Summary

Cybersecurity protects our computers, networks, and data from cyber threats and crimes. This chapter explores various malware types including viruses, worms, Trojan horses, and spyware, each with distinct behaviors. You’ll learn about cybercrimes like phishing, pharming, cyber bullying, and cyber stalking. Essential protective measures include firewalls, strong passwords, antivirus software, and following netiquettes. Global cyber laws including India’s IT Act 2000, GDPR, CCPA, and Australia’s Privacy Act provide legal frameworks. Prevention through awareness and safe online practices remains your best defense.


If you receive an email saying you’ve won a brand new smartphone and all you need to do to claim it is click a link and enter your personal details, what would you do? Click on the link, right? But before you do that, consider this: that “prize” might actually be a trap set by cybercriminals to steal your information.

Welcome to the world where we need to be as careful online as we are in the real world. Just as you wouldn’t share your house keys with strangers, you need to protect your digital information online. And that’s what cybersecurity is all about.

In this lesson, we’ll explore how to protect ourselves from cyber threats, understand different types of cybercrimes, and learn the measures we can take to stay safe online. Because in today’s digital age, knowing how to protect yourself isn’t optional – it’s essential.

Let’s dive in.

Understanding Cyber Security

Cyber security refers to the measures and processes which we must follow to protect our computers, networks, software and data from any kind of internet or cyber-related crimes or attacks.

Think of cybersecurity like the locks on your doors and windows at home. Just as those locks protect your physical belongings, cybersecurity protects your digital belongings – your photos, documents, passwords, and personal information.

With more and more of our lives happening online, from attending classes to chatting with friends to online shopping, the need for cybersecurity has increased many folds. The internet brings amazing facilities, but it also brings challenges. Information is vulnerable to errors and cybercrime activities.

Quick Check

In your own words, explain why cybersecurity is necessary for individuals, companies, and governments. Give one example for each category.

What Are Cybercrimes?

Cybercrimes are illegal activities that are done in cyberspace. The resources and tools of Information technology are often misused to misguide, tamper or steal information.

Here’s what makes cybercrimes particularly tricky: it’s very difficult to find the criminal instantly. The miscreant may be present at a far-off location and may be keeping a fake identity. That’s why understanding different types of cybercrimes becomes important.

The basic motive behind any cyberattack is to gain access to data related to any person or organization, and then use such information to harass or harm the entity.

Types of Cyber Crime

Cyber Bullying

Bullying means harassing, hurting or frightening someone by teasing, using absurd language and similar acts. Cyber bullying is a negative act of sending absurd, nasty, embarrassing messages, images or videos and posting them on social media or over online platforms to harass a person mentally, emotionally and psychologically.

It also includes sharing someone’s personal information with unauthorized people. This may cause embarrassment, humiliation and can even harm privacy of the victim.

Important to note: Cyber bullying is a serious offense under the Indian IT Act 2000, with imprisonment for 3 years and/or a fine up to Rs. 5 lakh.

Cyber Trolling vs Cyber Bullying: What’s the Difference?

Students often confuse cyber trolling with cyber bullying. Here’s how they differ:

Cyber Trolling is when an entity intentionally tries to create conflict by sending provocative or offensive messages. Cyber trolling mainly happens on social media platforms where the person with malicious intent deliberately uploads indecent or offensive comments and tries to upset or harass others in the online conversation.

The troll may interrupt an ongoing conversation with inflammatory and derogatory comments, due to which other people in the conversation may feel awkward.

Cyber Bullying, on the other hand, is more targeted and persistent harassment of a specific person. It’s meant to harm that individual emotionally and psychologically.

Think of it this way: A troll might post offensive comments on a public post to provoke many people. A cyberbully specifically targets one person repeatedly with hurtful messages.

Quick Check

What is the main difference between cyber trolling and cyber bullying? If you see someone posting mean comments about your classmate repeatedly on Instagram, what would you call it and why?

Cyber Stalking

Cyber stalking is a kind of cyberbullying where one uses internet to harass someone’s entity by way of threats, libels, identity theft and similar acts. Stalkers use text messages, e-mails, social media posts and other mediums for stalking.

Often, the identities of the victims are posted on social media which further add to the misery of the victim as the possibility of harassment by others also increases.

This is different from trolling or bullying because it involves persistent tracking and monitoring of someone’s online activities, creating a sense of fear and invasion of privacy.

Phishing vs Pharming: The Confusing Twins

These two terms sound similar and both involve tricking people, but they work differently.

Phishing is done by sending a fraudulent email or similar communication which appears to be genuine as if coming from a trusted source. The victim is often redirected to a fraud website, which appears to be genuine and prompts and persuades the victim to pass confidential information.

The information so seized is used for malicious purposes such as for financial frauds.

For example, you might receive an email that looks like it’s from your bank, asking you to “verify your account” by clicking a link. The email looks real, but it’s actually from criminals trying to steal your login details.

Pharming, on the other hand, is a kind of phishing activity where the server itself is hacked and victim is navigated to a fake website. A website that often looks exactly similar to the website that was primarily intended to be visited from where the details are acquired by miscreants.

For example, the intruder may develop a website which is similar to the website of the bank where the victim is having an account. When the victim visits the bank’s website, he/she is redirected to the fake website and enters the credentials which are stolen by the intruder or criminal.

Key difference: In phishing, you click on a fake link in an email. In pharming, you type the correct website address, but you’re secretly redirected to a fake website. Pharming is more dangerous because it’s harder to detect.

Quick Check

Your friend received an email from “Amazon” asking them to verify their account by clicking a link. You notice the email address is “amazon-security@amaz0n.com” (with a zero instead of ‘o’). Is this phishing or pharming? What advice would you give your friend?

Understanding Malware and Cyber Threats

A cyber threat is a possibility of a malicious attempt or an offensive action to steal or tamper the data, damage or disrupt information systems, networks, personal computers or devices.

Malware refers to infectious programs that hamper the functioning of a computer system. It refers to unwanted software which is designed to damage the functionality of computer systems.

Some common types of malware are virus, worms, trojan horse, spyware, etc. Let’s understand each one clearly because students often get confused between these terms.

Virus: The Original Digital Menace

A computer virus is a type of unwanted computer program which is developed by miscreants with an intention to damage the files of a computer, to corrupt database or to hamper the functioning of a computer system.

A virus is uploaded or injected in a network or into a storage media. It can be transmitted from one computer to another computer or to a network using CD, pen drive, external hard disk, software, internet connection, bluetooth, online apps, and similar means.

