Cyber Safety

PrevNextBack

Cyber Safety

Fill in the Blanks

Question 1

Threat is a potential violation of security.

Question 2

Stealing of information is an example of Cybercrime.

Question 3

A self-replicating program that eats up the entire disk space or memory is called worm.

Question 4

Spyware is a software which is installed on your computer to spy on your activities.

Question 5

A Trojan Horse is a program that appears harmless but actually performs malicious functions.

Question 6

Spamming refers to sending of bulk mails by an identified or unidentified source.

Question 7

Most hackers crack passwords of system accounts and gain entry into remote computer systems.

Question 8

When we visit certain websites with advertisements, the ads create cookies that store and track our online patterns.

Question 9

Ensuring that users or customers provide information that is associated with identity of a real person is known as identity verification.

Question 10

If the user is able to provide a legal email id, he is considered a/an authorized user.

Question 11

Unauthorized monitoring of other people's communication is known as eavesdropping.

Question 12

Flooding a system with junk mail is a Denial-of-Service type of attack.

Question 13

A Super cookie is a type of browser cookie that is designed to be permanently stored on a user's computer and difficult to detect and remove.

Question 14

Discarded electronic devices are called e-waste.

State True or False

Question 1

Computer security is protecting the integrity, availability and confidentiality of information system.

Answer

True

Reason — Computer security is protecting the integrity, availability and confidentiality of information system.

Question 2

Identity theft is a type of fraud.

Answer

True

Reason — Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.

Question 3

Browsing through VPN is anonymous browsing.

Answer

True

Reason — Private browsing or anonymous browsing is a type of browsing wherein the browser opens in incognito mode or through proxy or VPN (Virtual Private Network) and does not store cookies.

Question 4

Persistent cookies are different from super cookies.

Answer

False

Reason — Super cookies are persistent cookies, i.e., they come back even after being deleted. They store cookie data at multiple places, for example, in Flash cookies, Silverlight storage etc.

Question 5

Posting something leaves behind traces which are called digital footprints.

Answer

True

Reason — Digital Footprints are the records and traces of individual's activities as they use the Internet. Digital Footprints are permanently stored and can include data such as social media posts, online searches, and interactions with websites.

Question 6

A person who posts derogatory messages online targeting people is called a cyber troller.

Answer

True

Reason — A cyber troll is a person who starts quarrels or upsets people on the internet by posting inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain.

Question 7

Online theft refers to an act of stealing someone's personal information.

Answer

True

Reason — Online identity theft refers to an act of stealing someone's personal information such as name, login details, credit card details etc and then posing as that person online.

Question 8

A firewall only monitors incoming communication.

Answer

False

Reason — A firewall monitors and controls both incoming and outgoing communication between a network and the internet.

Question 9

To avoid tracking by website, we should browse internet privately.

Answer

True

Reason — To avoid tracking by website, we should browse internet privately. This is because websites can collect and track our online data, including browsing history, search queries, and personal information, through various means such as cookies etc.

Question 10

We can share sensitive information on wireless networks.

Answer

False

Reason — We should not share sensitive information over wireless networks because they are not secure and can be easily hacked.

Question 11

In cyberbullying, a victim is subjected to a barrage of online messages and emails.

Answer

False

Reason — Cyberbullying is an attack on an individual or group through the use of electronic means such as instant messaging, social media, email, and other forms of online communication, with the intent to abuse, intimidate, or overpower. A barrage of online messages and emails, on the other hand, refers to spamming.

Question 12

Spreading rumours online is a punishable offence.

Answer

True

Reason — Spreading rumours online comes under the category of cybercrime and is a punishable offence under the Information Technology Act.

Question 13

E-waste is very hazardous if not handled carefully.

Answer

True

Reason — If e-waste is not disposed of in proper manner, it can be extremely harmful to humans, plants, animals and the environment.

Multiple Choice Questions

Question 1

This term refers to safe and responsible use of technology.

  1. Cyber user
  2. Cyber present
  3. Cyber safety
  4. Cyber logic

Answer

Cyber safety

Reason — Cyber safety is the safe and responsible use of information and communication technology.

Question 2

This is a type of fraud that involves using someone else's identity to gain other benefits.

  1. Personal theft
  2. Information theft
  3. Cyber theft
  4. Identity theft

Answer

Identity theft

Reason — Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.

Question 3

These are the small text files for storing a small piece of information related to someone's online habits.

