Threat is a potential violation of security.
Stealing of information is an example of Cybercrime.
A self-replicating program that eats up the entire disk space or memory is called worm.
Spyware is a software which is installed on your computer to spy on your activities.
A Trojan Horse is a program that appears harmless but actually performs malicious functions.
Spamming refers to sending of bulk mails by an identified or unidentified source.
Most hackers crack passwords of system accounts and gain entry into remote computer systems.
When we visit certain websites with advertisements, the ads create cookies that store and track our online patterns.
Ensuring that users or customers provide information that is associated with identity of a real person is known as identity verification.
If the user is able to provide a legal email id, he is considered a/an authorized user.
Unauthorized monitoring of other people's communication is known as eavesdropping.
Flooding a system with junk mail is a Denial-of-Service type of attack.
A Super cookie is a type of browser cookie that is designed to be permanently stored on a user's computer and difficult to detect and remove.
Discarded electronic devices are called e-waste.
Computer security is protecting the integrity, availability and confidentiality of information system.
Answer
True
Reason — Computer security is protecting the integrity, availability and confidentiality of information system.
Identity theft is a type of fraud.
Answer
True
Reason — Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.
Browsing through VPN is anonymous browsing.
Answer
True
Reason — Private browsing or anonymous browsing is a type of browsing wherein the browser opens in incognito mode or through proxy or VPN (Virtual Private Network) and does not store cookies.
Persistent cookies are different from super cookies.
Answer
False
Reason — Super cookies are persistent cookies, i.e., they come back even after being deleted. They store cookie data at multiple places, for example, in Flash cookies, Silverlight storage etc.
Posting something leaves behind traces which are called digital footprints.
Answer
True
Reason — Digital Footprints are the records and traces of individual's activities as they use the Internet. Digital Footprints are permanently stored and can include data such as social media posts, online searches, and interactions with websites.
A person who posts derogatory messages online targeting people is called a cyber troller.
Answer
True
Reason — A cyber troll is a person who starts quarrels or upsets people on the internet by posting inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain.
Online theft refers to an act of stealing someone's personal information.
Answer
True
Reason — Online identity theft refers to an act of stealing someone's personal information such as name, login details, credit card details etc and then posing as that person online.
A firewall only monitors incoming communication.
Answer
False
Reason — A firewall monitors and controls both incoming and outgoing communication between a network and the internet.
To avoid tracking by website, we should browse internet privately.
Answer
True
Reason — To avoid tracking by website, we should browse internet privately. This is because websites can collect and track our online data, including browsing history, search queries, and personal information, through various means such as cookies etc.
We can share sensitive information on wireless networks.
Answer
False
Reason — We should not share sensitive information over wireless networks because they are not secure and can be easily hacked.
In cyberbullying, a victim is subjected to a barrage of online messages and emails.
Answer
False
Reason — Cyberbullying is an attack on an individual or group through the use of electronic means such as instant messaging, social media, email, and other forms of online communication, with the intent to abuse, intimidate, or overpower. A barrage of online messages and emails, on the other hand, refers to spamming.
Spreading rumours online is a punishable offence.
Answer
True
Reason — Spreading rumours online comes under the category of cybercrime and is a punishable offence under the Information Technology Act.
E-waste is very hazardous if not handled carefully.
Answer
True
Reason — If e-waste is not disposed of in proper manner, it can be extremely harmful to humans, plants, animals and the environment.
This term refers to safe and responsible use of technology.
- Cyber user
- Cyber present
- Cyber safety
- Cyber logic
Answer
Cyber safety
Reason — Cyber safety is the safe and responsible use of information and communication technology.
This is a type of fraud that involves using someone else's identity to gain other benefits.
- Personal theft
- Information theft
- Cyber theft
- Identity theft
Answer
Identity theft
Reason — Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.
These are the small text files for storing a small piece of information related to someone's online habits.
