0% found this document useful (0 votes)
5 views

Computer and Network Security

The document provides a comprehensive overview of computer and network security, detailing methods of protection, components of security, and various types of malware including viruses, worms, and ransomware. It discusses the importance of antivirus software and different detection methods, as well as the roles of hackers and ethical considerations in cybersecurity. Additionally, it covers internet security threats and safety measures to protect users online.

Uploaded by

cs66lokesh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Computer and Network Security

The document provides a comprehensive overview of computer and network security, detailing methods of protection, components of security, and various types of malware including viruses, worms, and ransomware. It discusses the importance of antivirus software and different detection methods, as well as the roles of hackers and ethical considerations in cybersecurity. Additionally, it covers internet security threats and safety measures to protect users online.

Uploaded by

cs66lokesh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

SUMMARY SHEET

Computer and Network Security


[email protected] 1|P age http://www.edutap.co.in
Contents
1 Computer security.......................................................................................................................4
1.1 Methods of Protection .........................................................................................................4
1.1.1 System Access Control ..................................................................................................4
1.1.2 Data Access control ......................................................................................................4
1.1.3 System and Security Administration...............................................................................4
1.1.4 System Design ..............................................................................................................4
2 Components of Computer Security ...............................................................................................4
3 Threats and Prevention................................................................................................................5
3.1 Malware..............................................................................................................................5
3.1.1 Modes of Malware distribution .....................................................................................5
3.2 Virus ...................................................................................................................................5
3.2.1 Types of Virus...............................................................................................................5
3.2.2 Antivirus ......................................................................................................................7
3.3 Worms ................................................................................................................................7
3.4 Ransomware .......................................................................................................................8
3.5 Trojan .................................................................................................................................8
3.6 Spyware ..............................................................................................................................8
3.7 Adware ...............................................................................................................................8
3.8 Keyloggers...........................................................................................................................8
4 Spam ..........................................................................................................................................8
5 HTTP vs HTTPS ............................................................................................................................9
6 Firewall.......................................................................................................................................9
6.1 Types of Firewall ..................................................................................................................9
7 Cookies.......................................................................................................................................9
7.1 Threats due to Cookies....................................................................................................... 10
8 Hackers and Crackers................................................................................................................. 10
8.1 White Hats: Ethical Hacker ................................................................................................. 10
8.2 Black Hats: Crackers ........................................................................................................... 10
8.3 Grey Hats .......................................................................................................................... 10
9 Internet Security Threats ........................................................................................................... 10
9.1 Pharming........................................................................................................................... 10
9.2 Mail Bomb......................................................................................................................... 11

[email protected] 2|P age http://www.edutap.co.in


9.3 Scareware ......................................................................................................................... 11
9.4 Sniffers.............................................................................................................................. 11
9.5 Rootkit .............................................................................................................................. 11
9.6 Phishing ............................................................................................................................ 11
9.7 Denial of Service ................................................................................................................ 11
9.8 Network Intrusion.............................................................................................................. 11
9.8.1 Asymmetric Routing ................................................................................................... 11
9.8.2 Buffer Overflow Attack ............................................................................................... 11
9.8.3 Traffic Flooding:.......................................................................................................... 11
9.8.4 Snooping.................................................................................................................... 12
9.8.5 Eavesdropping............................................................................................................ 12
10 Internet Safety ...................................................................................................................... 12
10.1 Protecting Children Online ................................................................................................. 13
11 Incognito mode ..................................................................................................................... 13
11.1 Difference from Regular Browsing ...................................................................................... 13
11.2 Uses.................................................................................................................................. 14
11.3 Limitations ........................................................................................................................ 14

[email protected] 3|P age http://www.edutap.co.in


1 Computer security
Every computer needs to secure the data form virus unauthorized users and attackers. There are
many types of security software including antivirus software, encryption software, firewall
software and spyware removal software. Computer security is also known as cyber security or IT
security. It is the protection of computer systems.

