Name-Popi Saikia
Rollno-23/1312
Course-History (Hons)
VAC- DIGITAL EMPOWERMENT
PRACTICAL
12. Students need to explore various blogs/social
media. Students may share their experiences
through 10-15 minutes audio-visual presentation.
-Exploring Blogs and Social Media:
Objective:
The goal was to explore various blogs and social
media platforms, understand their content styles,
user engagement strategies, and analyze their
effectiveness in conveying information to diverse
audiences.
1. Platforms Explored A. Blogs:
1. Medium.com
• Experience: Articles are well-
structured with clear headings and
visuals, enhancing readability.
• Most popular articles focus on personal
development, AI, and entrepreneurship.
• The platform allows readers to engage
through comments and “claps,” fostering
a community-driven approach.
2. HubSpot Blog
• Experience: Blogs are data-driven and
incorporate practical tips with statistics to
support claims.
• Call-to-action buttons direct readers to
related resources, boosting engagement.
• Infographics and embedded videos
enhance the learning experience.
B. Social Media:
1. Instagram
• Experience: Visually rich content with a
focus on aesthetics and engaging captions.
• Stories, reels, and carousel posts increase
audience retention.
• Influencers often collaborate with brands,
making promotions seem authentic.
• Insight: Instagram’s algorithm promotes
visually appealing content, and engagement is
•
driven by short, catchy captions and interactive
elements like polls and Q&A.
2. LinkedIn
• Experience: Posts range from industry
updates and thought leadership articles to
personal success stories.
• Engagement is driven by comments, likes,
and reposts, allowing users to network.
Direct messages and InMail facilitate
personalized communication.
• Insight: LinkedIn caters to a professional
audience where meaningful interactions and
career-building conversations dominate.
3. YouTube
• Experience: Long-form videos perform better
when structured with introductions, value-
packed content, and calls to action.
• Educational channels like Khan Academy
offer detailed, step-by-step learning.
• Comment sections often create thriving
discussions.
• Insight: YouTube’s algorithm rewards watch
time and viewer engagement, encouraging
creators to focus on high-quality, longer
content.
13. Students need to explore any one of the
digital platform related to financial or banking or
education sector.
1. Introduction to Paytm
• Platform Name: Paytm (Payment Through
Mobile)
• Founded: 2010 by Vijay Shekhar sharma
• Headquarters: Noida, India
• Website: www.paytm.com Exploring a
digital platform- PAYTM
• Category: Financial and Digital Payment
Platform
Purpose:
Paytm is a leading fintech platform that allows
users to perform various digital transactions,
including mobile recharges, utility bill payments,
digital wallets, UPI transfers, online shopping,
and financial services. It has revolutionized the
way people conduct digital payments, especially
postdemonetization in India.
2. Features and Services of Paytm
A. Digital Wallet and UPI Services
•
• Paytm Wallet: Allows users to store
money digitally and make payments at
various merchants, online platforms, and
retail stores.
• UPI Integration: Facilitates seamless
bank-to-bank transfers through UPI (Unified
Payments Interface) with minimal effort.
• Auto Payment Options: Enables
automatic recurring payments for
subscriptions and bills.
B. Mobile Recharges and Bill Payments
Prepaid and Postpaid Recharges: Users
can recharge mobile numbers for major telecom
operators.
• Utility Bills: Payment options for
electricity, water, gas, broadband, and DTH
services.
• FASTAG Recharges: Enables users to
recharge FASTAG accounts for toll payments.
C. Financial Services
• Paytm Payments Bank: Provides banking
services with zero balance savings accounts,
fixed deposits, and debit cards.
• Paytm Money: Offers investment options
such as mutual funds, SIPs, and stock
trading.
• Paytm Credit Card: Provides cashback
and exclusive offers on payments.
• Insurance Services: Life, health, and
vehicle insurance policies are available
through the platform.
D. E-Commerce and Ticketing Services
• E-Commerce Platform: Users can shop for
electronics, groceries, and fashion.
• Ticket Booking: Offers online ticketing for
movies, flights, buses, and trains.
