6. Cyber Security
and Digital Citizenship
6.1 Concepts of Cybersecurity
6.2 Concept of Cybercrime
6.3 Prevention methods for cyber crime
6.4 Safe web browsing techniques
6.5 Concept of Digital Citizen
6.6 Concept of Netiquette and online behaviors
6.7 Concept of digital footprint and privacy in online
6.1. Concept of
cybersecurity
Cybersecurity is the practice of protecting
computer systems, networks, and digital information from theft, damage,
unauthorized access, and cyberattacks.
Cyberattacks occur
every day and can affect individuals, small businesses, and large organizations
around the world. These attacks can cause serious data loss and financial
damage. To stay protected, people and organizations use various methods such as
network security, application security, information security, and operational
security. Therefore, cybersecurity is essential to keep digital information
safe from cyber threats.
Why is
cybersecurity essential for individuals and businesses in Nepal?
Cybersecurity is
essential in Nepal because the use of the internet, online banking, and digital
services is increasing rapidly. It protects individuals’ personal data and
finances from cyber crimes such as hacking and phishing. For businesses, it
helps secure confidential data, prevent financial loss, and maintain customer
trust.
How do your online
activities impact your privacy and security?
Online activities
affect privacy and security because sharing personal information, using weak
passwords, or clicking unknown links can expose data to cyber attacks. Unsafe
behavior may lead to hacking, data theft, or identity misuse. Safe practices
help protect privacy and security.
What are the
responsibilities of a digital citizen?
A digital citizen
should protect personal and others’ data, follow cyber laws, and use the
internet ethically. They should avoid cyber crimes, respect privacy, and
communicate responsibly online. Practicing safe online behavior is also an
important responsibility.
6.2. Concept of
cybercrime
Cybercrime refers to criminal activities
carried out using computers or the internet.
When computers are
used for illegal purposes, they can harm people’s safety, privacy, and
financial security. Cybercrime includes activities such as identity theft,
phishing through fake emails, website attacks, data theft, installing malicious
software without permission, and hijacking social media accounts.
In Nepal, cybercrime
is regulated under the Electronic Transactions Act (ETA), 2063 B.S.,
which helps control cybercrime and enforce laws related to digital offenses.
6.3 Prevention
methods from cybercrime
·
Use
a strong password.
·
Multi-factor
authentication (MFA)
·
Software
updates
·
Authentication
·
Use
of Firewall
Use a strong password.
A password is a set
of alphanumeric characters used to verify a user’s identity.
Using strong and
unique passwords helps protect digital data from cyber threats and unauthorized
access. Passwords should be changed regularly and never shared to prevent
misuse of personal information.
Passwords and
usernames together are known as credentials, which are essential for
accessing emails, websites, and financial accounts.
Keeping passwords
secure helps prevent unauthorized access and misuse of personal information.
Tips to Ensure Passwords are Secure
and Strong
a. Do not use simple sequences such
as 1234 or abcd, as they are easy to guess.
b. Use a combination of uppercase
and lowercase letters, numbers, and special symbols.
c. Avoid using dictionary words or
common terms such as admin or password.
d. Use a longer password. It
should be at least six characters, and longer passwords provide better
security.
e. Do not reuse the same password
for multiple accounts and avoid sharing passwords with others.
Multi-Factor
Authentication (MFA)
Multi-factor
authentication (MFA) is a security method that requires users to provide two
or more forms of verification to access an online account or application.
It adds an extra
layer of security, so even if a password is stolen, unauthorized users cannot
easily access the account.
MFA may require a
password along with a mobile phone, fingerprint, face scan, or other
verification methods.
Types of
Multi-Factor Authentication
- Something
you know
a. Password
b. PIN - Something
you have
a. Smartphone
b. Security badge - Something
you are
a. Biometrics such as fingerprint
b. Voice recognition
c. Retina scan
Software Updates
Keeping the operating
system and applications up to date is very important for cybersecurity.
