CBSE Class 8  >  Class 8 Notes  >  National Cyber Olympiad   >  Chapter Notes: Cyber Safety

Chapter Notes: Cyber Safety

Introduction

The safest and most responsible use of information and communication technology is cyber safety. When using the Internet, safe practice means avoiding personal attacks, preventing unauthorised access, and not engaging in illegal activity.

The cyber safety strategy is based on:

  • Maintaining a balanced attitude to the many advantages of technology
  • Encouraging the public to recognise ICT-related risks
  • Establishing plans for reducing and managing risks
  • Recognising the value of effective programmes for teaching and learning

To keep systems and users safe we must understand viruses and malware. The following sections explain what they are, how they harm computers, how to spot them and how to protect yourself.

What is a Virus?

A computer virus is a small program that can enter a computer and self-replicate. Viruses commonly spread through unsafe browsing, opening infected email attachments, and using removable media such as USB drives. Once present, a virus can spread from one computer to another and interfere with normal operation. A virus may delete or corrupt files, alter settings, or use an email program to send copies of itself to contacts.

How a Virus Harms a Computer System

Some viruses are written specifically to damage computers by corrupting programs, erasing files, or reformatting the hard drive. Others replicate rapidly or flood a system with traffic, making it difficult to perform normal tasks. Even less destructive viruses can reduce system performance, consume memory and cause frequent crashes.

Key Symptoms of a Virus Infection

If you notice any of the following, scan your computer with a reputable antivirus program:

  • Unusually slow performance
  • Frequent crashes
  • Unknown or new programs that start when you turn on your computer
  • Mass messages being sent from your email account
  • Unexpected changes to home page settings or to passwords

Types of Computer Virus

  • Boot Sector Virus: Infects the master boot record; difficult to remove and often requires formatting. It usually spreads through removable media.
  • Multipartite Virus: Spreads in more than one way, for example by infecting both the boot sector and executable files.
  • Direct Action Virus: Also called a non-resident virus; it attaches to specific file types and activates when those files are used.
  • Resident Virus: Installs itself into computer memory and can be difficult to detect and remove.
  • Overwrite Virus: Overwrites files it infects, destroying the original content. Removal often requires deleting the infected file, losing its contents.

Malware

What is Malware?

Malware (malicious software) is a general term for programmes designed deliberately to cause harm to a computer system, server, user device or network. Malware includes viruses, ransomware, spyware, worms, Trojan horses, adware, rogue software and scareware. Malware is commonly delivered as links or files in email and requires a user to click the link or open the file to execute the malicious code.

Malware has been a threat since the mid-1970s when the Creeper experiment appeared. Since then many malware variants have been created and used to attack computer systems.

How Malware Harms a Computer System

Malware can:

  • Steal passwords and personal data
  • Delete or corrupt files
  • Make computers inoperable
  • Allow attackers remote access to devices
  • Use infected devices to attack other systems

Key Symptoms of Malware Infection

Signs that your computer may be infected include:

  • Computer becomes slow and unresponsive
  • Frequent crashes and restarts
  • Applications crash often
  • Storage space is unexpectedly used or files are missing
  • Unusual error messages
  • Unwanted pop-up messages

If you observe these symptoms, there is a high chance of malware infection and you should run a full malware scan and follow removal guidance from a trusted security vendor.

Common Types of Malware

  • Virus: Intended to damage or disrupt systems and data.
  • Worm: A self-replicating programme that spreads over networks by exploiting system weaknesses; it does not require user action to replicate.
  • Trojan Horse: Malicious software disguised as legitimate software to trick users into installing it; once installed it can damage files or allow attackers access.
  • Spyware: Software that collects a user's browsing and activity data without permission.
  • Ransomware: Encrypts or steals data and demands payment to restore access.

Safely Browsing the Web and Using Social Networks

We live in a digital age where much of our life is online. Safe browsing and responsible use of social networks require awareness of identity protection, strong passwords, privacy settings, confidentiality, cyber stalking and reporting cybercrime. The following subsections explain each of these concepts and give practical advice.

Identity Protection

Identity protection means using methods to ensure that personal data which represents you online or offline is secure and not stolen or misused so others cannot impersonate you (for example to access your bank accounts or create online profiles in your name).

What is Identity Theft?

Identity theft occurs when someone uses your personal data without your consent. Thieves can use stolen identity to access funds, open accounts, commit fraud, or impersonate you for other crimes. Complete protection is difficult, but being vigilant helps reduce risk and enables a fast response if theft occurs.