1.1 Methods of Protection


✓ There are four methods of protection.
1.1.1 System Access Control
✓ It doesn’t allow unauthorized users into the system and supports the authorized users to
protect the system. It inspires the users to change passwords frequently.
1.1.2 Data Access control
✓ It observes who can get the information and for which purpose data can be used. Based on
the security levels of the users, access rules can be determined by the system.
1.1.3 System and Security Administration
✓ Offline methodology is used to make or break the protected system. System and security
administration can perform offline procedures.
1.1.4 System Design
✓ The hardware and software security characteristics are used for system design.

2 Components of Computer Security

Confidentiality: In this, the


system cannot be accessed
by unauthorized users

Cryptography: It is a
Integrity: This term
process of protecting the
certifies that the
information by storing on
information cannot be
disk. It is an art of writing
changed by unauthorized
data in hidden or secrete
users.
format.

Availability: It ensures that


unauthorized user cannot Access control: In this,
access the system and users can get only
make sure only authorized permitted resources.
can access it.

[email protected] 4|P age http://www.edutap.co.in


Encryption- Decryption
The plain text can be converted into cipher text by using an algorithm, this process is known as
encryption. Converting cipher text into plain text is called as decryption.

3 Threats and Prevention


Network security is concerned with protection of our device as well as data from illegitimate
access or misuse. Threats include all the ways in which one can exploit any vulnerability or
weakness in a network or communication system to cause harm or damage one’s reputation.

3.1 Malware
✓ Malware is a short term used for MALicious softWARE. It is any software developed with an
intention to damage hardware devices, steal data, or cause any other trouble to the user.
Viruses, Worms, Ransomware, Trojans, and Spyware are some of the kinds of malware.
3.1.1 Modes of Malware distribution
✓ A malware once designed, can take many routes to reach your computer. Some of the
common distribution channels for malware are:
• Downloaded from the Internet: Most of the time, malware is unintentionally
downloaded into the hard drive of a computer by the user.
• Spam Email: We often receive an unsolicited email with embedded hyperlinks or
attachment files. These links or attached files can be malware.
• Removable Storage Devices: Often, the replicating malware targets the removable
storage media like pen drives, SSD cards, music players, mobile phones, etc. and infect
them with malware that gets transferred to other systems that they are plugged into.
• Network Propagation: Some malware like Worms have the ability to propagate from
one computer to another through a network connection.

3.2 Virus
✓ A virus is a piece of software code created to perform malicious activities and hamper
resources of a computer system like CPU time, memory, personal files, or sensitive
information.
✓ Some well-known viruses include CryptoLocker, ILOVEYOU, MyDoom, Sasser and Netsky,
Slammer, Stuxnet, etc.
✓ It is a software program that affects the system to corrupt the files in the form of executable
files. The first computer virus is creepers and is developed in 1986.
✓ The virus is used for destruction purpose. It can copy itself and gets attached by itself to
other files. The virus can attack over a network such as the Internet or removable disk like
floppy disk, DVD, CD, and Pen drive. Virus can infect the computer and spread the infection.
3.2.1 Types of Virus
✓ Append Virus: This virus appends its malicious code to the end of the host program's file.
After that, it alters the file's header in a way that the file's header is redirected to the start
of the malicious code of the append virus. Thus, this code is executed each time the
program runs. However, it does not destroy the host program; rather, it modifies it in a
way that it holds the virus code and enables the code to run itself.

