Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
6 views8 pages

CDS Notes

Digital safety encompasses the protection of data, devices, and networks from cyber threats through measures like encryption, firewalls, and strong passwords. It differs from cybersecurity, which focuses on system-level protection, while digital safety emphasizes user-level practices. Online threats include phishing, malware, and identity theft, highlighting the importance of safe online behavior and the ethical use of technology.

Uploaded by

harshwardhand83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views8 pages

CDS Notes

Digital safety encompasses the protection of data, devices, and networks from cyber threats through measures like encryption, firewalls, and strong passwords. It differs from cybersecurity, which focuses on system-level protection, while digital safety emphasizes user-level practices. Online threats include phishing, malware, and identity theft, highlighting the importance of safe online behavior and the ethical use of technology.

Uploaded by

harshwardhand83
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Q1. What Is Digital Safety?

 Digital safety refers to the protection of data, devices, and networks from cyber
threats and unauthorized access.
 It involves implementing security measures like encryption to protect sensitive
information.
 Firewalls and antivirus software are used to block malicious traffic and detect
malware.
 Using strong passwords and multi-factor authentication (MFA) prevents account
hacking.
 Regular software and security patch updates reduce system vulnerabilities.
Safe browsing habits help prevent phishing attacks and malware downloads.
Data backup strategies like cloud storage protect against data loss and ransomware
attacks.
 Network security practices like VPNs ensure secure communication over public
networks
 Awareness of cyber threats such as hacking, identity theft, and social engineering is
essential.
 Monitoring system logs and using intrusion detection systems (IDS) help identify
suspicious activities.
 Digital safety also includes protecting AI/ML models and datasets from adversarial
attacks.
 Overall, it ensures confidentiality, integrity, and availability (CIA triad) of digital
resources.

Q2. What Is The Difference Between Cyber Security And Digital Safety

Aspect Cyber Security Digital Safety


Protection of computer systems, Safe practices followed by
1. Definition
networks, and data from cyber threats. individuals to stay secure online.
System-level, network-level, and User-level safety, privacy, and
2. Focus Area
organizational security. awareness.

Firewalls, encryption, IDS/IPS, Strong passwords, two-factor


3. Techniques
penetration testing, vulnerability authentication, privacy settings, safe
Used
management. browsing.

Broad – used by companies, Narrow – followed by individuals and


4. Scope
governments, and security teams. end users.

Ensure confidentiality, integrity, and


Protect personal data, avoid scams,
5. Objective availability (CIA triad) of data and
and maintain safe online behavior.
systems.
Aspect Cyber Security Digital Safety
Preventing hacking, ransomware, Avoiding phishing links, reporting
6. Examples
DDoS attacks, and data breaches. scams, not oversharing personal info.
Highly technical, involves Awareness-based, focuses on user
7. Approach
cybersecurity professionals and tools. behavior and education.
Creates a secure IT infrastructure for Ensures safe and positive online
8. Outcome
organizations. experience for individuals.

Q3. What Are The Different Types Of Online Threats?

Online threats are harmful activities that target users, devices, or networks through the
internet.
Some of the common types are:

1. Phishing
Phishing is a cyber-attack where fake emails, messages, or websites are created to
trick users into revealing sensitive data like passwords, credit card numbers, or bank
details.
Example: An email pretending to be from a bank asking you to "verify" your account.
2. Malware
Malware (malicious software) includes viruses, worms, trojans, and rootkits designed
to harm systems, steal data, or disrupt operations.
Example: A trojan that looks like a game but secretly installs spyware on your
computer.
3. Ransomware
Ransomware encrypts your files and demands payment (ransom) to unlock them. It
can paralyze organizations or individuals.
Example: Wanna Cry ransomware attack that affected hospitals and companies
worldwide.
4. Spyware
Spyware secretly monitors user activity and sends collected information (like
keystrokes or browsing history) to hackers.
Example: Keyloggers that capture everything you type, including passwords.
5. Adware
Adware displays unwanted ads, pop-ups, or redirects your browser to malicious
websites.
It can slow down your device and sometimes download other harmful programs.
6. Denial of Service (DoS) / DDoS Attacks
In these attacks, hackers flood a server with excessive traffic, making it slow or
completely unavailable for real users.
Example: DDoS attacks on websites of companies or governments, causing
downtime.
7. Man-in-the-Middle (MITM) Attack
In this attack, hackers secretly intercept communication between two parties to steal
or alter information.
Example: Intercepting data sent over public Wi-Fi and stealing login credentials.
8. SQL Injection
Hackers insert malicious SQL code into a website’s database query to gain
unauthorized access to data.
Example: Retrieving usernames, passwords, and credit card details from a website
database.
9. Identity Theft
Hackers steal personal information like Aadhaar number, PAN, or bank details to
impersonate the victim.
This can lead to financial fraud or criminal misuse of the victim’s identity.
10. Social Engineering
Social engineering manipulates people into revealing confidential information by
exploiting trust.
Example: A phone call pretending to be a tech support agent asking for your OTP or
password.