- Spyware
- Virus
- Cookies
- Spam
Answer
Cookies
Reason — Cookies are small text files, bits of information, left on our computer by websites we have visited which let them 'remember' things about us.
This is a unique address, assigned to every computer when connected to a network.
- MAC address
- Computer name
- URL address
- IP address
Answer
IP address
Reason — IP address is a unique address of our device when we connect to the internet.
This term ensures that only authorized users get access to sensitive and protected data.
- Safety
- Protection
- Confidentiality
- Provide
Answer
Confidentiality
Reason — Confidentiality of information ensures that only authorized users get access to sensitive and protected data.
This is a criminal offence that is facilitated by, or involves the use of, electronic communications or information system, including any electronic device.
- Network crime
- Internet crime
- Cybercrime
- Super crime
Answer
Cybercrime
Reason — Any criminal act that is facilitated by the use of electronic gadgets such as computer, smartphones, laptop etc, involving communications or information systems through internet, is referred to as cybercrime.
Which of the following is not an external threat to a computer or a computer network.
- Ignorance
- Trojan horse
- Adware
- Crackers
Answer
Ignorance
Reason — Ignorance refers to a lack of knowledge or awareness and does not pose an external threat to a computer or network. External threats, such as Trojan horses, adware, and crackers, involve malicious actions that harm a system.
When a person is harassed repeatedly by being followed, called or written to, he/she is a target of:
- Bullying
- Identity theft
- Stalking
- Phishing
Answer
Stalking
Reason — Stalking involves repeatedly harassing or threatening behaviour, such as following, calling, or sending unwanted messages to a person.
What is the name of the IT law that India is having in the Indian legislature?
- Indian Technology (IT) Act, 2000
- Digital Information Technology Act, 2000
- Information Technology (IT) Act, 2000
- The Technology Act, 2000
Answer
Information Technology (IT) Act, 2000
Reason — The name of the IT law in the Indian legislature is the Information Technology Act, 2000 (IT Act 2000).
This term refers to a person who purposely posts opposing, sarcastic, demeaning or insulting comments about something or someone.
- Cyber criminal
- Cyber thief
- Cyber troller
- Cyberstalker
Answer
Cyber troller
Reason — A cyber troll is a person who starts quarrels or upsets people on the internet by posing inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain.
These are the records and traces an individual leaves behind as they use the internet.
- Digital path
- Digital map
- Digital foot
- Digital footprints
Answer
Digital footprints
Reason — Digital Footprints are the records and traces of individual's activities as they use the Internet.
Unauthorized monitoring of other people's communication is called:
- Spamming
- Malware
- Adware
- Eavesdropping
Answer
Eavesdropping
Reason — Unauthorized monitoring of other people's communication is called eavesdropping.
Sending of unsolicited bulk and commercial messages over the internet is ............... .
- Stalking
- Phishing
- Spamming
- Spoofing
Answer
Spamming
Reason — Spamming refers to the practice of sending unsolicited bulk and commercial messages over the internet.
Child pornography is prohibited by ............... of IT Act, 2000.
- Sec. 64
- Sec. 65
- Sec. 66
- Sec. 67B
Answer
Sec. 67B
Reason — Child pornography is prohibited by Section 67B of IT Act, 2000.
Cybercrime is a crime in which computer is used as a:
- Tool
- Target
- Both (1) and (2)
- None of these
Answer
Both (1) and (2)
Reason — Cybercrime involves using a computer both as a tool to commit illegal activities, such as hacking or fraud, and as a target, where the computer or network itself is attacked, for example, through viruses or denial-of-service attacks.
Assertion (A): Viruses are malicious programs.
Reasoning (R): Malicious programs are specifically designed to delete, block, modify or copy data in order to disrupt the performance of computers.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true and R is the correct explanation of A.
Explanation
Viruses are malicious programs designed to harm computer systems. A malicious program is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
Assertion (A): An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting people.
Reasoning (R): We can download and use any material available on the internet.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
A is true but R is false.
