Page 91 - AI Ver 3.0 class 10_Flipbook
P. 91

(c)   Online Predator: Online predators are individuals who use the internet to exploit, manipulate, or abuse
                    others, particularly targeting vulnerable populations like children and teenagers. They often build trust
                    with their victims through flattery, gifts, or attention. They may pose as peers or friends to create a sense
                    of familiarity and trust.
                 (d)   Internet Scams: Internet scams often involve attractive offers that claim you have won a large sum of money
                    in a lottery or a prize and that you can claim the prize by depositing a certain amount of money. When you
                    deposit the money using credit card or online banking, you not only lose the deposit money but your card /
                    account information may be misused later.

                 Protecting Your Data


                 Data protection is safeguarding your data from data damage or data access by unauthorised people. It is always a
                 good practice to maintain and protect your computers data by following some precautions and managing a few
                 computer settings.


























                 Some of the important points to protect your data are:
                    • Use Proper Passwords Combinations for Your Computer Login:  At the time to allocate passwords take care to use
                   the combinations of small letters, upper case, numbers, and special characters like $, %, &, etc. These combinations
                   are difficult to hack and will be able to save your computer from unauthorised access.

                    • Install Anti-virus and Firewall: Anti-viruses and Firewall will not allow the unwanted data to enter your computer.
                   If by mistake you download any malicious code then antivirus or antimalware software will warn you and then
                   will remove it from your computer. This way you will be able to project your data from getting damaged or stolen.
                   Firewall can be a hardware— network security device or a software that acts as a barrier to protect your computer
                   or a network of computers of an organisation from unauthorised access of data.

                    • Encrypt Data:  Data  encryption  is  converting  the  readable  data  into  unreadable  encoded  form  to  save  it  from
                   unauthorised access. Sometimes sensitive data like personal credit card transactions you do in online purchasing or
                   data from defence services need to be transmitted through the internet or any other network should be encoded
                   to protect the information.

                    • Secure Sites: Websites that you access should be secured websites to avoid data hacking specially when you do
                   online transactions using your bank details or credit cards. If the site address starts with https:// and a lock symbol,
                   then it is safe to access.


                                                               Information & Communication Technology Skills-II  89
   86   87   88   89   90   91   92   93   94   95   96