ICT

Cyber Safety and Security Threats, CBSE Class 9 ICT

Complete notes on cyber safety for CBSE Class 9 ICT. Covers viruses, malware, phishing, cyberbullying, safe browsing, and online safety tips.

Cyber safety is one of the most important and frequently tested topics in CBSE Class 9 ICT. In today's digital age, understanding online threats and how to protect yourself is essential. This guide covers all security threats, types of malware, and safety measures you need to know.

What is Cyber Safety?

Cyber Safety refers to the safe and responsible use of the Internet and technology. It involves protecting yourself from online threats like hacking, viruses, identity theft, and cyberbullying.

Types of Cyber Threats

1. Malware (Malicious Software)

Malware is any software designed to harm or exploit computers and networks. There are several types:

Type Description How It Spreads
Virus Attaches itself to a file and spreads when the file is executed Email attachments, USB drives, downloads
Worm Replicates itself and spreads across networks without user action Network connections, emails
Trojan Horse Disguises itself as legitimate software Free software downloads, email links
Spyware Secretly monitors user activity and collects data Software bundles, malicious websites
Adware Displays unwanted advertisements Free software bundles
Ransomware Encrypts files and demands money to unlock them Email attachments, malicious links
Keylogger Records every keystroke to steal passwords Trojan installations, phishing

Exam tip: Know the difference between virus, worm, and Trojan. A virus needs a host file, a worm spreads on its own, and a Trojan pretends to be useful software.

2. Phishing

Phishing is a type of cyber attack where criminals send fake emails or create fake websites that look like legitimate ones to steal personal information like passwords, credit card numbers, and bank details.

Example of phishing:

  • You receive an email that looks like it is from your bank, The email says "Your account will be blocked. Click here to verify", The link takes you to a fake website that looks exactly like your bank's site, When you enter your password, the criminals steal it

How to Identify Phishing:

  1. Check the sender's email address carefully
  2. Look for spelling and grammar mistakes
  3. Do not click on suspicious links
  4. Legitimate organizations never ask for passwords via email
  5. Check the URL, look for https:// and the correct domain name

3. Hacking

Hacking is the unauthorized access to a computer system or network. A person who hacks is called a hacker.

Type of Hacker Also Known As Intent
White Hat Ethical Hacker Tests security with permission
Black Hat Cracker Malicious intent, illegal
Grey Hat - Hacks without permission but without malicious intent

4. Identity Theft

Identity theft occurs when someone steals your personal information and uses it to pretend to be you. They may use your name, Aadhaar number, or bank details for fraud.

5. Cyberbullying

Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. It includes:

  • Sending threatening messages, Spreading rumors online, Posting embarrassing photos without permission, Creating fake profiles to mock someone, Excluding someone from online groups deliberately

How to Deal with Cyberbullying:

  1. Do not respond to the bully
  2. Save evidence - take screenshots
  3. Block the person on all platforms
  4. Report the behavior to the platform
  5. Tell a trusted adult - parent, teacher, or counselor
  6. If serious, report to cyber crime authorities

6. Cyber Stalking

Cyber Stalking is the repeated use of the Internet or electronic communication to harass or frighten someone. It includes following someone's online activity, sending threatening emails, and monitoring their location.

7. Spam

Spam refers to unwanted, unsolicited messages sent in bulk, usually by email. Spam can:

  • Clog your inbox, Contain phishing links, Carry malware in attachments, Waste your time and bandwidth

Online Safety Measures

Password Safety

A strong password is your first line of defense.

Rules for creating a strong password:

  1. Use at least 8-12 characters
  2. Include a mix of uppercase and lowercase letters
  3. Include numbers (0-9)
  4. Include special characters (!@#$%^&*)
  5. Do not use personal information (name, birthday)
  6. Do not use dictionary words
  7. Use different passwords for different accounts
  8. Change passwords regularly

Example of a weak password: password123, rahul2010

Example of a strong password: R@hul#2k10!Mx

Safe Browsing Practices

  1. Use HTTPS websites (look for the padlock icon)
  2. Do not click on suspicious links or pop-ups
  3. Do not download software from untrusted sources
  4. Keep your browser updated
  5. Clear browsing history and cookies regularly
  6. Use private/incognito mode on shared computers
  7. Log out of accounts after use, especially on shared computers