Regular software
updates fix security vulnerabilities and protect systems from cyber attacks.
Enabling automatic
updates helps prevent attacks that target outdated software.
Authentication
Authentication is the
process of identifying a user, usually by using a username and password.
A strong
authentication system helps ensure that only authorized users can access a
computer system and prevents unauthorized access.
Use of Firewall
A firewall is a
security tool that monitors and filters network traffic to block unauthorized
access to a device or network.
It can be
hardware-based, software-based, or built into an operating system such as
Windows Firewall.
Using a firewall
helps protect systems from unwanted internet traffic, viruses, and cyber
attacks.
6.4 Safe Web
Browsing Techniques
Safe web browsing
techniques refer
to the practices and methods used to browse the internet securely in order to
protect users from cyber threats, malware, data theft, and unauthorized access.
Safe web browsing
techniques help reduce cyber risks and protect users from online threats.
To prevent such
attacks, here are some safe browsing techniques that help minimize cyber
threats:
Use a Secure
Connection
A secure connection
is a private and encrypted communication between a user’s device and a server.
Encryption prevents unauthorized users from viewing or altering data. A secure
connection can be identified by a lock icon or https in the
website address bar. Using a trusted Virtual Private Network (VPN) also
helps protect user privacy while browsing the internet.
Use a Secure
Browser
A secure browser
helps protect user privacy and security while browsing the internet.
It provides features such as private browsing,
tracking protection, ad-blocking, and password management.
Examples of secure
browsers include Mozilla Firefox, Google Chrome, Safari, Microsoft Edge, Opera,
and Brave.
Use a Secure
Search Engine
A secure search
engine is a web-based tool that allows users to search for information on the
internet while prioritizing privacy and security.
It may also filter
harmful or inappropriate websites from search results.
Examples of secure
search engines include Google, Bing, and DuckDuckGo.
Use Secure
Websites
A secure website
protects user privacy and data by using security features such as encryption
and authentication.
A secure website can
be identified by a lock icon or https in the address bar.
Checking the
website’s privacy policy and user reviews also helps ensure that proper
security measures are in place.
6.5 Concept of
Digital Citizen
A digital citizen is
a person who uses the Internet and digital technologies responsibly, safely,
and ethically. A good digital citizen respects others online, protects personal
information, avoids cyberbullying, follows laws, and uses technology to learn,
communicate, and contribute positively to society.
Example: A student
attending online classes, using social media politely, and following
cybersecurity rules is a good digital citizen
To be a good
digital citizen, consider following these guidelines:
- Think Before You Post anything online to avoid
hurting others or sharing harmful content.
- Use the Internet and social
media responsibly and respectfully.
- Protect personal information such as passwords, addresses,
and bank details.
- Avoid cyberbullying,
trolling, or spreading fake news.
- Follow cyber laws and respect copyrights when
using digital content.
- Use strong passwords and update them regularly for
online safety.
- Report harmful or suspicious
online activities to teachers, parents, or authorities.
- Use digital tools for learning,
communication, and positive contribution to society.
Digital Citizen
A digital citizen is a person who uses the internet and digital
technologies responsibly and ethically. They actively participate in the
digital world by creating, sharing, and using digital content in a safe and
respectful manner.
Guidelines of a Good Digital Citizen
a. Think carefully before posting on social media and consider its
impact.
b. Avoid sharing personal information to reduce the risk of identity theft.
c. Use multiple search engines to improve privacy and limit tracking.
d. Change passwords regularly to protect online accounts and data.
e. Report unlawful or inappropriate online activities to the concerned
authorities.
6.6 Concept of
Netiquette and Online Behaviors
Netiquette is a combination of the words network
and etiquette and refers to the set of rules and guidelines for proper
and respectful behavior on the internet.
Online behavior and
internet ethics focus on using digital platforms responsibly and ethically in
online communities.