[email protected] 5|P age http://www.edutap.co.in


✓ Boot Sector Virus: It is also called a Master Boot sector virus or Master Boot Record Virus.
It mainly infects the boot sector of a hard disk.
✓ Cavity Virus: It is also known as a space filler virus. This virus tends to install itself by
occupying the empty sections of a file. It is not easy to detect this virus as it fills the empty
spaces without changing the size of the file.
✓ CMOS Virus: It infects the CMOS, which stands for Complementary Metal-Oxide
Semiconductor and is a memory chip that contains the system configuration. This virus
can erase or reset the system configuration.
✓ Companion Virus: It resides itself in a file whose name is like another program file, which
is executed normally. When the program file is executed, the virus gets activated and
performs malicious steps such as deleting the files on your computer hard drive. Globe
virus is a first known companion virus, which was found in 1992.
✓ Computer Worm: Computer worm is like a virus but is technically different from the virus.
It can replicate and spread like a virus, but unlike viruses, it does not need a host program
to spread. Being able to self-replicate it can produce multiple copies of itself. It spreads
through networks such as an email sent to an infected email id can infect your system
with a computer worm.
✓ Direct Action Virus: If the file that consists the virus is executed, then this type of virus
comes into action. This virus infects the files that are mentioned in the AUTOEXEC.BAT
file path. e.g.: Vienna virus
✓ Encrypted Virus: It encrypts its payload to make its detection more difficult. It comprises
two parts: an encrypted virus body and a decryptor, which decrypts the virus when it is
executed. After decryption, the virus can execute itself to replicate and become a
resident. Furthermore, it is different from cryptolocker, which is a computer virus that
encrypts the hard drive data and holds it for ransom.
✓ Executable Virus: It is a non-resident computer virus, which resides in an executable file.
Whenever the infected file is executed, it infects the other files.
✓ FAT Virus: Usually, it stores the information about the location of files. e.g. Link virus.
✓ File Infector Virus: It is one of the commonly found computer viruses. It mainly infects the
executable files; the files with .com or .exe extensions. The virus becomes active when
the infected file is executed. The active virus overwrites the file partially or completely.
Thus, it may destroy the original file partially or completely.
✓ File System Virus: Also known as Cluster Virus or Directory Virus, it affects the directory of
the system and changes the path that is the location of a file. e.g. Dir-2 virus, etc.
✓ Macros Virus: This type of virus affects the files that are created by using certain
applications and contain macros. e.g.: Melissa.A.
✓ Multipartite Virus: This virus can affect and expand in multiple ways. e.g.: Flip.
✓ Non-resident Virus: Unlike the resident virus, the non-resident virus does not reside in the
memory of a computer. So, it is not executed from the computer's memory. For example,
executable viruses.
✓ Overwrite Virus: It is a type of virus that deletes the original file and replaces it with the
new harmful file. Once it has been infected, it is not possible to clean the file. e.g. Way,
Trj.Reboor, and Trivial.88-D.
✓ Polymorphic Virus: This type of virus affects system every time and encodes itself. This virus
is used to make many copies. e.g. Elkern, and Tuareg.
✓ Rabbit Virus: It is also known as wabbit, a fork bomb. It is capable of creating new
processes, and each of the new processes further creates new processes. This process
[email protected] 6|P age http://www.edutap.co.in
continues until this virus utilizes all the available resources in the system and the system
falls short of resources. It may cause the target system to slow down and crash. For
example, it is like an Infinite loop that repeatedly creates processes that consume lots of
CPU cycles and operating system resources.
✓ Resident Virus: It is a type of virus that affects the system at run time. Usually, this type of
virus is stored permanently in the computer memory and gets active to infect the files
even after the harmful code is executed. e.g. Randex, and Meve.
✓ Stealth Virus: It is a hidden computer virus, which specifically attacks operating system
processes. It usually hides itself in partitions, files, or boot sectors and is capable of going
unnoticed during antivirus or anti-malware scans, i.e., it can avoid detection intentionally.
✓ Web Scripting Virus: This type of virus will occur in many websites at the time of execution
code. This virus affects the computer via websites and these websites are created by
infected code. e.g. J.S.Fortnight.

3.2.2 Antivirus
Antivirus is software, also known as anti-malware. Initially, antivirus software was developed to
detect and remove viruses only hence the name anti-virus. However, with time it has evolved
and now comes bundled with the prevention, detection, and removal of a wide range of malware.

