Saturday, January 3, 2026

6. Cyber Security and Digital Citizenship

 

6. Cyber Security and Digital Citizenship

 DOWNLOAD PDF LINK




6.1 Concepts of Cybersecurity 

 6.2 Concept of Cybercrime 

 6.3 Prevention methods for cyber crime 

 6.4 Safe web browsing techniques 

 6.5 Concept of Digital Citizen 

 6.6 Concept of Netiquette and online behaviors 

 6.7 Concept of digital footprint and privacy in online 



6.1. Concept of cybersecurity

Cybersecurity is the practice of protecting computer systems, networks, and digital information from theft, damage, unauthorized access, and cyberattacks.

Cyberattacks occur every day and can affect individuals, small businesses, and large organizations around the world. These attacks can cause serious data loss and financial damage. To stay protected, people and organizations use various methods such as network security, application security, information security, and operational security. Therefore, cybersecurity is essential to keep digital information safe from cyber threats.

 

Why is cybersecurity essential for individuals and businesses in Nepal?

Cybersecurity is essential in Nepal because the use of the internet, online banking, and digital services is increasing rapidly. It protects individuals’ personal data and finances from cyber crimes such as hacking and phishing. For businesses, it helps secure confidential data, prevent financial loss, and maintain customer trust.

 

How do your online activities impact your privacy and security?

Online activities affect privacy and security because sharing personal information, using weak passwords, or clicking unknown links can expose data to cyber attacks. Unsafe behavior may lead to hacking, data theft, or identity misuse. Safe practices help protect privacy and security.

 

What are the responsibilities of a digital citizen?

A digital citizen should protect personal and others’ data, follow cyber laws, and use the internet ethically. They should avoid cyber crimes, respect privacy, and communicate responsibly online. Practicing safe online behavior is also an important responsibility.

 

6.2. Concept of cybercrime

 

Cybercrime refers to criminal activities carried out using computers or the internet.

When computers are used for illegal purposes, they can harm people’s safety, privacy, and financial security. Cybercrime includes activities such as identity theft, phishing through fake emails, website attacks, data theft, installing malicious software without permission, and hijacking social media accounts.

In Nepal, cybercrime is regulated under the Electronic Transactions Act (ETA), 2063 B.S., which helps control cybercrime and enforce laws related to digital offenses.

 

6.3 Prevention methods from cybercrime

·       Use a strong password.

·       Multi-factor authentication (MFA)

·       Software updates

·       Authentication

·       Use of Firewall

 

Use a strong password.

 

A password is a set of alphanumeric characters used to verify a user’s identity.

Using strong and unique passwords helps protect digital data from cyber threats and unauthorized access. Passwords should be changed regularly and never shared to prevent misuse of personal information.

 

Passwords and usernames together are known as credentials, which are essential for accessing emails, websites, and financial accounts.

Keeping passwords secure helps prevent unauthorized access and misuse of personal information.

 

 

Tips to Ensure Passwords are Secure and Strong

a. Do not use simple sequences such as 1234 or abcd, as they are easy to guess.

b. Use a combination of uppercase and lowercase letters, numbers, and special symbols.

c. Avoid using dictionary words or common terms such as admin or password.

d. Use a longer password. It should be at least six characters, and longer passwords provide better security.

e. Do not reuse the same password for multiple accounts and avoid sharing passwords with others.

 

Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) is a security method that requires users to provide two or more forms of verification to access an online account or application.

It adds an extra layer of security, so even if a password is stolen, unauthorized users cannot easily access the account.

MFA may require a password along with a mobile phone, fingerprint, face scan, or other verification methods.

 

Types of Multi-Factor Authentication

  1. Something you know
    a. Password
    b. PIN
  2. Something you have
    a. Smartphone
    b. Security badge
  3. Something you are
    a. Biometrics such as fingerprint
    b. Voice recognition
    c. Retina scan

 

Software Updates

Keeping the operating system and applications up to date is very important for cybersecurity.