How to Protect Your Identity

  • Protect your computer and phone with up-to-date security software
  • Learn to spot spam, phishing and scams
  • Use strong, unique passwords for each account
  • Be alert about what personal information you share online
  • Enable additional protections such as two-factor authentication where offered

Password or Secret Key

A password (or secret key) is a string of characters used to confirm a user's identity during authentication. Passwords are usually used with a username and should be known only to the user. Passwords may contain letters, numbers and special symbols. Other related terms are passphrase (longer password of multiple words) and PIN (numeric password).

Steps to Use Passwords Properly

  • Treat a password as the gatekeeper between your personal data and potential online threats.
  • Create unique passwords for each online account to prevent a breach of one account from affecting others.
  • Use passwords to protect all devices: PC, tablet and phone.
  • Consider a reputable password manager to store and generate complex passwords.

How to Create a Strong Password

  • Make it at least eight characters long (longer is better).
  • Use a mix of upper- and lower-case letters and at least one number.
  • Include at least one non-alphanumeric symbol (for example: ! @ # $ %).
  • Use the first letters of each word from a memorable sentence, and substitute some letters with similar numbers (for example replace 'e' with '3').
  • Use a combination of unrelated words, pet names and favourite numbers rather than obvious personal data such as birthdays or addresses.

Privacy

Privacy is the ability to control what computer and Internet data you disclose about yourself and who can access that personal data.

Computer Privacy

Computer privacy is the ability to control what computer data you reveal about yourself and to control who may access this personal information.

Internet Privacy

Internet privacy is a part of computer privacy. It concerns what information you reveal about yourself online, which websites and web applications can access your data, and whether those sites and applications are trustworthy.

What is Personal Information?

Your computer and online activities store and reveal much personal information, such as:

  • Websites you have visited
  • Files, folders, photos and videos you have created or opened
  • Email addresses, chat names and passwords
  • Bank and credit card information
  • Messages and communications (for example Skype, messaging apps)
  • Work, education or creative content you have produced
  • Online shopping activities and purchase history
  • Photos, videos, age, hobbies and preferences
  • Any other personal records stored electronically

All computer and internet information you consider private is part of your personal data.

How to Generate Secure Passwords

  • Avoid using the same short or simple password for all accounts; this greatly increases risk.
  • Attackers often try obvious details (name, pet, birthday) first, so avoid these.
  • Hacked passwords can be used to send spam, steal money or private data, or install malware on your devices.
  • Use a password manager to create and store strong, unique passwords for every account.

Confidentiality of Information

Confidentiality means protecting information so that only authorised people can access it. Most major security incidents reported in the media involve confidentiality breaches.

Things That You Should Keep Confidential

  • Social security numbers or national identity numbers
  • Phone numbers of friends, family, colleagues or students
  • Driver's licence numbers
  • Bank account numbers
  • Tax information
  • Passwords and login IDs
  • Home address and telephone numbers
  • Employee ID numbers
  • Digital photographs and videos
  • Any personal electronic records containing sensitive content

How to Protect Confidential Information

  • Encrypt sensitive files and documents
  • Manage and limit access to information
  • Physically secure devices and paper records
  • Securely dispose of information, devices and paper records
  • Control how information is collected and minimise unnecessary collection
  • Monitor and control how information is used
  • Keep devices patched and managed (install security updates)

Cyber Stalking

What is Cyber Stalking?

Cyber stalking is online stalking that involves repeated use of the Internet or other electronic means to harass, threaten or frighten a person or group. It can include false accusations, posting slanderous statements, monitoring someone's online activity or physical location, identity theft, or sending malware to a victim's devices.

Cyber stalkers may use email, texts, social network messages and other communications to follow or intimidate a person. Cyber stalking can appear as unwanted attention, persistent contact, or intrusive interest in someone's life and family activities.

Why We Must Be Aware of Cyber Stalking

  • Cyber stalking can take many forms and is often repeated over time via social networks, forums or email.
  • It can begin with seemingly harmless messages but can become systematic and threatening.
  • Not every negative comment is cyber stalking, but repeated or targeted messages that cause fear or distress may be.

Important Instructions to Fight Cyber Stalking

  • Be careful about allowing physical access to your computer and other internet-enabled devices; attackers may install hardware or software to monitor activity.
  • Always log out of web accounts when stepping away from a computer and use a screensaver with password protection. Use similar habits on mobile devices.
  • Use strong password management and account privacy settings. Change passwords regularly and use a password manager if needed.
  • Remove or set to private any online calendars where you list events. Such details can tell a stalker where you will be.
  • Limit the personal information shown on social networks (name, DOB, workplace, home town). Use privacy settings to restrict who sees your posts and photos and to prevent your profile appearing in public searches where possible.

What is Cyber Crime?

Cyber crime is any crime that targets or uses a computer, computer network or network device. Cybercrime can be committed by individuals or organised groups. Some attackers seek money, while others act for political, personal or other motives. Attackers range from highly skilled professionals to beginners.

