Cyber Safety class 11 sumita arora notes
Cyber Safety class 11 sumita arora notes
Answer:
Cyber Safety refers to the safe and responsible use of Internet so as to ensure safety and
security of personal information and not posing threat to anyone else's information.
It is important because it involves gaining knowledge about possible threats to personal safety
and security risks for the information along with measures to prevent and counter them.
Answer:
We can protect our identity on the Internet by using the following solutions:
Anonymous Browsing — Anonymous browsers allow users to view websites without
revealing any personal information of the user like their IP address, machine type, location
etc.
Private browsing — We can use the following to safely browse internet:
Incognito browsing — It opens up a version of the browser that will not track our activity.
Proxy — It works by acting as a middleman between our computer and the website we
want to access.
Virtual Private Network — It is a method used to protect our system from hackers trying
to access our sensitive information.
4. What are cookies? How are they used by websites to track you?
Answer:
Cookies are small text files on our computer storing small pieces of information related to our
online habits.
Cookies are of two types:
First party cookies — These store our own login id, passwords, auto fill information etc. for
some websites that we frequently visit. They can identify us and track our browsing activity
across a website.
Third party cookies — The websites store these cookies to know about our search history
and web browsing history so as to place advertisements as per our interests. Third party
cookies may result in many unwanted advertisements on our webpages.
5. What is private browsing? Why is it considered a better way of browsing the Internet?
Answer:
A type of browsing wherein browser opens in incognito mode or through proxy or VPN, and does
not store cookies about our online activity, is called Private browsing.
It is considered a better way of browsing the Internet as it allows the user to use the Internet
without revealing his/her search history and sharing data.
Answer:
Internet is a public platform, where most of your activity is public. But there must be some
information like your credit history or bank details, your mails, etc, which you do not want to
make public, i.e , you want to keep his information confidential.
Similarly on your computer system or in a private network, you would certainly want that crucial
information is protected and is not publicly visible. Confidentiality of information ensures that
only authorized users get access to sensitive and protected data.
Any criminal offence that is facilitated by, or involves the use of, electronic communications or
information systems, including any electronic device, computer, or the Internet is referred to as
Cybercrime.
A cybercrime can be reported in the following ways:
The local police stations can be approached for filing complaints with the cyber crime cells
specially designated with the jurisdiction to register complaint.
Provisions have now been made for filing of 'E-FIR' in most of the states.
The Ministry of Home Affairs is also launching a website for registering crimes against
women and children online including cybercrimes.
8. Can you give an example of crime which is not cybercrime?
Answer:
A person breaks into a house and steals jewellery and cash. This crime involves the unlawful
taking of someone else's property and is not classified as a cybercrime.
Cyber stalking:
Cyber Stalking refers to online stalking where someone uses Internet, chat rooms, social
networking sites, emails etc. to stalk his/her victim. Cyber stalker follows the victim online
everywhere and keeps posting/sending something which are unsolicited.
Answer:
19. what protection measures would you take against identity theft?
Answer:
Some common measures that one can take to protect one’s identity are:
20. what is computer forensics? What important practices are followed in computer
forensics?
Answer:
Digital forensics or computer forensics refers to methods used for interpretation of computer
media for digital evidence. Computer forensics provide our legal system with a way to recover
data from electronic or digital devices.
Computer forensics combines the elements of law and computer science so as to collect the
digital evidences while ensuring that the collection process has retained data integrity, which
means having proof that this digital evidence is not planted or the data has not been altered
during investigation