Many viruses have a tendency of replicating themselves. There are different types of viruses that infect specific components or specific functioning of a computer system. Some may cause mild damages while others can severely damage hardware, software or data files.

Examples of viruses: iBryte, OneInstaller, Koobface, CiaDoor, BrO_AcT, Byte Bandit, Brain, Small.TP, Stealth_C, etc.

Worms: The Self-Replicating Trouble

Worms are computer programs or algorithms which are designed to slow down the functioning of a computer by replicating inside the system and making multiple copies of themself, thereby occupying a huge memory space in the storage device.

Worms spread more commonly in computers that are connected to a network.

How are worms different from viruses?

  1. Replication: Both can replicate, but worms are specifically designed to make multiple copies and spread rapidly
  2. Network spread: Worms are particularly dangerous in networked computers
  3. Purpose: While viruses aim to damage files, worms primarily aim to slow down systems by consuming memory and resources

Examples of worms: Blgen3, Morris worm, W32/Nimda worm, Mydoom, Sasser, etc.

Trojan Horse: The Deceptive Invader

A Trojan Horse is malware that silently intrudes into a host computer along with contents, email attachments or software like computer games that appear to be genuine, but are not actually so.

It opens a kind of backdoor access to the computer from where miscreants can steal important information while the user is busy with some other tasks like browsing websites, playing computer games.

How is a Trojan different from viruses and worms?

A trojan horse does not replicate itself like a worm but can be destructive. It pretends to be something useful but is actually a gateway for criminals.

According to the ancient Greek mythology after a 10-year long seige of the city of Troy, Greek soldiers retreated, leaving behind a Trojan (Greek for wooden) horse. Greek hero Odyssesus hid inside a large wooden along with some of his bravest soldiers. The people of Troy dragged the horse inside the city, taking it to be their victory trophey. Once inside the city, the soldiers came out, attacked and captured the city of Troy.

Similarly, the online Trojan horse disguises itself as harmless software but secretly lets criminals into your computer.

Spam: The Unwanted Junk

Spam refers to unwanted and unsolicited messages which are received in the inbox of an email account or newsgroups across the online services. The one who sends the spams is called a ‘Spammer‘.

Generally, spams are sent with an intention to advertise about products and services.

Is spam the same as a virus? No. Spam is annoying and unwanted, but it’s not necessarily a harmful software. However, spam emails can contain viruses or malware as attachments, so they can be dangerous.

Spyware: The Silent Observer

Spywares are programs which get installed in the host computer without any permission from the user during installation of some trusted software. They keep on running in the background and collect information without taking permission from the owner.

How is spyware different from a virus?

  • Purpose: Spyware specifically collects your information secretly. Viruses aim to damage your system
  • Visibility: Spyware works silently in the background. Viruses often show symptoms like slowdowns or crashes
  • Installation: Spyware tricks you during legitimate software installation. Viruses spread through infected files

Boot Sector Virus: Attacking the Foundation

Boot sector is the core area of computer’s memory where the most important programs like OS are stored. Booting is the process of loading operating system in the primary memory from the boot sector.

A boot sector virus gains complete control over the Master Boot Record (MBR). MBR is the first sector of the computer hard drive that stores information about loading the operating system into the main memory.

Boot sector virus modifies the location and information of the Operating System in order to stop it from loading into main memory, which results in errors during booting.

Examples: Michelangelo, Polyboot.B, Stones and AntiEXE

Why is this particularly dangerous? Because it attacks the very foundation of your computer – the part that starts everything up. It’s like damaging the ignition system of a car.

Quick Check

Create a comparison table with three columns: Virus, Worm, and Trojan Horse. In each column, write: (1) How it spreads, (2) Main purpose, (3) Does it replicate itself? This will help you remember the differences clearly.

Program File Virus: Targeting Executables

A program file virus is a type of virus that infects the executable files with the intention of causing permanent damage or making them useless. Executable files are the files that execute the code of any program.

A file-infecting virus overwrites the code or inserts new code into the source of an executable file. When such programs are executed, the virus is activated and the files get damaged.

In most of the cases, program file viruses are deliberately loaded in a program by the developer. A program file infecting virus is also known as a ‘File Injector’.

Examples: Sunday and Cascade

Symptoms and Harms of Virus Infection

When our body gets affected by virus, it infects and damages some organs and also shows its adverse effect in our body in some way or the other. Similarly, there are some characteristics and symptoms shown by a computer when attacked by a virus or malware.

Here are some common signs that your computer might be infected:

  • Slowdown: There may be a sudden change in the processing speed of a computer, as virus has the tendency to slow down the processing abruptly.
  • Pop-ups: Unexpected pop-ups which appear on the system are a typical sign of a virus infection. It usually comes in bundles with other malware which can be destructive.
  • Crash: Viruses can damage the hard disk of a computer such as frequent crashing of system or BSOD (Blue Screen Of Death).
  • Running out of Storage Space: A virus may install its copies or replicate unwanted files and occupy a huge storage space.
  • Loss of Files: Some viruses may corrupt or delete files of a computer system.
  • Unusual activity of messages or programs: Some virus may lead to automatic opening or closing of a program or restarting of a computer abruptly and opening of strange dialog boxes.
  • Unusual Network Activity: Sometimes a computer system may show unusual network activity such as losing network connectivity, excessive consumption of data even when all the applications are closed.

If you notice any of these symptoms, it’s time to scan your computer with an antivirus immediately.

Prevention of Virus: Better Than Cure

Students! Don’t be afraid after knowing about various viruses or malware because there are remedial measures to fight against such threats. Although it’s better to avoid its attack beforehand as we know that, “Prevention is better than cure.”

Some common preventive measures are:

Download Content from Trusted Websites

Always download online content from an authentic website. Websites that start with ‘https’ are more secure. A strange website might be dangerous as it can infect the computer system with malware.

How to identify a trusted website?

  • Look for ‘https’ in the URL (the ‘s’ stands for secure)
  • Check for a padlock icon in the address bar
  • Be cautious of websites with strange URLs or lots of pop-ups

Open Email Attachments Received Only from Trusted Senders

Spam email may contain attachments that might have malware inside. Downloading such kind of attachments received from unknown senders may result in spreading of malware in a computer which may result in virus infection.

Golden rule: If you don’t know the sender, don’t open the attachment. Even if the email looks official, verify before clicking.