Regular software updates fix security vulnerabilities and protect systems from cyber attacks.

Enabling automatic updates helps prevent attacks that target outdated software.

 

Authentication

Authentication is the process of identifying a user, usually by using a username and password.

A strong authentication system helps ensure that only authorized users can access a computer system and prevents unauthorized access.

 

Use of Firewall

A firewall is a security tool that monitors and filters network traffic to block unauthorized access to a device or network.

It can be hardware-based, software-based, or built into an operating system such as Windows Firewall.

Using a firewall helps protect systems from unwanted internet traffic, viruses, and cyber attacks.

 

6.4 Safe Web Browsing Techniques

Safe web browsing techniques refer to the practices and methods used to browse the internet securely in order to protect users from cyber threats, malware, data theft, and unauthorized access.

Safe web browsing techniques help reduce cyber risks and protect users from online threats.

 

To prevent such attacks, here are some safe browsing techniques that help minimize cyber threats:

 

Use a Secure Connection

A secure connection is a private and encrypted communication between a user’s device and a server. Encryption prevents unauthorized users from viewing or altering data. A secure connection can be identified by a lock icon or https in the website address bar. Using a trusted Virtual Private Network (VPN) also helps protect user privacy while browsing the internet.

 

Use a Secure Browser

A secure browser helps protect user privacy and security while browsing the internet.

 It provides features such as private browsing, tracking protection, ad-blocking, and password management.

Examples of secure browsers include Mozilla Firefox, Google Chrome, Safari, Microsoft Edge, Opera, and Brave.

 

Use a Secure Search Engine

A secure search engine is a web-based tool that allows users to search for information on the internet while prioritizing privacy and security.

It may also filter harmful or inappropriate websites from search results.

Examples of secure search engines include Google, Bing, and DuckDuckGo.

 

Use Secure Websites

A secure website protects user privacy and data by using security features such as encryption and authentication.

A secure website can be identified by a lock icon or https in the address bar.

Checking the website’s privacy policy and user reviews also helps ensure that proper security measures are in place.

 

6.5 Concept of Digital Citizen

A digital citizen is a person who uses the Internet and digital technologies responsibly, safely, and ethically. A good digital citizen respects others online, protects personal information, avoids cyberbullying, follows laws, and uses technology to learn, communicate, and contribute positively to society.

Example: A student attending online classes, using social media politely, and following cybersecurity rules is a good digital citizen

 

To be a good digital citizen, consider following these guidelines:

  • Think Before You Post anything online to avoid hurting others or sharing harmful content.
  • Use the Internet and social media responsibly and respectfully.
  • Protect personal information such as passwords, addresses, and bank details.
  • Avoid cyberbullying, trolling, or spreading fake news.
  • Follow cyber laws and respect copyrights when using digital content.
  • Use strong passwords and update them regularly for online safety.
  • Report harmful or suspicious online activities to teachers, parents, or authorities.
  • Use digital tools for learning, communication, and positive contribution to society.

 

Digital Citizen

A digital citizen is a person who uses the internet and digital technologies responsibly and ethically. They actively participate in the digital world by creating, sharing, and using digital content in a safe and respectful manner.

 

Guidelines of a Good Digital Citizen

a. Think carefully before posting on social media and consider its impact.
b. Avoid sharing personal information to reduce the risk of identity theft.
c. Use multiple search engines to improve privacy and limit tracking.
d. Change passwords regularly to protect online accounts and data.
e. Report unlawful or inappropriate online activities to the concerned authorities.

 

 

6.6 Concept of Netiquette and Online Behaviors

Netiquette is a combination of the words network and etiquette and refers to the set of rules and guidelines for proper and respectful behavior on the internet.

Online behavior and internet ethics focus on using digital platforms responsibly and ethically in online communities.

Netiquette is important for both personal and professional use of the internet on platforms such as social media, online forums, and messaging apps.

