Page 1
Since childhood our parents and elders have been
guiding and suggesting us to take care of our eating
habits, practice hygiene, be wary of strangers,
communicate effectively and so on to ensure that we
develop into confident, strong and positive individuals
who are able to cope up with the competition and
complexities of the real world. With the advent of
Fig. 7.1: Cyber World
Digital footprint is
the information
about a particular
person that exists
on the Internet as a
result of their online
activity even after its
deletion.
Safety and Security
in the Cyber World
Chapter
7
Chapter 7.indd 93 28-Feb-19 3:40:50 PM
2024-25
Page 2
Since childhood our parents and elders have been
guiding and suggesting us to take care of our eating
habits, practice hygiene, be wary of strangers,
communicate effectively and so on to ensure that we
develop into confident, strong and positive individuals
who are able to cope up with the competition and
complexities of the real world. With the advent of
Fig. 7.1: Cyber World
Digital footprint is
the information
about a particular
person that exists
on the Internet as a
result of their online
activity even after its
deletion.
Safety and Security
in the Cyber World
Chapter
7
Chapter 7.indd 93 28-Feb-19 3:40:50 PM
2024-25
ICT Tex Tbook — Class Ix 94
Internet, all of us have also become a part of a cyber
world wherein we share and access resources, connect
and interact with many people. Just like real world we
need to be cautious and alert while working in this cyber
world as well.
Email is used to send and receive information and
messages but one needs to be careful while using email
as many a times one may find emails which are from
unknown source saying that you are a lucky winner
or asking you to provide personal information. These
mails will tempt you to follow the instructions written
in the contents of the mail. Such emails are called spam
mails and are sent with malicious intent to get you
into trouble.
Let’s look at some of the examples of spam mails.
Fig. 7.2 : Sample email-1
Chapter 7.indd 94 7/20/2020 11:23:04 AM
2024-25
Page 3
Since childhood our parents and elders have been
guiding and suggesting us to take care of our eating
habits, practice hygiene, be wary of strangers,
communicate effectively and so on to ensure that we
develop into confident, strong and positive individuals
who are able to cope up with the competition and
complexities of the real world. With the advent of
Fig. 7.1: Cyber World
Digital footprint is
the information
about a particular
person that exists
on the Internet as a
result of their online
activity even after its
deletion.
Safety and Security
in the Cyber World
Chapter
7
Chapter 7.indd 93 28-Feb-19 3:40:50 PM
2024-25
ICT Tex Tbook — Class Ix 94
Internet, all of us have also become a part of a cyber
world wherein we share and access resources, connect
and interact with many people. Just like real world we
need to be cautious and alert while working in this cyber
world as well.
Email is used to send and receive information and
messages but one needs to be careful while using email
as many a times one may find emails which are from
unknown source saying that you are a lucky winner
or asking you to provide personal information. These
mails will tempt you to follow the instructions written
in the contents of the mail. Such emails are called spam
mails and are sent with malicious intent to get you
into trouble.
Let’s look at some of the examples of spam mails.
Fig. 7.2 : Sample email-1
Chapter 7.indd 94 7/20/2020 11:23:04 AM
2024-25
Safety and Security in the c yber World 95
In the Fig. 7.2 given above, you can find some common
signals that you would usually find in a spam email.
Assume there is another email in your inbox asking you
to download a popular game for free which otherwise
costs `3,500/- as shown in Fig. 7.3.
Activity 1
In the Fig. 7.3 given above, which one of the following
proves that it is a fake email? Choose the option from
the list given below.
• The offer is valid only for the next 48 hours.
• Incorrect spelling of FIFA in the email ID in ‘From’
Box.
• The cost of the game mentioned in the mail is not
correct.
Assume there is another email in your inbox which
contains links asking you to provide account details
for verification purpose. If you click on such links or
download any attachments, they may lead you to a
phishing website or install harmful malware (malicious
software) on your device, as shown in Fig. 7.4.
Fig. 7.3: Sample email-2
Chapter 7.indd 95 7/20/2020 11:23:04 AM
2024-25
Page 4
Since childhood our parents and elders have been
guiding and suggesting us to take care of our eating
habits, practice hygiene, be wary of strangers,
communicate effectively and so on to ensure that we
develop into confident, strong and positive individuals
who are able to cope up with the competition and
complexities of the real world. With the advent of
Fig. 7.1: Cyber World
Digital footprint is
the information
about a particular
person that exists
on the Internet as a
result of their online
activity even after its
deletion.
Safety and Security
in the Cyber World
Chapter
7
Chapter 7.indd 93 28-Feb-19 3:40:50 PM
2024-25
ICT Tex Tbook — Class Ix 94
Internet, all of us have also become a part of a cyber
world wherein we share and access resources, connect
and interact with many people. Just like real world we
need to be cautious and alert while working in this cyber
world as well.
Email is used to send and receive information and
messages but one needs to be careful while using email
as many a times one may find emails which are from
unknown source saying that you are a lucky winner
or asking you to provide personal information. These
mails will tempt you to follow the instructions written
in the contents of the mail. Such emails are called spam
mails and are sent with malicious intent to get you
into trouble.
Let’s look at some of the examples of spam mails.
Fig. 7.2 : Sample email-1
Chapter 7.indd 94 7/20/2020 11:23:04 AM
2024-25
Safety and Security in the c yber World 95
In the Fig. 7.2 given above, you can find some common
signals that you would usually find in a spam email.