Explanation
A cyber troll is a person who starts quarrels or upsets people on the internet by posing inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain. We cannot download and use any material available on the internet, due to copyright issues and legal restrictions.
Assertion (A): Social media are websites or applications that enable users to participate in social networking but they cannot create and share content with others in the community.
Reasoning (R): We should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
A is false but R is true.
Explanation
Social media refers to web and mobile technologies and practices that enable users to participate in social networking and share content, opinions, experiences, and perspectives online. We should avoid wasting precious time responding to unnecessary emails or comments unless they are relevant to us.
Assertion (A): Cyberstalkers collect all personal information of the victim.
Reasoning (R): Cyberstalkers post the email of the victim on numerous filthy, obscene or illegal websites.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true and R is the correct explanation of A.
Explanation
Cyberstalking is the use of the internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Cyberstalkers gather personal information about their victims and post their email addresses on numerous filthy, obscene, or illegal websites to harass them.
Assertion (A): Harassing a person using modern technologies like the internet is called cyber bullying.
Reasoning (R): Cyberbullying is not a cybercrime.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
A is true but R is false.
Explanation
Cyberbullying is an attack on an individual or a group through the use of electronic means such as instant messaging, social media, email, and other forms of online communication with the intent to abuse, intimidate, or overpower. Cyberbullying is considered a cybercrime.
Assertion (A): IT Act 2000 provides legal recognition to electronic commerce.
Reasoning (R): IT (Amendment) Act 2008 provides additional focus on information security.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true and R is the correct explanation of A.
Explanation
The Information Technology Act, 2000 is the primary law in India dealing with cybercrime and electronic commerce. A major amendment was made to the IT Act in 2008. It introduced section 69, which gave authorities the power of "interception or monitoring or decryption of any information through any computer resource".
Assertion (A): Cyber law is a generic term which refers to all the legal and regulatory aspects of the internet and the World Wide Web.
Reasoning (R): Cyber law covers all aspects of transactions and activities on and concerning the internet, the World Wide Web and Cyberspace.
- Both A and R are true and R is the correct explanation of A.
- Both A and R are true but R is not the correct explanation of A.
- A is true but R is false.
- A is false but R is true.
Answer
Both A and R are true and R is the correct explanation of A.
Explanation
Cyber law is a broad term that encompasses all legal and regulatory aspects related to the internet and the World Wide Web. It includes various rules and regulations governing online activities, transactions, and interactions.
Should we use incognito window during surfing?
Answer
Yes, we should use an incognito window while surfing the internet. It helps protect the confidentiality of information by not saving cookies and browsing history, which reduces the risk of identity theft and keeps our personal data safe.
State whether True or False.
(a) IP address helps trace our geographical area.
(b) Cookies store our online habits.
(c) Using strong internet passwords does not help in maintaining cyber safety.
Answer
(a) True
Reason — When we share our IP address on the network with other devices, a website can determine our geographical location.
(b) True
Reason — Cookies are small text files on our computer storing small pieces of information related to our online habits/text.
(c) False
Reason — Using strong internet passwords is essential for maintaining cyber safety as they help protect accounts from unauthorized access.
How can one safely browse the internet?
Answer
We can safely browse the internet by following the tips given below:
(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.
(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.
(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.
(d) While making purchases online check if the site is reputed and has a refund policy.
(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.
(f) If there are sites we visit regularly, it is a good idea to bookmark them in our browser.
What are safe browsing tips?
Answer
We can safely browse the internet by following the tips given below:
(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.
(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.
(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.
(d) While making purchases online check if the site is reputed and has a refund policy.
(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.
(f) If there are sites we visit regularly, it is a good idea to bookmark then in our browser.
Is Google Chrome safe for browsing?
Answer
Google Chrome is generally safe for browsing due to its regular updates and built-in protection against phishing and malware. It also uses Google's Safe Browsing technology to warn users about malicious sites.
Do you feel safe on the internet?