  1. Spyware
  2. Virus
  3. Cookies
  4. Spam

Answer

Cookies

Reason — Cookies are small text files, bits of information, left on our computer by websites we have visited which let them 'remember' things about us.

Question 4

This is a unique address, assigned to every computer when connected to a network.

  1. MAC address
  2. Computer name
  3. URL address
  4. IP address

Answer

IP address

Reason — IP address is a unique address of our device when we connect to the internet.

Question 5

This term ensures that only authorized users get access to sensitive and protected data.

  1. Safety
  2. Protection
  3. Confidentiality
  4. Provide

Answer

Confidentiality

Reason — Confidentiality of information ensures that only authorized users get access to sensitive and protected data.

Question 6

This is a criminal offence that is facilitated by, or involves the use of, electronic communications or information system, including any electronic device.

  1. Network crime
  2. Internet crime
  3. Cybercrime
  4. Super crime

Answer

Cybercrime

Reason — Any criminal act that is facilitated by the use of electronic gadgets such as computer, smartphones, laptop etc, involving communications or information systems through internet, is referred to as cybercrime.

Question 7

Which of the following is not an external threat to a computer or a computer network.

  1. Ignorance
  2. Trojan horse
  3. Adware
  4. Crackers

Answer

Ignorance

Reason — Ignorance refers to a lack of knowledge or awareness and does not pose an external threat to a computer or network. External threats, such as Trojan horses, adware, and crackers, involve malicious actions that harm a system.

Question 8

When a person is harassed repeatedly by being followed, called or written to, he/she is a target of:

  1. Bullying
  2. Identity theft
  3. Stalking
  4. Phishing

Answer

Stalking

Reason — Stalking involves repeatedly harassing or threatening behaviour, such as following, calling, or sending unwanted messages to a person.

Question 9

What is the name of the IT law that India is having in the Indian legislature?

  1. Indian Technology (IT) Act, 2000
  2. Digital Information Technology Act, 2000
  3. Information Technology (IT) Act, 2000
  4. The Technology Act, 2000

Answer

Information Technology (IT) Act, 2000

Reason — The name of the IT law in the Indian legislature is the Information Technology Act, 2000 (IT Act 2000).

Question 10

This term refers to a person who purposely posts opposing, sarcastic, demeaning or insulting comments about something or someone.

  1. Cyber criminal
  2. Cyber thief
  3. Cyber troller
  4. Cyberstalker

Answer

Cyber troller

Reason — A cyber troll is a person who starts quarrels or upsets people on the internet by posing inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain.

Question 11

These are the records and traces an individual leaves behind as they use the internet.

  1. Digital path
  2. Digital map
  3. Digital foot
  4. Digital footprints

Answer

Digital footprints

Reason — Digital Footprints are the records and traces of individual's activities as they use the Internet.

Question 12

Unauthorized monitoring of other people's communication is called:

  1. Spamming
  2. Malware
  3. Adware
  4. Eavesdropping

Answer

Eavesdropping

Reason — Unauthorized monitoring of other people's communication is called eavesdropping.

Question 13

Sending of unsolicited bulk and commercial messages over the internet is ............... .

  1. Stalking
  2. Phishing
  3. Spamming
  4. Spoofing

Answer

Spamming

Reason — Spamming refers to the practice of sending unsolicited bulk and commercial messages over the internet.

Question 14

Child pornography is prohibited by ............... of IT Act, 2000.

  1. Sec. 64
  2. Sec. 65
  3. Sec. 66
  4. Sec. 67B

Answer

Sec. 67B

Reason — Child pornography is prohibited by Section 67B of IT Act, 2000.

Question 15

Cybercrime is a crime in which computer is used as a:

  1. Tool
  2. Target
  3. Both (1) and (2)
  4. None of these

Answer

Both (1) and (2)

Reason — Cybercrime involves using a computer both as a tool to commit illegal activities, such as hacking or fraud, and as a target, where the computer or network itself is attacked, for example, through viruses or denial-of-service attacks.

Assertions and Reasons

Question 1

Assertion (A): Viruses are malicious programs.

Reasoning (R): Malicious programs are specifically designed to delete, block, modify or copy data in order to disrupt the performance of computers.

  1. Both A and R are true and R is the correct explanation of A.
  2. Both A and R are true but R is not the correct explanation of A.
  3. A is true but R is false.
  4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.

Explanation
Viruses are malicious programs designed to harm computer systems. A malicious program is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.

Question 2

Assertion (A): An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting people.

Reasoning (R): We can download and use any material available on the internet.

