Page 147 - TP_V5.1_C8_fb
P. 147
It is important to remember that data once shared over the Internet is rarely deleted completely.
Cyber criminals use this data unethically to trouble their victims.
Let us discuss some of the most commonly used ways to commit cyber crimes.
Cyberbullying
Cyberbullying refers to the use of Internet, e-mail, instant
messaging, chat rooms or social networks, such as Facebook,
Twitter, etc. to harass, demean, embarrass or intimidate
someone else.
Never share personal details such as age,
address, date of birth, etc. with unknown
people on social media.
Never install unwanted software and
If your parents/elders feel the need, they
can also contact the local police station to apps like dating app, online games, etc.
lodge a complaint against the cyber bully. from unknown sources.
Some tips to
Try avoiding friend requests from safeguard from In case, any post hurts or upsets you,
unknown people on social media. Cyberbullying talk about it to your family or friends
instead of posting aggressive replies.
Always be considerate and mindful
of others’ feelings on sensitive Convey our opinions carefully by
topics such as politics or religion. choosing the right words.
We must be honest about our
identity. Never pretend to be
someone else.
Restrict the access to your
personal data on social media
platforms. For example, only
your friends must be able to see
any pictures on Facebook.
E-mail Spoofing
When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
not to be trusted.
For example, a user may receive an e-mail from a portal or social media platform where spelling
of service provider or email ID has been slightly changed.
For example,
mailto:customersupport@tridentportall.com.
Techipedia (Digital Safety Tips) 145

