Page 147 - TP_V5.1_C8_fb
P. 147

It is important to remember that data once shared over the Internet is rarely deleted completely.
                 Cyber criminals use this data unethically to trouble their victims.
                 Let us discuss some of the most commonly used ways to commit cyber crimes.

                 Cyberbullying

                 Cyberbullying refers to the use of Internet, e-mail, instant
                 messaging, chat rooms or social networks, such as Facebook,
                 Twitter, etc. to harass, demean, embarrass or intimidate
                 someone else.








                                                 Never share personal details such as age,
                                                  address, date of birth, etc. with unknown
                                                         people on social media.




                                                                                   Never install unwanted software and
                 If your parents/elders feel the need, they
                 can also contact the local police station to                     apps like dating app, online games, etc.
                 lodge a complaint against the cyber bully.                              from unknown sources.
                                                              Some tips to
                      Try avoiding friend requests from      safeguard from        In case, any post hurts or upsets you,
                      unknown people on social media.        Cyberbullying         talk about it to your family or friends
                                                                                   instead of posting aggressive replies.
                      Always be considerate and mindful
                         of others’ feelings on sensitive                         Convey our opinions carefully by
                       topics such as politics or religion.                           choosing the right words.

                                                                                     We must be honest about our
                                                                                      identity. Never pretend to be
                                                                                            someone else.
                                                        Restrict the access to your
                                                      personal data on social media
                                                       platforms. For example, only
                                                      your friends must be able to see
                                                        any pictures on Facebook.


                 E-mail Spoofing

                 When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
                 not to be trusted.
                 For example, a user may receive an e-mail from a portal or social media platform where spelling
                 of service provider or email ID has been slightly changed.

                 For example,
                 mailto:customersupport@tridentportall.com.






                                                                                      Techipedia (Digital Safety Tips)  145
   142   143   144   145   146   147   148   149   150   151   152