E. Loan and EMI Options
• Paytm Postpaid: Provides interest-free
credit to users for small-ticket transactions.
• Personal and Business Loans: Allows
users to apply for quick loans with minimal
documentation.
14. Create your account in the NPTEL/ SWAYAM
education portal. Enroll in any course of your
choice.
•
Creating an Account on NPTEL or SWAYAM
Step 1: Open the Website
• Visit the official website:
• NPTEL: https://nptel.ac.in/
• SWAYAM: https://swayam.gov.in/
Step 2: Click on “Sign Up / Register”
• Look for the “Sign Up” or “Register” button at
the top-right corner of the homepage.
• Click on it to begin the registration process.
Step 3: Choose Your Login Method
• You can register using any of the following
options:
Google Account: Sign up using your Gmail
account
for faster registration.
• Microsoft Account: Use a Microsoft email
(Outlook/Hotmail) if preferred.
• Create New Account: Use a different email
and manually enter your details.
Step 4: Fill in Personal Details
• If creating a new account manually, provide:
• Name: Enter your full name.
• Email ID: Use a valid email address.
• Username and Password: Choose a unique
username and a strong password.
• Phone Number: Add a valid phone number for
verification.
Step 5: Verify Your Email
• A verification link will be sent to your
registered email.
• Open your email inbox, click the link, and
verify your account.
Step 6: Login to Your Account
• Return to the NPTEL or SWAYAM homepage.
•
Click on “Login” and enter your
credentials (email/username and password).
B. Enrolling in a Course
Step 1: Browse Available Courses
• Once logged in, explore the list of available
courses.
• To browse:
• Use the Search Bar to look for a specific
course.
• Use Filters to narrow down options by
category, duration, and level (beginner,
intermediate, advanced).
• Popular Course Categories:
• Computer Science and Engineering
• Management and Entrepreneurship
• Humanities and Social Sciences
• Mathematics and Data Science
• Finance and Economics
Step 2: Select Your Desired Course
• Click on the course that interests you.
• Review the course details:
• Course Description: Overview of the course
content.
Duration: Length of the course (typically
4 to 12 weeks).
• Instructor: Name and credentials of the
instructor.
• Assessment and Certification: Information
about assignments and final certification.
Step 3: Click on “Enroll”
• Once satisfied with the course details, click
on the “Enroll” button.
• A confirmation message will appear
indicating successful enrollment.
15. Prepare a small report on either a data
breach or a cyber attack.
Report on Cyber Attack: An Overview
1. Introduction
A cyber attack is a deliberate attempt by hackers
to breach a system’s defenses and gain
unauthorized access to sensitive information.
Cyber attacks target individuals, organizations,
•
and governments, often leading to data theft,
system disruption, and financial loss. As digital
dependence grows, cyber attacks have become
more sophisticated and widespread.
2. Types of Cyber Attacks
A. Phishing Attacks
• Hackers use deceptive emails or
messages to trick users into providing
sensitive information, such as login
credentials or financial details.
B. Malware and Ransomware
• Malware: Malicious software designed to
damage or disrupt systems.
• Ransomware: A type of malware that
locks data and demands payment to restore
access.
C. Denial-of-Service (DoS) Attacks
• Attackers flood a network or server with
excessive traffic, causing it to crash and
denying legitimate users access.
D. Man-in-the-Middle (MITM) Attacks
• Hackers intercept communication
between two parties to steal or manipulate
data.
E. SQL Injection Attacks
Attackers exploit vulnerabilities in a
database by
injecting malicious SQL code to gain access to
sensitive information.
3. Notable Cyber Attacks
A. WannaCry Ransomware Attack (2017)
• Details: A ransomware attack that
exploited vulnerabilities in Microsoft
systems.
• Impact: Infected over 200,000 computers
across 150 countries, causing millions of
dollars in damages.
B. SolarWinds Cyber Attack (2020)
• Details: Hackers compromised
SolarWinds’ software update, infiltrating
multiple U.S. government agencies and
private organizations.
