SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
CYBER PRIVACY &
PASSWORD PROTECTION
Online Assignment Submitted to
UNIVERSITY OF KERALA
In partial fulfilment of the requirements for the degree of Bachelor in Education
(EDU 03 - Technology and Communication in Education)
By
NIKHIL D.
Reg. No. 182203020013
S1. B.Ed. Physical Science
MAR THEOPHILUS TRAINING COLLEGE
Mar Ivanios Vidya Nagar, Nalanchira, Thiruvananthapuram
2020-2022
Cyber Privacy and Password Protection
Online Assignment
EDU 03: Technology and Communication in Education
Submitted By : Nikhil D
Reg. No. 18220302013
S1. B.Ed. Physical Science
Mar Theophilus Training College,
Trivandrum
Submitter To : Dr. Joju John
Assistant Professor
Mar Theophilus Training College
Trivandrum
Date of Submission : 10-02-2021
Cyber Privacy and Password Protection | Nikhil D.
1
Cyber Privacy and Password Protection
Introduction
Digital tools generate digital concerns. The ease with which digital tools can be used to
find, create, manipulate, and share information can be a boon to teaching and learning.
However, these same tools can be used to quickly and easily copy other people’s work, capture
inappropriate or unwanted images, or spread sensitive information across the globe.
Our civilisation has progressed through ages breaking all geographical barriers and the
most notable addition to the human civilization, in recent years, is the Internet, bringing the
whole world closer and turning it into a 'global village'. But this 'closest global village', the
cyberspace, is now a space with new risks, which challenge the very essence of individual
privacy.
Cyber Privacy
It is the level of privacy protection for an individual while has connected to the Internet.
It covers the amount of online security available for personal and financial data,
communications, and preferences.
The new technologies have enhanced the possibilities of invasion into the privacy of
individuals and provided new tools in the hands of eavesdroppers. Individual privacy is at a
greater stake than ever before.
Cyber-Privacy is a huge concern for civilians and especially for companies because of
the potential for crime. Such crimes includes Malware such as the use of malicious code which
can compromise a user's identity and/or information Denial of Service Attacks Block a user
from accessing his or her information. Computer Viruses can compromise user information as
well as identity. All of these crimes fall under the category or fraud, identity theft, phishing
scams and or information warfare.
Cyber Privacy and Password Protection | Nikhil D.
2
Cyber Privacy Hazards
The cyber world and its related crimes have no territorial barriers, and this makes
everything complex because evidence is very hard to come by. With the privacy issue at centre
stage, cookies, spamming, data mining, and hacking - are important areas of discussion where
insecurity from the technological front arises.
Cookies: - A cookie is information that a website puts on one's hard disk so that it can
remember something about him at a later time. Typically, a cookie records your preferences
when using a particular site. Cookies can be used to track people to gain statistics as they go
through the website. Because every time we visit a Web site, we leave a footprint of personal
information about ourselves like our preferences.
Web Bugs:- A Web bug, also known as a Web beacon, is a file object (usually a graphic image
such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor
user behaviour, functioning as a kind of spyware. A Web bug can send several pieces of
information to the server computer, and those includes, the IP address of the computer that
fetched the Web bug.
Hacking: - Hacking is an ‘unauthorised Access’ to a computer and refers to access to the whole
or any part of a computer system without permission. Hackers worldwide attempt to hack into
remote computer systems for multiple purposes like eavesdropping, data theft, fraud,
destruction of data, causing damage to computer systems, or for mere pleasure or personal
satisfaction.
One example of a hacking software is a Trojan horse program, in which malicious or
harmful code is contained inside apparently harmless programming or data in such a way that
it can get control and do its chosen form of damage, such as ruining the file allocation table on
a hard disk.
Spamming: - Spamming is another area of concern where cyber privacy is at stake. It the use
of messaging systems to send an unsolicited message to a large numbers of recipients for the
purpose of commercial advertising or for any prohibited purpose (like phishing)
Data Mining: - Data mining is the latest big business in the information. It is defined as a
process used to extract usable data from a larger set of any raw data. It implies analysing data
patterns in large batches of data using one or more software. Data mining has applications in
multiple fields, like science and research.
Cyber Privacy and Password Protection | Nikhil D.
3
Cyber Security
Cyber Security is the privacy and security level for the personal data published via the
internet. It is a broad term that refers to a variety of factors, techniques and technologies used
to protect sensitive and private data, communications and preferences.
Protecting one's privacy means protection of right to control how personal information
is collected and promulgated. Protection of privacy also includes protection against identify
theft, or the use of an individual's personal information for fraudulent purposes.
Firewalls assist in blocking dangerous programs, viruses or spyware before they
infiltrate your system. Also, nowadays, several search engines are accompanied by cyber
security plugins. The HTTPS (Hyper Text Transfer Protocol Secure) protects personal and
financial data (Credit/debit cards details, OTPs) from fraudsters. Also, several other plugins
like, disconnect, blur etc. associated with Mozilla based browsers, Opera, Safari enhances the
protection of the private and personal information’s.
VPN (Virtual Private Network)
A Virtual Private Network is a way to create a secure tunnel between browsers and web
servers. Data packets are encrypted before they are sent to a destination server, which also
results in IP addresses and your location becoming hidden. VPN can also be used to change
the Geo-location of the user. VPNs are not a silver bullet for security; far from it, but they can
help mask your online presence. It is worth noting, however, that VPN usage is banned in some
countries.
Cyber Privacy and Password Protection | Nikhil D.
4
Password Protection
Password protection is a security process that protects information accessible via