  1. Both A and R are true and R is the correct explanation of A.
  2. Both A and R are true but R is not the correct explanation of A.
  3. A is true but R is false.
  4. A is false but R is true.

Answer

A is true but R is false.

Explanation
A cyber troll is a person who starts quarrels or upsets people on the internet by posing inflammatory, digressive, extraneous or off-topic messages to an online community with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, either for the troll's amusement or for a specific gain. We cannot download and use any material available on the internet, due to copyright issues and legal restrictions.

Question 3

Assertion (A): Social media are websites or applications that enable users to participate in social networking but they cannot create and share content with others in the community.

Reasoning (R): We should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.

  1. Both A and R are true and R is the correct explanation of A.
  2. Both A and R are true but R is not the correct explanation of A.
  3. A is true but R is false.
  4. A is false but R is true.

Answer

A is false but R is true.

Explanation
Social media refers to web and mobile technologies and practices that enable users to participate in social networking and share content, opinions, experiences, and perspectives online. We should avoid wasting precious time responding to unnecessary emails or comments unless they are relevant to us.

Question 4

Assertion (A): Cyberstalkers collect all personal information of the victim.

Reasoning (R): Cyberstalkers post the email of the victim on numerous filthy, obscene or illegal websites.

  1. Both A and R are true and R is the correct explanation of A.
  2. Both A and R are true but R is not the correct explanation of A.
  3. A is true but R is false.
  4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.

Explanation
Cyberstalking is the use of the internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Cyberstalkers gather personal information about their victims and post their email addresses on numerous filthy, obscene, or illegal websites to harass them.

Question 5

Assertion (A): Harassing a person using modern technologies like the internet is called cyber bullying.

Reasoning (R): Cyberbullying is not a cybercrime.

  1. Both A and R are true and R is the correct explanation of A.
  2. Both A and R are true but R is not the correct explanation of A.
  3. A is true but R is false.
  4. A is false but R is true.

Answer

A is true but R is false.

Explanation
Cyberbullying is an attack on an individual or a group through the use of electronic means such as instant messaging, social media, email, and other forms of online communication with the intent to abuse, intimidate, or overpower. Cyberbullying is considered a cybercrime.

Question 6

Assertion (A): IT Act 2000 provides legal recognition to electronic commerce.

Reasoning (R): IT (Amendment) Act 2008 provides additional focus on information security.

  1. Both A and R are true and R is the correct explanation of A.
  2. Both A and R are true but R is not the correct explanation of A.
  3. A is true but R is false.
  4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.

Explanation
The Information Technology Act, 2000 is the primary law in India dealing with cybercrime and electronic commerce. A major amendment was made to the IT Act in 2008. It introduced section 69, which gave authorities the power of "interception or monitoring or decryption of any information through any computer resource".

Question 7

Assertion (A): Cyber law is a generic term which refers to all the legal and regulatory aspects of the internet and the World Wide Web.

Reasoning (R): Cyber law covers all aspects of transactions and activities on and concerning the internet, the World Wide Web and Cyberspace.

  1. Both A and R are true and R is the correct explanation of A.
  2. Both A and R are true but R is not the correct explanation of A.
  3. A is true but R is false.
  4. A is false but R is true.

Answer

Both A and R are true and R is the correct explanation of A.

Explanation
Cyber law is a broad term that encompasses all legal and regulatory aspects related to the internet and the World Wide Web. It includes various rules and regulations governing online activities, transactions, and interactions.

Solutions to Unsolved Questions

Question 1

Should we use incognito window during surfing?

Answer

Yes, we should use an incognito window while surfing the internet. It helps protect the confidentiality of information by not saving cookies and browsing history, which reduces the risk of identity theft and keeps our personal data safe.

Question 2

State whether True or False.

(a) IP address helps trace our geographical area.

(b) Cookies store our online habits.

(c) Using strong internet passwords does not help in maintaining cyber safety.

Answer

(a) True

Reason — When we share our IP address on the network with other devices, a website can determine our geographical location.

(b) True

Reason — Cookies are small text files on our computer storing small pieces of information related to our online habits/text.

(c) False

Reason — Using strong internet passwords is essential for maintaining cyber safety as they help protect accounts from unauthorized access.

Question 3

How can one safely browse the internet?

Answer

We can safely browse the internet by following the tips given below:

(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.

(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.

(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.

(d) While making purchases online check if the site is reputed and has a refund policy.

(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.

(f) If there are sites we visit regularly, it is a good idea to bookmark them in our browser.