Just like good manners are important in real life, respectful behavior is equally important in the online world. The basic principle of netiquette is to treat others online with respect.

 

Examples of Good Netiquette and Online Behavior

  1. Communicate respectfully with others online.
  2. Avoid using offensive or harmful language.
  3. Respect privacy and do not share personal information without permission.
  4. Avoid spamming or flooding messages.
  5. Give proper credit when sharing others’ work.
  6. Think carefully before posting or commenting online.
  7. Report abusive or inappropriate behavior.
  8. Be open to constructive criticism.
  9. Maintain a positive and responsible online presence.

 

6.7 Concept of Digital Footprint and Privacy Online

A digital footprint is the information record created by an individual’s online activities. These activities include web searches, social media usage, online shopping, emails, phone calls, and app usage.

A digital footprint is also known as a digital shadow or electronic footprint.

All online activities create digital data that can be used to track a person’s behavior and devices, which makes privacy an important concern in the digital world.

 

Types of Digital Footprints

I. Active Digital Footprint

An active digital footprint consists of information that a user knowingly and intentionally shares online. Since the user provides this information willingly, they are aware of the footprint being created.
Examples: social media posts, emails, comments, and phone calls.

 

II. Passive Digital Footprint

A passive digital footprint consists of information that is collected without the user’s direct knowledge. These footprints are harder to control and manage because they are often gathered automatically.
Examples: web searches, online shopping history, location data, website cookies, and fitness tracker data.

 

Online privacy refers to the protection of an individual’s personal information and communications on the internet. It involves safeguarding data from unauthorized access and misuse. Although digital technology offers many benefits, it also increases the risk of privacy breaches due to digital footprints.

 

Advantages of Digital Footprints

 

a. Health Monitoring
Smartwatches and health applications use digital footprints to track and analyze fitness and health data, helping in better health management.

b. Social Connections
Digital footprints help people connect and communicate with others through social networking platforms.

c. Targeted Advertising
Companies use browsing behavior to show relevant advertisements, which can improve customer engagement and sales.

d. Law Enforcement Support
Law enforcement agencies use digital footprints to assist in investigations, prevent crimes, and ensure public safety.

 

Disadvantages of Digital Footprints

 

a. Security Vulnerabilities
Digital footprints can expose users to security risks, leading to privacy breaches and identity theft.

b. Legal and Ethical Concerns
The use of digital footprints raises legal and ethical issues related to privacy rights and data protection.

c. Exploitative Business Practices
Some businesses misuse or sell user data without proper consent, raising concerns about fairness and ethics.

d. Cybercriminal Exploitation
Hackers can use digital footprint data to commit fraud and other cyber crimes.

e. Spying and Online Abuse
Digital footprints can be misused for spying, cyber harassment, and online abuse.

 

Steps to Protect Yourself from Digital Footprint Risks

 

a. Know Security Rules
Understand how websites and online services collect and use your personal information.

b. Update Privacy Settings
Adjust privacy settings on social media and apps to control who can see your data.

c. Secure Devices
Use strong and unique passwords for each account and enable multi-factor authentication.

d. Remove Old Accounts
Delete unused or inactive online accounts to reduce exposure of personal information.

e. Update Software
Keep devices and applications updated to fix security vulnerabilities.

f. Disable Location Tracking
Turn off location services when not required to prevent unnecessary tracking.

 

ii. Explain Cyber Law by relating it with the constitution.

Cyber law refers to the laws that regulate the use of computers, the internet, and digital activities. Like the constitution protects citizens’ rights and responsibilities, cyber law protects users’ digital rights, privacy, and security while controlling cyber crimes.

 

iii. What is a Firewall? Why is it different from antivirus software?

A firewall is a security system that monitors and controls incoming and outgoing network traffic to block unauthorized access. It is different from antivirus software because a firewall prevents unauthorized access, while antivirus software detects and removes viruses and malware from a system.

