CYBER SECURITY AND PASSWORD PROTECTION
(EDU.03)
SUBMITTED TO SUBMITTED BY
MRS.DEEPA MISS SHAHNA SHAJAHAN
MEACT, B.Ed COLLEGE B.Ed ENGLISH
MAJAPPARA MEACT,MANJAPPARA
INTRODUCTION
Privacy may be defined as the claim of individuals , groups or instituitions to determine when ,how and to what extend information about them is communicated to others. Privacy is our right to control what happens with personal information about us.
The use of the internet can affect the privacy rights a person has in his or her identity or personal data. Internet usage and transactions generate a large insights into our personality and interests. Privacy issues relating to identity include the possible appropriation of a person’s email identity and address ease of access to and the appropriation of email address have led to the practice of ending vast amounts of unsolicited e-mails (spam).
Identification through email and website transactions and the ability to locate people’s physical addresses easily through national and international directories have raised new privacy concerns. Privacy issues relating to personal data arise from insecure electronic transmissions, data trails and logs of email messages ,online transmissions , messages and tracking of web pages visited.
Privacy invasion issues arise from data matching (the process of wholesale cross checking of data from one source against another source such as tax and social security data) and personal profile extraction processes which use this data alone or in combination with other publicly available data.
CYBER PRIVACY
Cyber privacy is mostly defined by the services used by the individuals. Whatever agreements individuals agree to when they sign up for a services usually signed away their right to privacy. In other cases the reasonable expectation of privacy is not reasonable if the behaviors of communications in question were knowingly exposed to public view.
Cyber privacy is the privacy and security level of personal data published via the Internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences. Cyber-Privacy is a huge concern for civilians and especially for companies because of the potential for crime. Such crimes include:
• Malware (such as the use of malicious code which can compromise a user's identity and/or information).
• Denial of Service Attacks (which blocks a user from accessing his or her information).
• Computer Viruses (can compromise user information as well as identity).
• All of these crimes fall under the category of fraud, identity theft, scams and information warfare.
• Other cyber crimes include: casual sharing of copyrighted software ,theft of trade secrets and product pricing ,unlawful copying of copyrighted software, accessing confidential employee records ,computer-directed diversion of funds ,unauthorized access to computer files ,office network for personal purposes.
The Cyber-Privacy Project attempts to raise public awareness and promote the education of Cyber Privacy to prevent crimes from happening.
PASSWORD PROTECTION
A password is a word or string of characters used for authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password),which should be kept secret from those not allowed access. The use of passwords is known to be ancient. Entries would challenge those wishing to enter an area or approaching it to supply a password or watchword, and would only allow a person or a group to pass if they knew the password.
In modern times, usernames and passwords are commonly used by people during log in process that controls access to protected computer operating systems , mobile phones ,cable TV decoders, ATMs etc. A typical computer user have passwords for many purposes: logging into accounts, databases, networks , websites and even reading the morning newspaper online.
Most organization specify a password policy that sets requirements for the composition and usage of passwords, typically dictating minimum length,required categories (e.g: upper and lower case, numbers and special characters) and prohibited elements (eg: Own name , date of birth ,address, telephone number).Some governments have national authentication frameworks that define requirements for user authentication to government services, including requirements for passwords.
Every password is important with the many ways we use the internet, its easy to consider some passwords less important than others. However, all passwords are important because wrongdoers can piece together the information you store online and use it for their benefit. They can even use information you share on social media networks. And commercials websites gives customers the ability to store billing and shipping addresses along with credit card information.
STEPS TO SECURE PASSWORDS
Never reveal your passwords to others.
You probably wouldn’t give your ATM card and PIN to a stranger and then walk away. So, why would you give away your username and password? Your login credentials protect information as valuable as the money in your bank account. Nobody needs to know them but you—not even the IT department. If someone is asking for your password, it’s a scam.
Use different passwords for different accounts.
That way, if one account is compromised, at least the others won’t be at risk.
Length trumps complexity.
The longer a password is, the better. Use at least 16 characters whenever possible.
Make passwords that are hard to guess but easy to remember.
- To make passwords easier to remember, use sentences or phrases. For example, “breadandbutteryum”. Some systems will even let you use spaces: “bread and butter yum”.
- Avoid single words, or a word preceded or followed by a single number (e.g. Password1). Hackers will use dictionaries of words and commonly used passwords to guess your password.
- Don’t use information in your password that others might know about you or that’s in your social media (e.g. birthdays, children’s or pet’s names, car model, etc.). If your friends can find it, so will hackers.
Complexity still counts.
To increase complexity, include upper and lower case letters, numbers, and special characters. A password should use at least 3 of these choices. To make the previous example more secure: “Bread & butter YUM!”
Use a password manager.
Password management tools, or password vaults, are a great way to organize your passwords. They store your passwords securely, and many provide a way to back-up your passwords and synchronize them across multiple systems. Though the University does not recommend any one solution, here are some examples of free password managers.
CONCLUSION
As individuals grow more dependent on and connected to the cyberspace, they will become more reliant on organizations’ effective implementation of cyber security and sensitivity to privacy. The following are some of the key areas in which an increased emphasis on privacy protection could help support, advance and augment cyber security activities.
• Building privacy values into cyber security policy directions.
• Legislative approaches that incentivize cyber security preparedness.
• Facilitating broader dialogue on cyber security that acknowledges its importance for privacy, trust, and responsible data stewardship.
International legal issues of cyber attacks are complicated in nature. There is no global base of common rules to judge, and eventually punish, cybercrimes and cybercriminals - and where security firms or agencies do locate the cybercriminal behind the creation of a particular piece of malware or form of cyber attack, often the local authorities cannot take action due to lack of laws under which to prosecute.
WORKS CITED
• Wikipedia contributors.(2021 ,December 2). Computer Security.Wikipedia.
https://en.wikipedia.org/wiki/Computer_security
• Slide Share (2022).Cyber Privacy and Password Protection.
https://www.slideshare.net/bavijesh/cyber-law-and-password-protection
https://www.it.ucsb.edu/secure-compute-research-environment-user-guide/password-best-practices.
No comments:
Post a Comment