0% found this document useful (0 votes)
63 views11 pages

Digital Empowerment

The document discusses the differences between online security and online privacy, emphasizing that security protects systems from breaches while privacy safeguards personal data. It outlines various digital threats, including malware, phishing, and cyber attacks, along with preventive measures against data breaches and the importance of cybersecurity. Additionally, it highlights initiatives like Cyber Swachhta Kendra and CyberDost aimed at promoting online safety and awareness.

Uploaded by

sy9532073001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views11 pages

Digital Empowerment

The document discusses the differences between online security and online privacy, emphasizing that security protects systems from breaches while privacy safeguards personal data. It outlines various digital threats, including malware, phishing, and cyber attacks, along with preventive measures against data breaches and the importance of cybersecurity. Additionally, it highlights initiatives like Cyber Swachhta Kendra and CyberDost aimed at promoting online safety and awareness.

Uploaded by

sy9532073001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Name:- Ravi Yadav

Class:- BA

Course:- Hindi(H)

Roll no:- 1018

Subject:- Digital empowerment

Assignment 2

Online Security vs Online Privacy

Online Security involves the technologies, processes, and measures put


in place to protect computers, networks, programs, and data from
unauthorized access, attacks, or damage. It is about safeguarding
systems and data integrity, confidentiality, and availability from external
threats such as hackers, malware, or viruses. Security measures include
firewalls, antivirus software, encryption, and secure passwords.

Online Privacy, meanwhile, focuses on the individual's control over


their personal information—what data is collected, how it is used, who it
is shared with, and how it is protected from misuse. Privacy deals with
protecting user identities, preferences, browsing habits, and personal
communications from being tracked or exploited without consent.
Privacy laws like GDPR (General Data Protection Regulation) empower
individuals to control their data.

Together, security protects the system from breaches, while privacy


protects the user’s personal data within those systems.
Privacy

Privacy in the digital context means having control over one’s personal
information in online environments. This includes data such as your
location, search history, social media activity, financial information, and
communications.

Privacy protection involves tools like:

• End-to-End Encryption: Ensures only communicating users


can read messages.
• Anonymization: Hiding user identity.
• Privacy Policies & Regulations: Laws such as the GDPR and
India’s Data Protection Bill define how organizations must
handle personal data, requiring consent and transparency.

Maintaining privacy is crucial to avoid unauthorized tracking, data


misuse, identity theft, or targeted advertising.

Threats in the Digital World

The digital world faces many threats, including:

• Malware: Malicious software like viruses, ransomware,


spyware.
• Phishing: Fraudulent attempts to obtain sensitive info by
impersonating trustworthy entities.
• Identity Theft: Stealing personal info to commit fraud.
• Ransomware: Locking victims’ data for ransom.
• Cyberbullying: Harassment via digital platforms.
• Cyberterrorism: Using cyber attacks to cause widespread
harm or panic.
These threats target individuals, businesses, and governments,
demanding constant vigilance, cybersecurity training, and strong
technical defenses.

Data Breaches

A data breach happens when sensitive information (like credit card


numbers, passwords, or health records) is accessed or leaked without
permission.

Common causes:

• Weak passwords
• Phishing scams
• Insider threats (disgruntled employees)
• Software vulnerabilities

Consequences:

• Financial loss
• Damage to reputation
• Legal penalties
• Personal privacy violations

Preventive measures include strong encryption, access controls, regular


audits, and employee training.

Cyber Attacks

Cyber attacks are intentional actions to compromise computer systems


or networks. Types include:

• Phishing: Fake emails to steal data.


• Ransomware: Demanding ransom to restore access.
• DDoS (Distributed Denial of Service): Flooding servers to
disrupt services.
• Trojan Horses: Malware disguised as legitimate software.
• Man-in-the-Middle (MITM): Intercepting communication
between two parties.

Motivations can range from financial gain to political activism or


espionage.

Absolutely! Let’s break down each topic with detailed explanations,


examples, and impacts, so you understand the full depth of these
concepts.

Malware – Malicious software to disrupt computers

Definition: Malware refers to any software intentionally designed to


cause harm to a computer system, steal data, or spy on users. It can
spread through infected files, websites, or attachments.
Types:

• Virus: Attaches to files and spreads when opened.


• Worm: Spreads itself without user action.
• Trojan: Disguised as a legitimate file but causes harm once
installed.
• Ransomware: Locks files and demands payment for access
(e.g., WannaCry attack in 2017).
• Spyware: Monitors user activity and steals information.
Impact: Malware can slow down computers, steal financial
data, or completely lock you out of your system. It can even be
used by governments or hackers for cyber-espionage.
Hacktivism

Definition: Hacktivism combines "hacking" with "activism." Hackers


use cyberattacks as a form of protest to promote political or social
agendas.
Examples: Defacing government websites, leaking sensitive data, or
launching Distributed Denial of Service (DDoS) attacks to disrupt
services.
Case Study: The group Anonymous has targeted governments and
corporations for issues like internet freedom and human rights
violations.
Impact: Raises awareness but can also cause legal issues and disrupt
public services.