computers that needs to be protected from certain users. Password protection allows only those
with an authorized password to gain access to certain information. Passwords are used
commonly to gain entry to networks and into various Internet accounts in order to authenticate
the user accessing the website.
Usage of alphanumeric and special character combination in password creations
provides more security the e-contents while using like this, disables the possibility of
replications and unauthorised entries.
Two-factor authentication (2FA), also known as two-step verification, is a widely-
implemented method of adding an extra layer of security to your accounts and services after
you have submitted a password.
The most common methods are via an SMS message, a biometric marker such as a
fingerprint or iris scan, a PIN number, pattern etc. Using 2FA creates an additional step to
access your accounts and data, can help protect your accounts and Information.
In modern devices, along with patterns, password, Biometric authentication options like
face recognition, iris scanning, and fingerprints were found.
Cyber Privacy and Password Protection | Nikhil D.
5
HOW TO CREATE A STRONG PASSWORD
1. Think them, as essentials
2. Use a password manager.
A good password manager creates strong, unique passwords for all of your accounts.
That means, if one of your passwords does get caught up in a data breach, criminals won't have
the keys to the rest of your online services.
3. Go long.
Despite what all those prompts for unique characters and uppercase letters might have
you believe, length matters more than complexity. Once you get into the 12-15 character range,
it becomes way harder for a hacker to brute force, much less guess, your password.
Eg."g0be@r$"
4. Keep them separated.
If you want to deploy special characters against a password manager lots of input fields
will force you to bunch them all together at the beginning or end. That’s what everyone else
does, which means that’s hackers are looking for. Instead, space them out throughout your
password to make the guesswork extra tricky.
5. Single-serve only.
Don’t reuse passwords across different accounts.
6. Don’t trust your browser.
Usually we let our browser to remember all those passwords, or getting a paid password
manager.
7. Add two-factor authentication
Two-factor authentication, or 2FA, is a method of verifying your identity that adds a
second layer of security to your account password like a PIN number, password, or pattern an
ATM or credit card, mobile phone, or security token. It combines your physical card and your
PIN a biometric form of authentication, such as your fingerprint, your voice, or your face
8. Do not use personal information
• Don’t use your name or names of family members or pets in your passwords.
• Don’t use numbers like your address, phone number, or birthdays, either.
Cyber Privacy and Password Protection | Nikhil D.
6
9. Do not use real words
Password cracking tools help attackers to guess password. These programs can process
every word in the dictionary, plus letter and number combinations, until a match is found. So
don’t use clear, real words from the dictionary or proper nouns or names. Instead, use special
characters by combining uppercase and lowercase letters with numbers and special characters,
such as “&” or “$,” you can increase the complexity of your password and help decrease the
chances of someone potentially hacking into your account.
10. Don’t write them down
11. Change passwords on a regular basis
12. Never enter your password on another person’s computer.
13. When using your devices on public Wi-Fi, you should avoid visiting websites that require
you to log in to your account, such as online banking or shopping.
When you’re on an unsecured public network, your unencrypted data could be
intercepted by a nearby hacker. To protect yourself from these threats, you should always use
a virtual private network (VPN), like Norton Secure VPN, when on a public Wi-Fi connection.
Cyber Privacy and Password Protection | Nikhil D.
7
Conclusion
As "cyberspace" has become central to the global information and communication
infrastructure, the security of cyberspace has now become a more urgent priority for
corporations and governments around the world. At the same time, the online environment has
increasingly been subjected to sophisticated and targeted threats; our ever-increasing reliance
on cyberspace is creating new and significant vulnerabilities. Privacy protection and cyber
security should be thought of as interconnected: as more and more personal information is
processed or stored online, privacy protection increasingly relies on effective cyber security
implementation by organizations to secure personal data both when it is in transit and at rest.
Strategies should include a comprehensive compliance process, management of internal
privacy, employee training and awareness, self-regulatory efforts, corporate interface with
privacy awareness organisations, litigation support and alternative dispute resolution.
Furthermore, every e-organization's privacy practices should be bench marked against national
and international standards for privacy and fair information practices to meet the emerging
challenges.
It is not impossible to protect yourself from the malicious content on the internet, but it
does take some time and effort. Reading privacy policies, checking privacy settings, and
keeping an eye on what content comes up in search engines about you. The best protection is
not allowing anything at all, but limiting the amount of information you share, or using only
one credit card for example will provide better control if anything does go wrong. Privacy is
not dead, but you do have to bury your head in the ground to stay safe.
Cyber Privacy and Password Protection | Nikhil D.
8
Reference
[1] Katherine S. Cennamo, John D. Ross, Peggy A. Ertmer, Techonology Integration for
Meaningful Classroom, Wadsworth, USA, 2010
[2] http://14.139.60.114:8080/jspui/bitstream/123456789/722/14/Cyber%20Privacy.pdf
dated 08-02-2021
[3] https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-
hackers-spies-and-the-government/
dated 08-02-2021
[4] https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-
research/2014/cs_201412/
dated 08-02-2021
[5] https://www.slideshare.net/bavijesh/cyber-law-and-password-protection
dated 08-02-2021
[6] https://economictimes.indiatimes.com/definition/data-mining
dated 08-02-2021
[7] https://en.wikipedia.org/wiki/Spamming
dated 08-02-2021
[8] https://legalbeagle.com/7640133-legal-ethical-issues-technology.html
dated 08-02-2021