Social Media Safety

  1. Set profiles to private
  2. Do not share personal information (phone number, address, school name)
  3. Do not accept friend requests from strangers
  4. Think before you post - once online, always online
  5. Review privacy settings regularly
  6. Do not share your location publicly
  7. Report suspicious accounts or behavior

Email Safety

  1. Do not open attachments from unknown senders
  2. Do not click links in suspicious emails
  3. Verify the sender's email address
  4. Use spam filters
  5. Do not share sensitive information via email

Antivirus Software

Antivirus software is a program designed to detect, prevent, and remove malware from your computer.

How Antivirus Works:

  1. Scanning - Checks files and programs for known malware patterns
  2. Real-time protection - Monitors activity in real-time
  3. Quarantine - Isolates suspicious files
  4. Updates - Downloads new virus definitions regularly

Popular Antivirus Software:

  • Quick Heal, Norton, Kaspersky, Avast, Windows Defender (built into Windows)

Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic. It acts as a barrier between a trusted network and an untrusted network (like the Internet).

Types of firewall:

  • Hardware firewall - A physical device between your network and the Internet
  • Software firewall - A program installed on your computer (e.g., Windows Firewall)

Cookies

Cookies are small text files that websites store on your computer to remember your preferences and login information.

Type Purpose Duration
Session cookies Temporary, deleted when browser closes One session
Persistent cookies Stored for a set period Days to years
Third-party cookies Placed by advertising networks Varies

Are cookies dangerous? Cookies themselves are not harmful, but they can be used to track your browsing habits. You should clear cookies regularly for privacy.

Indian Cyber Laws

The Information Technology Act, 2000 (IT Act) is the primary law in India dealing with cybercrime and electronic commerce. Important provisions:

Section Offense Punishment
Section 43 Unauthorized access to computer systems Compensation up to Rs. 1 crore
Section 66 Computer-related offenses (hacking) Up to 3 years imprisonment and/or fine
Section 66C Identity theft Up to 3 years imprisonment and fine up to Rs. 1 lakh
Section 67 Publishing obscene material online Up to 5 years imprisonment and fine up to Rs. 10 lakh

Cyber Crime Helpline in India: 1930 (National Cyber Crime Reporting Portal: cybercrime.gov.in)

Important Questions

Q1. What is the difference between a virus and a worm?

A virus attaches itself to a file and requires the user to execute the file to spread. A worm is a standalone program that replicates itself and spreads across networks automatically without requiring user action.

Q2. What is phishing? How can you protect yourself?

Phishing is a cyber attack where criminals create fake emails or websites that look legitimate to steal personal information like passwords and bank details. To protect yourself, verify the sender's email address, do not click suspicious links, check for HTTPS in the URL, and never share passwords via email.

Q3. List five rules for creating a strong password.

A strong password should have at least 8 characters, include uppercase and lowercase letters, include numbers, include special characters, and should not contain personal information like your name or birthday.

Q4. What is cyberbullying? How should you respond to it?

Cyberbullying is the use of technology to harass, threaten, or embarrass someone. If you face cyberbullying, do not respond to the bully, save the evidence by taking screenshots, block the person, report the behavior to the platform, and inform a trusted adult.

Q5. What is a firewall?

A firewall is a security system that monitors and controls incoming and outgoing network traffic. It acts as a barrier between your trusted internal network and untrusted external networks like the Internet. It can be hardware-based or software-based.

Quick Revision

  • Malware = malicious software (virus, worm, Trojan, spyware, ransomware)
  • Virus needs a host file; worm spreads on its own; Trojan disguises as useful software
  • Phishing = fake emails/websites to steal information, Strong password = 8+ characters, mixed case, numbers, special characters
  • Firewall = barrier between trusted and untrusted networks
  • Cookies = small files stored by websites on your computer
  • IT Act, 2000 = India's primary cyber law, Cyber crime helpline: 1930

Want to learn more?

Explore free chapter-wise notes with quizzes and code playground

Prefer watching over reading?

Subscribe for free.

Subscribe on YouTube