Mobile Devices and Applications and Their Associated Cyber Attacks

Definition: Smartphones, tablets, and apps are vulnerable to cyber


threats due to their widespread use and access to sensitive data.
Types of Attacks:

• Malware in apps: Fake apps that steal data.


• Phishing: Fake messages tricking users into revealing personal
information.
• Man-in-the-middle (MITM) attacks: Intercepting data on
public Wi-Fi.
Example: Fake banking apps that mimic real ones and steal
login credentials.
Impact: Identity theft, financial loss, and invasion of privacy.
Social Engineering

Definition: Social engineering manipulates people into giving up


confidential information by exploiting human emotions like fear,
urgency, or trust.
Methods:

• Phishing emails: Fake emails from "banks" asking for


passwords.
• Pretexting: Pretending to be someone trustworthy (e.g., IT
support).
• Baiting: Leaving infected USB drives for people to plug in.
Impact: People, not technology, become the weak link in
cybersecurity.

Spear Phishing

Definition: A highly targeted phishing attack aimed at a specific person


or organization.
Example: An attacker sends a fake email to a company's HR manager
pretending to be the CEO, asking for employee records.
Impact: More dangerous than regular phishing because it uses detailed
personal info (like your name, role, and company details) to trick you.

Domain Name System (DNS) Attacks

Definition: DNS translates website names into IP addresses. Attacking


DNS can redirect users to malicious websites or disrupt services.
Types:

• DNS Spoofing/Cache Poisoning: Fake DNS info redirects


users.
• DNS Amplification Attack: Flooding a DNS server to crash it.
Impact: Users think they’re visiting a safe website but are sent
to a malicious one. It can lead to data theft and service
outages.

Router Security

Definition: Routers control network traffic. If not secured, hackers can


access entire networks.
Risks:

• Default passwords (easy to guess).


• Outdated firmware (unpatched vulnerabilities).
• Weak encryption (e.g., using WEP instead of WPA2 or WPA3).
Impact: Attackers can intercept your internet traffic, install
malware, or control your smart devices.

Denial of Service (DoS)

Definition: A cyberattack that floods a server or network with traffic,


making it slow or completely unavailable.
Distributed DoS (DDoS): Multiple systems attack at once.
Example: The 2016 DDoS attack on Dyn servers took down major sites
like Twitter and Netflix.
Impact: Loss of services, reputation damage, and financial loss.
Blockchain

Definition: A decentralized, distributed ledger system that records


transactions securely.
Features:

• Immutable (cannot be altered).


• Transparent (visible to all participants).
• Secure through cryptography.
Applications:
• Cryptocurrencies like Bitcoin.
• Smart contracts (self-executing contracts).
• Supply chain tracking. Impact: Reduces fraud, increases
transparency, but still faces challenges like scalability and
energy consumption.

CSK (Cyber Swachhta Kendra)

Definition: A government initiative in India under CERT-In to promote


cybersecurity hygiene.
Functions:

• Provides free security tools (like antivirus).


• Offers alerts about new cyber threats.
• Spreads awareness about safe online practices.
Impact: Helps individuals and businesses protect themselves
from malware and other cyber threats.
. CyberDost

Definition: An awareness initiative by the Indian Ministry of Home


Affairs to educate citizens about online safety.
Functions:

• Shares tips on social media platforms.


• Informs users about the latest scams and cyber threats.
• Encourages reporting cyber crimes.
Impact: Empowers people to stay vigilant and safe online.

Netiquettes

Definition: A set of rules for proper behavior on the internet.


Examples:

• Be respectful in online conversations.


• Avoid using all caps (which looks like shouting).
• Do not spam.
• Give credit for others’ work.
Impact: Helps maintain a healthy and respectful online
community.

. Ethics in Digital Communication

Definition: Refers to moral principles while communicating digitally—


via emails, social media, or messaging.
Key Principles:

• Honesty (avoiding fake information).


• Privacy (not sharing others' data without permission).
• Respect (no abusive language or trolling).
Impact: Builds trust, prevents harm, and promotes a safe
digital space.

Ethics in Cyberspace

Definition: Broader than communication ethics, covering all online


behavior.
Includes:

• Following laws (not hacking into systems).


• Respecting intellectual property (not pirating software).
• Protecting privacy and data rights.
Impact: Promotes a safe and ethical digital environment,
discouraging cybercrime and abuse.

Communication

Definition: The exchange of information over digital channels—emails,


chats, video calls, etc.
Effective communication online:

• Be clear and concise.


• Use proper language.
• Be mindful of cultural differences.
• Protect sensitive information.
Impact: Miscommunication can lead to misunderstandings,
while good communication builds relationships and trust.

You might also like