Netiquette is
important for both personal and professional use of the internet on platforms
such as social media, online forums, and messaging apps.
Just like good
manners are important in real life, respectful behavior is equally important in
the online world. The basic principle of netiquette is to treat others online
with respect.
Examples of Good
Netiquette and Online Behavior
- Communicate respectfully with
others online.
- Avoid using offensive or
harmful language.
- Respect privacy and do not
share personal information without permission.
- Avoid spamming or flooding
messages.
- Give proper credit when
sharing others’ work.
- Think carefully before posting
or commenting online.
- Report abusive or
inappropriate behavior.
- Be open to constructive
criticism.
- Maintain a positive and
responsible online presence.
6.7 Concept of
Digital Footprint and Privacy Online
A digital
footprint is the information record created by an individual’s online
activities. These activities include web searches, social media usage, online
shopping, emails, phone calls, and app usage.
A digital footprint
is also known as a digital shadow or electronic footprint.
All online activities
create digital data that can be used to track a person’s behavior and devices,
which makes privacy an important concern in the digital world.
Types of Digital
Footprints
I. Active Digital
Footprint
An active digital
footprint consists of information that a user knowingly and intentionally
shares online. Since the user provides this information willingly, they are
aware of the footprint being created.
Examples: social media posts, emails, comments, and phone calls.
II. Passive
Digital Footprint
A passive digital
footprint consists of information that is collected without the user’s
direct knowledge. These footprints are harder to control and manage because
they are often gathered automatically.
Examples: web searches, online shopping history, location data, website
cookies, and fitness tracker data.
Online privacy refers to the protection of an
individual’s personal information and communications on the internet. It
involves safeguarding data from unauthorized access and misuse. Although
digital technology offers many benefits, it also increases the risk of privacy
breaches due to digital footprints.
Advantages of
Digital Footprints
a. Health Monitoring
Smartwatches and health applications use digital footprints to track and
analyze fitness and health data, helping in better health management.
b. Social Connections
Digital footprints help people connect and communicate with others through
social networking platforms.
c. Targeted Advertising
Companies use browsing behavior to show relevant advertisements, which can
improve customer engagement and sales.
d. Law Enforcement Support
Law enforcement agencies use digital footprints to assist in investigations,
prevent crimes, and ensure public safety.
Disadvantages of Digital Footprints
a. Security Vulnerabilities
Digital footprints can expose users to security risks, leading to privacy
breaches and identity theft.
b. Legal and Ethical Concerns
The use of digital footprints raises legal and ethical issues related to
privacy rights and data protection.
c. Exploitative Business
Practices
Some businesses misuse or sell user data without proper consent, raising
concerns about fairness and ethics.
d. Cybercriminal Exploitation
Hackers can use digital footprint data to commit fraud and other cyber crimes.
e. Spying and Online Abuse
Digital footprints can be misused for spying, cyber harassment, and online
abuse.
Steps to Protect Yourself from
Digital Footprint Risks
a. Know Security Rules
Understand how websites and online services collect and use your personal
information.
b. Update Privacy Settings
Adjust privacy settings on social media and apps to control who can see your
data.
c. Secure Devices
Use strong and unique passwords for each account and enable multi-factor
authentication.
d. Remove Old Accounts
Delete unused or inactive online accounts to reduce exposure of personal
information.
e. Update Software
Keep devices and applications updated to fix security vulnerabilities.
f. Disable Location Tracking
Turn off location services when not required to prevent unnecessary tracking.
ii. Explain Cyber Law by relating
it with the constitution.
Cyber law refers to the laws that
regulate the use of computers, the internet, and digital activities. Like the
constitution protects citizens’ rights and responsibilities, cyber law protects
users’ digital rights, privacy, and security while controlling cyber crimes.
iii. What is a Firewall? Why is it
different from antivirus software?
