SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
CYBER PRIVACY &
PASSWORD PROTECTION
Online Assignment Submitted to
UNIVERSITY OF KERALA
In partial fulfilment of the requirements for the degree of Bachelor in Education
(EDU 03 - Technology and Communication in Education)
By
NIKHIL D.
Reg. No. 182203020013
S1. B.Ed. Physical Science
MAR THEOPHILUS TRAINING COLLEGE
Mar Ivanios Vidya Nagar, Nalanchira, Thiruvananthapuram
2020-2022
Cyber Privacy and Password Protection
Online Assignment
EDU 03: Technology and Communication in Education
Submitted By : Nikhil D
Reg. No. 18220302013
S1. B.Ed. Physical Science
Mar Theophilus Training College,
Trivandrum
Submitter To : Dr. Joju John
Assistant Professor
Mar Theophilus Training College
Trivandrum
Date of Submission : 10-02-2021
Cyber Privacy and Password Protection | Nikhil D.
1
Cyber Privacy and Password Protection
Introduction
Digital tools generate digital concerns. The ease with which digital tools can be used to
find, create, manipulate, and share information can be a boon to teaching and learning.
However, these same tools can be used to quickly and easily copy other people’s work, capture
inappropriate or unwanted images, or spread sensitive information across the globe.
Our civilisation has progressed through ages breaking all geographical barriers and the
most notable addition to the human civilization, in recent years, is the Internet, bringing the
whole world closer and turning it into a 'global village'. But this 'closest global village', the
cyberspace, is now a space with new risks, which challenge the very essence of individual
privacy.
Cyber Privacy
It is the level of privacy protection for an individual while has connected to the Internet.
It covers the amount of online security available for personal and financial data,
communications, and preferences.
The new technologies have enhanced the possibilities of invasion into the privacy of
individuals and provided new tools in the hands of eavesdroppers. Individual privacy is at a
greater stake than ever before.
Cyber-Privacy is a huge concern for civilians and especially for companies because of
the potential for crime. Such crimes includes Malware such as the use of malicious code which
can compromise a user's identity and/or information Denial of Service Attacks Block a user
from accessing his or her information. Computer Viruses can compromise user information as
well as identity. All of these crimes fall under the category or fraud, identity theft, phishing
scams and or information warfare.
Cyber Privacy and Password Protection | Nikhil D.
2
Cyber Privacy Hazards
The cyber world and its related crimes have no territorial barriers, and this makes
everything complex because evidence is very hard to come by. With the privacy issue at centre
stage, cookies, spamming, data mining, and hacking - are important areas of discussion where
insecurity from the technological front arises.
Cookies: - A cookie is information that a website puts on one's hard disk so that it can
remember something about him at a later time. Typically, a cookie records your preferences
when using a particular site. Cookies can be used to track people to gain statistics as they go
through the website. Because every time we visit a Web site, we leave a footprint of personal
information about ourselves like our preferences.
Web Bugs:- A Web bug, also known as a Web beacon, is a file object (usually a graphic image
such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor
user behaviour, functioning as a kind of spyware. A Web bug can send several pieces of
information to the server computer, and those includes, the IP address of the computer that
fetched the Web bug.
Hacking: - Hacking is an ‘unauthorised Access’ to a computer and refers to access to the whole
or any part of a computer system without permission. Hackers worldwide attempt to hack into
remote computer systems for multiple purposes like eavesdropping, data theft, fraud,
destruction of data, causing damage to computer systems, or for mere pleasure or personal
satisfaction.
One example of a hacking software is a Trojan horse program, in which malicious or
harmful code is contained inside apparently harmless programming or data in such a way that
it can get control and do its chosen form of damage, such as ruining the file allocation table on
a hard disk.
Spamming: - Spamming is another area of concern where cyber privacy is at stake. It the use
of messaging systems to send an unsolicited message to a large numbers of recipients for the
purpose of commercial advertising or for any prohibited purpose (like phishing)
Data Mining: - Data mining is the latest big business in the information. It is defined as a
process used to extract usable data from a larger set of any raw data. It implies analysing data
patterns in large batches of data using one or more software. Data mining has applications in
multiple fields, like science and research.
Cyber Privacy and Password Protection | Nikhil D.
3
Cyber Security
Cyber Security is the privacy and security level for the personal data published via the
internet. It is a broad term that refers to a variety of factors, techniques and technologies used
to protect sensitive and private data, communications and preferences.
Protecting one's privacy means protection of right to control how personal information
is collected and promulgated. Protection of privacy also includes protection against identify
theft, or the use of an individual's personal information for fraudulent purposes.
Firewalls assist in blocking dangerous programs, viruses or spyware before they
infiltrate your system. Also, nowadays, several search engines are accompanied by cyber
security plugins. The HTTPS (Hyper Text Transfer Protocol Secure) protects personal and
financial data (Credit/debit cards details, OTPs) from fraudsters. Also, several other plugins
like, disconnect, blur etc. associated with Mozilla based browsers, Opera, Safari enhances the
protection of the private and personal information’s.
VPN (Virtual Private Network)
A Virtual Private Network is a way to create a secure tunnel between browsers and web
servers. Data packets are encrypted before they are sent to a destination server, which also
results in IP addresses and your location becoming hidden. VPN can also be used to change
the Geo-location of the user. VPNs are not a silver bullet for security; far from it, but they can
help mask your online presence. It is worth noting, however, that VPN usage is banned in some
countries.
Cyber Privacy and Password Protection | Nikhil D.
4
Password Protection
Password protection is a security process that protects information accessible via