Assume there is another email in your inbox asking you
to download a popular game for free which otherwise
costs `3,500/- as shown in Fig. 7.3.
Activity 1
In the Fig. 7.3 given above, which one of the following
proves that it is a fake email? Choose the option from
the list given below.
• The offer is valid only for the next 48 hours.
• Incorrect spelling of FIFA in the email ID in ‘From’
Box.
• The cost of the game mentioned in the mail is not
correct.
Assume there is another email in your inbox which
contains links asking you to provide account details
for verification purpose. If you click on such links or
download any attachments, they may lead you to a
phishing website or install harmful malware (malicious
software) on your device, as shown in Fig. 7.4.
Fig. 7.3: Sample email-2
Chapter 7.indd 95 7/20/2020 11:23:04 AM
2024-25
ICT TEXTBOOK — CLASS IX 96
Phishing is an
attempt to obtain
sensitive information
such as username,
password and credit
card details etc. for
malicious reasons,
by osing as a
trustworthy source in
email.
Fig. 7.4: Sample email-3
Activity 2
Identify the URL(s) which are indicative of a fake
website?
http://www.uiidai.gov.in/
http://www.incometakindiaefilling.gov.in/
https://onlinesbi.com
The above scenarios are examples of fraudulent emails.
You need to be cautious before proceeding with any of
the instructions given in the email.
Chapter 7.indd 96 28-Feb-19 3:40:51 PM
2024-25
Page 5
Since childhood our parents and elders have been
guiding and suggesting us to take care of our eating
habits, practice hygiene, be wary of strangers,
communicate effectively and so on to ensure that we
develop into confident, strong and positive individuals
who are able to cope up with the competition and
complexities of the real world. With the advent of
Fig. 7.1: Cyber World
Digital footprint is
the information
about a particular
person that exists
on the Internet as a
result of their online
activity even after its
deletion.
Safety and Security
in the Cyber World
Chapter
7
Chapter 7.indd 93 28-Feb-19 3:40:50 PM
2024-25
ICT Tex Tbook — Class Ix 94
Internet, all of us have also become a part of a cyber
world wherein we share and access resources, connect
and interact with many people. Just like real world we
need to be cautious and alert while working in this cyber
world as well.
Email is used to send and receive information and
messages but one needs to be careful while using email
as many a times one may find emails which are from
unknown source saying that you are a lucky winner
or asking you to provide personal information. These
mails will tempt you to follow the instructions written
in the contents of the mail. Such emails are called spam
mails and are sent with malicious intent to get you
into trouble.
Let’s look at some of the examples of spam mails.
Fig. 7.2 : Sample email-1
Chapter 7.indd 94 7/20/2020 11:23:04 AM
2024-25
Safety and Security in the c yber World 95
In the Fig. 7.2 given above, you can find some common
signals that you would usually find in a spam email.
Assume there is another email in your inbox asking you
to download a popular game for free which otherwise
costs `3,500/- as shown in Fig. 7.3.
Activity 1
In the Fig. 7.3 given above, which one of the following
proves that it is a fake email? Choose the option from
the list given below.
• The offer is valid only for the next 48 hours.
• Incorrect spelling of FIFA in the email ID in ‘From’
Box.
• The cost of the game mentioned in the mail is not
correct.
Assume there is another email in your inbox which
contains links asking you to provide account details
for verification purpose. If you click on such links or
download any attachments, they may lead you to a
phishing website or install harmful malware (malicious
software) on your device, as shown in Fig. 7.4.
Fig. 7.3: Sample email-2
Chapter 7.indd 95 7/20/2020 11:23:04 AM
2024-25
ICT TEXTBOOK — CLASS IX 96
Phishing is an
attempt to obtain
sensitive information
such as username,
password and credit
card details etc. for
malicious reasons,
by osing as a
trustworthy source in
email.
Fig. 7.4: Sample email-3
Activity 2
Identify the URL(s) which are indicative of a fake
website?
http://www.uiidai.gov.in/
http://www.incometakindiaefilling.gov.in/
https://onlinesbi.com
The above scenarios are examples of fraudulent emails.
You need to be cautious before proceeding with any of
the instructions given in the email.
Chapter 7.indd 96 28-Feb-19 3:40:51 PM
2024-25
Safety and Security in the c yber World 97
Protection from email fraud
• Do not reply to emails from unknown senders even if
it looks like a genuine email.
• Do not provide personal information like name, date
of birth, school name, address, parent’s names or any
other information.
• Do not fall for lucrative offers/discounts as they might
be coming from unknown source and it may not be
reliable. Ignore/delete those mails.
• Do not open attachments or click on links from
unknown senders, since they may contain
malicious files that might affect your device. Only
click the links and downloads from websites that
you trust.
• Beware of phishing websites — check the URL to
confirm if the website is secure.
• Do not forward spam or suspicious emails to others.
• Do not send excessive forwards as it might be
distracting to the receiver.
You have learnt how to use email for sharing information
and what safety precautions to be taken while using
email. Through email you can reach out to people only
if you have their email ID.
Activity 3
Can you think of ways to share your event with a larger
audience?
The Internet allows us to exchange and share
information, connect with people online across the
world and create our own networks through social
networking sites.
In order to create an account on a social networking site
you need to use your email ID as username.
Chapter 7.indd 97 28-Feb-19 3:40:51 PM
2024-25
Read More