Page 52 - PortGPT_V2.1_C7_Flipbook
P. 52
It is important to remember that data once shared over the Internet is rarely deleted completely.
Cyber criminals use this data unethically to trouble their victims.
Let us discuss some of the most commonly used ways to commit cyber crimes.
Cyberbullying
Cyberbullying refers to the use of Internet, e-mail, instant messaging, chat rooms or social networks,
such as Facebook, X (formerly known as Twitter), etc. to harass, demean, embarrass or intimidate
someone else.
Never share personal details such as age,
address, date of birth, etc. with unknown
people on social media.
Never install unwanted software and
If your parents/elders feel the need, they
can also contact the local police station to apps like dating app, online games, etc.
lodge a complaint against the cyber bully. from unknown sources.
Some tips to
Try avoiding friend requests from safeguard from In case, any post hurts or upsets you,
unknown people on social media. Cyberbullying talk about it to your family or friends
instead of posting aggressive replies.
Always be considerate and mindful
of others’ feelings on sensitive Convey our opinions carefully by
topics such as politics or religion. choosing the right words.
We must be honest about our
identity. Never pretend to be
Restrict the access to your someone else.
personal data on social media
platforms. For example, only
your friends must be able to see
any pictures on Facebook.
E-mail Spoofing
When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
not to be trusted.
For example, a user may receive an e-mail from a portal or social media platform where spelling
of service provider or email ID has been slightly changed.
For example, Update the operating system and
mailto:customersupport@tridentportall.com. antivirus timely.
Notice that the spelling of "portall" is
incorrect. These e-mails contain links Use secure
which will direct the user to another web Some tips to websites by
Frequently
page where the user would be asked update your safeguard from looking at the
lock sign or
to enter information by which means passwords. E-mail Spoofing HTTPS on the
the user ends up providing personal address bar.
credentials to cybercriminals. This is also
called as phishing.
Use two-factor authentication to
log in to e-mail accounts.
50 Premium Edition-VII

