Page 47 - Trackpad_ipro 4.1_Class7
P. 47

Ensure a website is secure before entering sensitive information by checking for the lock icon
                   (HTTPS) in the browser's address bar.

                    Download apps only from trusted sources, and review their permissions and authentication
                   requirements to ensure safety.
                 Spamming

                 Spam refers to unwanted emails, often from companies trying to advertise their products. These
                 emails, also known as bulk emails, can clutter your inbox and may contain malicious content,
                 such as viruses or worms used in cyberattacks.
                 Measures to Avoid Spam

                 To avoid spam, you can take the following measures:

                    Preview your messages before opening them.
                    Do not click on links in spam emails, as this can lead to more spam or security risks.
                    Do not reply to a spam e-mail.
                    Refrain from forwarding emails from unknown sources to others.

                 Clickipedia



                   In Microsoft Edge,  InPrivate  browsing  allows you to surf the Internet  without  saving
                   information about the sites and pages you visit. This can help maintain your privacy by not
                   storing browsing history or cookies.


                 Individual Right to Privacy

                 We all know that technology has become an important part everywhere these days. That’s why
                 the definition of "privacy" has also changed. The Right to Privacy may be defined as the right
                 of individuals or groups of people to know and decide when, how, and to what extent their

                 information may be shared with others. Privacy issues arise when information that is collected for
                 one specific purpose is shared with other companies without informing the authorised owner.
                 Ways to Protect Privacy

                    Do not fill in personal details on every website you visit.
                    Use private browsing mode to prevent your browser from storing your browsing history and
                   personal data.

                    Implement two-factor authentication (2FA) for an extra layer of security. This requires not only
                   a username and password but also a second piece of information, such as a PIN or a code sent
                   to your phone. Most email service providers offer this feature.
                    When shopping online, opt for cash on delivery instead of card payments whenever possible.

                   Do not share your credit card PIN or other sensitive information to avoid misuse.
                 Software Piracy

                 Software piracy refers to the illegal use, distribution, or duplication of software. It occurs when
                 software is used or shared without proper authorisation or payment.


                                                                        Ethics and Safety Measures in Computing  45
   42   43   44   45   46   47   48   49   50   51   52