Page 63 - CA_165_V2.0_C9_Flipbook
P. 63
l Avoid using a piece of information about yourself that is publicly known to others as a password.
l Avoid keeping names of loved ones, relatives, friends, etc. as passwords.
l Having a strong password is important to safeguard oneself.
l Examples of strong password: aniKR@87@18, Esd{@37
Negative Impacts of Choosing a Wrong Password
Following are the negative impacts of choosing a wrong password:
l Downloading & stealing of personal files and documents by others.
l Transmitting of messages without our knowledge from our email or social media account to others.
l Modification of personal details by someone with an intention to slander our image.
l Purchase of things in our name.
l Transfer or appropriation of funds from our bank account without our knowledge.
We should keep changing the password frequently. Using long passwords can lower the risk of a security
breach. Most websites rate the effectiveness of password with a password meter that displays the strength
of a password.
PRIVACY
While doing something important and personal, we do not like others to interfere or disturb us because
at that time we want to be left alone and enjoy our own privacy. Privacy is the freedom from any kind of
intrusion or interference. It is the right to have control on our personal life.
Privacy in Information Technology refers to personal control over one’s own files and documents. It
also refers to the right and ability to keep control over the information that one reveals or uploads over
the Internet and to have a control over the selection of viewers or users who can access that information.
Information Technology is rapidly destroying the privacy. The situation now demands that we consider
what information we want to keep as private and how to organise it in the best possible manner.
It is the right of an individual or an e-Group (Social Media) to restrict access or to disclose only selective
information on the Internet. The control is basically on what to reveal or whom to reveal. The information
or materials on Internet can be broadly categorised as based on the level of privacy control on such
materials:
l General content: Content that can be viewed by anyone who browses Internet.
l Restricted content: Secret or confidential content that is meant to be viewed or browsed only by
authorised person/s.
l Partially Restricted content: The selected portion of the content that is meant to be viewed by
authorised person or a group of persons.
CONFIDENTIALITY OF INFORMATION
There are certain information that we want to keep as a secret and restrict its access either to ourself, our
family or within a circle of friends only. Such information becomes confidential for the set of people for
whom it is meant.
Cyber Safety 61

