What is Cyber Security?
Cyber security is the practice of defending computers,
servers, mobile devices, electronic systems, networks, and
data from malicious attacks. It's also known as information
technology security or electronic information security. The
term applies in a variety of contexts, from business to mobile
computing, and can be divided into a few common categories.
Network security: is the practice of securing a computer
network from intruders, whether targeted attackers or
opportunistic malware
Application security: focuses on keeping software and devices
free of threats. A compromised application could provide
access to the data its designed to protect. Successful
security begins in the design stage, well before a program or
device is deployed
Information security: protects the integrity and privacy of data, both in storage
and in transit.
· Operational security: includes the processes and decisions for handling
and protecting data assets. The permissions users have when accessing a
network and the procedures that determine how and where data may be
stored or shared all fall under this umbrella.
· Disaster recovery and business continuity: define how an organization
responds to a cyber-security incident or any other event that causes the loss
of operations or data. Disaster recovery policies dictate how the organization
restores its operations and information to return to the same operating
capacity as before the event. Business continuity is the plan the organization
falls back on while trying to operate without certain resources.
What is cyberbullying?
Cyberbullying is bullying with the use of digital technologies. It can take place on social
media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour,
aimed at scaring, angering or shaming those who are targeted. Examples include:
spreading lies about or posting embarrassing photos or videos of someone on social media
sending hurtful, abusive or threatening messages, images or videos via messaging platforms
impersonating someone and sending mean messages to others on their behalf or through
fake accounts.
Face-to-face bullying and cyberbullying can often happen alongside each other. But
cyberbullying leaves a digital footprint – a record that can prove useful and provide evidence
to help stop the abuse.
If you are worried about your safety or something that has happened to you online, you
can seek help by calling your national helpline. If your country does not have a
helpline, please urgently speak to an adult you trust or seek professional support from
trained and experienced carers.
Child Pornography
Child pornography is a form of child sexual exploitation.
Federal law defines child pornography as any visual depiction of
sexually explicit conduct involving a minor (persons less than 18
years old). Images of child pornography are also referred to as
child sexual abuse images.
Judgements: Any person, who stores or possesses pornographic
material in any form involving a child for commercial purpose shall
be punished on the first conviction with imprisonment of either
description which shall not be less than three years which may
extend to five years, or with fine, or with both and in the event of
second or subsequent conviction, with imprisonment of either
description which shall not be less than five years which may
extend to seven years and shall also be liable to fine.
Cyber Trolls
Cyber bullying is when someone is targeting you
online, doing or saying things that upset you, or
trying to make you look bad to others. This could be
by writing nasty things about you, either in a public
way e.g. commenting on a YouTube video,
@replying on Twitter/tweeting about you, writing
Facebook posts about you/commenting on your
posts, writing a blog about you, etc. Or it could be a
more private bully, who will send you emails,
Facebook PMs, private Twitter messages, and so
on.
IT Act 2000
The Information Technology Act, 2000 was enacted by
the Indian Parliament in 2000. It is the primary law in
India for matters related to cybercrime and e-
commerce. The act was enacted to give legal
sanction to electronic commerce and electronic
transactions, to enable e-governance, and also to
prevent cybercrime.
Cyber Stalking
Cyberstalking is a crime committed when
someone uses the internet and other
technologies to harass or stalk
another person online. Even though
cyberstalking is a broad ter9m for
online harassment, it can include
defamation, false accusations,
teasing, and even extreme threats
Illegal Downloads
● Illegal downloading is a process of getting/downloading
data(like documents, images, videos, audio, etc.) that you
are not allowed to use on the internet. Or, in other words,
illegal downloads are a way in which user/users download
files without having any legal right to download them. The
files which are downloaded are copyrighted.