These threats can harm individuals, businesses, and even governments if proper security
measures are not followed.

Q4. What Are Some Real-World Examples Of Cyber Attacks?

1. WannaCry Ransomware Attack (2017)


This ransomware infected over 200,000 computers in 150+ countries, encrypting files
and demanding ransom in Bitcoin.
Hospitals, banks, and companies were badly affected, including the UK’s National
Health Service (NHS).
2. Yahoo Data Breach (2013–2014)
Hackers stole data from 3 billion Yahoo user accounts, including email addresses
and passwords.
It is considered one of the largest data breaches in history.
3. Equifax Data Breach (2017)
Hackers exploited a vulnerability and stole personal data of 147 million people,
including Social Security numbers and credit information.
4. Facebook–Cambridge Analytica Scandal (2018)
Personal data of millions of Facebook users was collected without consent and used
for targeted political advertising.
5. Target Data Breach (2013)
Hackers compromised Target’s payment system, stealing 40 million credit/debit card
details from customers.
6. Colonial Pipeline Ransomware Attack (2021)
This attack shut down one of the largest fuel pipelines in the U.S., causing fuel
shortages in several states.
7. Stuxnet Worm (2010)
A highly sophisticated malware that targeted Iran’s nuclear facilities, damaging
centrifuges used for uranium enrichment.
8. Uber Data Breach (2016)
Hackers accessed personal data of 57 million users and drivers; Uber paid $100,000
ransom to hide the breach initially.

Q5. Explain Different Types Of Attacks?

here are several types of attacks in cyber security that target systems, networks, and users:

1. Phishing Attack
Tricking users into sharing sensitive data (passwords, OTPs, bank details) through
fake emails, messages, or websites.
2. Malware Attack
Injecting malicious software (virus, trojan, worm) into a system to steal data, damage
files, or take control.
3. Ransomware Attack
Encrypting user data and demanding ransom payment to restore access.
4. Denial of Service (DoS) / Distributed DoS (DDoS) Attack
Overloading a server or network with traffic so it becomes slow or unavailable.
5. SQL Injection Attack
Injecting malicious SQL code into a database query to gain unauthorized access to
data.
6. Man-in-the-Middle (MITM) Attack
Intercepting communication between two parties to steal, modify, or spy on
transmitted data.
7. Password Attack
Trying to guess or crack passwords using brute force, dictionary attacks, or
keyloggers.
8. Social Engineering Attack
Manipulating people to reveal confidential information by exploiting trust (e.g., fake
tech support calls).
9. Cross-Site Scripting (XSS)
Injecting malicious scripts into websites to steal cookies, session data, or redirect
users to harmful sites.
10. Insider Attack
An attack performed by an employee or trusted person who misuses access to steal or
leak information.

Q6. Explain Digital Identity And How To Manage Your Online Presence?

 Digital Identity
 Digital identity is the sum of all information about a person that exists online.
It includes personal data like name, email ID, phone number, social media
accounts, and online transaction history.
 Every time you log in, post, or interact online, you add to your digital identity
(digital footprint).
 It is used by websites and apps to authenticate users and give them
personalized services.
 Digital identity can also include biometric data like fingerprints or facial
recognition used in secure logins.
 It is unique to each individual and acts like your “virtual identity card” in the
online world.
 Companies use digital identities to provide access to accounts and secure
transactions.
 However, a compromised digital identity can lead to identity theft or fraud.
Cybercriminals may misuse your data for phishing, scams, or financial fraud.
Hence, protecting your digital identity is crucial for privacy and security.
Using encryption, strong passwords, and authentication methods helps keep it
safe.
 Digital identity is a key element of today’s digital world for both users and
organizations.

 Managing Online Presence


 Managing online presence means controlling how you appear on the internet
and what information about you is accessible.
 It starts with using strong, unique passwords and enabling two-factor
authentication for all important accounts.
 Keeping privacy settings updated on social media helps control who can see
your posts and personal details.
 Avoid oversharing personal data like your home address, phone number, or
bank details online.
 Think before posting photos, comments, or opinions that may harm your
reputation later.
 Regularly search your name online to check what information about you is
public.
 Delete or update any outdated, unsafe, or unprofessional content linked to you.
Be cautious of phishing emails, suspicious links, and untrusted downloads.
Separate personal and professional accounts for better control over your
image.
 Engage positively online to build a good reputation for education, career, or
business purposes.
 Report and block any malicious or abusive online activity that targets you.
 Managing online presence reduces risks like cyber bullying, scams, and
identity theft while keeping your digital image safe.

Q7. How Do Parental Controls And Safe Browsing Tools Protect Kids Online?