computers that needs to be protected from certain users. Password protection allows only those
with an authorized password to gain access to certain information. Passwords are used
commonly to gain entry to networks and into various Internet accounts in order to authenticate
the user accessing the website.
Usage of alphanumeric and special character combination in password creations
provides more security the e-contents while using like this, disables the possibility of
replications and unauthorised entries.
Two-factor authentication (2FA), also known as two-step verification, is a widely-
implemented method of adding an extra layer of security to your accounts and services after
you have submitted a password.
The most common methods are via an SMS message, a biometric marker such as a
fingerprint or iris scan, a PIN number, pattern etc. Using 2FA creates an additional step to
access your accounts and data, can help protect your accounts and Information.
In modern devices, along with patterns, password, Biometric authentication options like
face recognition, iris scanning, and fingerprints were found.
Cyber Privacy and Password Protection | Nikhil D.
5
HOW TO CREATE A STRONG PASSWORD
1. Think them, as essentials
2. Use a password manager.
A good password manager creates strong, unique passwords for all of your accounts.
That means, if one of your passwords does get caught up in a data breach, criminals won't have
the keys to the rest of your online services.
3. Go long.
Despite what all those prompts for unique characters and uppercase letters might have
you believe, length matters more than complexity. Once you get into the 12-15 character range,
it becomes way harder for a hacker to brute force, much less guess, your password.
Eg."g0be@r$"
4. Keep them separated.
If you want to deploy special characters against a password manager lots of input fields
will force you to bunch them all together at the beginning or end. That’s what everyone else
does, which means that’s hackers are looking for. Instead, space them out throughout your
password to make the guesswork extra tricky.
5. Single-serve only.
Don’t reuse passwords across different accounts.
6. Don’t trust your browser.
Usually we let our browser to remember all those passwords, or getting a paid password
manager.
7. Add two-factor authentication
Two-factor authentication, or 2FA, is a method of verifying your identity that adds a
second layer of security to your account password like a PIN number, password, or pattern an
ATM or credit card, mobile phone, or security token. It combines your physical card and your
PIN a biometric form of authentication, such as your fingerprint, your voice, or your face
8. Do not use personal information
• Don’t use your name or names of family members or pets in your passwords.
• Don’t use numbers like your address, phone number, or birthdays, either.
Cyber Privacy and Password Protection | Nikhil D.
6
9. Do not use real words
Password cracking tools help attackers to guess password. These programs can process
every word in the dictionary, plus letter and number combinations, until a match is found. So
don’t use clear, real words from the dictionary or proper nouns or names. Instead, use special
characters by combining uppercase and lowercase letters with numbers and special characters,
such as “&” or “$,” you can increase the complexity of your password and help decrease the
chances of someone potentially hacking into your account.
10. Don’t write them down
11. Change passwords on a regular basis
12. Never enter your password on another person’s computer.
13. When using your devices on public Wi-Fi, you should avoid visiting websites that require
you to log in to your account, such as online banking or shopping.
When you’re on an unsecured public network, your unencrypted data could be
intercepted by a nearby hacker. To protect yourself from these threats, you should always use
a virtual private network (VPN), like Norton Secure VPN, when on a public Wi-Fi connection.
Cyber Privacy and Password Protection | Nikhil D.
7
Conclusion
As "cyberspace" has become central to the global information and communication
infrastructure, the security of cyberspace has now become a more urgent priority for
corporations and governments around the world. At the same time, the online environment has
increasingly been subjected to sophisticated and targeted threats; our ever-increasing reliance
on cyberspace is creating new and significant vulnerabilities. Privacy protection and cyber
security should be thought of as interconnected: as more and more personal information is
processed or stored online, privacy protection increasingly relies on effective cyber security
implementation by organizations to secure personal data both when it is in transit and at rest.
Strategies should include a comprehensive compliance process, management of internal
privacy, employee training and awareness, self-regulatory efforts, corporate interface with
privacy awareness organisations, litigation support and alternative dispute resolution.
Furthermore, every e-organization's privacy practices should be bench marked against national
and international standards for privacy and fair information practices to meet the emerging
challenges.
It is not impossible to protect yourself from the malicious content on the internet, but it
does take some time and effort. Reading privacy policies, checking privacy settings, and
keeping an eye on what content comes up in search engines about you. The best protection is
not allowing anything at all, but limiting the amount of information you share, or using only
one credit card for example will provide better control if anything does go wrong. Privacy is
not dead, but you do have to bury your head in the ground to stay safe.
Cyber Privacy and Password Protection | Nikhil D.
8
Reference
[1] Katherine S. Cennamo, John D. Ross, Peggy A. Ertmer, Techonology Integration for
Meaningful Classroom, Wadsworth, USA, 2010
[2] http://14.139.60.114:8080/jspui/bitstream/123456789/722/14/Cyber%20Privacy.pdf
dated 08-02-2021
[3] https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-
hackers-spies-and-the-government/
dated 08-02-2021
[4] https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-
research/2014/cs_201412/
dated 08-02-2021
[5] https://www.slideshare.net/bavijesh/cyber-law-and-password-protection
dated 08-02-2021
[6] https://economictimes.indiatimes.com/definition/data-mining
dated 08-02-2021
[7] https://en.wikipedia.org/wiki/Spamming
dated 08-02-2021
[8] https://legalbeagle.com/7640133-legal-ethical-issues-technology.html
dated 08-02-2021