A firewall is a security system
that monitors and controls incoming and outgoing network traffic to block
unauthorized access. It is different from antivirus software because a firewall
prevents unauthorized access, while antivirus software detects and removes
viruses and malware from a system.
iv. You use digital devices on a
daily basis. What do you know about digital society?
A digital society is a community
where people use digital devices and the internet for communication, education,
business, and social interaction. It relies on technology to share information
and provide services efficiently.
a. Define malware and describe its
types.
Malware (malicious software) refers to any
software intentionally designed to damage computer systems, steal data, or
disrupt normal operations without the user’s permission.
Types of Malware
- Virus
A virus attaches itself to files or programs and spreads when the infected file is executed, causing damage to data and systems. - Worm
A worm spreads automatically through networks without user action and consumes system resources. - Trojan
Horse
A trojan disguises itself as a legitimate program but secretly performs harmful actions such as stealing data. - Spyware
Spyware secretly monitors user activities and collects personal information without consent. - Ransomware
Ransomware locks files or systems and demands payment to restore access.
c. Explain the safe browsing
techniques.
Safe browsing techniques are
practices used to reduce cyber risks while using the internet.
- Use
Secure Connections
Always browse websites with https and a lock icon to ensure encrypted communication. - Use
Secure Browsers and Search Engines
Secure browsers and search engines provide privacy protection and reduce tracking. - Use
Strong Passwords and Authentication
Strong passwords and multi-factor authentication protect online accounts. - Avoid
Suspicious Links and Downloads
Do not click unknown links or download files from untrusted sources. - Keep
Software Updated
Regular updates fix security vulnerabilities and protect against attacks.
35 Higher-Ability MCQs
(Section-wise, Tick the Answer)
1. Cybersecurity mainly focuses on
protecting:
a. Hardware only b. Software only c. ✓ Systems, networks, and digital data d.
Internet speed
2. Which situation best represents
cybersecurity?
a. Playing online games b. Using social media
c. ✓
Preventing unauthorized access to data d. Downloading videos
3. Why is cybersecurity important
for businesses?
a. For entertainment b. ✓ To protect customer data and trust
c. To increase advertising d.
To reduce staff
4. Which is NOT a type of
cybersecurity?
a. Network security b. Application security c. Information security d. ✓ Hardware manufacturing
5. Cybersecurity failures mostly
result in:
a. Faster internet b. ✓ Data loss and financial damage
c. More storage d.
Software upgrades
6. Cybercrime is best defined as:
a. Online communication b.
Software error
c. ✓
Illegal activities using computers or internet d. Internet addiction
7. Which is a cybercrime?
a. Software update b. File backup c. ✓ Identity theft d. Online learning
8. Phishing mainly aims to:
a. Improve security b. ✓ Steal personal information
c. Block websites d.
Speed up internet
9. Cybercrime in Nepal is
controlled by:
a. Criminal Code b.
Civil Code
c. ✓
Electronic Transactions Act, 2063 d. Copyright Act
10. Hijacking social media accounts
is an example of:
a. Ethical hacking b. ✓ Cybercrime
c. Cybersecurity d.
Authentication
11. The strongest password is:
a. ram123 b. password c.
123456 d. ✓ R@9#Lm2
12. Multi-Factor Authentication
improves security by:
a. Removing passwords b. ✓ Adding extra verification layers
c. Increasing speed d.
Blocking websites
13. Which is “something you are” in
MFA?
a. PIN b. Smartphone c.
✓
Fingerprint d. Password
14. Why are software updates
important?
a. Add features b. ✓ Fix security vulnerabilities
c. Delete files d.
Improve graphics
15. A firewall mainly helps to:
a. Remove malware b. ✓ Block unauthorized network access
c. Store passwords d.
Encrypt emails
16. A secure website can be
identified by:
a. www b. .com c.
✓
https and lock icon d. Ads
17. VPN is mainly used to:
a. Increase download speed b. ✓ Protect privacy and encrypt data
c. Remove viruses d.
