Page 136 - Web Applications (803) Class 11
P. 136

Anti-virus
              Anti-virus  software  is  designed  to  keep  your  computer  safe  from  harmful  and
              potentially undesirable malware. It is in charge of detecting dangerous programmes
              by  searching  for  them  and  deleting  them  in  order  to  keep  the  system  safe.  The
              software  works  by  maintaining  an  automatically  updated  database  of  malware
              definitions. It looks for harmful programmes by comparing the files to the malware
              definitions it has on hand. If there is a match, they are flagged as possibly hazardous
              and, depending on the anti-virus software settings, disabled or uninstalled.
              Protective Measures while accessing Internet

              Ð ÐNever click on a questionable link on a website or send an email that you aren’t convinced is legitimate.
              Ð ÐMake sure your passwords are strong and updated on a regular basis.
              Ð ÐPersonal information such as date of birth, home address, personal phone number, account information, passwords,
                 credit and debit card information, and employment history records should never be shared.

              Ð ÐReport phishing incidents to the appropriate authorities or report them online at cybercrime.gov.in. Mark spam
                 mails if you receive unsolicited emails.

              Ð ÐThe security of an Internet communication can be determined by the protocol that is being utilised. The Secure
                 Hypertext Transfer Protocol (HTTPs) is a secure variant of the Hypertext Transfer Protocol that is used to communicate
                 between a client and a server over the Internet. As a result, be sure that all communications, especially online
                 transactions, are secure. The presence of a padlock on the left side of the address bar indicates that the website is
                 secure. It signifies that the website has an SSL (Secure Socket Layer) digital certificate issued by a trustworthy third
                 party that ensures and confirms the remote host’s identity.

              Ð ÐCheck that the web browser you’re using to access the internet is up to date and safe.
              Ð ÐWhen it comes to finding acquaintances on social media sites, be selective. Do not send or accept friendship
                 requests from strangers.

              Ð ÐIf you upload any offensive content on a social networking site, you may face criminal charges.
              Ð ÐBefore spreading any kind of rumour, keep in mind that it could be considered a form of cybercrime.
              Ð ÐTake a picture as proof if someone is harassing or threatening you, and block the person. Also, notify the site
                 administrator of the incident.

              Ð ÐUse up-to-date antivirus and firewall software, as well as safe browsing and password management strategies.
              Ð ÐDelete cookies on a regular basis. A cookie is a little piece of data that a website stores about a visitor. When a client
                 sends a request, the server saves the client’s information, such as the domain name and registration id, in the form
                 of a file or a string on the server site. This cookie is sent by the server along with the client’s response. The browser
                 saves the cookie it receives from the server in a directory called cookie directory on the client side. Hackers may be
                 able to get unauthorised access to these websites by gaining access to these cookies. As a result, cookies, as well as
                 the temporary files stored on our system while online browsing, should be erased on a regular basis.

              Cyber Law
              Cyber  laws  govern  the  systematic  use  of  e-resources,  such  as  e-commerce,  and  serve  as  a  deterrent  to  criminal
              cybercrime. Various cyber laws have also been enacted in order to combat cybercrime and prosecute those who
              commit it.
              These laws specify the actions that will be taken against those who break the law. An amendment to the Information
              Technology Act of 2000, dubbed the Information Technology Amendment Act of 2008, was also submitted to address
              cyber security. The statute also establishes cyber-crime offences and sanctions. According to the IT Act, cyber police
              are in charge of discovering such offences and taking appropriate action.

                134     Touchpad Web Applications-XI
   131   132   133   134   135   136   137   138   139   140   141