•
• Impact: Affected thousands of systems
and exposed sensitive government
information.
C. Colonial Pipeline Attack (2021)
• Details: Ransomware attack on the
Colonial
Pipeline, disrupting fuel supply across the eastern
U.S.
• Impact: Caused widespread fuel
shortages and resulted in a $4.4 million
ransom payment.
4. Impact of Cyber Attacks
A. Financial Losses
• Direct financial losses due to system
downtime, ransom payments, and data
recovery costs.
• Loss of business revenue and increased
cybersecurity spending.
B. Data Breach and Privacy Concerns
• Compromised personal, financial, and
corporate data can lead to identity theft
and fraud.
• Loss of customer trust and reputational
damage.
C. Disruption of Critical Infrastructure
• Cyber attacks on power grids, healthcare
systems, and communication networks
can cause widespread disruption.
5. Preventive Measures and Best Practices
A. Strengthening Cybersecurity
• Use multi-factor authentication (MFA) and
strong password policies.
• Regularly update and patch software to
fix vulnerabilities.
B. Employee Training and Awareness
• Conduct regular cybersecurity training to
recognize phishing and social
engineering attempts.
• Encourage vigilance in handling sensitive
data.
C. Network Security and Monitoring
• Use firewalls, intrusion detection systems
(IDS), and anti-malware solutions to
safeguard networks.
• Monitor systems for suspicious activities
and potential threats.
D. Backup and Disaster Recovery
• Implement regular data backups to
enable quick recovery after an attack.
• Develop a comprehensive incident
response plan (IRP) to mitigate the
impact of breaches.
6. Conclusion
Cyber attacks pose serious threats to
organizations and individuals, leading to
financial, operational, and reputational harm. By
adopting strong cybersecurity practices, regularly
educating employees, and investing in robust
security infrastructure, organizations can
minimize the risk of cyber attacks and protect
their systems and data.
16. Browse the Govt blockchain website
"blockchain.gov.in". Explore and present any one
case study present on the website.
CASE STUDY-
Land Records
In India, currently the ownership of a property is
proved through presumptive land titling -chain of
documents that provide evidence of the transfer
of title from person to person over the years all
the way to the current owners. Registration is
only recognized as an agreement between two
parties for transfer of property. An important
constraint is that any one of these intermediate
transactions is liable to be challenged as the
office of sub-registrar (SRO) is only undertaking
deed registration under the central registration
act 1908 and does not verify the ownership of
the land.
Property fraud is also rampant in many forms in
our country.
The revenue department/ Revenue & Panchayati
Raj department is the custodian of the land
records. They are the authority to maintain the
land record details. The various other
transactions related to change of ownership
through sale, loan, mortgage, release of
mortgage, crop updation initiated by other
departments are approved by the revenue
department officials and the ROR gets updated.
Land records is under the jurisdiction of state
laws.
The Land records system deployed in the various
states facilitate the mutation of land. The change
in ownership of the land, the cultivators, the crop
grown, the source of irrigation, rights and
liabilities are what is stored and maintained. The
Record of Rights document is what is required for
farmers to obtain benefit from the Government in
the form of subsidy for seeds, fertilizers and for
other purposes like securing loan, for sale etc.
The Registration departments in the country use
a software independent of the land records
system. The complete document pertaining to
the property to be registered is uploaded along
with meta data by the citizen. It undergoes
approval process and at final stage , biometrics
of the parties is taken. Then the sale deed
document is printed, signature is obtained from
purchaser and seller and uploaded again into the
system for future issuance of certified copy.
Challenges
Some of the major challenges faced in this sector
include increase in the number of Land related
litigations, difficulty to track double selling of the
same land or landed property , non-existence of
unique record or golden record of ownership, lack
of system to facilitate citizens to verify the land
records, lot of paper work for obtaining loan from
banks using land as collateral security, financial
institutions do not get the factual picture of the
piece of land for providing loan as they rely
heavily on property for collateral security, delay
in the obtaining documents from revenue and
financial institutions etc.