Weitere ähnliche Inhalte

Was ist angesagt?

Web based learning [autosaved]
Web based learning [autosaved]Web based learning [autosaved]
Web based learning [autosaved]Akhilajs2
 
Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Jincy24
 
3.b.ed class-scope of ict
3.b.ed class-scope of ict3.b.ed class-scope of ict
3.b.ed class-scope of ictSanthosh Thomas
 
Scope of ict in education
Scope of ict in educationScope of ict in education
Scope of ict in educationGREESHMAPR
 
School induction program report
School induction program reportSchool induction program report
School induction program reportADLINRV
 
Ncfte- 2009 (National Curriculum Framework for Teacher Education)
Ncfte- 2009 (National Curriculum Framework for Teacher Education)Ncfte- 2009 (National Curriculum Framework for Teacher Education)
Ncfte- 2009 (National Curriculum Framework for Teacher Education)MDFAIZANALAM4
 
It enabled instructional resources
It enabled instructional resourcesIt enabled instructional resources
It enabled instructional resourcesathulyavijayan
 
Use of ICT in Teacher Education
Use of ICT in Teacher EducationUse of ICT in Teacher Education
Use of ICT in Teacher Educationjagannath Dange
 
Multiple roles of teacher
Multiple roles of teacherMultiple roles of teacher
Multiple roles of teacherzenana sahla
 
Chapter 3 The Role of Multimedia in Education
Chapter 3   The Role of Multimedia in EducationChapter 3   The Role of Multimedia in Education
Chapter 3 The Role of Multimedia in EducationSalina Saharudin
 

Was ist angesagt? (20)

Web based learning [autosaved]
Web based learning [autosaved]Web based learning [autosaved]
Web based learning [autosaved]
 
Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...
 
