Page 52 - PortGPT_V2.1_C7_Flipbook
P. 52

It is important to remember that data once shared over the Internet is rarely deleted completely.
                  Cyber criminals use this data unethically to trouble their victims.
                  Let us discuss some of the most commonly used ways to commit cyber crimes.


                       Cyberbullying
                  Cyberbullying refers to the use of Internet, e-mail, instant messaging, chat rooms or social networks,
                  such as Facebook, X (formerly known as Twitter), etc. to harass, demean, embarrass or intimidate
                  someone else.

                                                   Never share personal details such as age,
                                                   address, date of birth, etc. with unknown
                                                          people on social media.


                                                                                    Never install unwanted software and
                   If your parents/elders feel the need, they
                  can also contact the local police station to                     apps like dating app, online games, etc.
                  lodge a complaint against the cyber bully.                              from unknown sources.
                                                               Some tips to
                       Try avoiding friend requests from      safeguard from        In case, any post hurts or upsets you,
                       unknown people on social media.        Cyberbullying         talk about it to your family or friends
                                                                                    instead of posting aggressive replies.
                       Always be considerate and mindful
                          of others’ feelings on sensitive                          Convey our opinions carefully by
                        topics such as politics or religion.                           choosing the right words.

                                                                                      We must be honest about our
                                                                                       identity. Never pretend to be
                                                         Restrict the access to your         someone else.
                                                        personal data on social media
                                                        platforms. For example, only
                                                       your friends must be able to see
                                                         any pictures on Facebook.
                       E-mail Spoofing

                  When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
                  not to be trusted.

                  For example, a user may receive an e-mail from a portal or social media platform where spelling
                  of service provider or email ID has been slightly changed.
                  For example,                                             Update the operating system and

                  mailto:customersupport@tridentportall.com.                       antivirus timely.
                  Notice  that  the  spelling  of "portall"  is
                  incorrect.  These  e-mails contain  links                                               Use secure
                  which will direct the user to another web                          Some tips to         websites by
                                                                  Frequently
                  page  where  the user would be asked           update your       safeguard from        looking at the
                                                                                                          lock sign or
                  to  enter  information  by  which means        passwords.        E-mail Spoofing        HTTPS on the
                  the user ends up providing personal                                                     address bar.
                  credentials to cybercriminals. This is also
                  called as phishing.
                                                                            Use two-factor authentication to
                                                                               log in to e-mail accounts.

                  50    Premium Edition-VII
   47   48   49   50   51   52   53   54   55   56   57