Learn All About Cyber Safety
By Durgesh
()
About this ebook
We all tend to share our personal information with people whom we trust and not with strangers. However, we share a lot of information online that affects our privacy, directly or indirectly.
With the ever-evolving technology and increased use of internet, it is important for every individual to create boundaries for the type of information shared online. Therefore it is extremely important to be careful about the information we reveal online.
This book we discuss in detail different types of risks involved and the ways to protect data we share online.
Durgesh
Major part of my career has been in the field of Education and Administration. I have a good command over my subject (computer science) and effective communication in English. I have written books in my subject and have represented Science Olympiad Foundation. I have been very adaptable to any kind of new environment and technologies. I have written a few computer science books for my students based on their syllabus.With lots of health issues cropping up with time, I recreated myself with the help of Yoga and Meditation. Which gave me a direction towards a happy mind and body.Thus, decided to share my experience in penning down the Good Health Technique with all.I am ever grateful to Guruji, Sri Sri Ravi Shankarji and to Swami Satyananda Saraswatiji for guidance towards ultimate physical and mental good health.Lately I have picked up a new hobby - the art of crocheting. While making some crochet related products, I have written a few amigurumi patterns. Sharing my new skill through this platform.
Read more from Durgesh
Learn C++ Rating: 4 out of 5 stars4/5Yoga (Pawanmuktasana) Rating: 3 out of 5 stars3/5Learn Typing Rating: 0 out of 5 stars0 ratingsC Language Programming Codes Rating: 0 out of 5 stars0 ratingsLearn All about Evolution of Computers Rating: 0 out of 5 stars0 ratingsLearning Open Office: Writer, Impress, Draw Rating: 0 out of 5 stars0 ratingsBasic Language Rating: 0 out of 5 stars0 ratingsEnjoy with Computers Rating: 0 out of 5 stars0 ratingsOpen Source: Introduction & Outline of Office Suite Rating: 0 out of 5 stars0 ratingsAmigurumi Patterns of 2 Bunnies Rating: 0 out of 5 stars0 ratingsLearning Open Office: Calc & Base Rating: 0 out of 5 stars0 ratingsHappiness with Meditation & Yoga Rating: 0 out of 5 stars0 ratings
Related to Learn All About Cyber Safety
Related ebooks
Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsZero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsEthical Hacking Rating: 0 out of 5 stars0 ratingsHacked: The Ultimate Guidence Rating: 5 out of 5 stars5/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Learn Ethical Hacking: A Help Book of Ethical Hacking Rating: 0 out of 5 stars0 ratingsComputer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations Rating: 0 out of 5 stars0 ratingsHacking: A Comprehensive Guide to Computer Hacking and Cybersecurity Rating: 0 out of 5 stars0 ratingsHacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Hacking Rating: 3 out of 5 stars3/5Detecting and Combating Malicious Email Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 0 out of 5 stars0 ratingsHacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsSeven Deadliest Web Application Attacks Rating: 0 out of 5 stars0 ratingsCybersecurity in Our Digital Lives Rating: 5 out of 5 stars5/5The Core of Hacking Rating: 0 out of 5 stars0 ratingsStay Safe!: A Basic Guide to Information Technology Security Rating: 0 out of 5 stars0 ratingsCYBER SECURITY HANDBOOK Part-2: Lock, Stock, and Cyber: A Comprehensive Security Handbook Rating: 0 out of 5 stars0 ratingsPHP Security and Session Management: Managing Sessions and Ensuring PHP Security (2022 Guide for Beginners) Rating: 3 out of 5 stars3/5AVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsHack Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsMobile Malware Attacks and Defense Rating: 5 out of 5 stars5/5
Teaching Methods & Materials For You
Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5Grit: The Power of Passion and Perseverance Rating: 4 out of 5 stars4/5The 5 Love Languages of Children: The Secret to Loving Children Effectively Rating: 4 out of 5 stars4/5Dumbing Us Down - 25th Anniversary Edition: The Hidden Curriculum of Compulsory Schooling Rating: 4 out of 5 stars4/5Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5Closing of the American Mind Rating: 4 out of 5 stars4/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5Verbal Judo, Second Edition: The Gentle Art of Persuasion Rating: 4 out of 5 stars4/5The 5 Love Languages of Teenagers: The Secret to Loving Teens Effectively Rating: 4 out of 5 stars4/5The Lost Tools of Learning Rating: 5 out of 5 stars5/5Jack Reacher Reading Order: The Complete Lee Child’s Reading List Of Jack Reacher Series Rating: 4 out of 5 stars4/5Inside American Education Rating: 4 out of 5 stars4/5Weapons of Mass Instruction: A Schoolteacher's Journey Through the Dark World of Compulsory Schooling Rating: 4 out of 5 stars4/5Principles: Life and Work Rating: 4 out of 5 stars4/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5From 150 to 179 on the LSAT Rating: 4 out of 5 stars4/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5Everything You Need to Know About Personal Finance in 1000 Words Rating: 5 out of 5 stars5/5Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5The Science of Making Friends: Helping Socially Challenged Teens and Young Adults Rating: 5 out of 5 stars5/5Why Are You Still Sending Your Kids to School? Rating: 5 out of 5 stars5/5Who Gets In and Why: A Year Inside College Admissions Rating: 4 out of 5 stars4/5My System Rating: 4 out of 5 stars4/5The Chicago Guide to Grammar, Usage, and Punctuation Rating: 5 out of 5 stars5/5
Reviews for Learn All About Cyber Safety
0 ratings0 reviews
Book preview
Learn All About Cyber Safety - Durgesh
Learn All about Cyber Safety
For My Computer Sc. Students
By Durgesh
Contents
Cyber Safety
Browsing the Web safely
Cyber security breach
Cyber ethics
Laws against cybercrime
Reporting a cyber-crime
Introduction
We all tend to share our personal information with people whom we trust and not with strangers. However, we share a lot of information online that affects our privacy, directly or indirectly.
With the ever-evolving technology and increased use of internet, it is important for every individual to create boundaries for the type of information shared online. We spend enormous amount of time browsing the web and share a lot of information on social networking websites like Facebook, Twitter, LinkedIn, Instagram, etc. All the information we share online is particularly vulnerable to the dangers involved. Predators, hackers, cyber criminals, spammers, cyber stalkers, identity thieves and other criminals try to take advantage of the information we share online. Therefore it is extremely important to be careful about the information we reveal online.
Now, let us discuss in detail different types of risks involved and the ways to protect data we share online.
CYBER SAFETY
Cyber