0% found this document useful (0 votes)
892 views78 pages

Cyber Textbooks

The document covers essential topics on Cyber Safety, including safe browsing practices, understanding cyberbullying, and recognizing cybersecurity threats like phishing and malware. It emphasizes the importance of protecting personal information online and provides guidelines for safe internet usage. Additionally, it introduces concepts related to databases and programming languages, particularly in the context of artificial intelligence.

Uploaded by

Yu En Hung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
892 views78 pages

Cyber Textbooks

The document covers essential topics on Cyber Safety, including safe browsing practices, understanding cyberbullying, and recognizing cybersecurity threats like phishing and malware. It emphasizes the importance of protecting personal information online and provides guidelines for safe internet usage. Additionally, it introduces concepts related to databases and programming languages, particularly in the context of artificial intelligence.

Uploaded by

Yu En Hung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 78
Table of Contents Cyber Safety... What is Cyber Safety? Safe browsing Cyberbullying Cybersecurity and common threats Appropriate usage of social networks Creating games using Visual Coding a. Visual Coding b. Dogand Crab game c. Tessellations using Visual Coding d. Functions Database .. What is Database? Database Management System(DBMS) Entity - Relationship Model MySQL ‘Types of SQL statements Data types in MySQL... a. Datatype b. MySQL Constraints DML Statements using MySQL a. CRUD operations on database b. DMLoperations Functions in MySQL a. SQL Functions b. Grouping of data c. The HAVING Clause Al Programming languages. Introduction Why Python for Al programming? NumPy Pandas Matplotlib Seaborn Jupyter Notebook Cys Module £9 Cyber Safety ‘At the end of this module, the students will be able to: 1. Browse the Internet safely. 2. Understand cyberbullying. 3. Use social media in a proper way. 4. Understand what phishing, viruses, and trojans are. What is Cyber Safety? The Internet is a great place to learn, play, and connect with friends. However, it's important to stay safe online, just like in the real world, because some people online might try to harm you. es) Objectives Cyber safety is the term used to describe the safe use of computers, mobile phones, and their related networks and data to protect them from cyber attackers. This means being careful about the information you share, the people you talk to, and the websites you visit on the Internet. Eee ets} We all browse the web for various purposes. Isn'tit? It may be used to search forinformation, download movies or music, or play games. We spendalot of time browsing the Internet. When you browse the Internet, you may encounter different types of threats. These threats can harm your computer, steal your personal information, or even trick you into giving them money. tis important to be aware of these threats and take steps to protect yourself. Let's look at how to be safe on the Internet. 1. Update your browser frequently. Imagine that your house has a lock on the door. The lock is like your browser's security features. If the lock is broken, someone could break into your house. If your browser is not up to date, hackers could find a way to break into your computer and steal your personal information. Therefore, whenever a new browser update is released, you should update your browser. 2. Block pop-ups. Pop-ups are ads that suddenly appear on your computer screen when you're using the In- fs) www.cybersquere.org module @ ternet. They can be annoying, especially when you're trying to look for something online. Sometimes, these pop-ups can have bad stuff like links to harmful websites or things that are not suitable for you. Block them to keep your computer safe. Check the website's URL. The URL is the address of the website you're visiting. When you visit a website, check the address bar to see if there's a lock icon next to the URL and if it starts with HTTPS. This means that the website is secure. Cyber Square ees Gite Se Figure 1-1 Use reputable E-commerce websites. E-commerce websites are websites used for shopping. You can pay and buy products like dresses, gadgets, stationery items, foods, etc. through E-commerce websites. Popular E-commerce websites are: wan AMAZON Myntra Flipkart se eBay Figure 1-2 There are many e-commerce websites that display attractive products and collect payments from you but do not deliver the goods. Before purchasing from any website, look at the ratings and customer reviews. Avoid clicking on links, if possible, from messages or chats. Viruses spread easily through links in messages and e-mail attachments. Even if you know and trust the person who sentit, it is possible that the link is infected and the sender is unaware of it. Turn on Two-Factor Authentication whenever possible. Imagine you have a secret code to open your locker. This code is like your password. If someone else knows your secret code, they can open your locker and steal your stuff. But what if you also needed to enter a special code on your phone to open your locker? Even if someone knew your secret code, they couldn't open your locker without the code on your phone. This is how 2FA works. 2FA is a security feature that adds an extra layer of protection to your accounts. It makes it much harder for hackers to steal them, even if they have your password. oe Module www.cybersquare.org TSE Probleme win yur cose? > Figure 1-3 7. Bookmark the important sites. When you like certain websites and want to visit them regularly, we can bookmark them in your browser. This helps because sometimes you might make a little mistake when typing a web address, and you want to avoid ending up on the wrong website. Bookmarked addresses take you to the same site every time. Figure 1-4 Coy Te Tat) Cyberbullying is when people are unkind or hurtful to oth- ers through phones, computers, or the Internet. They send hurtful messages, share mean things, or embarrass others online. This is not okay and can be against the law. It mostly happens in social media, text messaging, and online gaming communities. We should always be nice to others, whether online or offline. Figure 1-5 FT) worwcybersquare.org vodule @ i a sal _ Different forms of Cyberbullying 1. FLAMING Flaming is like having an argument with someone online, but instead of using nice words, people use angry and rude language. Imagine if you wrote a comment on a picture saying you don’t agree with something. Then someone you don't know writes back, and instead of being polite, they start saying mean things to you. That's called ‘flaming.’ It's not a good way to talk to each other online. We should always try to be kind and respectful, even when we disagree. 2. HARASSMENT Itinvolves sending mean and insulting messages repeatedly. Aby and Alex are on different teams for a school project. Aby’s team wins, and Alex gets upset. Instead of handling it nicely, Alex and his friends send Aby lots of angry and even scary messages on email, WhatsApp, and Instagram. That's called ‘harass- ‘ment,’ and it's not okay. We should always treat others with kindness and not send mean messages like that. 3. DENIGRATION “Denigration” means saying bad or hurtful things about someone to make them look bad or feel bad. It's ike spreading rumors or insults to make others think less of that person. Some boys created a WhatsApp group called “We hate the math teacher” where they posted jokes, cartoons, gossip, and rumors, all dissing their math teacher. 4. IMPERSONATION Pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships. Dane made a fake Instagram profile using someone else’s pictures and posts. He sent mean messages to their friends and asked for money. He also sent rude messages using the girls' numbers from the friend list. 5. OUTING Outing means sharing someone's private information online to harm or embarrass them without their consent. @ "ore www.cybersquare.org an COT SS red Grey gave Alan his phone to hold when he went to play cricket. Alan copied Grey's photos and chat screenshots from Grey's phone and posted them on schoo! WhatsApp groups and Facebook pages. 6. TRICKERY “Trickery refers to using dishonest methods online toharm someone, often by pretending to be someone else or spreading false information. Ritika and Rohan used to be friends, but they fell out. Rohan uses trickery by creating a fake social media account and pretending to be someone else. He befriends Ritika using this fake identity and gains her trust. Then, Rohan starts spreading false rumours about Ritika, making her look bad to their classmates. This is an example of how trick- ery can be used in cyberbullying to harm someone's reputation and feelings. 7. EXCLUSION Exclusion means purposefully leaving someone out of online activities, groups, or conversa- tions with the intent to isolate or hurt them socially or emotionally. ‘Megha is a new student who transferred from another school. Some students referred to her as the odd one out, and she was blocked from class online groups. What should you do if you feel that you are being cyberbullied? © Don't respond to cyberbullies: If someone is mean to you online, don't reply. Cyberbullies like attention, and if you react, they may bother you more. Instead, use tools to delete, ban, or report them. © Don't cyberbully back: Revenge is never the best answer. © Tell a trusted adult: Don't keep cyberbullying a secret. Tell a grown-up you trust about it. Remember, it’s not your fault that it's happening. © Take action to prevent further interaction: If the bullying is occurring on a platform such as Facebook, Instagram, etc., utilize the option to block the individual or exit the chat room and also keep a record of incidents. © Talk to your parents: Let your parents know what you do online in general. They canhelp keep you safe. © Never bully yourself: Recognize that you don't deserve to be treated that way, and you deserve respect. WZ www.cybersquere.ore Module @ s to be smart on social media _ @ Don't share your personal information, such as your full name, address, phone number, or password, with people you don't know and trust. Also, don’t share pho- tos or videos that you wouldn't want everyone to see. '@ Only connect with people you know and trust. Be careful about accepting friend requests from strangers. _ @ It's important to limit the amount of time you spend on social media. Too much social media can be bad for your mental and physical health. Cybersecurity and common threats ‘Cybersecurity involves safeguarding computer systems and networks against information disclosure, hardware or software theft, electronic data damage, and disruption or misdirection. Cybersecurity threats are like digital dangers that can harm your computer or information online. These threats come from various sources and can include things like harmful software, fake e-mails, and attacks on computer systems. They aim to steal your information, damage your devices, or disrupt online a s. It's important to be aware of these threats and take steps to protect yourself and your digital information. Some common cybersecurity threats are given below. Phishing Phishing is when someone tricks you into giving them your personal information, like your pass words, by pretending to be someone or something trustworthy, like your school friend. They might send you fake e-mails or messages that look real, but they're trying to steal your information to do bad things with it. So, it's important not to share your personal information with anyone unless you're absolutely sure it's safe. Imagine you receive an email that looks like it’s from your favourite online game. The e-mail says you've won a special prize, and all you need to do is click on a link and log in with your game username and password to claim it. However, if you look closely, the e-mail address seems a bit strange, and there are some spelling mistakes in the message. If you click on that link and provide your information, you might be giving it to a scammer who wants fo steal your game account or even access other accounts for which you use the same login information. Vishing (phishing attacks that occur over phone calls) and smishing (phishing attacks conducted through SMS or text messages) are some examples of phishing attacks. e Module www.cybersquare.org