The farmer has to spend time and money to
collect all the documents such as mutation
extract, crop certificate etc that are necessary for
securing loan, subsidy and any other benefit from
the Government.
There is a need to ensure that the data in the
land records system, registration system etc. are
not susceptible to alteration as each of these
departments rely totally on the integrity of the
other to initiate transactions. Hence there is a
need for trust to use a common source of data to
perform approvals for different activities so as to
avoid the problem.
History shows that duplicate registration
documents are generated by tampering original
documents and the properties are being sold on
the basis of the tampered documents. Also one
property is being sold to multiple purchasers by
keeping each other under dark.
Proposed System
As compared to other data, Land records data
need to be accurately stored in the blockchain.
The existing history of transactions on a piece of
land first needs to be inserted into the blockchain
after approval by Revenue functionaries in the
State. The approved data will be digitally signed
and stored. This will be a starting point for any
mutation.
The certificates issued by the Revenue
Department will be stored in the blockchain and
can be used by the other agencies like the bank
for any of the verification process during a
transaction on the land parcel / farmer.
The transactions related to change of ownership
through sale, loan, mortgage, release of
mortgage, crop updation is initiated by other
departments. During the initiation of above
mentioned transactions, the verification of the
details need to be done using the blockchain
data. After the approval of transaction in the
respective database such as completion of deed
registration / approval of loan by the bank, the
transaction details should be stored in the
blockchain.
Specifically, the registration department will fetch
details w.r.t a survey number from the blockchain
and ensure that the ownership of the land parcel
indeed rests with the prospective seller before
initiating a sale. After obtaining the signature of
the purchaser and seller in the sale deed, the
scanned document should be moved in to
Blockchain Network to create a block. Once the
block is created it cannot be edited or tampered.
Likewise the chain of block is created every time
the property title is changed from one person to
another.
By implementing smart contracts, certain events
such as registration of the land can automatically
initiate the mutation request in the land record,
the approval of loan by the bank can update the
rights and liabilities, crop details updation can
trigger the updation of cultivators and crop
details in RTC. Smart contracts can also facilitate
the payment of subsidy to farmers on failure of
crops. In cases when the entitlement is only for
certain types of farmers, the eligibility can be
ascertained from the blockchain.
Benefits
The availability of data in a central location that
can be accessed by all departments would
enable faster disposal of requests for subsidy,
mutation,
There would be no need for trusted authority like
notaries to provide attested copies of documents.
The farmers will be assured that their land
ownership cannot be changed by spurious
persons.
The farmers can obtain loans quickly. The
updation of the details related to liability in the
Record of Rights can be done as soon as the
farmer repays the loan. This is facilitate the
farmer to avail other benefits / services.
The facilities provided to the farmer from the
agriculture / Horticulture departments / Animal
Husbandry department when recorded in the
blockchain will facilitate these departments to
ensure that same benefit / multiple benefits do
not reach the same farmer multiple times or
might not receive multiple benefits as per the
terms & conditions laid down.
Blockchain data of the property registration will
be made available in the work flow system of the
Registration software as well as the public for
verification. This will provide the complete details
of the property chain right from the first
purchaser to latest one. The Purchaser need not
depend on any non-reliable personnel/agency to
verify the authenticity of the document provided
by the seller.
A repository of a transparent, trusted and a
tamper proof Property Registration documents
would be available for use by citizens & the
registration department.
Citizens can verify the ownership details &
complete history of the property before going in
for purchase of the property
The availability of document chain will eliminate
registration based on bogus.
17. Explore the site "https://www.csk.gov.in/".
The Cyber Swachhta Kendra (CSK), also known as
the Botnet
Cleaning and Malware Analysis Centre, is part of
India’s
Digital India Initiative, established under the
Ministry of Electronics and Information
Technology . It aims to ensure a secure cyber
ecosystem by detecting botnet infections,
notifying affected users, and providing tools to
clean and secure their systems.
2. Role and Objectives
• Detect and Prevent: Identifies botnet and
malware infections and prevents further
spread.
