Page 136 - Web Applications (803) Class 11
P. 136
Anti-virus
Anti-virus software is designed to keep your computer safe from harmful and
potentially undesirable malware. It is in charge of detecting dangerous programmes
by searching for them and deleting them in order to keep the system safe. The
software works by maintaining an automatically updated database of malware
definitions. It looks for harmful programmes by comparing the files to the malware
definitions it has on hand. If there is a match, they are flagged as possibly hazardous
and, depending on the anti-virus software settings, disabled or uninstalled.
Protective Measures while accessing Internet
Ð ÐNever click on a questionable link on a website or send an email that you aren’t convinced is legitimate.
Ð ÐMake sure your passwords are strong and updated on a regular basis.
Ð ÐPersonal information such as date of birth, home address, personal phone number, account information, passwords,
credit and debit card information, and employment history records should never be shared.
Ð ÐReport phishing incidents to the appropriate authorities or report them online at cybercrime.gov.in. Mark spam
mails if you receive unsolicited emails.
Ð ÐThe security of an Internet communication can be determined by the protocol that is being utilised. The Secure
Hypertext Transfer Protocol (HTTPs) is a secure variant of the Hypertext Transfer Protocol that is used to communicate
between a client and a server over the Internet. As a result, be sure that all communications, especially online
transactions, are secure. The presence of a padlock on the left side of the address bar indicates that the website is
secure. It signifies that the website has an SSL (Secure Socket Layer) digital certificate issued by a trustworthy third
party that ensures and confirms the remote host’s identity.
Ð ÐCheck that the web browser you’re using to access the internet is up to date and safe.
Ð ÐWhen it comes to finding acquaintances on social media sites, be selective. Do not send or accept friendship
requests from strangers.
Ð ÐIf you upload any offensive content on a social networking site, you may face criminal charges.
Ð ÐBefore spreading any kind of rumour, keep in mind that it could be considered a form of cybercrime.
Ð ÐTake a picture as proof if someone is harassing or threatening you, and block the person. Also, notify the site
administrator of the incident.
Ð ÐUse up-to-date antivirus and firewall software, as well as safe browsing and password management strategies.
Ð ÐDelete cookies on a regular basis. A cookie is a little piece of data that a website stores about a visitor. When a client
sends a request, the server saves the client’s information, such as the domain name and registration id, in the form
of a file or a string on the server site. This cookie is sent by the server along with the client’s response. The browser
saves the cookie it receives from the server in a directory called cookie directory on the client side. Hackers may be
able to get unauthorised access to these websites by gaining access to these cookies. As a result, cookies, as well as
the temporary files stored on our system while online browsing, should be erased on a regular basis.
Cyber Law
Cyber laws govern the systematic use of e-resources, such as e-commerce, and serve as a deterrent to criminal
cybercrime. Various cyber laws have also been enacted in order to combat cybercrime and prosecute those who
commit it.
These laws specify the actions that will be taken against those who break the law. An amendment to the Information
Technology Act of 2000, dubbed the Information Technology Amendment Act of 2008, was also submitted to address
cyber security. The statute also establishes cyber-crime offences and sanctions. According to the IT Act, cyber police
are in charge of discovering such offences and taking appropriate action.
134 Touchpad Web Applications-XI

