Page 129 - TrackpadV2.1_Class8
P. 129
DIGITAL FOOTPRINTS
Digital footprints or digital shadow are the traceable activities that we leave behind after surfing
the Internet. All the activities performed by us on the Internet are recorded, including:
All social media activities on Facebook, X,
Instagram, blogs, etc.
Uploaded photos and videos
Browsing history
E-subscription
Personal information
Playing online games
Digital footprints are permanent and can be used by law enforcement agencies to find out the
details about the offenders.
COMMON CYBER SECURITY MEASURES
Cyber security comprises technologies, processes and practices designed to protect systems,
devices, programs and data from cyber-attack or unauthorised access. It is also known as
information technology security.
Tick ( ) if you know this.
▶ The word ‘cyber’ denotes the culture of computers, information technology and virtual reality.
▶ Cyber security is used to protect cyber space from misuse and cyber-attacks.
INDIAN LAWS AND GOVERNMENT INITIATIVES
The various legislations that enforce cyber security in India are as follows:
INFORMATION AND TECHNOLOGY ACT, 2000
This act is also known as the Indian Cyber Act. It provides legal recognition to all e-transactions
and aims to protect online privacy and curb online crimes.
INFORMATION TECHNOLOGY AMENDMENT ACT, 2008
This law aims to protect data privacy and information security. It validates digital signatures and
contracts. According to this act, the owner of a given IP address will be held responsible for the
content accessed or distributed through it.
Cyber Security 127