NMEICT
NMEICTNMEICT
NMEICT
 
Teacher Tube
Teacher TubeTeacher Tube
Teacher Tube
 
CIET
CIETCIET
CIET
 
3.b.ed class-scope of ict
3.b.ed class-scope of ict3.b.ed class-scope of ict
3.b.ed class-scope of ict
 
Scope of ict in education
Scope of ict in educationScope of ict in education
Scope of ict in education
 
E content
E contentE content
E content
 
School induction program report
School induction program reportSchool induction program report
School induction program report
 
E-learning
E-learningE-learning
E-learning
 
edublog.pptx
edublog.pptxedublog.pptx
edublog.pptx
 
Gyan darshan
Gyan darshanGyan darshan
Gyan darshan
 
Ncfte- 2009 (National Curriculum Framework for Teacher Education)
Ncfte- 2009 (National Curriculum Framework for Teacher Education)Ncfte- 2009 (National Curriculum Framework for Teacher Education)
Ncfte- 2009 (National Curriculum Framework for Teacher Education)
 
It enabled instructional resources
It enabled instructional resourcesIt enabled instructional resources
It enabled instructional resources
 
SIET
SIETSIET
SIET
 
Edusat
EdusatEdusat
Edusat
 
Use of ICT in Teacher Education
Use of ICT in Teacher EducationUse of ICT in Teacher Education
Use of ICT in Teacher Education
 
Victers channel,ppt rinku
Victers channel,ppt rinkuVicters channel,ppt rinku
Victers channel,ppt rinku
 
Multiple roles of teacher
Multiple roles of teacherMultiple roles of teacher
Multiple roles of teacher
 
Chapter 3 The Role of Multimedia in Education
Chapter 3   The Role of Multimedia in EducationChapter 3   The Role of Multimedia in Education
Chapter 3 The Role of Multimedia in Education
 

Ähnlich wie Cyber Privacy & Password Protection

Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfJihithaJP
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 

Ähnlich wie Cyber Privacy & Password Protection (20)

Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
techalpha07
techalpha07techalpha07
techalpha07
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Task 3
Task 3Task 3
Task 3
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 

Kürzlich hochgeladen

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Kürzlich hochgeladen (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Cyber Privacy & Password Protection