Store files
18. Which browser feature improves
privacy?
a. Auto-play b. ✓ Private browsing mode
c. Zoom d.
Screenshot
19. Which search engine focuses
more on privacy?
a. Google b. Bing
c. ✓
DuckDuckGo d. Yahoo
20. Clicking unknown links may
result in:
a. Faster browsing b. ✓ Malware infection
c. Software updates d.
Backup
21. A digital citizen is someone
who:
a. Uses internet freely b. ✓ Uses technology responsibly and
ethically
c. Avoids technology d.
Breaks cyber laws
22. Which shows good digital
citizenship?
a. Sharing fake news b. ✓ Respecting others’ privacy
c. Cyberbullying d.
Using weak passwords
23. Which action harms digital
society?
a. Reporting abuse b. ✓ Spreading misinformation
c. Learning online d.
Using secure passwords
24. A good digital citizen should:
a. Ignore cyber laws b. ✓ Follow laws and ethical behavior
c. Share passwords d.
Troll others
25. Digital society mainly depends
on:
a. Paper records b. ✓ Digital devices and internet
c. Manual systems d.
Postal services
26. Netiquette refers to:
a. Hardware rules b. ✓ Online behavior guidelines
c. Software design d.
Network speed
27. Which is good netiquette?
a. Spamming b. ✓ Giving credit to others’ work
c. Offensive language d.
Sharing private data
28. Why is netiquette important?
a. For entertainment b. ✓ To maintain respectful online
communication
c. To increase followers d.
To hack accounts
29. Which violates netiquette?
a. Respectful comments b. ✓ Cyberbullying
c. Reporting abuse d.
Constructive feedback
30. The basic principle of
netiquette is:
a. Be popular b. ✓ Treat others with respect
c. Post frequently d.
Share opinions aggressively
31. Digital footprint means:
a. Internet speed b. ✓ Record of online activities
c. Computer virus d.
Software license
32. Posting on social media
creates:
a. Passive footprint b. ✓ Active digital footprint
c. No footprint d. Malware
33. Location tracking without
knowledge is:
a. Active footprint b. ✓ Passive digital footprint
c. Cyber law d. Authentication
34. Which is an advantage of
digital footprints?
a. Identity theft b. ✓ Health monitoring
c. Cyber fraud d. Privacy loss
35. Best way to reduce digital
footprint risk is to:
a. Share more data b. ✓ Update privacy settings and use
strong passwords
c. Ignore security d.
Disable antivirus
1.
Define
cybersecurity and explain its importance.
2.
Why
is cybersecurity essential for individuals and businesses in Nepal?
3.
Define
cybercrime and Explain the major types of cybercrime with examples.
4.
Explain
various methods to prevent cybercrime.
5.
What
is a strong password? Explain the tips to create secure passwords.
6.
Explain
multi-factor authentication (MFA) and its importance.
7.
Why
are software updates important for preventing cybercrime?
8.
Explain
the role of authentication and firewall in cybersecurity.
9.
What
are safe web browsing techniques? Explain with examples.
10. What is a secure website? How can
you identify it?
11. What risks are involved in unsafe
web browsing?
12. Who is a digital citizen? Explain
the qualities of a good digital citizen.
13. Explain the responsibilities of a
digital citizen.
14. What is digital society? Explain
its features.
15. How can students become responsible
digital citizens?
16. Why is digital citizenship
important in today’s society?
17. Define netiquette and explain its
importance.
18. Explain the guidelines for good
netiquette and online behavior.
19. Why is respectful communication
important in online platforms?
20. What are the consequences of poor
netiquette?
21. How does netiquette help create a
positive digital environment?
22. Define digital footprint and
explain its types.
23. Explain the concept of online
privacy.
24. Write the advantages and disadvantages
of digital footprints.
25. Explain the steps to protect
oneself from digital footprint risks.

No comments:
Post a Comment