless networks.
8. Avoid using public computers.
CYBERCRIME : Any criminal offense that is facilitated by, or
involves the use of, electronic communications or
information systems, including any electronic device,
computer, or the Internet is referred to as Cybercrime.

Cyber Troll : Derogatory messages or comments posted


online targeting people are called cyber trolls.
Cyber Bullying : Harassing, Demeaning, embarrassing,
defaming or intimidating someone using modern
technologies like Internet, cell phones, Instant messengers,
social networks, etc, is called Cyber Bullying.
Common Social networking sites
1. Facebook
2. Twitter
3. LinkedIn
4. Instagram
Digital Footprint : Digital footprints are the records and traces
individuals’ activities as they sue the Internet. Digital footprints are
permanently stored.

Privacy Settings : It is always a good idea to set up privacy settings


yourself by using Account Settings. Through Privacy settings, you can
control :
• Who all can see what you have posted.
• Who all can send requests to you
• What all information about you is visible to others, even to your
contacts etc.
Social Media Usage Rules
1. Be authentic
2. Use a Disclaimer
3. Don’t pick Fights online
4. Don’t use fake name or pseudonyms
5. Protect your identity
6. Does your information/Post pass the publicity test ?
7. Respect your audience
8. Respect others sentiments.
9. Monitor Comments

Potrebbero piacerti anche