Students, the Internet & COVID-19 by Ayush Chopra
To Google your name is to know your legacy and always remember that your Digital Footprint is your new resume.
MAKE IT WORTH READING !!
-Ayush Chopra
2. With school closures and social distancing
measures to curb the spread of COVID-19, children
are spending more time than ever online.
As a result, students are getting more screen-time
than usual.
LET'S FACE IT
6. Cyber crimes can be defined as: "Offences that are committed against
individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm, or
loss, to the victim directly or indirectly, using modern telecommunication
networks such as Internet (networks including chat rooms, emails, notice
boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
DEFINING CYBER CRIME
8. HACKING
The gaining of unauthorized access to data in a system or computer.
PHISHING
The fraudulent practice of sending emails purporting to be from reputable companies in order to
induce individuals to reveal personal information, such as passwords and credit card numbers.
IN-HOUSE MAINTENANCE
Presentations are communication tools.
PIRACY
The unauthorized use or reproduction of another's work.
VIRUSES
A piece of code which is capable of copying itself and typically has a detrimental effect,
such as corrupting the system or destroying data.
9.
10.
11. ONLINE FINANCIAL
TRANSACTIONS IN-HOUSE MAINTENANCE
Presentations are communication tools.
PHARMING
the fraudulent practice of directing Internet users to a bogus website that mimics the
appearance of a legitimate one, in order to obtain personal information such as
passwords, account numbers, etc.
IDENTITY THEFTS
The fraudulent acquisition and use of a person's private identifying information, usually
for financial gain.
12. COMPUTER ETHICS
Ethics means “What is wrong and What is
Right”. It is a set of moral principles that rule the
behaviour of individuals who use computers.
Computer ethics are a set of moral standards
that govern the use of computers, both
hardware and software.
ETHICS
13. COMPUTER ETHICS
ONE SHOULD NOT ...
Use a computer to harm other people.
Interfere with other people's computer work or files.
Use a computer to steal or bear false information.
Copy or use proprietary software for which you have
not paid for.
Use other people's computer resources without
authorisation or proper compensation.
14. Computer security, cybersecurity is the protection of computer
systems and networks from the theft of or damage to their hardware,
software or electronic data, as well as from the disruption or
misdirection of the services they provide.
15. To safeguard
cybersecurity
YOU SHOULD...
Install a good antivirus.
Update antivirus regularly.
Always scan external drives before using.
Should use recommended secured sites with lock
sign.
Hypertext Transfer Protocol Secure (HTTPS) is an
extension of the Hyper Text Transfer Protocol(HTTP). It
is used for secure communication over a computer
network, and is widely used on the Internet.
16. SAFE EMAIL
PRACTICES
LIMIT PUBLIC INFORMATION
Attackers cannot target you if they don’t know your email
addresses. Don’t publish non-essential contact details on
your website or on any public directories, including phone
numbers or physical addresses.
CAREFULLY CHECK EMAILS
Phishing attacks are seldom perfectly executed. A bizarre
From address (e.g. service145@mail.145.com), unusual links
(e.g. amazon.net.ru), or a high number of typos or
formatting mistakes in the text. If it looks suspicious,
students should report it.
BEWARE OF LINKS & ATTACHMENTS
You should be sceptical anytime you receive an email from
an unknown sender. Do not click on links or download
attachments without verifying the source and establishing
the legitimacy of the link or attachment.
17. SAFE EMAIL PRACTICES
HOVER OVER HYPERLINKS
Never click on hyperlinked text without hovering your cursor
over the link first to check the destination URL, which should
appear in the lower corner of your window. Sometimes the
hacker might disguise a malicious link as a short URL.
NEVER ENTER YOUR PASSWORD
Unless you’re 100% certain the website is legitimate, you
should never enter your password anywhere. If you aren’t
logging into your account and you haven’t requested to
reset your password, then password reset links are likely
part of a phishing attack.
18. ONLINE PREDATORS
As per Indian Information Technology Act, 2000, the
significant aspect of Section 67B seeks to protect
children. This law penalizes any and every person who
facilitates the abuse of children online.
Online Predators are individuals who commit child
sexual abuse that begins or takes place on the internet.
Chat rooms, instant messaging, Internet forums, social
networking sites, cell phones have issues with online
predations.
19. While practicing Social Distancing, Social networking sites like Facebook,
Instagram, Twitter, Whatsapp etc can be a great way to connect with friends.
But there are some social networking safety tips you should always keep in
mind.
20. SAFE SOCIAL
NETWORKING
BEST PRACTICES
REMEMBER ONCE POSTED, ALWAYS
POSTED .. MAINTAIN GOOD DIGITAL
FOOTPRINTS
Protect your reputation on social networks. What you post
online stays online. Think twice before posting pictures
you wouldn't want your parents or future employers to
see. Recent research found that 70% of job recruiters
rejected candidates based on information they found
online.
MANAGE YOUR PRIVACY SETTINGS
Learn about and use the privacy and security settings on your
social networking sites. They help you control who sees what you
post and manage your online experience in a positive way.
KEEP PERSONAL INFO PERSONAL
Be careful how much personal info you provide on social networking sites. The more information
you post, the easier it may be for someone to use that information to steal your identity, access
your data, or commit other crimes such as stalking.
21. USE STRONG PASSWORDS
Make sure that your password is at least eight characters long and consists of some
combination of letters, numbers, and special characters (for example, +, @, #, or $).
SAFE SOCIAL NETWORKING
BEST PRACTICES
KNOW WHAT ACTION TO TAKE
If someone is harassing or threatening you, remove them from your friends list, block them,
and report them to the site administrator.
SELECT BLOCKING
Block specific users or application invitations
22. SAFE SOCIAL NETWORKING
DOCUMENTED PROOF
Remember whatever you write on social site is a
Documented proof of what you have expressed
and will remain there for ever and may be used
as an evidence against you in future.
ACCEPTED THE TERMS
Remember that legally you have accepted the
terms while signing up the social networking site. So
abide by the discipline.