Page 74 - Data Science class 10
P. 74
3.14. PROTECTING YOUR DATA
Data protection is safeguarding your data from data
damage or data access by unauthorised people. It is always
a good practice to maintain and protect your computer by
following some precautions and managing a few computer
settings. Some of the important points to take care are:
• Use proper passwords combinations for your
computer login: At the time to allocate passwords take
care to use the combinations of small letters, upper case,
numbers, and special characters like $, %, &, etc. These
combinations are difficult to hack and will be able to save your computer from unauthorised access.
• Install Anti-virus and Firewall: Anti-viruses and Firewall will not allow the unwanted data to enter your
computer. If by mistake you download any malicious code then antivirus or antimalware software will warn
you and then will remove it from your computer. This way you will be able to project your data from getting
damaged or stolen.
• Encrypt Data: Data encryption is converting the readable data into unreadable encoded form to save it from
unauthorised access. Sometimes sensitive data like personal credit card transactions you do in online purchasing
or data from defence services need to be transmitted through the internet or any other network should be
encoded to protect the information.
• Secure sites: Websites that you access should be secured websites to avoid data hacking specially when you
do online transactions using your bank details or credit cards. If the site address starts with https:// and a lock
symbol, then it is safe to access.
3.14.1. Who are Online Predators?
Online predators are internet users whose main purpose is to trap innocent people for inappropriate relationships.
They may be of older age and pretend to be of yours by creating fake social networking accounts with fake pictures
to lure you to do illegal activities which can be online or face to face.
3.14.2. What are Internet Scams?
Internet scams are the use of Internet services to take undue advantage of others. Some internet users may take
advantage of innocent people browsing the internet. They pretend to be different by using fake name, age, profile
and do financial frauds by taking out money from their bank accounts or stealing their credit cards information
and using it for online transactions or involving in some kind of unwanted relationships.
Activity 3
Answer the following questions:
1. What is Spam?
2. How many types of virus?
3. What is the need for an anti-virus and firewall?
4. How can we tell if a website is secure or not?
72 Touchpad Data Science-X