  • 1. CYBER PRIVACY & PASSWORD PROTECTION Online Assignment Submitted to UNIVERSITY OF KERALA In partial fulfilment of the requirements for the degree of Bachelor in Education (EDU 03 - Technology and Communication in Education) By NIKHIL D. Reg. No. 182203020013 S1. B.Ed. Physical Science MAR THEOPHILUS TRAINING COLLEGE Mar Ivanios Vidya Nagar, Nalanchira, Thiruvananthapuram 2020-2022
  • 2. Cyber Privacy and Password Protection Online Assignment EDU 03: Technology and Communication in Education Submitted By : Nikhil D Reg. No. 18220302013 S1. B.Ed. Physical Science Mar Theophilus Training College, Trivandrum Submitter To : Dr. Joju John Assistant Professor Mar Theophilus Training College Trivandrum Date of Submission : 10-02-2021
  • 3. Cyber Privacy and Password Protection | Nikhil D. 1 Cyber Privacy and Password Protection Introduction Digital tools generate digital concerns. The ease with which digital tools can be used to find, create, manipulate, and share information can be a boon to teaching and learning. However, these same tools can be used to quickly and easily copy other people’s work, capture inappropriate or unwanted images, or spread sensitive information across the globe. Our civilisation has progressed through ages breaking all geographical barriers and the most notable addition to the human civilization, in recent years, is the Internet, bringing the whole world closer and turning it into a 'global village'. But this 'closest global village', the cyberspace, is now a space with new risks, which challenge the very essence of individual privacy. Cyber Privacy It is the level of privacy protection for an individual while has connected to the Internet. It covers the amount of online security available for personal and financial data, communications, and preferences. The new technologies have enhanced the possibilities of invasion into the privacy of individuals and provided new tools in the hands of eavesdroppers. Individual privacy is at a greater stake than ever before. Cyber-Privacy is a huge concern for civilians and especially for companies because of the potential for crime. Such crimes includes Malware such as the use of malicious code which can compromise a user's identity and/or information Denial of Service Attacks Block a user from accessing his or her information. Computer Viruses can compromise user information as well as identity. All of these crimes fall under the category or fraud, identity theft, phishing scams and or information warfare.
  • 4. Cyber Privacy and Password Protection | Nikhil D. 2 Cyber Privacy Hazards The cyber world and its related crimes have no territorial barriers, and this makes everything complex because evidence is very hard to come by. With the privacy issue at centre stage, cookies, spamming, data mining, and hacking - are important areas of discussion where insecurity from the technological front arises. Cookies: - A cookie is information that a website puts on one's hard disk so that it can remember something about him at a later time. Typically, a cookie records your preferences when using a particular site. Cookies can be used to track people to gain statistics as they go through the website. Because every time we visit a Web site, we leave a footprint of personal information about ourselves like our preferences. Web Bugs:- A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behaviour, functioning as a kind of spyware. A Web bug can send several pieces of information to the server computer, and those includes, the IP address of the computer that fetched the Web bug. Hacking: - Hacking is an ‘unauthorised Access’ to a computer and refers to access to the whole or any part of a computer system without permission. Hackers worldwide attempt to hack into remote computer systems for multiple purposes like eavesdropping, data theft, fraud, destruction of data, causing damage to computer systems, or for mere pleasure or personal satisfaction. One example of a hacking software is a Trojan horse program, in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on a hard disk. Spamming: - Spamming is another area of concern where cyber privacy is at stake. It the use of messaging systems to send an unsolicited message to a large numbers of recipients for the purpose of commercial advertising or for any prohibited purpose (like phishing) Data Mining: - Data mining is the latest big business in the information. It is defined as a process used to extract usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software. Data mining has applications in multiple fields, like science and research.
  • 5. Cyber Privacy and Password Protection | Nikhil D. 3 Cyber Security Cyber Security is the privacy and security level for the personal data published via the internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications and preferences. Protecting one's privacy means protection of right to control how personal information is collected and promulgated. Protection of privacy also includes protection against identify theft, or the use of an individual's personal information for fraudulent purposes. Firewalls assist in blocking dangerous programs, viruses or spyware before they infiltrate your system. Also, nowadays, several search engines are accompanied by cyber security plugins. The HTTPS (Hyper Text Transfer Protocol Secure) protects personal and financial data (Credit/debit cards details, OTPs) from fraudsters. Also, several other plugins like, disconnect, blur etc. associated with Mozilla based browsers, Opera, Safari enhances the protection of the private and personal information’s. VPN (Virtual Private Network) A Virtual Private Network is a way to create a secure tunnel between browsers and web servers. Data packets are encrypted before they are sent to a destination server, which also results in IP addresses and your location becoming hidden. VPN can also be used to change the Geo-location of the user. VPNs are not a silver bullet for security; far from it, but they can help mask your online presence. It is worth noting, however, that VPN usage is banned in some countries.