3.2.2.1 Methods of Malware Identification used by Antivirus


• Signature-based detection : Signature-based detection relies on an antivirus utilizing a
continuously updated signature database, known as the Virus Definition File (VDF). This
database contains virus signatures, requiring regular updates to effectively detect new
malware. Outdated VDFs render antivirus software ineffective, especially against
polymorphic malware or encrypted code.
• Sandbox detection: Sandbox detection involves executing new applications or files within
a virtual environment (sandbox) to observe their behavioral patterns for potential
malware indicators.
• Data mining techniques : Data mining techniques utilize various data mining and machine
learning methods to classify file behavior as either benign or malicious.
• Heuristics: Heuristics involves comparing suspected program source code to known
viruses in a heuristic database. If a significant match is found, the code is flagged as a
potential threat based on patterns typically seen in malware infections.
• Real-time protection: Real-time protection monitors the behavior of applications or files
in active memory, ensuring timely detection of dormant or activated malware. This
involves continuous observation of any suspicious activity while the file is being executed.

3.3 Worms
✓ The Worm is also malware that incurs unexpected or damaging behavior on an infected
computer system. The major difference between a worm and a virus is that unlike a virus, a
worm does not need a host program or software to insert its code into. Worms are
standalone programs that can work on its own.
✓ Also, a virus needs human triggering for replication (i.e. when a user opens/executes the
infected file), while a worm replicates on its own and can spread to other computers through
[email protected] 7|P age http://www.edutap.co.in
the network. Some prominent examples of worms include Storm Worm, Sobig, MSBlast,
Code Red, Nimda, Morris Worm, etc.

3.4 Ransomware
✓ It is a type of malware that targets user data. It either blocks the user from accessing their
own data or threatens to publish the personal data online and demands ransom payment
against the same.

3.5 Trojan
✓ It is malware, that looks like a legitimate software and once it tricks a user into installing it,
it acts pretty much like a virus or worm. However, a Trojan does not self-replicate or infect
other files, it spreads through user interaction such as opening an email attachment or
downloading and executing a file from the Internet. Some Trojans create backdoors to give
malicious users access to the system.

3.6 Spyware
✓ It is a type of malware that spies on a person or an organisation by gathering information
about them, without the knowledge of the user. It records and sends the collected
information to an external entity without consent or knowledge of the user.
✓ Spyware usually tracks internet usage data and sells it to advertisers. They can also be used
to track and capture credit card or bank account information, login and password
information or user’s identity.

3.7 Adware
✓ An Adware is malware that is created to generate revenue for its developer. An adware
displays online advertisements using pop-ups, web pages, or installation screens. Once an
adware has infected a substantial number of computer systems, it generates revenue either
by displaying advertisements or using “pay per click” mechanism to charge its clients against
the number of clicks on their displayed ads.

3.8 Keyloggers
✓ A keylogger can either be malware or hardware. The main purpose of this malware is to
record the keys pressed by a user on the keyboard. A keylogger makes logs of daily keyboard
usage and may send it to an external entity as well. In this way, very sensitive and personal
information like passwords, emails, private conversations, etc. can be revealed to an external
entity without the knowledge of the user.

4 Spam
Spam encompasses a range of activities across digital platforms such as messaging, forums, chats,
emails, and advertisements. However, email spam is perhaps the most recognized form.

It involves sending unsolicited advertisements or invitations to a large number of recipients,


cluttering inboxes and potentially leading users to unknowingly engage with harmful content
such as malware or deceptive offers.

[email protected] 8|P age http://www.edutap.co.in


5 HTTP vs HTTPS
HTTP (Hyper Text Transfer Protocol) and its secure variant HTTPS (Hyper Text Transfer Protocol
Secure) are both sets of protocols governing data transmission over the World Wide Web
(WWW).

HTTP transmits data over the network without encryption, making it susceptible to attacks by
hackers. Therefore, it's suitable for websites sharing public information like news portals and
blogs.

In contrast, HTTPS encrypts data before transmission and requires an SSL Digital Certificate for
decryption at the receiver's end. This ensures enhanced security for websites handling sensitive
information.

6 Firewall
A computer firewall serves as a network security mechanism crafted to safeguard a trusted
private network from unauthorized access or traffic stemming from an untrusted external
network, such as the Internet or distinct sections within the same network.

