Today I am back with my new topic which is based on cybersecurity.
Let's Start!
The internet is one of the best resources available to us for convenient and for fun. But all of that can also be risky and sometimes extremely dangerous.
Cyber safety is the process of using the services and resources of the Internet in a safe and secure manner. We should know the ways of safe browsing the web and using the social networks.
1. IDENTITY PROTECTION
Identity protection means simply making sure that only you can use and share your personal details. This personal detail may include, your name, age, sex, appearance, phone number, email address, home address, your usernames, passwords of accounts, hobbies you are involved in, etc. So it is important to make sure that you know who will have access to your information. Always be careful about what you share on social networking sites and other accounts.
2. PROPER USE OF PASSWORD
Never share your password with anyone. Many users choose a password that is easy to remember like an address, special dates, name, and phone numbers and use it often. Generally, the password should be at least eight characters in length long and a combination (123), lower letter (a,b,c) and upper letter (A, B, C), and special characters (!@#). Always change the password on regular basis and use the different password for the different online account.
3. PRIVACY
It is important to read the site's privacy policy and use its privacy and security settings to control who can see your personal information.
For example, Facebook offers controls over who can see your basic or full profile, your posts, and photos.
Privacy on Facebook is just to keep you safe on the Internet because of today, there are more predators out there, randomly going through pages and stalking people. To fix your privacy settings, follow these steps.
Step 1: Log on to your Facebook account
Step 2: At the top right of the screen, hover your mouse over the down arrow and click "Settings".
You will get opened a new window of "Privacy settings and tools".
Step 3: Then click on "Privacy", and choose the option to where you want to set Privacy option, select and click Edit.
- If you click "Public", all of your information and posts will be available to anyone who comes across your page.
- If you click '' Friends", your information will be available for your friends to see.
- If you click "Custom", it will open a little window and ask to whom you want to make your account visible, e.g. Friends, specific people/lists or only you. It will give the option of having friends tagged in photos and also give you a bar to type in who's allowed to see your information.
Step 4: Select which option you want and click the option "save changes".
Step 5: Head back to your home page and your setting will be saved.
4. CONFIDENTIALLY OF INFORMATION
Confidentially of information is protecting the information from disclosure to unauthorized parties. Information has values especially bank account statements, personal information, credit card numbers etc. protecting these information is major part of the security.
REPORTING CYBERCRIMES
The procedure for reporting cybercrimes is more or less the same as for reporting and another kind of offence. You need to visit the Cyber Cell of your district. For combating cybercrimes, different cybercrime Cells have been made in different cities across the country. You can register your complaint in this cell against the cybercrime.
You can report the cybercrime in following ways:
1. Online
Step 1: For cybercrime complaint, first of all, write an application in the name of the head of cyber crime cell.
Step 2: Provide the following details with the application.
- Name
- Address
- Email address
- Telephone number
Step 3: Arrange the following details for cybercrime complaint.
1. In case of vulgar emails, abusive email etc., the following details are required:
- The header of email which is offering you.
- The email address of the offending sender.
2. In case of hacking, the following details are required:
- Logs of the server.
- A hard copy and soft copy of the defected page.
- If the data of the defected site is compromised then you will need a soft copy of original data as well as compromised data.
- Control mechanism details of access in which you have to tell who has accessed the computer.
- If you have any doubt or you feel suspicious about anyone then you have to provide the list of these suspicious.
Step 4: You can file the compliment from any Cyber Cell of any of the cities and send a direct email to cyber cell police station.
THANKS, FRIENDS TO READ THIS POST
Comments
Post a Comment