 

iv. You use digital devices on a daily basis. What do you know about digital society?

A digital society is a community where people use digital devices and the internet for communication, education, business, and social interaction. It relies on technology to share information and provide services efficiently.

 

 

 

a. Define malware and describe its types.

Malware (malicious software) refers to any software intentionally designed to damage computer systems, steal data, or disrupt normal operations without the user’s permission.

 

Types of Malware

  1. Virus
    A virus attaches itself to files or programs and spreads when the infected file is executed, causing damage to data and systems.
  2. Worm
    A worm spreads automatically through networks without user action and consumes system resources.
  3. Trojan Horse
    A trojan disguises itself as a legitimate program but secretly performs harmful actions such as stealing data.
  4. Spyware
    Spyware secretly monitors user activities and collects personal information without consent.
  5. Ransomware
    Ransomware locks files or systems and demands payment to restore access.

 

c. Explain the safe browsing techniques.

Safe browsing techniques are practices used to reduce cyber risks while using the internet.

  1. Use Secure Connections
    Always browse websites with https and a lock icon to ensure encrypted communication.
  2. Use Secure Browsers and Search Engines
    Secure browsers and search engines provide privacy protection and reduce tracking.
  3. Use Strong Passwords and Authentication
    Strong passwords and multi-factor authentication protect online accounts.
  4. Avoid Suspicious Links and Downloads
    Do not click unknown links or download files from untrusted sources.
  5. Keep Software Updated
    Regular updates fix security vulnerabilities and protect against attacks.

 

 


 

35 Higher-Ability MCQs (Section-wise, Tick the Answer)

1. Cybersecurity mainly focuses on protecting:

a. Hardware only        b. Software only         c. Systems, networks, and digital data    d. Internet speed

 

2. Which situation best represents cybersecurity?

a. Playing online games                                                          b. Using social media
c.
Preventing unauthorized access to data                     d. Downloading videos

 

3. Why is cybersecurity important for businesses?

a. For entertainment                           b. To protect customer data and trust
c. To increase advertising                   d. To reduce staff

 

4. Which is NOT a type of cybersecurity?

a. Network security    b. Application security    c. Information security   d. Hardware manufacturing

 

5. Cybersecurity failures mostly result in:

a. Faster internet                     b. Data loss and financial damage
c. More storage                       d. Software upgrades

 

6. Cybercrime is best defined as:

a. Online communication                                                       b. Software error
c.
Illegal activities using computers or internet             d. Internet addiction

 

7. Which is a cybercrime?

a. Software update      b. File backup             c. Identity theft     d. Online learning

 

8. Phishing mainly aims to:

a. Improve security                 b. Steal personal information
c. Block websites                    d. Speed up internet

 

9. Cybercrime in Nepal is controlled by:

a. Criminal Code                                                         b. Civil Code
c.
Electronic Transactions Act, 2063                   d. Copyright Act

 

10. Hijacking social media accounts is an example of:

a. Ethical hacking                   b. Cybercrime
c. Cybersecurity                     d. Authentication

 

11. The strongest password is:

a. ram123        b. password     c. 123456        d. R@9#Lm2

 

12. Multi-Factor Authentication improves security by:

a. Removing passwords                      b. Adding extra verification layers
c. Increasing speed                             d. Blocking websites

 

13. Which is “something you are” in MFA?

a. PIN              b. Smartphone            c. Fingerprint                    d. Password

 

14. Why are software updates important?

a. Add features                        b. Fix security vulnerabilities
c. Delete files                          d. Improve graphics

 

15. A firewall mainly helps to:

a. Remove malware                b. Block unauthorized network access
c. Store passwords                  d. Encrypt emails

 

16. A secure website can be identified by:

a. www            b. .com            c. https and lock icon                    d. Ads

 

17. VPN is mainly used to:

a. Increase download speed                b. Protect privacy and encrypt data
c. Remove viruses                              d. Store files

