Page 129 - TrackpadV2.1_Class8
P. 129

DIGITAL FOOTPRINTS
                 Digital footprints or digital shadow are the traceable activities that we leave behind after surfing

                 the Internet. All the activities performed by us on the Internet are recorded, including:
                    All  social media  activities  on  Facebook, X,
                    Instagram, blogs, etc.

                    Uploaded photos and videos
                    Browsing history

                    E-subscription
                    Personal information

                    Playing online games

                 Digital footprints are permanent and can be used by law enforcement agencies to find out the
                 details about the offenders.



                           COMMON CYBER SECURITY MEASURES

                 Cyber security comprises technologies, processes and practices designed to protect systems,

                 devices,  programs and data  from cyber-attack or unauthorised  access.  It is also known as
                 information technology security.




                      Tick ( ) if you know this.

                      ▶   The word ‘cyber’ denotes the culture of computers, information technology and virtual reality.
                      ▶   Cyber security is used to protect cyber space from misuse and cyber-attacks.






                           INDIAN LAWS AND GOVERNMENT INITIATIVES

                 The various legislations that enforce cyber security in India are as follows:


                 INFORMATION AND TECHNOLOGY ACT, 2000

                 This act is also known as the Indian Cyber Act. It provides legal recognition to all e-transactions
                 and aims to protect online privacy and curb online crimes.


                 INFORMATION TECHNOLOGY AMENDMENT ACT, 2008
                 This law aims to protect data privacy and information security. It validates digital signatures and

                 contracts. According to this act, the owner of a given IP address will be held responsible for the
                 content accessed or distributed through it.





                                                                                                   Cyber Security  127
   124   125   126   127   128   129   130   131   132   133   134