Más contenido relacionado

La actualidad más candente

Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...Jincy24
 
Interactive role of education and society
Interactive role of education and society Interactive role of education and society
Interactive role of education and society AncyAS3
 
E learning
E learningE learning
E learningsspink
 
E-content Features : Concept, Scope ppt presentation
E-content Features : Concept, Scope ppt presentationE-content Features : Concept, Scope ppt presentation
E-content Features : Concept, Scope ppt presentationAbhiramiMRS3Unitary
 
3.b.ed class-scope of ict
3.b.ed class-scope of ict3.b.ed class-scope of ict
3.b.ed class-scope of ictSanthosh Thomas
 
EDU0.3.Computer managed instruction
EDU0.3.Computer managed instructionEDU0.3.Computer managed instruction
EDU0.3.Computer managed instructionAmrithaSuresh14
 
School induction program report
School induction program reportSchool induction program report
School induction program reportADLINRV
 
Educational Technology, B.Ed. 1st year
Educational Technology, B.Ed. 1st yearEducational Technology, B.Ed. 1st year
Educational Technology, B.Ed. 1st yearNidhi Jain
 
Role of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internetRole of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internetsujinaganga
 
Educational technology and its application
Educational technology and its applicationEducational technology and its application
Educational technology and its applicationPondicherry university
 
ICT use in B.Ed. Teacher Education course
ICT use in B.Ed. Teacher Education courseICT use in B.Ed. Teacher Education course
ICT use in B.Ed. Teacher Education coursejagannath Dange
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignmentKavitha Dhanesh
 
Teacher competencies, assignment
Teacher competencies, assignmentTeacher competencies, assignment
Teacher competencies, assignmentzenana sahla
 
COMPUTER MANAGED INSTRUCTION
COMPUTER MANAGED INSTRUCTION COMPUTER MANAGED INSTRUCTION
COMPUTER MANAGED INSTRUCTION JijiShaji1
 
Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Jincy24
 
Central institute of educational technology (ciet)
Central institute of educational technology (ciet)Central institute of educational technology (ciet)
Central institute of educational technology (ciet)NIMMY ABRAHAM
 

La actualidad más candente (20)

Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...Role of education to curb social evils like corruption, terrorism,anti nation...
Role of education to curb social evils like corruption, terrorism,anti nation...
 
