Page 132 - TrackpadV5.1_class7
P. 132

DIGITAL FOOTPRINTS
                  Digital footprints or digital shadow are the traceable activities that we leave behind after surfing

                  the Internet. All the activities performed by us on the Internet are recorded, including:
                      All social media activities on Facebook, Twitter,
                     Instagram, blogs, etc.

                      Uploaded photos and videos
                      Browsing history

                      E-subscription
                      Personal information

                      Played online games

                  Digital footprints are permanent and can be used by law enforcement agencies to find out the
                  details about the offenders.



                            COMMON CYBER SECURITY MEASURES

                  Cyber security comprises technologies, processes and practices designed to protect systems,

                  devices,  programs and data  from cyber-attack or unauthorised  access.  It is also known as
                  information technology security.




                       Tick ( ) if you know this.

                       ▶   The word ‘cyber’ denotes the culture of computers, information technology and virtual reality.
                       ▶   Cyber security is used to protect cyber space from misuse and cyber-attacks.






                            INDIAN LAWS AND GOVERNMENT INITIATIVES

                  The various legislations that enforce cyber security in India are as follows:


                  INFORMATION AND TECHNOLOGY ACT, 2000

                  This act is also known as the Indian Cyber Act. It provides legal recognition to all e-transactions
                  and aims to protect online privacy and curb online crimes.


                  INFORMATION TECHNOLOGY AMENDMENT ACT, 2008
                  This law aims to protect data privacy and information security. It validates digital signatures and

                  contracts. According to this act, the owner of a given IP address will be held responsible for the
                  content accessed or distributed through it.





                  130   Pro (V5.1)-VII
   127   128   129   130   131   132   133   134   135   136   137