Parental Controls and Safe Browsing Tools

 Parental controls and safe browsing tools are designed to protect children from
harmful online content and unsafe interaction.
 They allow parents to filter websites, blocking access to inappropriate or unsafe sites
like adult content or violent material.
 Parents can set screen time limits, ensuring kids do not spend too much time online
or on gaming platforms.
 These tools also help monitor online activity, such as search history, apps used, and
videos watched.
 Safe browsing tools automatically detect and block malicious websites that might
contain phishing links, malware, or scams.
 They provide age-appropriate search results, helping children access safe
educational content.
 Some tools allow location tracking to keep children physically safe when using
connected devices.
 Parents can receive alerts about suspicious activities or attempts to access blocked
content.
 This helps in teaching children safe and responsible internet behaviour.
Together, these tools reduce risks of cyber bullying, online predators, identity theft,
and accidental exposure to harmful content.
 They create a safer online environment where kids can learn, play, and explore
without unnecessary risks.

Q8. Why Is Staying Safe Online Important, And How Can People Protect Themselves?

 Why Staying Safe Online Is Important


 Staying safe online is very important because our daily life is connected to the
internet.
 We share personal data like names, phone numbers, bank details, and photos
on websites and apps.
 If this data is not protected, hackers can steal it and misuse it for fraud or
scams.
 Cybercriminals can hack accounts, spread malware, or steal money from
online banking apps.
 Phishing attacks can trick people into sharing passwords or OTPs, leading to
financial loss.
 Staying safe online also helps protect privacy, so strangers cannot misuse
your personal information.
 It reduces the risk of identity theft, where hackers pretend to be you for
illegal activities.
 Safe online practices prevent exposure to harmful content, cyberbullying, and
fake news.
 For students, staying safe keeps their online reputation clean and professional.
Employers and colleges often check social media, so a bad online image can
affect careers.
 Safe practices protect devices from viruses and ransomware that can lock or
delete data.
 It ensures children and teens have a safe, positive learning environment on the
internet.
 Safe online behavior also helps avoid addiction and unhealthy screen habits.
In short, online safety protects your data, money, devices, and mental well-
being.
 It creates a secure and trustworthy digital experience for everyone.
 How People Can Protect Themselves
 People can protect themselves by following good cybersecurity habits every day.
Use strong, unique passwords with a mix of letters, numbers, and symbols for all
accounts.
 Enable two-factor authentication (2FA) for email, banking, and social media for
extra protection.
 Keep all devices, apps, and software updated to patch security vulnerabilities.
Install a reliable antivirus and firewall to detect and block threats.
 Avoid clicking suspicious links, unknown email attachments, or pop-ups.
 Use a VPN or secure Wi-Fi when browsing or doing online transactions.
Review and update privacy settings on social media to limit who can see your data.
Do not overshare personal details like address, phone number, or financial info
publicly.
 Regularly back up important files on cloud storage or external drives.
 Be careful of phishing calls, messages, and fake websites before entering credentials.
Teach children about online safety and monitor their internet usage with parental
controls.
 Log out from accounts after using public or shared devices.
 Report and block any suspicious or harmful online activity immediately.
 By staying alert and following these steps, people can stay secure and enjoy the
benefits of the internet safely.

Q9. Discuss The Ethical And Responsible Use Of Technology With Examples.

 The ethical and responsible use of technology means using digital tools, devices, and
the internet in a way that is fair, respectful, and does not harm others.
It involves following moral principles, laws, and online etiquette while using
technology.
 Users should respect privacy by not misusing other people’s personal data or spying
on them.
 Intellectual property must be respected — avoid piracy of movies, software, music, or
books.
 Cyberbullying, trolling, and spreading hate speech are unethical and should be
avoided.
 Sharing false information or fake news can harm society and must be prevented.
Responsible use includes practicing cyber hygiene like strong passwords and secure
logins to protect systems.
 Students should use technology for learning and research, not for cheating or
plagiarism.
 Organizations must use data ethically, with consent, and follow data protection laws
like GDPR.
 AI systems should be designed to avoid bias and unfair discrimination.
Examples of ethical use include reporting a bug to developers instead of exploiting it,
or using licensed software legally.
 Another example is using parental controls to protect children from harmful content
online.
 Posting positive and respectful comments on social media is also responsible
technology use.
 Using technology mindfully (not overusing screen time) helps maintain mental well-
being.
 Ethical technology use creates a safe, trustworthy, and productive digital environment
for everyone.

Ethical / Responsible Practice Example


Not sharing someone’s personal photos or contact details
Respecting Privacy
without permission.
Buying genuine Microsoft Office instead of downloading a
Using Licensed Software
pirated version.
Avoiding Cyberbullying & Posting respectful comments on social media instead of
Hate Speech trolling or harassing others.
Following Data Protection Companies asking for user consent before collecting data
Laws (e.g., GDPR pop-ups).
Citing sources when using information for assignments or
Preventing Plagiarism
research work.
Verifying news before sharing it to avoid spreading fake
Spreading True Information
news or misinformation.
Using strong passwords, enabling 2FA, and keeping devices
Practicing Cyber Hygiene
updated.
Designing AI tools that are unbiased and do not
Using AI & Tech Responsibly
discriminate.
Informing a company about a security bug instead of
Reporting Issues Ethically
exploiting it.
Limiting gaming or social media use to maintain mental and
Managing Screen Time
physical health.

You might also like