Think before you click! Figure 1-6 Fake e-mails This type of phishing occurs when you receive an email telling you that you've won a lottery. It’s, important to remember that nothing on the In- ternet is truly free. So, never share your phone number or account details with someone who says you've won the lottery or inherited some- thing. pascmeceee cease Adware Adware is like digital advertising that can some- times be annoying. It's a type of software that displays lots of advertisements on your comput- er or device, often when you're browsing the in- ternet or using certain apps. Imagine you downloaded a free game for your computer, and after installing it, you notice that there are annoying pop-up ads appearing on your screen while you play. These ads might be Figure 1-7 for other games or products. That's adware in action. ‘AdChoices, an advertising platform that displays personalized ads based on user behavior, is an example of adware. Malware Malware is software that is designed to harm your computer. It stands for malicious software. Malware can steal your personal information, delete your files, or even take control of your com- puter. www.cybersquare.org Cyber Sai Imagine you're excited to play a new game, and you find a website offering a free download of that game. You eagerly download and install it. However, the website ‘you got the game from is not a legitimate source, and the game file you downloaded contains hidden malware. Once you start playing the game, the malware activates. It could start causing issues like slowing down your system, showing unwanted ads, or even stealing your personal information. This is how malware can infect your computer when you download games from untrustworthy sources Mydoom was one of the fastest-spreading email malware and was responsible for widespread ‘email disruption. What isa virus? Acomputer virus is like a harmful program that can damage your computer and files. It spreads by changing other computer programs and putting its own code in them. Whenit spreads alot, it can make your computer crash. ‘Computer viruses are a big problem worldwide because they can cost the economy billions of dollars each year. If your computer has a virus, you might notice it running slower than usual. Later, you may see ‘other problems too. Be aware! Connect with care! Figure 1-8 do you prevent malware and adware? © Onlydownloadfiles from trusted sources. © Install an antivirus program and keep it up to date. © Donot click on links in e-mails or messages from unknown senders. © Keep your operating system and software up to date. Software updates often include security patches that can help protect you from new viruses. (ym sted Trojan horse In.computing, a Trojan horse is a program downloaded and installed on 2 computer that appears harmless but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, ‘yen when the computer should be idle, are strong indications that a Trojan resides on a computer. ‘The Trojan horse is typically hidden in an innocent-looking e-mail attachment or free download. When the user clicks on the e-mail attachment or downloads the free program, the malware hidden inside is transferred to the user's computing device. Once inside, the malicious code can execute whatever task the attacker designed it to carry out. cr Know the law to stay safe Cyber and criminal laws are like rules for the internet. Just like there are rules for the playground, there are rules for the Internet. These rules help to keep people safe online. Some examples of cyber and criminal laws include: © tis illegal to bully or harass others online. © Itisillegal to post threats of violence or harm against others online. © tis illegal to share copyrighted material without permission. © {tis illegal to impersonate another person online. Ifyou break cyber or criminal law, you could face consequences. These consequene= 2 could include being banned from social media, being arrested, or even going to all. IN Te) eT eet Flac Do's and Dont's © Docustomize your privacy settings: Ensure that your online profiles have customized privacy settings so that only people you trust can see your information. © Do verify friend requests: Before accepting friend requests, do ask a trusted adult for help in confirming the identity of the requester. © Do spend quality time offiine: While enjoying social media, do remember to spend time in the real world, engaging in activities and face-to-face interactions. © Don’t share sensitive information: Don't disclose personal and confidential details like social security or ID numbers, passwords, bank account or credit card numbers, and addresses. © Don’t accept invitations blindly: Don't accept friend requests or connections from strangers without first verifying their identity with the help of a trusted adult. © Don't over-share online: Don't share too much personal information online by commenting excessively or revealing every aspect of your life, as this can compromise your privacy. rT roy cybersquare.or8 woasie @ Quick Reean | ‘Cyber safety is the term used to describe the safe use of computers, mobile phones, and their related networks and data to protect them from cyber attackers. Some important internet safety tips are: Update your browser frequently. Block pop-ups Check the website's URL. Use reputable E-commerce websites. Avoid clicking on links, if possible, from messages or chats. Oo o70 00 Turn on Two-Factor Authentication whenever possible. Bookmark the important sites ‘Cyberbullying is when people are unkind or hurtful to others through phones, computers, or the Internet. Adware is like digital advertising that can sometimes be annoying. It's a type of soft- ware that displays lots of advertisements on your computer or device, often when you're browsing the Internet or using certain apps. Malware is software that is designed to harm your computer. It stands for malicious software. Acomputer virus is like a harmful program that can damage your computer andfiles. It spreads by changing other computer programs and putting its own code in them. A Trojan horse is a program downloaded and installed on a computer that appears harmless but is, in fact, malicious. | Qronui www cybersquare.org

You might also like