CYBER SAFETY
Cyber Safety refers to the safe and responsible use of Internet to ensure safety and security of
personal information and not posing threat to anyone else's information.
Identity theft is a type of fraud that involves using someone else's identity to steal money or gain
other benefits. Online identity theft refers to an act of stealing someone's personal information
such as name, login details etc. and then posing as that person online.
Cookies are small text files that a Web server can store on a user's computer. Its purpose is to
allow a Web server to personalize a Web page, depending on whether we have been to that Web
site before and what we may have told it during previous sessions.
Virtual Private Network or a VPN is a method used to add security and privacy to private and
public networks, like WiFi hotspots and the Internet. VPNs are most often used by corporations to
protect sensitive data. Virtual Private Networks (VPN) were originally meant for business
employees working offsite to gain access to shared drives or networks. Nowadays, we can set up a
VPN at home to protect ourself from hackers trying to access our sensitive information.
Any criminal offense that is facilitated by, or involves the use of, electronic communications or
information systems, including any electronic device, computer, or the Internet is referred to as
Cybercrime.
Harassing, demeaning, embarrassing, defaming or intimidating someone using modern
technologies like Internet, cell phones, instant messengers, social networks etc., is called Cyber
Bullying.
Firewall- A Firewall is a program which limits network access between two or more networks.
Normally, a Firewall is deployed between a trusted, protected private network and an untrusted
public network. A Firewall might grant or revoke access based on user Authentication, source and
destination network addresses, network protocol, time of day, network service or any
combination of these.
Cyber Stalking refers to online stalking where someone uses the Internet, chat rooms, social
networking sites, emails etc. to stalk his / her victim. Cyber Stalker follows the victim online
everywhere and keeps posting / sending something which are unsolicited.
Cyber security is necessary for 3 reasons:
Integrity- Data integrity is very vital in today's world, everything is totally relying on internet and
digital technology for every financial or non-financial transaction.
Confidentiality- Many confidential information and keys are stored in computer, so its security is
very essential.
Authenticity- To ensure that data or information must be reached to the right and only the
authenticated persons.
What do you mean by Ethics?
The ability to distinguish right from wrong and to act accordingly is known as Ethics.
What is Computer Ethics?
Computer Ethics can be understood as the branch of applied ethics that studies and analyses
social and ethical impacts of information technology.
Some common ethical issues are:
Intellectual property rights
Plagiarism
Digital property rights
Intellectual Property Rights (IPR):
Intellectual property rights are the rights of the owner of information to decide how much
information is to be exchanged, shared or distributed. Intellectual property rights include patents,
copyright, industrial design rights, trademarks, geographical indication etc.
Violation of IPR:
The violation of IPR (Intellectual property rights) is called infringement of IPR infringement.
There are three forms of IPR infringement:
1. Plagiarism
2. Copyright infringement
3. Trademark infringement
Plagiarism
Plagiarism is literal theft. It means taking away another's production without crediting the source.
It is a serious offence and an act of fraud.
All of the below are considered plagiarism:
Copying words or ideas from someone else without giving credit
Only changing the structure of the sentence from the source without giving credit
Copying media from other websites and using them for your own project
Making a music composition which has a copied composition
Recording audio or video in which copyrighted music or video is playing in the background
Copyright infringement: A copyright infringement refers to using copyrighted work without the
consent or permission of the copyright holder.
Copyright Infringement include:
Selling pirated books
Selling pirated software
Online piracy and many other such acts.
Performing a play in public without permission from the playright.
Trademark Infringement: The trademark infringement is the unauthorized usage of a mark that is
identical or deceptively similar to registered trademark.