Question 4

What are safe browsing tips?

Answer

We can safely browse the internet by following the tips given below:

(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.

(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.

(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.

(d) While making purchases online check if the site is reputed and has a refund policy.

(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.

(f) If there are sites we visit regularly, it is a good idea to bookmark then in our browser.

Question 5

Is Google Chrome safe for browsing?

Answer

Google Chrome is generally safe for browsing due to its regular updates and built-in protection against phishing and malware. It also uses Google's Safe Browsing technology to warn users about malicious sites.

Question 6

Do you feel safe on the internet?

Answer

Yes, I feel safe on the internet by following practices such as using strong passwords, enabling two-factor authentication, keeping software updated, and being cautious with online interactions.

Question 7

Define cyber safety.

Answer

Cyber safety refers to the safe and responsible use of internet to ensure safety and security of personal information and not posing threat to information available online about other's.

Question 8

Write at least four tips of cyber safety.

Answer

The tips for cyber safety are as follows:

(a) Before we start browsing the web, make sure to protect ourself by keeping our operating system, web browser, security software, browser plug-ins, and other applications up-to-date.

(b) We can adjust settings in our web browser to work in a more or less secure way. Most web browsers will give us warnings when they detect that we are visiting a malicious website or possibly being exposed to malicious content.

(c) We should use strong, unique passwords online, download files and applications only from trusted websites, and pause to think before clicking on links in emails, messages, or on social networking sites.

(d) While making purchases online check if the site is reputed and has a refund policy.

(e) We should regularly clear cookies from our computer, as they collect information about our activity on websites.

(f) If there are sites we visit regularly, it is a good idea to bookmark them in our browser.

Question 9

What is private browsing?

Answer

Private browsing is a type of browsing wherein the browser opens in incognito mode or through proxy or VPN (Virtual Private Network) and does not store cookies.

Question 10

What are the possible dangers if cyber safety is overlooked?

Answer

If cyber safety is overlooked, several dangers can arise, including:

  1. Data theft, where personal and financial information is stolen.
  2. Malware infections that can damage or encrypt data.
  3. Phishing attacks that trick users into revealing sensitive information.
  4. Loss of privacy due to unauthorized access to personal data.
  5. Financial loss from fraudulent transactions.
  6. Damage to reputation from leaked or misused information.
  7. Legal consequences from non-compliance with data protection regulations.

Question 11

What is the role of IP Address in networking?

Answer

IP address is a unique address of our device when we connect to the internet. When we share our IP address on the network with other devices, a website can determine our geographical location.

Question 12

What do you mean by confidentiality of information?

Answer

Confidentiality of information ensures that only authorized users get access to sensitive and protected data.

Question 13

What is the role of firewall?

Answer

A firewall plays a critical role in network security by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.

Question 14

Define cookies.

Answer

Cookies are small text files on our computer storing small pieces of information related to our online habits/text. They can identify us and track our browsing activity.

Question 15

How do websites track us?

Answer

The different types of information used by websites to track us online are as follows:

  1. IP Address — When we share our IP address on the network with other devices, a website can determine our geographical location.
  2. Cookies and Tracking Scripts — They can identify and track our browsing activity across a website.
  3. HTTP Referrer — When a link to an outside website on a webpage is clicked, then the linked website will get opened and internally our information will be provided to the linked website.
  4. Super Cookies — Super Cookies are persistent cookies that come back even after we delete them. They store cookie data at multiple places, for example, in Flash cookies, Silverlight storage, our browsing history and HTML5 local storage etc.
  5. User Agent — It tells websites our browser and operating system, providing another piece of data that can be stored and used to target ads.

Question 16

Robin searched the net to purchase a wrist watch and a football. Now, whenever he goes online, he is flooded with advertisements about sports items and wrist watches.

(a) Why does this happen?

(b) How could Robin avoid this?

(c) How can Robin get rid of this?

Answer

(a) Robin is experiencing targeted ads due to adware, which collects information about his online activities. Since he searched for wrist watches and sports items, the adware uses this data to display related advertisements.

(b) To avoid this, Robin should use ad blockers, browse in private mode, and be cautious about installing software from untrusted sources.

(c) To get rid of the adware, he should run anti-adware scans using reputable tools, uninstall any suspicious programs, reset his browser settings, and ensure his security software is up-to-date. These steps will help remove the adware and prevent further unwanted advertisements.

Question 17

What is meant by gender discrimination? How does it hamper classroom teaching and learning process?

Answer

Gender discrimination refers to the unfair or unequal treatment of individuals based on their gender.

