Class 10 Exam  >  Class 10 Notes  >  Information Technology for Class 10  >  Internet Security

Internet Security | Information Technology for Class 10 PDF Download

As we are using internet for many purposes in a day. So security is also one of the major concern for it. While using internet you have to take care of two aspects concern to security.

  • The browser security
  • The network security

Security refers to follow some rules and guideline to protect the data and information shared on the internet. There is a huge risk of data when you are online if you are not following some basic protocols.
While performing online transactions, you need to check some security aspects.
There are many online threats which may lead to steal your information online. Whatever sensitive data like username, passwords, credit cards and debit cards information, you are providing while performing the online transactions can be tracked by some unauthorized users.
Some websites release links and malware without your consent which are very dangerous and can damage the computer and steal your information.

Online threats

There are some online threats discussed below:

  • Phishing: Phishing is an activity that demands your sensitive data like bank details, username or passwords, credit card details, and other details through email attachments or links. The links redirect you to such a fake website that looks too similar to the bank’s website and asks to enter data.
  • Email Spoofing: Email spoofing is an activity of an email from a source that is fake and used for phishing emails and spam emails to run a campaign. The main goal of email spoofing is that recipient opens a message and click on the links provided in that email.
  • Chat Spoofing: It similar to email spoofing on the chat platform.
  • Eavesdropping: Eavesdropping is a process like listening online. In this technique, a third party is observing the communication happening between you and your partner. The hackers may attempt to take out your data from a website directly.
  • Denial of Services: The DoS attack refers to an attack from a large number of computers to a single target and tries to prevent the device from properly functioning.
  • Password Attack: Password attacks are a common security threat that is aimed to guess your password or steal your password using different tricks such as dictionary attacks (common words and numbers), brute force attack (uses a program to generate similar kind of passwords), Man-in-the-middle attack (Impersonates an app or website to capture passwords), Keylogger attack (Tracks the keystrokes for a user to collect their password), Social engineering attack(Uses phishing techniques or personal interaction to get passwords).
  • Viruses: Viruses are malicious program or harmful program which can damage the computer system, memory and replicate themselves. To read more about virus click here.

Best Practices for security

To reduce the risks follow these best practices:

  1. Use updated antivirus or antispyware software: Install and use a valid antivirus or antispyware software
  2. Install and Use a firewall: A firewall is software or hardware that provides a dialog box to allow the services or deny. It controls the incoming traffic and services.
  3. Use strong passwords: A strong password is a combination of character, numbers and special characters. The following points can be taken into consideration while assigning a strong password:
    • Do not use simple passwords like your favourite colour, bike number, hero, date of birth, mobile number, repetition password, common dictionary words, letter or number sequence, usernames, relative or pet names etc.
    • Change your password frequently
    • Keep the password length up to 12-24 characters
    • Use capital and lower-case letters
    • Avoid using similar passwords for different websites
    • Avoid using something which is publicly known
    • Use random password generators
  4. Use encryption software: Encryption software can be downloaded from the website. It is used to protect data from unauthorised users.
  5. Keep username password private: The username and password cannot be shared or saved on computers.
  6. Clear browser history frequently: Sometimes a computer is used in a shared environment in the offices. The browsers store the information related to the user’s logins and sessions in cookies. So whenever one user session is ending, the history must be cleared.
  7. Privacy Policies: Read the privacy policies and agreement about to use personal data while accepting the agreement.
  8. Don’t share personal information: Be careful while filling up the details of the form such as name, gender, age, and other data. Share data with open eyes.
  9. Secure Transactions: While doing online shopping or transactions, ensure that the website is secured. As you can see a lock icon on the address bar in front of the website’s address.
  10. Don’t respond to unknown mails: While using emails, we are receiving hundreds of unknown emails, do not respond to such emails or click on any links.
  11. Keep up to date software: Download and install regular updates for the applications and operating systems.
  12. Don’t install software from unknown sources: While downloading the software and applications, use trustworthy and reputed sources.
  13. Remove unwanted software: Some applications may be installed automatically while using the internet, remove such applications.
The document Internet Security | Information Technology for Class 10 is a part of the Class 10 Course Information Technology for Class 10.
All you need of Class 10 at this link: Class 10
4 videos|27 docs|8 tests

Top Courses for Class 10

4 videos|27 docs|8 tests
Download as PDF
Explore Courses for Class 10 exam

Top Courses for Class 10

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

Internet Security | Information Technology for Class 10

,

past year papers

,

Objective type Questions

,

Internet Security | Information Technology for Class 10

,

ppt

,

study material

,

Exam

,

Viva Questions

,

shortcuts and tricks

,

Extra Questions

,

Important questions

,

practice quizzes

,

Sample Paper

,

Internet Security | Information Technology for Class 10

,

pdf

,

Summary

,

video lectures

,

Semester Notes

,

Previous Year Questions with Solutions

,

MCQs

,

mock tests for examination

,

Free

;