CSI COLLEGE OF EDUCATION
L.M.S COMPOUND PARASSALA
RECORD OF
…………………..
(SEMESTER-1)
2020-22
EDU 01
Candidate Name :JIHITHA J P
Candidate Code :18020351006
Subject :MATHEMATICS
Certified that this is a Bonafide Record
Member of the faculty Principal
Place: Parassala Place: Parassala
Date: Date:
In this cyber world cyber privacy and password protection is very
important. Privacy is our right to control what happens with personal
information about us. Cyber privacy is the privacy and security level of personal
data published via the internet. It is a broad item that refers to a variety of
factors, techniques and technologies used to protect sensitive and private data,
communications and preferences. Here we discuss about cyber privacy, crimes
involving cyber privacy and how to minimize the internet privacy violation
risks. And also we discuss about the password protection. Password protection
is a security process that protects information accessible via internet. Every
password is important with many ways while we using internet. It keeps a great
privacy of our information on internet. We can say password protection is also
an important part of cyber privacy.
CYBER PRIVACY
Cyber privacy is mostly defined by the services used by individuals. Whatever
agreements individuals agree to when they sign up for a service usually signs
away their right to privacy. In other cases the reasonable expectation of privacy
is not reasonable if the behaviours or communications in question were
knowingly exposed to public view. Internet privacy is a cause for concern for
any user planning to make an online purchase, visit a social networking site,
participation in online games or attend forums. Internet privacy, ethics and
online security are important issues because they are present in every action
taken by every user online. With the rising rate of incidents of hacking, cyber
bullying and identity theft, it is clear that people need directions now more than
ever.
CRIMES INVOLVING CYBER – PRIVACY
1) Malware - It is the collective name for a number of malicious software
variants including virus, spyware, trogen….which cause extensive damage to
system and data or to gain access to a network. The use of malicious code which
can compromise a user’s identity or information.
2) Denial of service attacks (DoS attack) – It is a cyber-attack, it disrupt the
services by overloading the provider of the service. It blocks a user from
accessing his/her personal information.
3) Computer Viruses - A series of man made replicable programme or code. It
can compromise user information as well as identity
All these crimes fall under the category of,
Fraud
Identity Theft
Phishing scams
Information warfare
Cyber bullying
INTERNET PRIVACY VIOLATION RISKS MAY BE MINIMIZED AS
FOLLOWS
Always use preventative software application such as anti-virus, anti-
malware, anti-spam and firewalls.
Update the software on a regular basis
Install safety features like scans or filters.
Avoid exposing password, personal data on websites with lower security
levels.
Clear the browser’s Cache and browsing history on a consistent basis.
Avoid shopping from unreliable websites.
Use a strong alpha-numerical passwords
Avoid using the same password for all the accounts
Change passwords and PIN regularly; do not share it with others.
Internet is a boon or bane depending on how it is used.
PASSWORD PROTECTION
In a cyber-privacy a password and its protection is very important.
Passwords are the first line of defense against cybercrimes. A password is a
secret word or string of characters that is used for authentication.
Basically every security system is based on password. In modern times, user
names and passwords are commonly used by people during a log in process that
controls access to protected computer operating systems, mobile phones, cable
TV decoders, automated teller machine (ATM) etc. A typical internet user has
passwords for many purposes: logging into accounts, retrieving email, accessing
applications, websites and even reading the morning newspaper online. It is
crucial to pick strong passwords that are different for each of the important
account and it is a good practice to update password regularly.
SOME TIPS FOR PASSWORD PROTECTION
Use different password for each of the important accounts like email
and online banking.
Choosing the same password for each of the online
accounts is like using the same key to lock the home, car and
office. If a criminal gains access to one, all of them are compromised.
So don’t use the same password for everything.
The password must be big enough. It must have a minimum of eight -
character letters or number or both mixed together.
The password kept in a secret place that isn’t easily visible. Don’t
reveal your password to anyone or write in a common place where it is
visible to all.
Set the password recovery option.
If you forget your password and get locked out, you need a
way to get back into your account. So make sure your recovery
email address is up- to- date and it's an account you can still
access.
You can also further secure your account by using additional
authentication methods.
Having a mobile phone number on your account is one of
the easiest and most reliable ways to keep your account safe. So if
anyone login to your account you will get notification about it.
Always remember to sign out while using your accounts in a local
network, internet cafes, public computers etc. Never save your Id and
password in such situations. Clear the browser’s Cache and browsing
history after using internet in public places.
Don’t reveal your password to anyone else. Frequently change and keep
them up-to-date.
Cyber privacy is an important issue in this era. Password protection is
obviously a part of cyber privacy. If a password is compromised and revealed a
victim's identity or the privacy may be fraudulently used or stolen. So any way
we have got a crystal and clear idea about cyber privacy and the password
protection. We have clearly discussed about all the aspects of cyber privacy and
the password protection. In this era we should aware about all these aspects. We
should follow all the privacy safety measures also.