Page 61 - CA 165 ver 1.0 Class 9
P. 61

l    Avoid keeping names of loved ones, relatives, friends, etc. as passwords.
                 l    Having a strong password is important to safeguard oneself.

                 l    Examples of strong password: aniKR@87@18, Esd{@37
                 Negative Impacts of Choosing a Wrong Password

                 Following are the negative impacts of choosing a wrong password:

                 l    Downloading & stealing of  personal files and documents by others.
                 l    Transmitting of messages without our knowledge from our email or social media account to others.

                 l    Modification of personal details by someone with an intention to slander our image.
                 l    Purchase of things in our name.

                 l    Transfer or appropriation of funds from our bank account without our knowledge.
                 We should keep changing the password frequently. Using long passwords can lower the risk of a security
                 breach. Most websites rate the effectiveness of password with a password meter that displays the strength
                 of a password.

                   PRIVACY

                 While doing something important and personal, we do not like others to interfere or disturb us because
                 at that time we want to be left alone and enjoy our own privacy. Privacy is the freedom from any kind of
                 intrusion or interference. It is the right to have control on our personal life.
                 Privacy  in  Information  Technology  refers  to  personal  control  over  one’s  own  files  and  documents.  It
                 also  refers  to  the  right  and  ability  to  keep  control  over  the  information  that  one  reveals  or  uploads
                 over  the  internet  and  to  have  a  control  over  the  selection  of  viewers  or  users  who  can  access  that
                 information.

                 Information Technology is rapidly destroying the privacy. The situation now demands that we consider
                 what information we want to keep as private and how to organize it in the best possible manner.

                 It is the right of an individual or an e-Group (Social Media) to restrict access or to disclose only selective
                 information on the internet. The control is basically on what to reveal or whom to reveal. The information
                 or materials on internet can be broadly categorized as based on the level of privacy control on such
                 materials:
                 l    General content: Content that can be viewed by anyone who browses Internet.

                 l    Restricted content: Secret or confidential content that is meant to be viewed or browsed only by
                      authorized person/s.

                 l    Partially Restricted content: The selected portion of the content that is meant to be viewed by
                      authorized person or a group of persons.

                   CONFIDENTIALITY OF INFORMATION

                 There are certain information that we want to keep as a secret and restrict its access either to ourself, our
                 family or within a circle of friends only. Such information becomes confidential for the set of people for
                 whom it is meant.




                                                                                                 Cyber Safety    59
   56   57   58   59   60   61   62   63   64   65   66