• Cleaning and Securing Systems: Offers
free tools to clean infected devices and
enhance security.
• User Awareness: Educates users on
cybersecurity best practices.
3. Compliance with National Cyber Security Policy
CSK was established to fulfill the objectives of the
National Cyber Security Policy, which emphasizes
the creation of a secure digital environment in
India. This policy seeks to protect personal and
national digital infrastructure from cyber threats.
4. Operational Structure
• Coordination with ISPs and Antivirus
Providers: CSK operates in close
collaboration with Internet Service
Providers (ISPs) and antivirus companies
to detect infections and provide cleaning
solutions.
• CERT-In Oversight: Managed by the
Indian
Computer Emergency Response Team (CERT-In)
under Section 70B of the Information Technology
Act, 2000, CSK responds to cybersecurity
incidents and provides technical assistance.
5. Services and Tools Provided
• Free Security Tools: CSK offers
downloadable tools to remove botnets
and malware. Popular tools include USB
Pratirodh (USB security) and Browser JS
Guard (browser security).
• Advisories and Alerts: It issues alerts,
guidelines, and best practices for
improving cyber hygiene.
• Incident Response: Assists organizations
and individuals in mitigating cyber
threats.
6. Importance of CSK
• Reducing Cyber Threats: CSK plays a
critical role in reducing botnet and
malware infections, ensuring safer digital
interactions.
•
Empowering Users: By offering free tools
and
guidelines, it empowers users to secure their
systems proactively.
7. Conclusion
The Cyber Swachta Kendra (CSK) is an essential
part of India’s cybersecurity framework,
safeguarding systems from cyber threats and
enhancing public awareness. Through its
collaborative approach with ISPs and antivirus
vendors, CSK strengthens the nation’s digital
infrastructure and promotes responsible online
behavior.
18. When students' online behavior draws
criticism from others, what kind of guidelines
help us as a society determine what is
acceptable in cyberspace?
Detailed Guidelines for Acceptable Online
Behavior in Cyberspace
•
When students’ online behavior draws criticism,
these guidelines help maintain a safe and
respectful digital environment:
1. Respect and Civility
Treat others with respect in all online
interactions.
• Avoid using offensive, derogatory, or
inflammatory language that may hurt
others.
• Practice empathy by considering the
impact of your words and actions on
others.
2. Privacy and Confidentiality
• Protect personal and sensitive
information.
• Avoid sharing private details such as
phone numbers, addresses, or financial
information.
• Understand platform privacy settings to
control who can access shared content.
•
3. Responsible Content Sharing
• Verify the authenticity of information
before sharing to prevent misinformation.
• Avoid spreading rumors, false
information, or misleading content.
• Attribute sources when sharing content
that is not your own.
4. Avoid Cyberbullying and Harassment
Do not engage in cyberbullying, trolling,
or targeted harassment.
• Report and block individuals engaging in
harmful behavior.
• Support peers who may be victims of
online abuse.
5. Digital Etiquette (Netiquette)
• Follow the rules and guidelines of online
platforms.
• Use appropriate language and tone in
formal and informal digital
communication.
• Understand cultural sensitivity while
engaging with a global audience.
•
6. Cybersecurity Awareness
• Use strong passwords and enable two-
factor authentication (2FA).
• Be cautious when clicking on unknown
links to prevent phishing attacks.
• Regularly update software and
applications to protect against security
vulnerabilities.
7. Legal and Ethical Awareness
• Understand the consequences of sharing
illegal, copyrighted, or harmful content.
Abide by national and international laws
governing cyberspace.
• Avoid plagiarism and give proper credit
to original creators.
8. Digital Footprint Management
• Be mindful of the content shared online,
as it contributes to a permanent digital
record.
• Review and update privacy settings on
social media platforms.
•
• Be cautious while expressing opinions
that may affect future educational or
career opportunities.
9. Conflict Resolution and Reporting
• Engage in constructive dialogue to
resolve disagreements.
• Report inappropriate or harmful content
to platform moderators or relevant
authorities.
• Encourage a culture of accountability and
responsible online behavior.
