This document is a paper submitted to the University of Kerala by Nikhil D. in partial fulfillment of a Bachelor of Education degree. The paper discusses cyber privacy, password protection, and related cybersecurity issues. It defines cyber privacy and outlines privacy hazards like cookies, web bugs, hacking, spamming, and data mining. It also discusses cyber security measures like firewalls, VPNs, and two-factor authentication. The paper provides guidelines for creating strong passwords and concludes by emphasizing the interconnected nature of privacy protection and cyber security.
Measures of Dispersion and Variability: Range, QD, AD and SD
Cyber Privacy & Password Protection
1. CYBER PRIVACY &
PASSWORD PROTECTION
Online Assignment Submitted to
UNIVERSITY OF KERALA
In partial fulfilment of the requirements for the degree of Bachelor in Education
(EDU 03 - Technology and Communication in Education)
By
NIKHIL D.
Reg. No. 182203020013
S1. B.Ed. Physical Science
MAR THEOPHILUS TRAINING COLLEGE
Mar Ivanios Vidya Nagar, Nalanchira, Thiruvananthapuram
2020-2022
2. Cyber Privacy and Password Protection
Online Assignment
EDU 03: Technology and Communication in Education
Submitted By : Nikhil D
Reg. No. 18220302013
S1. B.Ed. Physical Science
Mar Theophilus Training College,
Trivandrum
Submitter To : Dr. Joju John
Assistant Professor
Mar Theophilus Training College
Trivandrum
Date of Submission : 10-02-2021
3. Cyber Privacy and Password Protection | Nikhil D.
1
Cyber Privacy and Password Protection
Introduction
Digital tools generate digital concerns. The ease with which digital tools can be used to
find, create, manipulate, and share information can be a boon to teaching and learning.
However, these same tools can be used to quickly and easily copy other people’s work, capture
inappropriate or unwanted images, or spread sensitive information across the globe.
Our civilisation has progressed through ages breaking all geographical barriers and the
most notable addition to the human civilization, in recent years, is the Internet, bringing the
whole world closer and turning it into a 'global village'. But this 'closest global village', the
cyberspace, is now a space with new risks, which challenge the very essence of individual
privacy.
Cyber Privacy
It is the level of privacy protection for an individual while has connected to the Internet.
It covers the amount of online security available for personal and financial data,
communications, and preferences.
The new technologies have enhanced the possibilities of invasion into the privacy of
individuals and provided new tools in the hands of eavesdroppers. Individual privacy is at a
greater stake than ever before.
Cyber-Privacy is a huge concern for civilians and especially for companies because of
the potential for crime. Such crimes includes Malware such as the use of malicious code which
can compromise a user's identity and/or information Denial of Service Attacks Block a user
from accessing his or her information. Computer Viruses can compromise user information as
well as identity. All of these crimes fall under the category or fraud, identity theft, phishing
scams and or information warfare.
4. Cyber Privacy and Password Protection | Nikhil D.
2
Cyber Privacy Hazards
The cyber world and its related crimes have no territorial barriers, and this makes
everything complex because evidence is very hard to come by. With the privacy issue at centre
stage, cookies, spamming, data mining, and hacking - are important areas of discussion where
insecurity from the technological front arises.
Cookies: - A cookie is information that a website puts on one's hard disk so that it can
remember something about him at a later time. Typically, a cookie records your preferences
when using a particular site. Cookies can be used to track people to gain statistics as they go
through the website. Because every time we visit a Web site, we leave a footprint of personal
information about ourselves like our preferences.
Web Bugs:- A Web bug, also known as a Web beacon, is a file object (usually a graphic image
such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor
user behaviour, functioning as a kind of spyware. A Web bug can send several pieces of
information to the server computer, and those includes, the IP address of the computer that
fetched the Web bug.