Use a Popup Blocker

While opening a particular website, sometimes some small browser windows open automatically which are said as Popup. Most of such small dialog boxes contain advertisements but some of them may contain malwares.

Hence, always use a Popup Blocker with the browser, which blocks the popups and helps to prevent issues which can be caused by Popups.

Keep the Software Up to Date

Your software and operating systems should always be kept updated with the latest version. This will ensure that the software have the tools to stop virus infection and hence will have lesser chance of getting corrupted.

Why are updates important? Software companies constantly find new security threats and create patches (fixes) for them. When you update your software, you’re installing these protective fixes.

Quick Check

List 5 preventive measures you can take right now to protect your computer from viruses. Which of these do you already follow? Which ones do you need to start following?

Installation of Antivirus

As there are antibodies to make our body fight from diseases and make us ready to fight against harmful bacteria, similarly, there are antivirus software which are used to safeguard or prevent the computer from viruses and for cleaning the unwanted programs which help in its proper and smooth functioning.

Understanding Antivirus Software

Antivirus are remedial software that scan, detect, clean and remove virus or malware from a computer system. Once an antivirus software is installed in a computer, it prevents the attack of viruses which are recorded in its database i.e. virus signature.

It prompts and informs the user if there is an attack of virus on the computer.

Some common examples of antivirus software are:

  • Avast
  • Norton
  • McAfee
  • AVG antivirus
  • Quick Heal
  • Kaspersky

How to Clean a Computer from Virus or Malware

If you face some unusual symptoms while operating a computer, then it must be scanned and also cleaned as it might have been infected by a malware. Here’s how to do it:

  1. Load an Antivirus, say ‘Quick Heal Total Security‘ in the computer system
  2. Select and right click on the file/folder or drive to be checked for threats of virus
  3. Click on ‘Quick Heal Total Security Scan’

The scanning process begins. To pause or stop the process of scanning, you can click on the buttons ‘Pause’ or ‘Stop’. The infected files (if any) will be cleaned or deleted automatically.

Keeping Your Antivirus Updated

Here’s something important: Every second a new virus is developed by miscreants. If some new virus is developed after the installation of the existing antivirus, then it might not be recognised by the loaded antivirus and it might not be able to prevent or to clean that virus.

In such case, the existing antivirus has to be updated or upgraded to its latest virus signature. For updating an antivirus, a user needs to connect to its URL or its developer.

That’s why most antivirus software show you notifications to update regularly. Don’t ignore these notifications – they’re keeping your computer safe from the latest threats.

Cyber Security Measures

Cyber security is a necessity for all users on internet, be it an individual, company, government and similar entities. Some common measures of cyber security are:

Firewall: Your Digital Guard

A firewall is a network security mechanism that is used to analyze, control and regulate the network traffic (flow of data in a network) and determine whether the incoming traffic should be allowed or not in the network.

It establishes a barrier between secured internal networks and outside untrusted network, such as the Internet.

Firewall could be either software or hardware that helps in keeping a network secure. Operating systems such as Linux, Windows or Mac include firewall software as a part of the operating system and keep the computer secure.

In some cases, a user needs to configure hardware based firewall in his computer or network for additional security.

Think of a firewall like this: Imagine a security guard at the entrance of a building who checks everyone coming in and decides who should be allowed inside and who shouldn’t. A firewall does the same thing for your computer network.

Password: Your Digital Key

A password can be termed as a key of codes that protect our valuable contents, documents or files from others’ access. It helps us to keep our files and documents secure or secret.

We can safeguard our belongings (documents or data) by restricting their access to others through locks that can be opened only through keys or password. Passwords authenticate or enable a person to open and access or operate a computer, network resource, internet, e-mail, bank account etc.

Whether it is banking, online shopping, checking of emails or use of social media, users have to make use of passwords.

What makes a strong password?

Ideally, a password is a combination of alphabets, numbers and special characters that should not be easily guessed by others.

Examples of strong passwords: ‘aniKR@87@!8’, ‘Esdl@378’ etc.

Password tips for students:

  • Never use obvious passwords like your name, birthday, or “password123”
  • Mix uppercase and lowercase letters
  • Include numbers and special characters
  • Don’t share your passwords with anyone
  • Use different passwords for different accounts
  • Change your passwords regularly

Understanding Netiquettes

Netiquette (net + etiquette) can be defined as the behaviour or formal guidelines that should be followed by the users of the Internet. They include common sense, courtesy and proper dialects while using tools of cyberspace and aim to create a dignified culture among internet users.

Many such guidelines are unstated and casual whereas some of such guidelines have evolved into formal rules enforced by system administrators, owners of IT resources and the Government.

Think of netiquettes as digital manners. Just as you say “please” and “thank you” in person, there are polite ways to behave online too.

Some basic netiquettes include:

  • Don’t type in ALL CAPS (it’s considered shouting)
  • Respect others’ privacy and opinions
  • Don’t share fake news or unverified information
  • Think before you post – once something is online, it’s very hard to completely remove it
  • Be kind in your comments and messages
  • Don’t spam or send unnecessary messages

Cyber Laws: Rules for the Digital World

Cyber laws are laws defined by government bodies to handle cybercrimes and Internet security related issues. Such laws lay down the norms and procedures to be implemented so that all activities being conducted using computers, especially over the internet can be put under a legal perspective.

These laws are the need of time so that people can browse social media, use their credit cards, and engage in other online activities without fear of misuse of their credentials. These laws offer a legal protection so that information has security and validity even if it is in the form of electronic records.

Cyber laws are being enforced in almost every country. Some of them are:

  • Indian IT Act 2000
  • CCPA (California, USA)
  • GDPR (European Union)
  • Privacy Act 1988 (Australia)
  • USA Cybersecurity Enhancement Act
  • USA Cybersecurity Information Sharing Act
  • UK Network and Information Systems Regulations 2018

Indian IT Act 2000: Protecting India’s Digital Space

The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament notified on October 17, 2000. It is the primary law in India dealing with cybercrime and electronic commerce.