Types of Cyber Crime

  • DDoS Attacks: Distributed Denial of Service attacks make an online service unavailable by overwhelming it with traffic from many sources. Botnets-large networks of infected devices-are often used to create this traffic.
  • Botnets: Networks of compromised computers controlled remotely by attackers. Botnets can send spam, distribute malware or be used in attacks such as DDoS.
  • Identity Theft: Criminals access a person's personal information to steal money, access private data, commit insurance or tax fraud, or create accounts in the victim's name. They may obtain passwords by hacking, collecting data from social media or using phishing.
  • Cyber Stalking: Repeated online harassment that causes the victim fear or distress. Cyber stalkers may know the victim personally and use social media, search tools or messaging to intimidate.
  • Social Engineering: Attackers contact victims by phone, email or social media and pretend to be a trusted person (for example, a support technician) to gain confidential information such as passwords or bank data.
  • Where to Report Cyber Crime: You can file a cyber crime complaint or first information report (FIR) at the nearest police station. Under Section 154 of the Code of Criminal Procedure (CrPC) it is the duty of police to register information or a complaint of an offence.

Practical Measures to Stay Safe Online

  • Keep your operating system, browser and applications up to date with security patches.
  • Use reputable antivirus and anti-malware software and run regular scans.
  • Enable two-factor authentication (2FA) on accounts that support it.
  • Be cautious when clicking links or opening attachments in emails, even if they appear to come from known contacts-verify first.
  • Do not download software from unknown or untrusted websites.
  • Use secure (HTTPS) websites when entering sensitive information.
  • Back up important files regularly to an external drive or trusted cloud storage, so you can recover data if ransomware locks your files.
  • Educate family members, especially children, about online risks and safe behaviour.

Summary

Understanding viruses, malware, privacy, passwords, cyber stalking and cyber crime helps you use the Internet safely and responsibly. Use strong passwords, keep software updated, learn to spot scams, protect confidential information and report serious incidents to the police. These habits will reduce risk and keep your online life more secure.

The document Chapter Notes: Cyber Safety is a part of the Class 8 Course National Cyber Olympiad Class 8.
All you need of Class 8 at this link: Class 8

FAQs on Chapter Notes: Cyber Safety

1. What are the main types of cyber threats that Class 8 students should know about?
Ans. Cyber threats include malware, phishing scams, identity theft, cyberbullying, and ransomware attacks. Malware is malicious software designed to damage devices, while phishing involves fraudulent emails or messages tricking users into revealing personal information. Cyberbullying occurs through online harassment, and ransomware locks your files until payment is made. Understanding these digital dangers helps students recognize and avoid online risks effectively.
2. How can I protect my passwords and keep my online accounts secure?
Ans. Create strong passwords using a mix of uppercase letters, numbers, and special characters-avoid birthdays or common words. Never share passwords with anyone, including friends, and use different passwords for each account. Enable two-factor authentication when available as an extra security layer. Change passwords regularly, especially after suspicious activity. These practises significantly reduce the risk of unauthorised account access and data breaches.
3. What should I do if someone is cyberbullying me online?
Ans. Stop engaging with the bully immediately and don't respond to hurtful messages. Document the harassment by taking screenshots, then block the person on all platforms. Report the cyberbullying to the website or app administrator and inform your parents or teachers. Seek support from trusted adults who can guide you through proper reporting channels. Never retaliate, as this can escalate the situation further.
4. Why is it dangerous to share personal information on social media and chat apps?
Ans. Sharing personal details like your home address, phone number, or school name exposes you to identity theft, stalking, and scams. Predators use this information to locate minors or manipulate them into dangerous situations. Once posted online, information spreads permanently and remains searchable. Cyber criminals exploit shared data for fraud. Limiting what you reveal protects your privacy and keeps you safer in digital spaces.
5. What are safe online practices I should follow to stay protected from cyber attacks?
Ans. Always verify website URLs before entering login credentials, use only secure Wi-Fi networks, and install antivirus software on your devices. Keep your operating system and apps updated with the latest security patches. Avoid downloading files from unknown sources and be cautious about clicking suspicious links. Refer to flashcards and mind maps on EduRev to reinforce these cyber safety habits and digital hygiene practises for long-term protection.
Explore Courses for Class 8 exam
Get EduRev Notes directly in your Google search
Related Searches
pdf , MCQs, Free, Viva Questions, Chapter Notes: Cyber Safety, Sample Paper, Extra Questions, video lectures, Semester Notes, practice quizzes, shortcuts and tricks, ppt, Objective type Questions, Exam, past year papers, Chapter Notes: Cyber Safety, Summary, Previous Year Questions with Solutions, Chapter Notes: Cyber Safety, mock tests for examination, study material, Important questions;