Hacking: - Hacking is an ‘unauthorised Access’ to a computer and refers to access to the whole
or any part of a computer system without permission. Hackers worldwide attempt to hack into
remote computer systems for multiple purposes like eavesdropping, data theft, fraud,
destruction of data, causing damage to computer systems, or for mere pleasure or personal
satisfaction.
One example of a hacking software is a Trojan horse program, in which malicious or
harmful code is contained inside apparently harmless programming or data in such a way that
it can get control and do its chosen form of damage, such as ruining the file allocation table on
a hard disk.
Spamming: - Spamming is another area of concern where cyber privacy is at stake. It the use
of messaging systems to send an unsolicited message to a large numbers of recipients for the
purpose of commercial advertising or for any prohibited purpose (like phishing)
Data Mining: - Data mining is the latest big business in the information. It is defined as a
process used to extract usable data from a larger set of any raw data. It implies analysing data
patterns in large batches of data using one or more software. Data mining has applications in
multiple fields, like science and research.
5. Cyber Privacy and Password Protection | Nikhil D.
3
Cyber Security
Cyber Security is the privacy and security level for the personal data published via the
internet. It is a broad term that refers to a variety of factors, techniques and technologies used
to protect sensitive and private data, communications and preferences.
Protecting one's privacy means protection of right to control how personal information
is collected and promulgated. Protection of privacy also includes protection against identify
theft, or the use of an individual's personal information for fraudulent purposes.
Firewalls assist in blocking dangerous programs, viruses or spyware before they
infiltrate your system. Also, nowadays, several search engines are accompanied by cyber
security plugins. The HTTPS (Hyper Text Transfer Protocol Secure) protects personal and
financial data (Credit/debit cards details, OTPs) from fraudsters. Also, several other plugins
like, disconnect, blur etc. associated with Mozilla based browsers, Opera, Safari enhances the
protection of the private and personal information’s.
VPN (Virtual Private Network)
A Virtual Private Network is a way to create a secure tunnel between browsers and web
servers. Data packets are encrypted before they are sent to a destination server, which also
results in IP addresses and your location becoming hidden. VPN can also be used to change
the Geo-location of the user. VPNs are not a silver bullet for security; far from it, but they can
help mask your online presence. It is worth noting, however, that VPN usage is banned in some
countries.
6. Cyber Privacy and Password Protection | Nikhil D.
4
Password Protection
Password protection is a security process that protects information accessible via
computers that needs to be protected from certain users. Password protection allows only those
with an authorized password to gain access to certain information. Passwords are used
commonly to gain entry to networks and into various Internet accounts in order to authenticate
the user accessing the website.
Usage of alphanumeric and special character combination in password creations
provides more security the e-contents while using like this, disables the possibility of
replications and unauthorised entries.
Two-factor authentication (2FA), also known as two-step verification, is a widely-
implemented method of adding an extra layer of security to your accounts and services after
you have submitted a password.
The most common methods are via an SMS message, a biometric marker such as a
fingerprint or iris scan, a PIN number, pattern etc. Using 2FA creates an additional step to
access your accounts and data, can help protect your accounts and Information.
In modern devices, along with patterns, password, Biometric authentication options like
face recognition, iris scanning, and fingerprints were found.
7. Cyber Privacy and Password Protection | Nikhil D.
5
HOW TO CREATE A STRONG PASSWORD
1. Think them, as essentials
2. Use a password manager.
A good password manager creates strong, unique passwords for all of your accounts.
That means, if one of your passwords does get caught up in a data breach, criminals won't have
the keys to the rest of your online services.
3. Go long.
Despite what all those prompts for unique characters and uppercase letters might have
you believe, length matters more than complexity. Once you get into the 12-15 character range,
it becomes way harder for a hacker to brute force, much less guess, your password.
Eg."g0be@r$"
4. Keep them separated.
If you want to deploy special characters against a password manager lots of input fields
will force you to bunch them all together at the beginning or end. That’s what everyone else
does, which means that’s hackers are looking for. Instead, space them out throughout your
password to make the guesswork extra tricky.