Some agencies which work towards regulation of Cyber issues are:

  • CERT-IN: Computer Emergency Response Team (India)
  • NCIIPC: National Critical Information Infrastructure Protection Centre
  • MElTY: Ministry of Electronics and Information Technology
  • CAT: Cyber Appellate Tribunal
  • TRAI: Telecom regulatory authority of India

Some salient features of Indian IT Act 2000 are:

  1. This act grants legal recognition to all monetary transactions done using electronic means or e-commerce platforms
  2. It enables the electronic filing of legal documents with government agencies
  3. It provides methods to enforce legal security measures for electronic records and digital signatures. A digital signature is an electronic encrypted stamp of authentication on digital documents so that their authenticity can be verified
  4. It empowers the authorities to control and/or block certain internet websites if the contents defames the integrity of our nation or any individual
  5. It empowers authorities to intercept and monitor any information being generated or transmitted via any network if there is suspicion that information could be against the interest of our nation, or compromises with the safeguarding of the law

Real-world example: The recent ban enforced by the Government on some China based apps like TikTok, WeChat, etc., was done under the regulations of this act.

Offences and Punishments Under IT Act 2000

The IT Act clearly defines what actions are considered cybercrimes and what punishments they carry. Here are some key offences:

  1. Sending offensive messages (Cyber Bulling): Imprisonment for 3 years and/or imposition of fine upto Rs. 5 lakh
  2. Stealing or tampering with documents of others: Imprisonment for 3 years and/or imposition of fine upto Rs. 2 lakh
  3. Using the credentials of some other person without consent: Imprisonment for 3 years and/or imposition of fine upto Rs. 1 lakh
  4. Distributing obscene content over the internet: Imprisonment for 3 years and/or imposition of fine upto Rs. 5 lakh
  5. Stealing of credentials of others by means of Phishing, Pharming, etc: Imprisonment for 3 years and/or imposition of fine upto Rs. 5 lakh
  6. Indulging in Cyber Terrorism: Life Imprisonment

Why should you know about these punishments? Because understanding the serious consequences helps you realize that cybercrimes aren’t “just pranks” – they’re real crimes with real legal consequences.

Quick Check

According to the Indian IT Act 2000, what is the punishment for cyber bullying (sending offensive messages)? Why do you think the government has made such strict laws for cybercrimes?

Global Cyber Laws: Protecting Digital Rights Worldwide

While India has the IT Act 2000, other countries have also enacted comprehensive cyber laws to protect their citizens. Let’s understand some major global cyber laws that you should know about.

GDPR – General Data Protection Regulation (European Union)

The General Data Protection Regulation (GDPR) came into effect on May 25, 2018, in the European Union. It’s considered one of the world’s strongest data protection laws.

Key features of GDPR:

  1. Right to be Forgotten: Individuals can request companies to delete their personal data
  2. Data Breach Notification: Companies must report data breaches within 72 hours
  3. Consent Required: Companies must get clear consent before collecting personal data
  4. Heavy Penalties: Violations can result in fines up to €20 million or 4% of global annual revenue

Why it matters globally: Even though it’s an EU law, any company doing business in Europe (including Indian companies) must comply with GDPR.

CCPA – California Consumer Privacy Act (USA)

The California Consumer Privacy Act became effective on January 1, 2020. It’s considered the strongest privacy law in the United States.

Key features of CCPA:

  1. Right to Know: Consumers can ask what personal information businesses collect about them
  2. Right to Delete: Consumers can request deletion of their personal information
  3. Right to Opt-Out: Users can say no to the sale of their personal information
  4. Non-Discrimination: Businesses cannot discriminate against consumers who exercise their privacy rights

Impact: California is home to Silicon Valley, so this law affects major tech companies like Google, Facebook, and Apple.

Privacy Act 1988 (Australia)

Australia’s Privacy Act 1988 regulates how personal information is handled. It was significantly updated in 2014 with the introduction of the Australian Privacy Principles (APPs).

Key features:

  1. 13 Privacy Principles: Cover collection, use, disclosure, and security of personal information
  2. Notifiable Data Breaches Scheme: Organizations must notify individuals if serious data breach occurs
  3. Credit Reporting: Specific rules for credit reporting agencies
  4. Cross-Border Data: Rules for sending personal information overseas

Other Notable Cyber Laws

COPPA (USA): Children’s Online Privacy Protection Act protects children under 13 online

PIPA (South Korea): Personal Information Protection Act, one of Asia’s comprehensive privacy laws

LGPD (Brazil): Lei Geral de Proteção de Dados, similar to GDPR for Brazil

Why should you know about international cyber laws? Because the internet is global. When you use apps and websites from different countries, you’re protected by these laws. Understanding your rights helps you make informed decisions about sharing your data online.

Quick Check

What is the “Right to be Forgotten” under GDPR? Why do you think this right is important for internet users?

Baiting and Social Engineering: Psychology-Based Attacks

Beyond technical attacks, criminals also use psychological tricks to steal information.

Baiting is a practice in which a cyber criminal uses a trap or bait which is pretended as something to be normal and uses it to deceive a victim by infecting his system with malware or divulging sensitive information.

A common way of baiting is that a cybercriminal infects a USB or similar storage device with malware and leaves it around a workspace. Out of curiosity, an unaware person inserts it into his computer resulting in compromise of the entire system or the network to which the device is connected to.

Social Engineering is method covering different types of cyber-attacks that use various psychological tactics to manipulate people emotionally compelling them to disclose confidential personal information.

In Social Engineering, criminals work on weakness of the victim such as by luring with love, money or provoking fear, etc and use it to their advantage.

Example: A criminal might call pretending to be from your bank and create a sense of urgency (“Your account will be blocked unless you verify your details immediately!”). The fear makes you share information you normally wouldn’t.

Staying Safe: Your Action Plan

Now that you understand the threats, here’s what you can do to protect yourself:

For your computer:

  • Install and regularly update a good antivirus
  • Keep your operating system and software updated
  • Use a firewall
  • Don’t download files from unknown sources
  • Scan USB drives before opening files from them

For your online accounts:

  • Use strong, unique passwords for different accounts
  • Don’t share your passwords with anyone
  • Be suspicious of emails asking for personal information
  • Verify before clicking on links in emails
  • Enable two-factor authentication where available

For your digital behavior:

  • Think before you post anything online
  • Don’t share personal information publicly
  • Be kind and respectful in your online interactions
  • Follow netiquettes
  • If something seems too good to be true, it probably is

If you notice something wrong:

  • Tell your parents or teachers immediately
  • Don’t try to handle cybercrime situations alone
  • Report suspicious activities to the proper authorities

Quick Check

Create your own “Cyber Safety Checklist” with at least 8 items that you will follow to stay safe online. Which three items on your list do you think are most important?