In the classroom, gender discrimination can significantly hamper the teaching and learning process in several ways:

  1. Unequal Opportunities — Students may not receive the same opportunities to participate in activities, discussions, or leadership roles based on their gender, limiting their engagement and development.
  2. Bias in Assessment — Teachers might unconsciously favour one gender over another, leading to biased assessments and unfair evaluations of students' abilities and contributions.
  3. Stereotyping — Gender stereotypes can influence the expectations teachers and peers have of students, affecting their confidence and interest in subjects traditionally associated with their gender, such as STEM fields for girls or arts for boys.
  4. Reduced Participation — Students may feel discouraged from participating or expressing themselves freely if they believe their gender will lead to judgment or discrimination, which can impact their learning experience and academic performance.
  5. Limited Role Models — Gender discrimination can result in a lack of diverse role models in teaching materials or staff, making it harder for students to envision themselves in various careers or roles beyond traditional gender expectations.

Question 18

What do you mean by virus?

Answer

Viruses are programs that copy themselves throughout a computer or network. Viruses can only be activated when a user opens the program. At their worst, viruses can corrupt or delete data, use the user's email to spread, or erase everything on the hard disk. If not checked, a virus can damage the system or specific files which are important for the functioning of an operating system. It may also slow down our computer as a result of replication of virus in the background without being visible on the screen.

Question 19

What do you mean by spyware and adware?

Answer

Malware that collects information about the usage of the infected computer and communicates it back to the attacker is known as Spyware.

Adware refers to a type of malware that displays unwanted advertisements on our computer or device.

Question 20

What is the difference between spyware and adware?

Answer

SpywareAdware
Malware that collects information about the usage of the infected computer and communicates it back to the attacker is known as Spyware.Adware refers to a type of malware that displays unwanted advertisements on our computer or device.
It finds its way into PCs by "piggybacking" onto a file, or gets downloaded from the internet when we visit a particular website.Adware is commonly activated unknowingly when users are trying to install legitimate applications that adware is bundled with.

Question 21

What do you mean by malware?

Answer

Malware (malicious software) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behaviour an attacker wants.

Question 22

What do you mean by worm?

Answer

Worms are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.

Question 23

What do you mean by Trojan horse?

Answer

Malware disguised in what appears to be legitimate software are known as Trojan horse. Once activated, Trojans will conduct whatever action they have been programmed to carry out.

Question 24

What is the difference between worm and Trojan horse?

Answer

WormTrojan horse
Worms are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.Malware disguised in what appears to be legitimate software are known as Trojan horse.
It can replicate itself and spread automatically.Trojans do not replicate or reproduce through infection, instead, it performs whatever actions it has been programmed to carry out.

Question 25

Explain the difference between malware and worm?

Answer

Malware (Malicious Software) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants. It includes various forms of malicious software, such as viruses, spyware, trojans and worms.

Worms are a type of malware that are self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.

Question 26

Why do we need a secure connection while doing netbanking?

Answer

We need a secure connection while doing net banking to protect sensitive financial information and prevent unauthorized access. Secure connections, indicated by "HTTPS" in the URL and a padlock icon in the browser, encrypt data transmitted between the user’s device and the bank’s server.

Question 27

Is WhatsApp secure?

Answer

Yes, WhatsApp is considered secure due to its use of end-to-end encryption, which ensures that messages, calls, photos, and videos are encrypted and can only be read by the intended recipient, using special keys to decrypt the content.

Question 28

How will you identify from a URL whether the website you are visiting is safe or not?

Answer

The URL of a secure website begins with "https" rather than "http". Also, the Internet browsers display a padlock icon in address bar to indicate that the website is secure. These checks help ensure that the website is opened in secure mode.

Question 29

Define secure connection.

Answer

A secure connection is a connection that is encrypted by one or more security protocols to ensure the security of data flowing between two or more nodes.

Question 30

Differentiate between http and https.

Answer

HTTPHTTPS
The full form of HTTP is Hypertext Transfer Protocol.The full form of HTTPS is Hypertext Transfer Protocol Secure.
HTTP is the set of rules for transferring hypertext on world wide web (WWW).HTTPS is a secure version of the HTTP protocol that uses the SSL/TLS protocol for encryption and authentication.
HTTP sends data in plain text.HTTPS sends the data in encrypted form to make the transmission secure.
URLs using HTTP start with "http://".URLs using HTTPS start with "https://".

Question 31

Name any two websites which use https.

