Page 91 - AI Ver 3.0 class 10_Flipbook
P. 91
(c) Online Predator: Online predators are individuals who use the internet to exploit, manipulate, or abuse
others, particularly targeting vulnerable populations like children and teenagers. They often build trust
with their victims through flattery, gifts, or attention. They may pose as peers or friends to create a sense
of familiarity and trust.
(d) Internet Scams: Internet scams often involve attractive offers that claim you have won a large sum of money
in a lottery or a prize and that you can claim the prize by depositing a certain amount of money. When you
deposit the money using credit card or online banking, you not only lose the deposit money but your card /
account information may be misused later.
Protecting Your Data
Data protection is safeguarding your data from data damage or data access by unauthorised people. It is always a
good practice to maintain and protect your computers data by following some precautions and managing a few
computer settings.
Some of the important points to protect your data are:
• Use Proper Passwords Combinations for Your Computer Login: At the time to allocate passwords take care to use
the combinations of small letters, upper case, numbers, and special characters like $, %, &, etc. These combinations
are difficult to hack and will be able to save your computer from unauthorised access.
• Install Anti-virus and Firewall: Anti-viruses and Firewall will not allow the unwanted data to enter your computer.
If by mistake you download any malicious code then antivirus or antimalware software will warn you and then
will remove it from your computer. This way you will be able to project your data from getting damaged or stolen.
Firewall can be a hardware— network security device or a software that acts as a barrier to protect your computer
or a network of computers of an organisation from unauthorised access of data.
• Encrypt Data: Data encryption is converting the readable data into unreadable encoded form to save it from
unauthorised access. Sometimes sensitive data like personal credit card transactions you do in online purchasing or
data from defence services need to be transmitted through the internet or any other network should be encoded
to protect the information.
• Secure Sites: Websites that you access should be secured websites to avoid data hacking specially when you do
online transactions using your bank details or credit cards. If the site address starts with https:// and a lock symbol,
then it is safe to access.
Information & Communication Technology Skills-II 89