Wrapping Up

Cybersecurity isn’t just a chapter to study for exams. It’s a life skill that you’ll need as long as you use the internet. The digital world offers amazing opportunities for learning, connecting, and creating. But like any powerful tool, it needs to be used wisely and safely.

Remember, being careful online doesn’t mean being scared of technology. It means being smart about how you use it. Just as you look both ways before crossing the road, you need to think before you click, download, or share online.

Start with small steps: Create strong passwords. Update your software regularly. Think twice before opening suspicious emails. These simple habits, practiced consistently, will keep you safe in the digital world.

The internet is an incredible place. Let’s make sure we can enjoy it safely.


Key Terms to Remember

  • Cybersecurity: Measures to protect computers, networks, software and data from cyber threats
  • Cybercrime: Illegal activities done in cyberspace
  • Malware: Infectious programs that harm computer systems
  • Virus: Unwanted program that damages files and corrupts databases
  • Worm: Program that replicates itself and slows down computers
  • Trojan Horse: Malware that disguises itself as genuine software
  • Phishing: Sending fraudulent emails to steal information
  • Pharming: Redirecting to fake websites to steal credentials
  • Firewall: Network security mechanism that controls traffic
  • Antivirus: Software that detects and removes viruses
  • Netiquettes: Behavioral guidelines for internet users
  • IT Act 2000: India’s primary law dealing with cybercrime
  • GDPR: European Union’s data protection regulation
  • CCPA: California’s consumer privacy act

CHAPTER END EXERCISES

Exercise 1: Fill in the Blanks

  1. Cybercrimes are performed by _____________ or _____________.
  2. Boot sector virus gains complete control over the _____________.
  3. _____________ are programs designed to slow the functioning of a computer.
  4. A _____________ infects the executable files and makes them useless.
  5. In _____________ the victim is sent to a fake website which often looks exactly similar to the original website.
  6. _____________ refers to measures and processes to protect computers, networks, software and data from cyber-related crimes.
  7. A _____________ can be termed as a key of codes that protect our valuable contents and documents.
  8. _____________ is a network security mechanism that controls and regulates network traffic.
  9. The _____________ came into effect on May 25, 2018 in the European Union.
  10. _____________ stands for Computer Emergency Response Team of India.

Exercise 2: True or False

  1. Virus can damage the hard disk of the computer. ( )
  2. Not installing an antivirus will not cause any issues. ( )
  3. It is safe to open email attachments from any person. ( )
  4. Passwords should be strong and not easily guessable. ( )
  5. Cyber attack is done to gain access to data of an entity. ( )
  6. Worms do not replicate themselves inside the computer system. ( )
  7. A Trojan Horse replicates itself like a worm. ( )
  8. Spam emails are always harmful like viruses. ( )
  9. The Indian IT Act 2000 grants legal recognition to electronic transactions. ( )
  10. GDPR gives users the “Right to be Forgotten”. ( )

Exercise 3: Select the Most Suitable Alternative

1. Which of the following is a motive behind cyberattack?

  • (a) Play games on others computer
  • (b) Illegal access to data
  • (c) Physically harming a person
  • (d) Making a person laugh

2. Which of the following describes cyberbullying?

  • (a) Sending embarrasing messages
  • (b) Posting embarrassing images
  • (c) Both (a) and (b)
  • (d) None of these

3. Which of the following malware is related to email?

  • (a) Spam
  • (b) Worms
  • (c) Trojan Horse
  • (d) All of these

4. For which category is Cyber security necessary?

  • (a) Individuals
  • (b) Companies
  • (c) Governments
  • (d) All of these

5. Which of the following is allowed by Indian IT Act 2000?

  • (a) Digital Signatures
  • (b) Hoarding of Money
  • (c) Hacking
  • (d) Cyber Terrorism

6. Which of the following computer malware replicates itself?

  • (a) Trojan Horse
  • (b) Worms
  • (c) Program File Virus
  • (d) None of these

7. Which malware opens a backdoor to steal information?

  • (a) Virus
  • (b) Worm
  • (c) Trojan Horse
  • (d) Spam

8. What does CCPA stand for?

  • (a) California Computer Privacy Act
  • (b) California Consumer Privacy Act
  • (c) Computer Consumer Privacy Act
  • (d) Cyber Consumer Protection Act

9. Which preventive measure blocks unwanted pop-ups?

  • (a) Antivirus
  • (b) Firewall
  • (c) Popup Blocker
  • (d) Password

10. What is the full form of GDPR?

  • (a) General Data Protection Regulation
  • (b) Global Data Privacy Rights
  • (c) General Digital Protection Rules
  • (d) Global Data Protection Regulation

Exercise 4: Short Notes

Write short notes (4-5 sentences each) on the following topics:

  1. Program File Virus
  2. Trojan Horse
  3. Phishing
  4. Cybertrolling
  5. Password
  6. Malware
  7. Firewall
  8. Netiquettes
  9. GDPR
  10. Antivirus Software

Exercise 5: Answer the Following Questions

  1. What do you mean by Netiquettes? Give five examples of good netiquettes.
  2. What are cyber laws? Why are they required? Mention any three international cyber laws.
  3. Write some features of the Indian IT Act 2000. Why was the ban on Chinese apps like TikTok justified under this act?
  4. What is the role of Firewall in ensuring Cyber Security? Explain with an example.
  5. Mention about some symptoms and harms of a virus infection. How can you identify if your computer is infected?
  6. What are the different measures to prevent virus infection in a computer? Explain at least three measures in detail.
  7. Differentiate between Phishing and Pharming with examples. Why is Pharming considered more dangerous?
  8. Explain the difference between Virus, Worm, and Trojan Horse. Give two examples of each.
  9. What is Social Engineering? How do criminals use psychological tactics to steal information?
  10. Explain the “Right to be Forgotten” under GDPR and “Right to Opt-Out” under CCPA. Why are these rights important?

ANSWER KEY

Exercise 1: Fill in the Blanks – Answers

  1. Cybercrimes are performed by hackers or miscreants/criminals.
  2. Boot sector virus gains complete control over the Master Boot Record (MBR).
  3. Worms are programs designed to slow the functioning of a computer.
  4. A program file virus infects the executable files and makes them useless.
  5. In pharming the victim is sent to a fake website which often looks exactly similar to the original website.
  6. Cyber security refers to measures and processes to protect computers, networks, software and data from cyber-related crimes.
  7. A password can be termed as a key of codes that protect our valuable contents and documents.
  8. Firewall is a network security mechanism that controls and regulates network traffic.
  9. The GDPR (General Data Protection Regulation) came into effect on May 25, 2018 in the European Union.
  10. CERT-IN stands for Computer Emergency Response Team of India.