Firewalls can be deployed through software, hardware, or a combination of both. They function
as the primary line of defense against malware infiltration.

A firewall acts as a network filter and based on the predefined security rules, it continuously
monitors and controls the incoming and outgoing traffic.

6.1 Types of Firewall


✓ Network Firewall: If the firewall is placed between two or more networks and monitors the
network traffic between different networks, it is termed Network Firewall.
✓ Host-based Firewall: If the firewall is placed on a computer and monitors the network traffic
to and from that computer, it is called a host-based firewall.

7 Cookies
A computer cookie, a small file, or data packet, is stored by a website on the client's computer
and can only be modified by the originating website. The client's computer serves as a host for
storing the cookie, which is utilized by websites to retain browsing information.

There are various types of cookies depending on their functions. Session cookies, for instance,
monitor the ongoing session and automatically end it upon timeout, as seen in banking websites
were leaving an e-banking page open results in automatic closure after a period of inactivity.

Similarly, authentication cookies are employed by websites to verify whether the user is already
logged in (authenticated) or not. This eliminates the need for repeated logins when navigating
different pages or links within the same website.

[email protected] 9|P age http://www.edutap.co.in


7.1 Threats due to Cookies
✓ Usually, cookies are used for enhancing the user’s browsing experience and do not infect
your computer with malware. However, some malware might disguise as cookies e.g.
“supercookies”.
✓ There is another type of cookie known as “Zombie cookie” that gets recreated after being
deleted. Some third-party cookies might share user data without the consent of the user for
advertising or tracking purposes.
Identity theft

Identity theft occurs when someone wrongfully obtains and uses another person's personal data, such as
their name, Social Security number, credit card number, or other identifying information, usually for
financial gain.
Phishing, Hacking, 3rd Party Cookies, Spyware, Dumpster Diving, Malware can also lead to identity theft

8 Hackers and Crackers


Hackers and crackers are people who have a thorough knowledge of the computer systems,
system software (operating system), computer networks, and programming. They use this
knowledge to find loopholes and vulnerabilities in computer systems or computer networks and
gain access to unauthorized information (Hacking). There are the following types of hackers:

8.1 White Hats: Ethical Hacker


✓ If a hacker uses his knowledge to find and help in fixing the security flaws in the system, it’s
termed a White Hat hacker. These are hackers with good intentions. They are security
experts.
✓ Organizations hire ethical or white hat hackers to check and fix their systems for potential
security threats and loopholes. Technically, white hats work against black hats.

8.2 Black Hats: Crackers


✓ If hackers use their knowledge unethically to break the law and disrupt security by exploiting
flaws and loopholes in a system, then they are called black hat hackers.

8.3 Grey Hats


✓ The distinction between different hackers is not always clear. There exists a grey area in
between, which represents the class of hackers that are neutral, they hack systems by
exploiting their vulnerabilities, but they don’t do so for monetary or political gains.
✓ The grey hats take system security as a challenge and just hack systems for the fun of it.

9 Internet Security Threats


9.1 Pharming
✓ More advance method of Phishing in which the attackers create duplicate or similar
looking website of other companies, to attract the customers and steal the data.

[email protected] 10 | P a g e http://www.edutap.co.in
9.2 Mail Bomb
✓ An excessively large email (typically many thousands of messages) or one large message
sent to a user’s email account. This is done to crash the system and prevent genuine
messages from being received.

9.3 Scareware
✓ A common trick cybercriminal uses to make users think that their computer has become
infected with malware to get them to purchase a fake application.

9.4 Sniffers
✓ A software program used to monitor the traffic in a network. The hackers may use the
sniffed data to access important confidential data.

9.5 Rootkit
✓ A program designed to hide objects such as processes, files or Windows registry entries
(often including its own).

9.6 Phishing
✓ This is acquiring the personal and sensitive information of a person through official
looking emails. Users of online banking and e-commerce websites are more prone to this
attack.