10. Promoting Digital Literacy
• Educate peers on the importance of
ethical and responsible internet use.
Stay informed about evolving threats in
the digital landscape.
• Encourage critical thinking when
consuming online content.
Conclusion
Adhering to these guidelines promotes a
respectful, inclusive, and secure cyberspace.
•
Students should be encouraged to develop digital
responsibility and contribute positively to online
communities.
19. Do important people in your life talk with you
about the dangers of certain online behavior?
Yes, important people such as parents, teachers,
and mentors often discuss the potential dangers
associated with online behavior to encourage
safe digital practices. These discussions cover a
wide range of risks, including cyberbullying,
identity theft, phishing, malware, and privacy
breaches. They emphasize the importance of
protecting personal information, creating strong
passwords, and being cautious when interacting
with unknown individuals online.
Parents usually focus on maintaining privacy and
safety, stressing the dangers of oversharing
personal details or
engaging with strangers. They often highlight
how cybercriminals can manipulate information
to commit identity theft or financial fraud.
Parents may also guide children in recognizing
suspicious links or malicious websites that could
infect devices with malware or steal sensitive
data.
Teachers and educators emphasize the
importance of critical thinking and verifying
sources before sharing content online. They
encourage students to be aware of the spread of
misinformation and fake news and promote the
development of digital literacy to help young
people distinguish between trustworthy and
unreliable sources. Teachers also warn students
about the long-term effects of inappropriate
online behavior, including damage to their
reputation and career prospects due to a
negative digital footprint.
Mentors and role models often focus on helping
young individuals build a positive online
presence. They discuss how content shared on
social media can have long-lasting consequences
and how employers, universities, and other
institutions may evaluate a person’s digital
history. Mentors may also guide students on
engaging in respectful online interactions,
discouraging involvement in cyberbullying or any
form of harassment.
These conversations contribute to raising
awareness and instilling a sense of responsibility
among young internet users. They empower
students to make informed decisions, protect
themselves from cyber threats, and engage
respectfully and safely in the digital world.
Moreover, these ongoing dialogues create a
supportive environment where young individuals
feel comfortable seeking advice or reporting
concerns if they encounter issues online.
By fostering awareness, encouraging responsible
decisionmaking, and promoting open
communication, these discussions play a crucial
role in helping students navigate the
complexities of the digital world safety and
effectively.
20.Do young people fully understand the consequences
of their online activity? Why ort?why no
: Most young people do not fully comprehend the
long-term consequences of their online behavior.
While they may be aware of basic internet safety,
they often overlook how impulsive actions—such
as oversharing personal information, posting
inappropriate content, or engaging with unknown
individuals—can affect their privacy, reputation,
and security.
Reasons for This Lack of Awareness:
1. Limited Digital Literacy: Many young users
are not adequately educated on how a digital
footprint can influence their future.
2. Desire for Instant Gratification: Social media
encourages immediate engagement, leading
young people to prioritize likes and comments
over considering long-term impacts.
3. Inadequate Privacy Awareness: Many users
don’t fully understand how the information they
share can be misused, leaving them vulnerable
to identity theft, phishing, and cyberbullying.
Potential Consequences:
• Damage to Reputation: Inappropriate content
can surface later and harm college admissions or
job prospects.
• Cybersecurity Threats: Oversharing personal
information increases vulnerability to phishing
attacks and online fraud.
• Emotional and Psychological Impact:
Cyberbullying or negative feedback can lead to
lasting emotional harm.
Why Some Young People Are More Aware:
1. Parental Supervision and Guidance: Those
whose parents engage in regular conversations
about online safety are more cautious.
2. School-Based Education: Schools that include
digital literacy and cyber ethics in their
curriculum help students make more informed
decisions online.
Conclusion:
While some young people demonstrate an
understanding of potential online risks, many
lack awareness of the deeper consequences of
their actions. Encouraging greater digital literacy,
responsible behavior, and open discussions about
internet safety is essential to empower young
users to navigate the digital world with caution
and responsibility.