Exercise 2: True or False – Answers

  1. Virus can damage the hard disk of the computer. (True)
  2. Not installing an antivirus will not cause any issues. (False) – Not installing antivirus leaves your computer vulnerable to malware attacks.
  3. It is safe to open email attachments from any person. (False) – Only open attachments from trusted senders as spam emails may contain malware.
  4. Passwords should be strong and not easily guessable. (True)
  5. Cyber attack is done to gain access to data of an entity. (True)
  6. Worms do not replicate themselves inside the computer system. (False) – Worms specifically replicate themselves to spread and consume system resources.
  7. A Trojan Horse replicates itself like a worm. (False) – Trojan Horse does not replicate itself; it opens backdoor access for criminals.
  8. Spam emails are always harmful like viruses. (False) – Spam is unwanted email, not necessarily harmful software, though it can contain malware.
  9. The Indian IT Act 2000 grants legal recognition to electronic transactions. (True)
  10. GDPR gives users the “Right to be Forgotten”. (True)

Exercise 3: Select the Most Suitable Alternative – Answers

  1. Answer: (b) Illegal access to data
    • Explanation: The basic motive behind cyberattack is to gain access to data for malicious purposes.
  2. Answer: (c) Both (a) and (b)
    • Explanation: Cyberbullying includes sending embarrassing messages and posting embarrassing images to harass someone.
  3. Answer: (a) Spam
    • Explanation: Spam refers specifically to unwanted emails, while worms and Trojans can spread through various means.
  4. Answer: (d) All of these
    • Explanation: Cyber security is necessary for individuals, companies, and governments alike.
  5. Answer: (a) Digital Signatures
    • Explanation: IT Act 2000 grants legal recognition to digital signatures; the other options are cybercrimes.
  6. Answer: (b) Worms
    • Explanation: Worms specifically replicate themselves inside the system to spread and consume memory.
  7. Answer: (c) Trojan Horse
    • Explanation: Trojan Horse opens backdoor access allowing criminals to steal information.
  8. Answer: (b) California Consumer Privacy Act
    • Explanation: CCPA stands for California Consumer Privacy Act, enacted in 2020.
  9. Answer: (c) Popup Blocker
    • Explanation: Popup Blocker specifically blocks unwanted pop-up windows that may contain malware.
  10. Answer: (a) General Data Protection Regulation
    • Explanation: GDPR is the General Data Protection Regulation of the European Union.

Exercise 4: Short Notes – Model Answers

1. Program File Virus

A program file virus infects executable files that run program code. It overwrites or inserts new malicious code into the source of executable files. When infected programs are executed, the virus activates and damages the files. These viruses are often deliberately loaded by developers and are also called “File Injectors”. Examples include Sunday and Cascade viruses.

2. Trojan Horse

A Trojan Horse is malware that disguises itself as genuine software like games or email attachments. It silently intrudes into a computer and opens backdoor access for criminals to steal information. Unlike worms, Trojan horses do not replicate themselves but can be highly destructive. The name comes from the ancient Greek story where soldiers hid inside a wooden horse. Users unknowingly install them while browsing or playing games.

3. Phishing

Phishing involves sending fraudulent emails or communications that appear genuine and seem to come from trusted sources. Victims are redirected to fake websites that look authentic and are persuaded to share confidential information. This information is then used for malicious purposes like financial fraud. For example, receiving a fake bank email asking to “verify your account” is a common phishing attempt.

4. Cybertrolling

Cybertrolling occurs when someone intentionally tries to create conflict by sending provocative or offensive messages. It mainly happens on social media where trolls deliberately upload indecent comments to upset others. Trolls may interrupt ongoing conversations with inflammatory remarks, making others feel awkward. Unlike cyberbullying which targets specific individuals, trolling aims to provoke multiple people in public forums.

5. Password

A password is a key of codes that protects valuable contents, documents, and files from unauthorized access. Passwords authenticate users to access computers, networks, emails, bank accounts, and other resources. Strong passwords combine alphabets, numbers, and special characters that cannot be easily guessed. Examples of strong passwords include ‘aniKR@87@!8’ and ‘Esdl@378’. Passwords should be unique for different accounts and changed regularly.

6. Malware

Malware refers to infectious programs designed to damage computer system functionality. It includes various types like viruses, worms, Trojan horses, and spyware. Malware is unwanted software created to harm systems, steal data, or disrupt operations. Some malware causes mild damage while others severely impact hardware, software, or data files. Prevention includes using antivirus software, keeping systems updated, and avoiding suspicious downloads.

7. Firewall

A firewall is a network security mechanism that analyzes, controls, and regulates network traffic. It determines whether incoming traffic should be allowed into the network. Firewalls establish barriers between secured internal networks and untrusted external networks like the Internet. They can be software (included in operating systems) or hardware-based for additional security. Firewalls work like security guards checking who enters a building.

8. Netiquettes

Netiquettes (net + etiquette) are behavioral guidelines and formal rules for Internet users. They include common sense, courtesy, and proper conduct while using cyberspace tools. Netiquettes aim to create dignified online culture. Examples include not typing in ALL CAPS, respecting others’ privacy, not sharing fake news, thinking before posting, and being kind in comments. Some guidelines are informal while others are enforced by administrators and governments.

9. GDPR

GDPR (General Data Protection Regulation) is the European Union’s data protection law effective from May 25, 2018. It provides users the Right to be Forgotten, requiring companies to delete personal data on request. Organizations must report data breaches within 72 hours and obtain clear consent before collecting data. Violations can result in heavy fines up to €20 million or 4% of global revenue. GDPR affects any company doing business in Europe globally.

10. Antivirus Software

Antivirus software scans, detects, cleans, and removes viruses or malware from computer systems. Once installed, it prevents virus attacks recorded in its database (virus signature) and alerts users about threats. Common examples include Avast, Norton, McAfee, AVG, Quick Heal, and Kaspersky. Antivirus must be regularly updated to recognize new viruses. It works like antibodies in our body, protecting against harmful infections and ensuring smooth computer functioning.