5. Single-serve only.
Don’t reuse passwords across different accounts.
6. Don’t trust your browser.
Usually we let our browser to remember all those passwords, or getting a paid password
manager.
7. Add two-factor authentication
Two-factor authentication, or 2FA, is a method of verifying your identity that adds a
second layer of security to your account password like a PIN number, password, or pattern an
ATM or credit card, mobile phone, or security token. It combines your physical card and your
PIN a biometric form of authentication, such as your fingerprint, your voice, or your face
8. Do not use personal information
• Don’t use your name or names of family members or pets in your passwords.
• Don’t use numbers like your address, phone number, or birthdays, either.
8. Cyber Privacy and Password Protection | Nikhil D.
6
9. Do not use real words
Password cracking tools help attackers to guess password. These programs can process
every word in the dictionary, plus letter and number combinations, until a match is found. So
don’t use clear, real words from the dictionary or proper nouns or names. Instead, use special
characters by combining uppercase and lowercase letters with numbers and special characters,
such as “&” or “$,” you can increase the complexity of your password and help decrease the
chances of someone potentially hacking into your account.
10. Don’t write them down
11. Change passwords on a regular basis
12. Never enter your password on another person’s computer.
13. When using your devices on public Wi-Fi, you should avoid visiting websites that require
you to log in to your account, such as online banking or shopping.
When you’re on an unsecured public network, your unencrypted data could be
intercepted by a nearby hacker. To protect yourself from these threats, you should always use
a virtual private network (VPN), like Norton Secure VPN, when on a public Wi-Fi connection.
9. Cyber Privacy and Password Protection | Nikhil D.
7
Conclusion
As "cyberspace" has become central to the global information and communication
infrastructure, the security of cyberspace has now become a more urgent priority for
corporations and governments around the world. At the same time, the online environment has
increasingly been subjected to sophisticated and targeted threats; our ever-increasing reliance
on cyberspace is creating new and significant vulnerabilities. Privacy protection and cyber
security should be thought of as interconnected: as more and more personal information is
processed or stored online, privacy protection increasingly relies on effective cyber security
implementation by organizations to secure personal data both when it is in transit and at rest.
Strategies should include a comprehensive compliance process, management of internal
privacy, employee training and awareness, self-regulatory efforts, corporate interface with
privacy awareness organisations, litigation support and alternative dispute resolution.
Furthermore, every e-organization's privacy practices should be bench marked against national
and international standards for privacy and fair information practices to meet the emerging
challenges.
It is not impossible to protect yourself from the malicious content on the internet, but it
does take some time and effort. Reading privacy policies, checking privacy settings, and
keeping an eye on what content comes up in search engines about you. The best protection is
not allowing anything at all, but limiting the amount of information you share, or using only
one credit card for example will provide better control if anything does go wrong. Privacy is
not dead, but you do have to bury your head in the ground to stay safe.
10. Cyber Privacy and Password Protection | Nikhil D.
8
Reference
[1] Katherine S. Cennamo, John D. Ross, Peggy A. Ertmer, Techonology Integration for
Meaningful Classroom, Wadsworth, USA, 2010
[2] http://14.139.60.114:8080/jspui/bitstream/123456789/722/14/Cyber%20Privacy.pdf
dated 08-02-2021
[3] https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-
hackers-spies-and-the-government/
dated 08-02-2021
[4] https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-
research/2014/cs_201412/
dated 08-02-2021
[5] https://www.slideshare.net/bavijesh/cyber-law-and-password-protection
dated 08-02-2021
[6] https://economictimes.indiatimes.com/definition/data-mining
dated 08-02-2021
[7] https://en.wikipedia.org/wiki/Spamming
dated 08-02-2021
[8] https://legalbeagle.com/7640133-legal-ethical-issues-technology.html
dated 08-02-2021