  • 6. Cyber Privacy and Password Protection | Nikhil D. 4 Password Protection Password protection is a security process that protects information accessible via computers that needs to be protected from certain users. Password protection allows only those with an authorized password to gain access to certain information. Passwords are used commonly to gain entry to networks and into various Internet accounts in order to authenticate the user accessing the website. Usage of alphanumeric and special character combination in password creations provides more security the e-contents while using like this, disables the possibility of replications and unauthorised entries. Two-factor authentication (2FA), also known as two-step verification, is a widely- implemented method of adding an extra layer of security to your accounts and services after you have submitted a password. The most common methods are via an SMS message, a biometric marker such as a fingerprint or iris scan, a PIN number, pattern etc. Using 2FA creates an additional step to access your accounts and data, can help protect your accounts and Information. In modern devices, along with patterns, password, Biometric authentication options like face recognition, iris scanning, and fingerprints were found.
  • 7. Cyber Privacy and Password Protection | Nikhil D. 5 HOW TO CREATE A STRONG PASSWORD 1. Think them, as essentials 2. Use a password manager. A good password manager creates strong, unique passwords for all of your accounts. That means, if one of your passwords does get caught up in a data breach, criminals won't have the keys to the rest of your online services. 3. Go long. Despite what all those prompts for unique characters and uppercase letters might have you believe, length matters more than complexity. Once you get into the 12-15 character range, it becomes way harder for a hacker to brute force, much less guess, your password. Eg."g0be@r$" 4. Keep them separated. If you want to deploy special characters against a password manager lots of input fields will force you to bunch them all together at the beginning or end. That’s what everyone else does, which means that’s hackers are looking for. Instead, space them out throughout your password to make the guesswork extra tricky. 5. Single-serve only. Don’t reuse passwords across different accounts. 6. Don’t trust your browser. Usually we let our browser to remember all those passwords, or getting a paid password manager. 7. Add two-factor authentication Two-factor authentication, or 2FA, is a method of verifying your identity that adds a second layer of security to your account password like a PIN number, password, or pattern an ATM or credit card, mobile phone, or security token. It combines your physical card and your PIN a biometric form of authentication, such as your fingerprint, your voice, or your face 8. Do not use personal information • Don’t use your name or names of family members or pets in your passwords. • Don’t use numbers like your address, phone number, or birthdays, either.
  • 8. Cyber Privacy and Password Protection | Nikhil D. 6 9. Do not use real words Password cracking tools help attackers to guess password. These programs can process every word in the dictionary, plus letter and number combinations, until a match is found. So don’t use clear, real words from the dictionary or proper nouns or names. Instead, use special characters by combining uppercase and lowercase letters with numbers and special characters, such as “&” or “$,” you can increase the complexity of your password and help decrease the chances of someone potentially hacking into your account. 10. Don’t write them down 11. Change passwords on a regular basis 12. Never enter your password on another person’s computer. 13. When using your devices on public Wi-Fi, you should avoid visiting websites that require you to log in to your account, such as online banking or shopping. When you’re on an unsecured public network, your unencrypted data could be intercepted by a nearby hacker. To protect yourself from these threats, you should always use a virtual private network (VPN), like Norton Secure VPN, when on a public Wi-Fi connection.
  • 9. Cyber Privacy and Password Protection | Nikhil D. 7 Conclusion As "cyberspace" has become central to the global information and communication infrastructure, the security of cyberspace has now become a more urgent priority for corporations and governments around the world. At the same time, the online environment has increasingly been subjected to sophisticated and targeted threats; our ever-increasing reliance on cyberspace is creating new and significant vulnerabilities. Privacy protection and cyber security should be thought of as interconnected: as more and more personal information is processed or stored online, privacy protection increasingly relies on effective cyber security implementation by organizations to secure personal data both when it is in transit and at rest. Strategies should include a comprehensive compliance process, management of internal privacy, employee training and awareness, self-regulatory efforts, corporate interface with privacy awareness organisations, litigation support and alternative dispute resolution. Furthermore, every e-organization's privacy practices should be bench marked against national and international standards for privacy and fair information practices to meet the emerging challenges. It is not impossible to protect yourself from the malicious content on the internet, but it does take some time and effort. Reading privacy policies, checking privacy settings, and keeping an eye on what content comes up in search engines about you. The best protection is not allowing anything at all, but limiting the amount of information you share, or using only one credit card for example will provide better control if anything does go wrong. Privacy is not dead, but you do have to bury your head in the ground to stay safe.
  • 10. Cyber Privacy and Password Protection | Nikhil D. 8 Reference [1] Katherine S. Cennamo, John D. Ross, Peggy A. Ertmer, Techonology Integration for Meaningful Classroom, Wadsworth, USA, 2010 [2] http://14.139.60.114:8080/jspui/bitstream/123456789/722/14/Cyber%20Privacy.pdf dated 08-02-2021 [3] https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from- hackers-spies-and-the-government/ dated 08-02-2021 [4] https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy- research/2014/cs_201412/ dated 08-02-2021 [5] https://www.slideshare.net/bavijesh/cyber-law-and-password-protection dated 08-02-2021 [6] https://economictimes.indiatimes.com/definition/data-mining dated 08-02-2021 [7] https://en.wikipedia.org/wiki/Spamming dated 08-02-2021 [8] https://legalbeagle.com/7640133-legal-ethical-issues-technology.html dated 08-02-2021