Exercise 5: Long Answer Questions – Detailed Model Answers

1. What do you mean by Netiquettes? Give five examples of good netiquettes.

Answer: Netiquettes (net + etiquette) are behavioral guidelines and formal rules that should be followed by Internet users. They include common sense, courtesy, and proper conduct while using cyberspace tools, aiming to create a dignified online culture.

Five examples of good netiquettes:

  • Avoid ALL CAPS: Don’t type in capital letters as it’s considered shouting and is rude
  • Respect Privacy: Don’t share others’ personal information or photos without permission
  • Think Before Posting: Remember that once something is online, it’s difficult to remove completely
  • Be Kind and Courteous: Use polite language and avoid offensive or hurtful comments
  • Don’t Spread Fake News: Verify information before sharing it with others online

2. What are cyber laws? Why are they required? Mention any three international cyber laws.

Answer: Cyber laws are laws defined by government bodies to handle cybercrimes and Internet security-related issues. They lay down norms and procedures for activities conducted using computers, especially over the internet, from a legal perspective.

Why cyber laws are required:

  • To protect people while browsing social media, using credit cards, and engaging in online activities
  • To prevent misuse of personal credentials and data
  • To provide legal protection for electronic records and ensure information security
  • To punish cybercriminals and deter cybercrimes
  • To create a safe digital environment for individuals, businesses, and governments

Three international cyber laws:

  1. GDPR (General Data Protection Regulation) – European Union: Effective May 25, 2018, provides strong data protection including Right to be Forgotten, mandatory breach notification within 72 hours, and heavy penalties for violations.
  2. CCPA (California Consumer Privacy Act) – USA: Effective January 1, 2020, gives consumers rights to know what data is collected, delete their information, opt-out of data sales, and protection from discrimination.
  3. Privacy Act 1988 – Australia: Regulates personal information handling with 13 Australian Privacy Principles, Notifiable Data Breaches Scheme, and specific rules for credit reporting and cross-border data transfer.

3. Write some features of the Indian IT Act 2000. Why was the ban on Chinese apps like TikTok justified under this act?

Answer: The Indian IT Act 2000 is the primary law dealing with cybercrime and electronic commerce in India, notified on October 17, 2000.

Features of Indian IT Act 2000:

  1. Legal Recognition for E-Transactions: Grants legal validity to all monetary transactions done through electronic means or e-commerce platforms
  2. Electronic Filing: Enables electronic filing of legal documents with government agencies
  3. Digital Signatures: Provides methods to enforce legal security measures for electronic records and digital signatures, which are encrypted stamps of authentication
  4. Website Control: Empowers authorities to control or block internet websites if content defames national integrity or individuals
  5. Surveillance Powers: Allows authorities to intercept and monitor network information if there’s suspicion of threats to national interest or law violation
  6. Clear Punishments: Defines specific cybercrimes and their punishments, including imprisonment and fines

Justification for Chinese Apps Ban:

The ban on Chinese apps like TikTok, WeChat, etc., was justified under IT Act 2000 because:

  • These apps were suspected of compromising national security by sharing user data with foreign entities
  • The Act empowers authorities to block websites/apps that threaten national integrity
  • Concerns about data privacy and sovereignty led to the ban under the Act’s regulations
  • The government used provisions allowing control over content that may harm national interests

4. What is the role of Firewall in ensuring Cyber Security? Explain with an example.

Answer: A firewall plays a crucial role as the first line of defense in cyber security by acting as a network security mechanism that analyzes, controls, and regulates network traffic.

Role of Firewall:

  1. Traffic Control: Examines incoming and outgoing network traffic (data flow) to determine what should be allowed or blocked
  2. Barrier Creation: Establishes a protective barrier between secured internal networks and untrusted external networks like the Internet
  3. Threat Prevention: Prevents unauthorized access, malware, and cyber attacks from entering the network
  4. Policy Enforcement: Implements security policies by allowing legitimate traffic while blocking suspicious activities
  5. Two Types: Can be software-based (included in operating systems like Windows, Linux, Mac) or hardware-based for additional security

Example:

Imagine your school computer lab is connected to the Internet. A firewall acts like a security guard at the school gate:

  • Without Firewall: Any malicious website, hacker, or malware can freely enter your network and infect computers, steal data, or cause damage
  • With Firewall: When someone tries to access the school network from outside (like a hacker), the firewall checks their credentials and intentions. If the firewall detects suspicious activity, it blocks the access immediately. Similarly, if a student tries to visit a harmful website, the firewall can block that outgoing connection too

For instance, if a student accidentally clicks on a phishing link, the firewall can detect that the destination website is malicious and block the connection before any data is stolen or malware is downloaded. This protection works 24/7, automatically monitoring all network traffic.


5. Mention about some symptoms and harms of a virus infection. How can you identify if your computer is infected?

Answer: When a computer gets infected by a virus or malware, it shows specific symptoms and causes various harms to the system.

Symptoms of Virus Infection:

  1. Slowdown: Sudden decrease in processing speed as viruses slow down system performance
  2. Unexpected Pop-ups: Random pop-up windows appearing on screen, often bundled with other malware
  3. Frequent Crashes: System crashes frequently or Blue Screen of Death (BSOD) appears
  4. Unusual Network Activity: Losing network connectivity or excessive data consumption even when applications are closed
  5. Automatic Actions: Programs opening, closing, or restarting automatically; strange dialog boxes appearing
  6. File Issues: Files getting corrupted, deleted, or becoming inaccessible

Harms of Virus Infection:

  1. Running out of Storage Space: Viruses install copies or replicate files, occupying huge storage space
  2. Loss of Files: Viruses may corrupt or permanently delete important files
  3. Unusual Activity: Programs or messages behaving strangely, restarting abruptly
  4. Hardware Damage: Can damage hard disk causing frequent system crashes

How to Identify if Your Computer is Infected:

  • Computer running much slower than usual
  • Programs taking longer to load or crashing unexpectedly
  • Seeing advertisements or pop-ups you didn’t request
  • New toolbars or programs you didn’t install
  • Homepage or search engine changed without your permission
  • Files missing or corrupted
  • Antivirus software disabled or not working
  • Friends receiving spam emails from your account
  • Hard disk constantly running even when you’re not using the computer
  • Internet data usage suddenly increasing

Action to Take: If you notice any of these symptoms, immediately run a full system scan with updated antivirus software, disconnect from the internet to prevent spread, and inform an adult or technical expert for help.