Answer
Yes, I feel safe on the internet by following practices such as using strong passwords, enabling two-factor authentication, keeping software updated, and being cautious with online interactions.
Define cyber safety.
Answer
Cyber safety refers to the safe and responsible use of internet to ensure safety and security of personal information and not posing threat to information available online about other's.
Write at least four tips of cyber safety.
Answer
The tips for cyber safety are as follows:
(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.
(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.
(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.
(d) While making purchases online check if the site is reputed and has a refund policy.
(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.
(f) If there are sites we visit regularly, it is a good idea to bookmark them in our browser.
What is private browsing?
Answer
Private browsing is a type of browsing wherein the browser opens in incognito mode or through proxy or VPN (Virtual Private Network) and does not store cookies.
What are the possible dangers if cyber safety is overlooked?
Answer
If cyber safety is overlooked, several dangers can arise, including:
- Data theft, where personal and financial information is stolen.
- Malware infections that can damage or encrypt data.
- Phishing attacks that trick users into revealing sensitive information.
- Loss of privacy due to unauthorized access to personal data.
- Financial loss from fraudulent transactions.
- Damage to reputation from leaked or misused information.
- Legal consequences from non-compliance with data protection regulations.
What is the role of IP Address in networking?
Answer
IP address is a unique address of our device when we connect to the internet. When we share our IP address on the network with other devices, a website can determine our geographical location.
What do you mean by confidentiality of information?
Answer
Confidentiality of information ensures that only authorized users get access to sensitive and protected data.
What is the role of firewall?
Answer
A firewall plays a critical role in network security by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.
Define cookies.
Answer
Cookies are small text files on our computer storing small pieces of information related to our online habits/text. They can identify us and track our browsing activity.
How do websites track us?
Answer
The different types of information used by websites to track us online are as follows:
- IP Address — When we share our IP address on the network with other devices, a website can determine our geographical location.
- Cookies and Tracking Scripts — They can identify and track our browsing activity across a website.
- HTTP Referrer — When a link to an outside website on a webpage is clicked, then the linked website will get opened and internally our information will be provided to the linked website.
- Super Cookies — Super Cookies are persistent cookies that come back even after we delete them. They store cookie data at multiple places, for example, in Flash cookies, Silverlight storage, our browsing history and HTML5 local storage etc.
- User Agent — It tells websites our browser and operating system, providing another piece of data that can be stored and used to target ads.
Robin searched the net to purchase a wrist watch and a football. Now, whenever he goes online, he is flooded with advertisements about sports items and wrist watches.
(a) Why does this happen?
(b) How could Robin avoid this?
(c) How can Robin get rid of this?
Answer
(a) Robin is experiencing targeted ads due to adware, which collects information about his online activities. Since he searched for wrist watches and sports items, the adware uses this data to display related advertisements.
(b) To avoid this, Robin should use ad blockers, browse in private mode, and be cautious about installing software from untrusted sources.
(c) To get rid of the adware, he should run anti-adware scans using reputable tools, uninstall any suspicious programs, reset his browser settings, and ensure his security software is up-to-date. These steps will help remove the adware and prevent further unwanted advertisements.
What is meant by gender discrimination? How does it hamper classroom teaching and learning process?
Answer
Gender discrimination refers to the unfair or unequal treatment of individuals based on their gender.
In the classroom, gender discrimination can significantly hamper the teaching and learning process in several ways:
- Unequal Opportunities — Students may not receive the same opportunities to participate in activities, discussions, or leadership roles based on their gender, limiting their engagement and development.
- Bias in Assessment — Teachers might unconsciously favour one gender over another, leading to biased assessments and unfair evaluations of students' abilities and contributions.
- Stereotyping — Gender stereotypes can influence the expectations teachers and peers have of students, affecting their confidence and interest in subjects traditionally associated with their gender, such as STEM fields for girls or arts for boys.
- Reduced Participation — Students may feel discouraged from participating or expressing themselves freely if they believe their gender will lead to judgment or discrimination, which can impact their learning experience and academic performance.