Interactive role of education and society
Interactive role of education and society Interactive role of education and society
Interactive role of education and society
 
E learning
E learningE learning
E learning
 
E-content Features : Concept, Scope ppt presentation
E-content Features : Concept, Scope ppt presentationE-content Features : Concept, Scope ppt presentation
E-content Features : Concept, Scope ppt presentation
 
3.b.ed class-scope of ict
3.b.ed class-scope of ict3.b.ed class-scope of ict
3.b.ed class-scope of ict
 
EDU0.3.Computer managed instruction
EDU0.3.Computer managed instructionEDU0.3.Computer managed instruction
EDU0.3.Computer managed instruction
 
School induction program report
School induction program reportSchool induction program report
School induction program report
 
Victers
VictersVicters
Victers
 
UGC CEC PowerPoint
UGC CEC PowerPointUGC CEC PowerPoint
UGC CEC PowerPoint
 
Victers channel,ppt rinku
Victers channel,ppt rinkuVicters channel,ppt rinku
Victers channel,ppt rinku
 
Educational Technology, B.Ed. 1st year
Educational Technology, B.Ed. 1st yearEducational Technology, B.Ed. 1st year
Educational Technology, B.Ed. 1st year
 
Role of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internetRole of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internet
 
Educational technology and its application
Educational technology and its applicationEducational technology and its application
Educational technology and its application
 
ICT use in B.Ed. Teacher Education course
ICT use in B.Ed. Teacher Education courseICT use in B.Ed. Teacher Education course
ICT use in B.Ed. Teacher Education course
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
 
Teacher competencies, assignment
Teacher competencies, assignmentTeacher competencies, assignment
Teacher competencies, assignment
 
COMPUTER MANAGED INSTRUCTION
COMPUTER MANAGED INSTRUCTION COMPUTER MANAGED INSTRUCTION
COMPUTER MANAGED INSTRUCTION
 
Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...Role of education to curb social evils like corruption, terrorism ,anti-natio...
Role of education to curb social evils like corruption, terrorism ,anti-natio...
 
Ciet 2[1]
Ciet 2[1]Ciet 2[1]
Ciet 2[1]
 
Central institute of educational technology (ciet)
Central institute of educational technology (ciet)Central institute of educational technology (ciet)
Central institute of educational technology (ciet)
 

Similar a Cyber Privacy & Password Protection

Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfJihithaJP
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 

Similar a Cyber Privacy & Password Protection (20)

Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
techalpha07
techalpha07techalpha07
techalpha07
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Task 3
Task 3Task 3
Task 3
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 

Último

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Último (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