9.7 Denial of Service


✓ Denial of Service (DoS) attacks involve overwhelming a target resource with illegitimate
requests, hindering authorized users from accessing it. This can disrupt services such as
websites, email servers, and network connections. If a server crashes, it can be restarted,
but recovery from flooding attacks is difficult due to mixed legitimate and malicious
requests. Distributed Denial of Service (DDoS) attacks expand upon this by coordinating
flooded requests from compromised computers across the globe, making them even
harder to counteract.

9.8 Network Intrusion


✓ Network intrusion refers to any unauthorized activity occurring on a computer network,
which could involve the misuse of network resources (such as in DoS attacks) or pose a
threat to network security and data integrity. It's a significant challenge, requi ring
network administrators to devise strategies and implement various security measures for
protection. In addition to previously discussed intrusion techniques like DoS, Trojans, and
Worms, other notable attacks include:
9.8.1 Asymmetric Routing
✓ Attackers seek to avoid detection by sending intrusion packets through multiple paths,
effectively bypassing network intrusion sensors.
9.8.2 Buffer Overflow Attack
✓ In this scenario, attackers exploit programming errors to overwrite specific memory areas
on network computers with code. When a buffer overflow occurs, this code is executed,
allowing attackers to initiate DoS attacks or gain unauthorized network access.
9.8.3 Traffic Flooding:
✓ This method involves inundating the network intrusion detection system with a high
volume of message packets. This flood of packets overwhelms the detection system,
[email protected] 11 | P a g e http://www.edutap.co.in
creating a chaotic network environment that enables hackers to infiltrate the system
without being detected.
9.8.4 Snooping
✓ Snooping, both in general and within networking, involves covertly listening in on
conversations or capturing and analyzing network traffic. It's typically carried out using
specialized software or devices that monitor communication channels.
✓ While snooping is often associated with malicious intent, it can also be used by network
administrators for troubleshooting purposes. Various software tools exist for snooping, and
some network equipment offers features like SPAN ports for this purpose.
9.8.5 Eavesdropping
✓ It involves the unauthorized, real-time interception or monitoring of private
communications between two entities over a network. Unlike snooping, where network
traffic can be stored for later analysis, eavesdropping occurs instantaneously.
✓ Typically, eavesdropping targets private communication channels such as phone calls
(VoIP), instant messages, video conferences, and fax transmissions.

10 Internet Safety
✓ Strong Passwords: Avoid using easily guessable information like birthdates or pet names.
Consider using a password manager to generate and store complex passwords securely.
✓ Two-Factor Authentication (2FA): Enable two-factor authentication wherever possible. This
adds an extra layer of security by requiring a second form of verification, such as a code sent
to your phone, in addition to your password.
✓ Update Software Regularly: Keep your operating system, antivirus software, web browsers,
and other applications up to date with the latest security patches and updates to protect
against vulnerabilities.
✓ Secure Wi-Fi Connections: Use encrypted Wi-Fi connections at home and in public places.
Avoid connecting to public Wi-Fi networks without using a VPN (Virtual Private Network) for
added security.
✓ Be Cautious of Phishing: Be wary of unsolicited emails, messages, or calls asking for personal
information or urging urgent action. Avoid clicking on suspicious links or downloading
attachments from unknown sources.
✓ Privacy Settings: Review and adjust privacy settings on social media platforms and other
online services to control who can see your information and posts. Limit the amount of
personal information you share publicly.
✓ Safe Browsing Habits: Exercise caution when visiting websites, downloading files, or clicking
on links. Stick to reputable websites and avoid downloading software from unknown sources
to minimize the risk of malware infections.
✓ Use Secure Websites (HTTPS): Look for the padlock icon and "https://" in the URL when
accessing websites, especially when entering sensitive information like passwords or credit
card details. This indicates a secure connection.
✓ Data Backup: Regularly back up important files and data to an external hard drive, cloud
storage service, or another secure location to protect against data loss due to malware,
hardware failure, or other incidents.
✓ Educate Yourself: Stay informed about common online threats and scams. Educate yourself
and your family members about internet safety practices and encourage open communication
about online experiences and concerns.
[email protected] 12 | P a g e http://www.edutap.co.in
10.1 Protecting Children Online
Protecting children online requires special attention and measures due to their vulnerability.
Here are some specific strategies to help keep children safe on the internet:

