Skip to main content

These settings will safe you in online world

Today I am back with my new topic which is based on cybersecurity.

Let's Start!

tech buddy


The internet is one of the best resources available to us for convenient and for fun. But all of that can also be risky and sometimes extremely dangerous. 
Cyber safety is the process of using the services and resources of the Internet in a safe and secure manner. We should know the ways of safe browsing the web and using the social networks. 

1.  IDENTITY PROTECTION

Identity protection means simply making sure that only you can use and share your personal details. This personal detail may include, your name, age, sex, appearance, phone number, email address, home address, your usernames, passwords of accounts, hobbies you are involved in, etc. So it is important to make sure that you know who will have access to your information. Always be careful about what you share on social networking sites and other accounts. 

2. PROPER USE OF PASSWORD

Never share your password with anyone. Many users choose a password that is easy to remember like an address, special dates, name, and phone numbers and use it often. Generally, the password should be at least eight characters in length long and a combination (123), lower letter  (a,b,c) and upper letter (A, B, C), and special characters (!@#). Always change the password on regular basis and use the different password for the different online account.

3.  PRIVACY

It is important to read the site's privacy policy and use its privacy and security settings to control who can see your personal information.
For example, Facebook offers controls over who can see your basic or full profile, your posts, and photos. 
Privacy on Facebook is just to keep you safe on the Internet because of today, there are more predators out there, randomly going through pages and stalking people. To fix your privacy settings, follow these steps. 

Step 1: Log on to your Facebook account

tech buddy

Step 2:  At the top right of the screen, hover your mouse over the down arrow and click "Settings".

    You will get opened a new window of "Privacy settings and tools". 

Step 3: Then click on "Privacy", and choose the option to where you want to set Privacy option, select and click Edit. 

tech buddy

  • If you click "Public", all of your information and posts will be available to anyone who comes across your page.
  • If you click '' Friends", your information will be available for your friends to see.
  • If you click "Custom", it will open a little window and ask to whom you want to make your account visible, e.g. Friends, specific people/lists or only you. It will give the option of having friends tagged in photos and also give you a bar to type in who's allowed to see your information. 
tech buddy

Step 4: Select which option you want and click the option "save changes".

tech buddy


Step 5: Head back to your home page and your setting will be saved. 



4.  CONFIDENTIALLY OF INFORMATION

Confidentially of information is protecting the information from disclosure to unauthorized parties. Information has values especially bank account statements, personal information, credit card numbers etc. protecting these information is major part of the security. 

REPORTING CYBERCRIMES

The procedure for reporting cybercrimes is more or less the same as for reporting and another kind of offence. You need to visit the Cyber Cell of your district. For combating cybercrimes, different cybercrime Cells have been made in different cities across the country. You can register your complaint in this cell against the cybercrime. 
You can report the cybercrime in following ways: 

1.  Online

 Step 1: For cybercrime complaint, first of all, write an application in the name of the head of cyber crime cell. 

 Step 2: Provide the following details with the application.
  • Name 
  • Address
  • Email address
  • Telephone number
 Step 3: Arrange the following details for cybercrime complaint.

1.   In case of vulgar emails, abusive email etc., the following details are required: 
  • The header of email which is offering you.
  • The email address of the offending sender.
2.   In case of hacking, the following details are required: 
  • Logs of the server. 
  • A hard copy and soft copy of the defected page.
  • If the data of the defected site is compromised then you will need a soft copy of original data as well as compromised data.
  • Control mechanism details of access in which you have to tell who has accessed the computer. 
  • If you have any doubt or you feel suspicious about anyone then you have to provide the list of these suspicious.
 Step 4: You can file the compliment from any Cyber Cell of any of the cities and send a direct email to cyber cell police station. 


THANKS, FRIENDS TO READ THIS POST 


Comments

Popular posts from this blog

How Viruses are spread on our computer

Today I am back with my new topic which is based on How Viruses are spread on our computer Let's start !! A program that has the capability to infect other program and make copies of itself and spread into other programs is called Virus. A Virus can be identified if our system:    Takes a long time to load applications.     Has an inability to boot.     Shows unpredictable program behavior.     Has strange graphics appearing on the screen. The types of viruses are:   File Virus, which infects and replicates when it gets attached to MS-DOS program files with EXE or COM extensions. Boot Sector virus infects the boot sector of the floppy disk or hard disk.   Macro Viruses insert unwanted words or phrases in MS Word or Excel. How Viruses are spread? It seems to be a common belief that viruses are spread by games, by Internet file downloads or by Bulletin Board Systems (BBSs). The truth is more intricate. A physical disk has to be involved in case

How Internet Works and how much kind of it

Today I am back with an interesting topic which is how the Internet works. Let's Start! About Vinton Gray Cerf The Vinton Gray Cerf is an American Internet Pioneer. He was born in (June 23, 1943). Who is recognized as one of the fathers of the Internet? Sharing this title with TCP/IP co-inventor Bob Kahn. His acknowledge and lauded, repeatedly, with the honorary awards that include the National Media Of Technology, the Turing Award, the Presidental Medal Of Freedom, the Marconi Prize and membership in the National Academy Of Engineering.  If you want to read more about Vint Cerf then click on the link:  https://bit.ly/1je8u4g Wired Communication Media The data is physically transmitted from the source computer to the destination computer through the wired transmission medium. Bounded media are made up of the external conductor (Usually Copper) bounded by the jacket material. Bounded media are great for LABS because they offer high speed, good security, a

Safely browsing the web and using social networks

Today i am back with my new topic which is Cyber security. Let's start!! Internet is the most recent telecommunication technology,which has brought a technological revolution not only in offices but also in homes. Internet is the world's largest computer network, which connects several computers of different types belonging to various networks all over the world. Internet is not governed by a single authority. So, there are no official rules and regulations to control activities involving it.  This has many problems being associated with the internet. Individuals or organization use  their computers to store important and valuable data.Very often this data is kept confidential and needs to be stored securely. However, with the internet connecting all these computers, this security is now being threatened.   INTERNET APPLICATION  It is not that the Internet is used only for sending and receiving information. It has its commercial aspect too. Internet