Cyber Privacy & Password Protection

  • 1. CYBER PRIVACY & PASSWORD PROTECTION Online Assignment Submitted to UNIVERSITY OF KERALA In partial fulfilment of the requirements for the degree of Bachelor in Education (EDU 03 - Technology and Communication in Education) By NIKHIL D. Reg. No. 182203020013 S1. B.Ed. Physical Science MAR THEOPHILUS TRAINING COLLEGE Mar Ivanios Vidya Nagar, Nalanchira, Thiruvananthapuram 2020-2022
  • 2. Cyber Privacy and Password Protection Online Assignment EDU 03: Technology and Communication in Education Submitted By : Nikhil D Reg. No. 18220302013 S1. B.Ed. Physical Science Mar Theophilus Training College, Trivandrum Submitter To : Dr. Joju John Assistant Professor Mar Theophilus Training College Trivandrum Date of Submission : 10-02-2021
  • 3. Cyber Privacy and Password Protection | Nikhil D. 1 Cyber Privacy and Password Protection Introduction Digital tools generate digital concerns. The ease with which digital tools can be used to find, create, manipulate, and share information can be a boon to teaching and learning. However, these same tools can be used to quickly and easily copy other people’s work, capture inappropriate or unwanted images, or spread sensitive information across the globe. Our civilisation has progressed through ages breaking all geographical barriers and the most notable addition to the human civilization, in recent years, is the Internet, bringing the whole world closer and turning it into a 'global village'. But this 'closest global village', the cyberspace, is now a space with new risks, which challenge the very essence of individual privacy. Cyber Privacy It is the level of privacy protection for an individual while has connected to the Internet. It covers the amount of online security available for personal and financial data, communications, and preferences. The new technologies have enhanced the possibilities of invasion into the privacy of individuals and provided new tools in the hands of eavesdroppers. Individual privacy is at a greater stake than ever before. Cyber-Privacy is a huge concern for civilians and especially for companies because of the potential for crime. Such crimes includes Malware such as the use of malicious code which can compromise a user's identity and/or information Denial of Service Attacks Block a user from accessing his or her information. Computer Viruses can compromise user information as well as identity. All of these crimes fall under the category or fraud, identity theft, phishing scams and or information warfare.
  • 4. Cyber Privacy and Password Protection | Nikhil D. 2 Cyber Privacy Hazards The cyber world and its related crimes have no territorial barriers, and this makes everything complex because evidence is very hard to come by. With the privacy issue at centre stage, cookies, spamming, data mining, and hacking - are important areas of discussion where insecurity from the technological front arises. Cookies: - A cookie is information that a website puts on one's hard disk so that it can remember something about him at a later time. Typically, a cookie records your preferences when using a particular site. Cookies can be used to track people to gain statistics as they go through the website. Because every time we visit a Web site, we leave a footprint of personal information about ourselves like our preferences. Web Bugs:- A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behaviour, functioning as a kind of spyware. A Web bug can send several pieces of information to the server computer, and those includes, the IP address of the computer that fetched the Web bug. Hacking: - Hacking is an ‘unauthorised Access’ to a computer and refers to access to the whole or any part of a computer system without permission. Hackers worldwide attempt to hack into remote computer systems for multiple purposes like eavesdropping, data theft, fraud, destruction of data, causing damage to computer systems, or for mere pleasure or personal satisfaction. One example of a hacking software is a Trojan horse program, in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on a hard disk. Spamming: - Spamming is another area of concern where cyber privacy is at stake. It the use of messaging systems to send an unsolicited message to a large numbers of recipients for the purpose of commercial advertising or for any prohibited purpose (like phishing) Data Mining: - Data mining is the latest big business in the information. It is defined as a process used to extract usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software. Data mining has applications in multiple fields, like science and research.
  • 5. Cyber Privacy and Password Protection | Nikhil D. 3 Cyber Security Cyber Security is the privacy and security level for the personal data published via the internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications and preferences. Protecting one's privacy means protection of right to control how personal information is collected and promulgated. Protection of privacy also includes protection against identify theft, or the use of an individual's personal information for fraudulent purposes. Firewalls assist in blocking dangerous programs, viruses or spyware before they infiltrate your system. Also, nowadays, several search engines are accompanied by cyber security plugins. The HTTPS (Hyper Text Transfer Protocol Secure) protects personal and financial data (Credit/debit cards details, OTPs) from fraudsters. Also, several other plugins like, disconnect, blur etc. associated with Mozilla based browsers, Opera, Safari enhances the protection of the private and personal information’s. VPN (Virtual Private Network) A Virtual Private Network is a way to create a secure tunnel between browsers and web servers. Data packets are encrypted before they are sent to a destination server, which also results in IP addresses and your location becoming hidden. VPN can also be used to change the Geo-location of the user. VPNs are not a silver bullet for security; far from it, but they can help mask your online presence. It is worth noting, however, that VPN usage is banned in some countries.