6. What are the different measures to prevent virus infection in a computer? Explain at least three measures in detail.

Answer: Prevention is better than cure, especially when it comes to protecting computers from viruses. Here are six detailed preventive measures:

1. Download Content from Trusted Websites: Always download files, software, and content only from authentic, verified websites. Websites starting with ‘https’ (note the ‘s’ for secure) are safer than those with just ‘http’. Check for padlock icons in the browser address bar. Strange or unfamiliar websites might be dangerous and can infect your system with malware. Avoid clicking on suspicious download links or advertisements.

2. Open Email Attachments Only from Trusted Senders: Spam emails often contain attachments with hidden malware. Never open attachments from unknown senders, even if they look interesting or claim to be prizes. Verify the sender’s email address carefully – phishing emails often use addresses that look similar to legitimate ones but have slight differences. If you receive an unexpected attachment even from someone you know, verify with them before opening, as their account might be compromised.

3. Use a Popup Blocker: While browsing websites, small browser windows (popups) may appear automatically. While most contain advertisements, some may hide malware. Always use a popup blocker with your browser to prevent these windows from opening. Modern browsers have built-in popup blockers that you can enable in settings. This prevents accidental clicks on malicious popups that could install harmful software.

4. Keep Software and Operating Systems Updated: Software companies constantly discover new security threats and create patches (fixes) to protect against them. When you update your software and operating system, you’re installing these protective fixes. Set your system to automatically download and install updates. Don’t ignore update notifications – they’re not just adding features, they’re fixing security vulnerabilities that hackers could exploit. Updated software has better tools to detect and stop virus infections.

5. Install and Update Antivirus Software: Just as our bodies have antibodies to fight diseases, computers need antivirus software to fight digital threats. Install reliable antivirus software like Quick Heal, Norton, Kaspersky, or Avast. However, installation alone isn’t enough – new viruses are created daily. Regularly update your antivirus to its latest virus signature database so it can recognize and prevent new threats. Most antivirus software can be set to update automatically. Run full system scans weekly and quick scans daily.

6. Practice Safe USB and External Drive Usage: Viruses often spread through pen drives, external hard disks, and other storage devices. Before opening any files from an external device, scan it with antivirus software. Never use “autorun” features that automatically execute files from USB drives. Be especially careful with devices used in public computers like cyber cafes or libraries. If you must share files via USB, scan them both before copying and after pasting on another computer.

Additional Tips:

  • Create regular backups of important data
  • Use strong, unique passwords
  • Don’t click on suspicious links in messages or social media
  • Be cautious about what you share online
  • Educate yourself about new cyber threats

7. Differentiate between Phishing and Pharming with examples. Why is Pharming considered more dangerous?

Answer: Both phishing and pharming are cybercrimes aimed at stealing personal information, but they work differently.

Phishing: Criminals send fake emails appearing from trusted sources (like banks) with malicious links. Example: Email saying “Your Amazon account is suspended, click here to verify.”

Pharming: Redirects you to fake websites even when you type correct URLs. Example: You type your bank’s correct address but land on a fake lookalike site.

Why Pharming is more dangerous: It’s harder to detect since you typed the correct address. Works automatically without clicking suspicious links. Can affect thousands simultaneously through DNS poisoning, bypassing email filters and user caution.

KEY DIFFERENCES:

AspectPhishingPharming
MethodUses fake emails/messagesRedirects web traffic
User ActionMust click malicious linkHappens automatically
DetectionCan spot suspicious emailsVery hard to detect
URLOften shows different URLMay show correct URL
ScaleTargets many individuallyCan affect many simultaneously

8. Explain the difference between Virus, Worm, and Trojan Horse. Give two examples of each.

Answer: Virus, Worm, and Trojan Horse are three distinct types of malware with different behaviors, purposes, and spreading methods.

Virus: Attaches to files, needs human action to spread (opening infected files), damages/corrupts data. Examples: iBryte, CiaDoor.

Worm: Self-replicates automatically, spreads through networks without human action, consumes memory to slow systems. Examples: Morris worm, Mydoom.

Trojan Horse: Disguises as legitimate software (games, apps), opens backdoor for criminals, doesn’t replicate itself, steals data. Examples: Zeus Trojan, Emotet.

Key difference: Virus needs host files; Worm spreads independently; Trojan tricks users into installation.

COMPARISON TABLE:

FeatureVirusWormTrojan Horse
Self-ReplicationSome doYes, rapidlyNo
Needs Host FileYesNoNo
Spreading MethodInfected filesNetwork propagationUser installation
User Action RequiredYes (open file)NoYes (install program)
Primary DamageFile corruptionResource consumptionData theft
DetectionModerateModerateDifficult
Speed of SpreadModerateVery fastSlow
IndependenceNeeds hostIndependentNeeds user action

9. What is Social Engineering? How do criminals use psychological tactics to steal information?

Answer: Social Engineering manipulates human psychology rather than hacking technology. Criminals exploit emotions like fear, trust, greed, and curiosity to steal information.

Psychological Tactics:

  • Fear/Urgency: “Your account will be blocked in 30 minutes!”
  • Trust: Pretending to be IT support or authority figures
  • Greed: “You’ve won a prize, click to claim”
  • Curiosity: Leaving infected USB drives labeled “Confidential Salary Data”
  • Helpfulness: “I forgot my access card, can you let me in?”

These tactics bypass security by targeting human weaknesses, not technical vulnerabilities.

10. Explain the “Right to be Forgotten” under GDPR and “Right to Opt-Out” under CCPA. Why are these rights important?

Answer: Right to be Forgotten (GDPR):

Allows individuals to request companies delete their personal data. Example: Delete old embarrassing social media posts including all associated data.

Right to Opt-Out (CCPA):

Lets users prevent businesses from selling their personal information to third parties. Companies can still use your data but cannot profit by selling it.

Why Important:

  • Balances power between individuals and tech companies
  • Control your digital footprint and online reputation
  • Protect privacy from data exploitation
  • People change; past shouldn’t define future
  • Prevents misuse for identity theft or harassment

COMPARISON:

AspectGDPR (Right to be Forgotten)CCPA (Right to Opt-Out)
FocusDelete all dataStop selling data
Geographic ScopeEuropean UnionCalifornia, USA
ActionRemove data entirelyKeep but don’t sell
Primary ControlData existenceData commercialization
Business ImpactMust delete recordsCan keep but can’t sell

Remember: In the digital world, your awareness is your best defense. Stay informed, stay alert, stay safe.

Pin It on Pinterest

Share This