Answer

Two websites which use https are:

  1. Google (https://www.google.com)
  2. Amazon (https://www.amazon.com)

Question 32

What should we practice to ensure confidentiality of information?

Answer

Confidentiality of information can be maintained by observing the following practices:

  1. Prevention by encrypting the data and by limiting the places where it might appear.
  2. Using firewall wherever possible.
  3. Controlling browser settings to block tracking.
  4. Browsing privately wherever possible.
  5. Taking care while posting on social media.
  6. Ensuring safe sites while entering crucial information.
  7. Ensuring that the address contains HTTPS and a padlock sign.
  8. Carefully handling emails.
  9. Not giving sensitive information on wireless networks.
  10. Avoiding use of public computers.

Question 33

What do you mean by identity theft?

Answer

Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.

Question 34

How is cyber law implemented in India?

Answer

In India, cyber laws are enforced through the Information Technology Act, 2000, which was notified on October 17, 2000. It is the primary legislation in India dealing with cybercrime and electronic commerce. The IT Act is a key legal framework that provides support to computer users against cybercrime.

Question 35

What is IT Act, 2000?

Answer

The Information Technology Act, 2000 is an Act of the Indian Parliament notified on 17 October, 2000. It is the primary law in India dealing with cybercrime and electronic commerce.

Question 36

What is child pornography?

Answer

Child pornography is publishing and transmitting obscene material about children in electronic form.

Question 37

How does cybercrime affect our daily life?

Answer

Cybercrime impacts our daily lives by causing financial losses, invading our privacy, and disrupting online services. It can lead to stress and damage to personal and professional reputations. Overall, it undermines trust in digital systems and creates extra costs for dealing with the aftermath.

Question 38

Analyze two cybercrime prevention and protection methods.

Answer

Two effective methods for preventing and protecting against cybercrime are:

  1. Observe safe online behavior:

    1. Use strong unique passwords online.
    2. Download files and applications only from those websites that we trust, such as from official app stores or legitimate organizations, such as our bank.
    3. Pause and think before clicking on links in email, messages or on social networking sites. Don't click on links in messages if we don't know the sender or if the message is unexpected.
    4. If a link looks suspicious or we can't tell where it leads to, before clicking, hover over that link to see the actual web address it will take us to. If we do not recognize or trust the address, try searching for relevant key terms in a web browser. This way we can find the article, video or webpage without directly clicking on the suspicious link.
    5. Beware of offers that seem too good to be true. Leave websites that ask for our personal or banking details in return for money, these are scams.
  2. Online transaction handling: While making purchases online,

    1. Check if the site is reputed and has a refund policy.
    2. While making payments, check that we are using a secure connection. The URL of a secure payment page will use 'https' instead of 'http' and a padlock icon will be displayed by our browser.
    3. If the website looks suspicious or there are doubts, do not proceed.
    4. Don't use online banking or make payments with credit cards using public computers or Wi-Fi.

Question 39

What steps should be taken to protect oneself from online fraud?

Answer

The steps to be taken to protect oneself from online fraud are as follows:

  1. Before we start browsing the web, we must ensure that our operating system, web browser, security software, browser plug-ins, and other applications are up-to-date.
  2. We must adjust our web browser’s settings for better security. Most browsers will warn us if we are visiting a risky website.
  3. We should use strong, unique passwords online, only download from trusted sites, and always think twice before clicking on links in emails, messages, or social media.
  4. When shopping online, we should check if the website is trusted and has a refund policy.
  5. We should clear cookies regularly as they track our online activity.
  6. We should bookmark trusted websites that we visit often to prevent mistyping the website name.

Question 40

Write four steps to combat cybercrime.

Answer

Four steps to combat cybercrime are as follows:

  1. Before we start browsing the web, we must ensure that our operating system, web browser, security software, browser plug-ins, and other applications are up-to-date.
  2. We should use strong, unique passwords online, only download from trusted sites, and always think twice before clicking on links in emails, messages, or social media.
  3. When shopping online, we should check if the website is trusted and has a refund policy.
  4. We should clear cookies regularly as they track our online activity.

Question 41

How is social networking responsible for cybercrime?

Answer

Social networking sites play a role in cybercrime in several ways. Since many people use them, some believe they can post anything without facing consequences by using fake email IDs or hiding their identity. This allows them to share false information, spread rumours, or make harmful comments, leading to arguments, harassment, and even causing communal tension. This kind of behaviour not only disturbs social harmony but also encourages cybercrimes like fraud and identity theft.