  • 6. Cyber Privacy and Password Protection | Nikhil D. 4 Password Protection Password protection is a security process that protects information accessible via computers that needs to be protected from certain users. Password protection allows only those with an authorized password to gain access to certain information. Passwords are used commonly to gain entry to networks and into various Internet accounts in order to authenticate the user accessing the website. Usage of alphanumeric and special character combination in password creations provides more security the e-contents while using like this, disables the possibility of replications and unauthorised entries. Two-factor authentication (2FA), also known as two-step verification, is a widely- implemented method of adding an extra layer of security to your accounts and services after you have submitted a password. The most common methods are via an SMS message, a biometric marker such as a fingerprint or iris scan, a PIN number, pattern etc. Using 2FA creates an additional step to access your accounts and data, can help protect your accounts and Information. In modern devices, along with patterns, password, Biometric authentication options like face recognition, iris scanning, and fingerprints were found.
  • 7. Cyber Privacy and Password Protection | Nikhil D. 5 HOW TO CREATE A STRONG PASSWORD 1. Think them, as essentials 2. Use a password manager. A good password manager creates strong, unique passwords for all of your accounts. That means, if one of your passwords does get caught up in a data breach, criminals won't have the keys to the rest of your online services. 3. Go long. Despite what all those prompts for unique characters and uppercase letters might have you believe, length matters more than complexity. Once you get into the 12-15 character range, it becomes way harder for a hacker to brute force, much less guess, your password. Eg."g0be@r$" 4. Keep them separated. If you want to deploy special characters against a password manager lots of input fields will force you to bunch them all together at the beginning or end. That’s what everyone else does, which means that’s hackers are looking for. Instead, space them out throughout your password to make the guesswork extra tricky. 5. Single-serve only. Don’t reuse passwords across different accounts. 6. Don’t trust your browser. Usually we let our browser to remember all those passwords, or getting a paid password manager. 7. Add two-factor authentication Two-factor authentication, or 2FA, is a method of verifying your identity that adds a second layer of security to your account password like a PIN number, password, or pattern an ATM or credit card, mobile phone, or security token. It combines your physical card and your PIN a biometric form of authentication, such as your fingerprint, your voice, or your face 8. Do not use personal information • Don’t use your name or names of family members or pets in your passwords. • Don’t use numbers like your address, phone number, or birthdays, either.
  • 8. Cyber Privacy and Password Protection | Nikhil D. 6 9. Do not use real words Password cracking tools help attackers to guess password. These programs can process every word in the dictionary, plus letter and number combinations, until a match is found. So don’t use clear, real words from the dictionary or proper nouns or names. Instead, use special characters by combining uppercase and lowercase letters with numbers and special characters, such as “&” or “$,” you can increase the complexity of your password and help decrease the chances of someone potentially hacking into your account. 10. Don’t write them down 11. Change passwords on a regular basis 12. Never enter your password on another person’s computer. 13. When using your devices on public Wi-Fi, you should avoid visiting websites that require you to log in to your account, such as online banking or shopping. When you’re on an unsecured public network, your unencrypted data could be intercepted by a nearby hacker. To protect yourself from these threats, you should always use a virtual private network (VPN), like Norton Secure VPN, when on a public Wi-Fi connection.
  • 9. Cyber Privacy and Password Protection | Nikhil D. 7 Conclusion As "cyberspace" has become central to the global information and communication infrastructure, the security of cyberspace has now become a more urgent priority for corporations and governments around the world. At the same time, the online environment has increasingly been subjected to sophisticated and targeted threats; our ever-increasing reliance on cyberspace is creating new and significant vulnerabilities. Privacy protection and cyber security should be thought of as interconnected: as more and more personal information is processed or stored online, privacy protection increasingly relies on effective cyber security implementation by organizations to secure personal data both when it is in transit and at rest. Strategies should include a comprehensive compliance process, management of internal privacy, employee training and awareness, self-regulatory efforts, corporate interface with privacy awareness organisations, litigation support and alternative dispute resolution. Furthermore, every e-organization's privacy practices should be bench marked against national and international standards for privacy and fair information practices to meet the emerging challenges. It is not impossible to protect yourself from the malicious content on the internet, but it does take some time and effort. Reading privacy policies, checking privacy settings, and keeping an eye on what content comes up in search engines about you. The best protection is not allowing anything at all, but limiting the amount of information you share, or using only one credit card for example will provide better control if anything does go wrong. Privacy is not dead, but you do have to bury your head in the ground to stay safe.
  • 10. Cyber Privacy and Password Protection | Nikhil D. 8 Reference [1] Katherine S. Cennamo, John D. Ross, Peggy A. Ertmer, Techonology Integration for Meaningful Classroom, Wadsworth, USA, 2010 [2] http://14.139.60.114:8080/jspui/bitstream/123456789/722/14/Cyber%20Privacy.pdf dated 08-02-2021 [3] https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from- hackers-spies-and-the-government/ dated 08-02-2021 [4] https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy- research/2014/cs_201412/ dated 08-02-2021 [5] https://www.slideshare.net/bavijesh/cyber-law-and-password-protection dated 08-02-2021 [6] https://economictimes.indiatimes.com/definition/data-mining dated 08-02-2021 [7] https://en.wikipedia.org/wiki/Spamming dated 08-02-2021 [8] https://legalbeagle.com/7640133-legal-ethical-issues-technology.html dated 08-02-2021