✓ Parental Controls: Use parental control features available on devices, routers, and internet
browsers to restrict access to inappropriate content. These controls can limit the websites
children can visit, set time limits for internet usage, and block or filter explicit content.
✓ Safe Search Settings: Enable safe search settings on search engines to filter out explicit
content from search results. This helps prevent children from accidentally accessing
inappropriate material while browsing the web.
✓ Education and Communication: Educate children about online safety, including the risks of
sharing personal information, interacting with strangers, and engaging in cyberbullying.
Encourage open communication and teach them to report any suspicious or uncomfortable
online encounters.
✓ Supervised Internet Use: Monitor children's online activities and supervise their internet
usage, especially for younger children. Co-browsing with them can help you guide their
online experience and address any concerns or questions they may have.
✓ Set Ground Rules: Establish clear rules and guidelines for internet use, such as which
websites are allowed, time limits for screen time, and appropriate online behavior. Make
sure children understand the consequences of breaking these rules.
✓ Privacy Settings: Review and adjust privacy settings on social media accounts and other
online platforms to restrict who can view and interact with your child's profile or posts.
Teach children to be cautious about sharing personal information online.
✓ Cyberbullying Awareness: Educate children about cyberbullying and encourage them to
speak up if they experience or witness bullying online. Teach them how to block or report
abusive behavior and seek help from a trusted adult.
✓ Safe Messaging Apps: Choose messaging apps and online platforms with built-in safety
features designed for children, such as age-appropriate content filters, moderation tools,
and options for parental supervision.
✓ Regular Check-Ins: Have regular conversations with children about their online experiences
and any challenges they may be facing. Create a supportive environment where they feel
comfortable sharing their concerns or seeking help if needed.
✓ Lead by Example: Be a positive role model for responsible internet use. Practice good
online habits yourself and demonstrate respectful and safe behavior in your interactions
online.

11 Incognito mode
It also known as private browsing or privacy mode, is a feature available in most web browsers
that allows users to browse the internet without storing local data such as browsing history,
cookies, or cached files. However, it's important to note that incognito mode does not make you
completely anonymous online.

11.1 Difference from Regular Browsing


✓ The primary difference between Incognito Mode and regular browsing is that in Incognito
Mode, the browser does not retain any information about the user's browsing session after

[email protected] 13 | P a g e http://www.edutap.co.in
it is closed. This means that once the Incognito window is closed, all data associated with
that session is deleted, providing users with a level of privacy and anonymity does not
present in regular browsing.
✓ In Incognito Mode, downloaded files are not saved directly to the device's local storage.
However, it's essential to note that while the downloaded files themselves aren't stored
locally after the Incognito session ends, users should still exercise caution.
✓ Once a file is downloaded in Incognito Mode, it typically resides temporarily in the device's
RAM or cache. While this may provide a level of privacy during the browsing session, the file
could still potentially leave traces on the device. For instance, if the user accesses the
downloaded file directly from the browser before the Incognito session ends, it might leave
a temporary cache or history entry.

11.2 Uses
✓ Privacy: It prevents others who may have access to your device from seeing your browsing
history.
✓ Testing: Web developers often use incognito mode to test websites without interference
from their browsing history or cached data.
✓ Logging into Multiple Accounts: It allows users to log into multiple accounts on the same
website simultaneously.
✓ Avoiding Cookies: Incognito mode can help users avoid being tracked by cookies, which are
often used for advertising purposes.

11.3 Limitations
✓ While Incognito Mode provides a level of privacy by not storing data locally, it does not make
users completely anonymous online. Internet service providers, websites visited, and
network administrators may still be able to track users' online activities.
✓ Additionally, activities such as downloading files or bookmarking pages while in Incognito
Mode may still leave traces on the device or network.

[email protected] 14 | P a g e http://www.edutap.co.in

You might also like