- Limited Role Models — Gender discrimination can result in a lack of diverse role models in teaching materials or staff, making it harder for students to envision themselves in various careers or roles beyond traditional gender expectations.
What do you mean by virus?
Answer
Viruses are programs that copy themselves throughout a computer or network. Viruses can only be activated when a user opens the program. At their worst, viruses can corrupt or delete data, use the user's email to spread, or erase everything on the hard disk. If not checked, a virus can damage the system or specific files which are important for the functioning of an operating system. It may also slow down our computer as a result of replication of virus in the background without being visible on the screen.
What do you mean by spyware and adware?
Answer
Malware that collects information about the usage of the infected computer and communicates it back to the attacker is known as Spyware.
Adware refers to a type of malware that displays unwanted advertisements on our computer or device.
What is the difference between spyware and adware?
Answer
Spyware | Adware |
---|---|
Malware that collects information about the usage of the infected computer and communicates it back to the attacker is known as Spyware. | Adware refers to a type of malware that displays unwanted advertisements on our computer or device. |
It finds its way into PCs by "piggybacking" onto a file, or gets downloaded from the internet when we visit a particular website. | Adware is commonly activated unknowingly when users are trying to install legitimate applications that adware is bundled with. |
What do you mean by malware?
Answer
Malware (malicious software) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behaviour an attacker wants.
What do you mean by worm?
Answer
Worms are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
What do you mean by Trojan horse?
Answer
Malware disguised in what appears to be legitimate software are known as Trojan horse. Once activated, Trojans will conduct whatever action they have been programmed to carry out.
What is the difference between worm and Trojan horse?
Answer
Worm | Trojan horse |
---|---|
Worms are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks. | Malware disguised in what appears to be legitimate software are known as Trojan horse. |
It can replicate itself and spread automatically. | Trojans do not replicate or reproduce through infection, instead, it performs whatever actions it has been programmed to carry out. |
Explain the difference between malware and worm?
Answer
Malware (Malicious Software) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants. It includes various forms of malicious software, such as viruses, spyware, trojans and worms.
Worms are a type of malware that are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
Why do we need a secure connection while doing netbanking?
Answer
We need a secure connection while doing net banking to protect sensitive financial information and prevent unauthorized access. Secure connections, indicated by "HTTPS" in the URL and a padlock icon in the browser, encrypt data transmitted between the user’s device and the bank’s server.
Is WhatsApp secure?
Answer
Yes, WhatsApp is considered secure due to its use of end-to-end encryption, which ensures that messages, calls, photos, and videos are encrypted and can only be read by the intended recipient, using special keys to decrypt the content.
How will you identify from a URL whether the website you are visiting is safe or not?
Answer
The URL of a secure website begins with "https" rather than "http". Also, the Internet browsers display a padlock icon in address bar to indicate that the website is secure. These checks help ensure that the website is opened in secure mode.
Define secure connection.
Answer
A secure connection is a connection that is encrypted by one or more security protocols to ensure the security of data flowing between two or more nodes.
Differentiate between http and https.
Answer
HTTP | HTTPS |
---|---|
The full form of HTTP is Hypertext Transfer Protocol. | The full form of HTTPS is Hypertext Transfer Protocol Secure. |
HTTP is the set of rules for transferring hypertext on world wide web (WWW). | HTTPS is a secure version of the HTTP protocol that uses the SSL/TLS protocol for encryption and authentication. |
HTTP sends data in plain text. | HTTPS sends the data in encrypted form to make the transmission secure. |
URLs using HTTP start with "http://". | URLs using HTTPS start with "https://". |
Name any two websites which use https.
Answer
Two websites which use https are:
- Google (https://www.google.com)
- Amazon (https://www.amazon.com)
What should we practice to ensure confidentiality of information?
Answer
Confidentiality of information can be maintained by observing the following practices:
- Prevention by encrypting the data and by limiting the places where it might appear.