 

18. Which browser feature improves privacy?

a. Auto-play                b. Private browsing mode
c. Zoom                       d. Screenshot

 

19. Which search engine focuses more on privacy?

a. Google                                b. Bing
c.
DuckDuckGo                 d. Yahoo

 

20. Clicking unknown links may result in:

a. Faster browsing                  b. Malware infection
c. Software updates                d. Backup

 

21. A digital citizen is someone who:

a. Uses internet freely             b. Uses technology responsibly and ethically
c. Avoids technology              d. Breaks cyber laws

 

22. Which shows good digital citizenship?

a. Sharing fake news               b. Respecting others’ privacy
c. Cyberbullying                     d. Using weak passwords

 

23. Which action harms digital society?

a. Reporting abuse                  b. Spreading misinformation
c. Learning online                   d. Using secure passwords

 

24. A good digital citizen should:

a. Ignore cyber laws               b. Follow laws and ethical behavior
c. Share passwords                 d. Troll others

 

25. Digital society mainly depends on:

a. Paper records                      b. Digital devices and internet
c. Manual systems                  d. Postal services

 

26. Netiquette refers to:

a. Hardware rules                   b. Online behavior guidelines
c. Software design                  d. Network speed

 

27. Which is good netiquette?

a. Spamming                           b. Giving credit to others’ work
c. Offensive language             d. Sharing private data

 

28. Why is netiquette important?

a. For entertainment               b. To maintain respectful online communication
c. To increase followers                      d. To hack accounts

 

29. Which violates netiquette?

a. Respectful comments                     b. Cyberbullying
c. Reporting abuse                  d. Constructive feedback

 

30. The basic principle of netiquette is:

a. Be popular                          b. Treat others with respect
c. Post frequently                    d. Share opinions aggressively

 

31. Digital footprint means:

a. Internet speed                      b. Record of online activities
c. Computer virus                   d. Software license

 

32. Posting on social media creates:

a. Passive footprint                 b. Active digital footprint
c. No footprint                         d. Malware

 

33. Location tracking without knowledge is:

a. Active footprint                  b. Passive digital footprint
c. Cyber law                            d. Authentication

 

34. Which is an advantage of digital footprints?

a. Identity theft                       b. Health monitoring
c. Cyber fraud                         d. Privacy loss

 

35. Best way to reduce digital footprint risk is to:

a. Share more data                  b. Update privacy settings and use strong passwords
c. Ignore security                    d. Disable antivirus

 

1.     Define cybersecurity and explain its importance.

2.     Why is cybersecurity essential for individuals and businesses in Nepal?

3.     Define cybercrime and Explain the major types of cybercrime with examples.

4.     Explain various methods to prevent cybercrime.

5.     What is a strong password? Explain the tips to create secure passwords.

6.     Explain multi-factor authentication (MFA) and its importance.

7.     Why are software updates important for preventing cybercrime?

8.     Explain the role of authentication and firewall in cybersecurity.

9.     What are safe web browsing techniques? Explain with examples.

10.  What is a secure website? How can you identify it?

11.  What risks are involved in unsafe web browsing?

12.  Who is a digital citizen? Explain the qualities of a good digital citizen.

13.  Explain the responsibilities of a digital citizen.

14.  What is digital society? Explain its features.

15.  How can students become responsible digital citizens?

16.  Why is digital citizenship important in today’s society?

17.  Define netiquette and explain its importance.

18.  Explain the guidelines for good netiquette and online behavior.

19.  Why is respectful communication important in online platforms?

20.  What are the consequences of poor netiquette?

21.  How does netiquette help create a positive digital environment?

22.  Define digital footprint and explain its types.

23.  Explain the concept of online privacy.

24.  Write the advantages and disadvantages of digital footprints.

25.  Explain the steps to protect oneself from digital footprint risks.

 

 

No comments:

Post a Comment