- Using firewall wherever possible.
- Controlling browser settings to block tracking.
- Browsing privately wherever possible.
- Taking care while posting on social media.
- Ensuring safe sites while entering crucial information.
- Ensuring that the address contains HTTPS and a padlock sign.
- Carefully handling emails.
- Not giving sensitive information on wireless networks.
- Avoiding use of public computers.
What do you mean by identity theft?
Answer
Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.
How is cyber law implemented in India?
Answer
In India, cyber laws are enforced through the Information Technology Act, 2000, which was notified on October 17, 2000. It is the primary legislation in India dealing with cybercrime and electronic commerce. The IT Act is a key legal framework that provides support to computer users against cybercrime.
What is IT Act, 2000?
Answer
The Information Technology Act, 2000 is an Act of the Indian Parliament notified on 17 October, 2000. It is the primary law in India dealing with cybercrime and electronic commerce.
What is child pornography?
Answer
Child pornography is publishing and transmitting obscene material about children in electronic form.
How does cybercrime affect our daily life?
Answer
Cybercrime impacts our daily lives by causing financial losses, invading our privacy, and disrupting online services. It can lead to stress and damage to personal and professional reputations. Overall, it undermines trust in digital systems and creates extra costs for dealing with the aftermath.
Analyze two cybercrime prevention and protection methods.
Answer
Two effective methods for preventing and protecting against cybercrime are:
Observe safe online behavior:
- Use strong unique passwords online.
- Download files and applications only from those websites that we trust, such as from official app stores or legitimate organizations, such as our bank.
- Pause and think before clicking on links in email, messages or on social networking sites. Don't click on links in messages if we don't know the sender or if the message is unexpected.
- If a link looks suspicious or we can't tell where it leads to, before clicking, hover over that link to see the actual web address it will take us to. If we do not recognize or trust the address, try searching for relevant key terms in a web browser. This way we can find the article, video or webpage without directly clicking on the suspicious link.
- Beware of offers that seem too good to be true. Leave websites that ask for our personal or banking details in return for money, these are scams.
Online transaction handling: While making purchases online,
- Check if the site is reputed and has a refund policy.
- While making payments, check that we are using a secure connection. The URL of a secure payment page will use 'https' instead of 'http' and a padlock icon will be displayed by our browser.
- If the website looks suspicious or there are doubts, do not proceed.
- Don't use online banking or make payments with credit cards using public computers or Wi-Fi.
What steps should be taken to protect oneself from online fraud?
Answer
The steps to be taken to protect oneself from online fraud are as follows:
- Before we start browsing the web, we must ensure that our operating system, web browser, security software, browser plug-ins, and other applications are up-to-date.
- We must adjust our web browser’s settings for better security. Most browsers will warn us if we are visiting a risky website.
- We should use strong, unique passwords online, only download from trusted sites, and always think twice before clicking on links in emails, messages, or social media.
- When shopping online, we should check if the website is trusted and has a refund policy.
- We should clear cookies regularly as they track our online activity.
- We should bookmark trusted websites that we visit often to prevent mistyping the website name.
Write four steps to combat cybercrime.
Answer
Four steps to combat cybercrime are as follows:
- Before we start browsing the web, we must ensure that our operating system, web browser, security software, browser plug-ins, and other applications are up-to-date.
- We should use strong, unique passwords online, only download from trusted sites, and always think twice before clicking on links in emails, messages, or social media.
- When shopping online, we should check if the website is trusted and has a refund policy.
- We should clear cookies regularly as they track our online activity.
How is social networking responsible for cybercrime?
Answer
Social networking sites play a role in cybercrime in several ways. Since many people use them, some believe they can post anything without facing consequences by using fake email IDs or hiding their identity. This allows them to share false information, spread rumours, or make harmful comments, leading to arguments, harassment, and even causing communal tension. This kind of behaviour not only disturbs social harmony but also encourages cybercrimes like fraud and identity theft.