ICT
Cyber Safety and Security Threats, CBSE Class 9 ICT
Complete notes on cyber safety for CBSE Class 9 ICT. Covers viruses, malware, phishing, cyberbullying, safe browsing, and online safety tips.
Cyber safety is one of the most important and frequently tested topics in CBSE Class 9 ICT. In today's digital age, understanding online threats and how to protect yourself is essential. This guide covers all security threats, types of malware, and safety measures you need to know.
What is Cyber Safety?
Cyber Safety refers to the safe and responsible use of the Internet and technology. It involves protecting yourself from online threats like hacking, viruses, identity theft, and cyberbullying.
Types of Cyber Threats
1. Malware (Malicious Software)
Malware is any software designed to harm or exploit computers and networks. There are several types:
| Type | Description | How It Spreads |
|---|---|---|
| Virus | Attaches itself to a file and spreads when the file is executed | Email attachments, USB drives, downloads |
| Worm | Replicates itself and spreads across networks without user action | Network connections, emails |
| Trojan Horse | Disguises itself as legitimate software | Free software downloads, email links |
| Spyware | Secretly monitors user activity and collects data | Software bundles, malicious websites |
| Adware | Displays unwanted advertisements | Free software bundles |
| Ransomware | Encrypts files and demands money to unlock them | Email attachments, malicious links |
| Keylogger | Records every keystroke to steal passwords | Trojan installations, phishing |
Exam tip: Know the difference between virus, worm, and Trojan. A virus needs a host file, a worm spreads on its own, and a Trojan pretends to be useful software.
2. Phishing
Phishing is a type of cyber attack where criminals send fake emails or create fake websites that look like legitimate ones to steal personal information like passwords, credit card numbers, and bank details.
Example of phishing:
- You receive an email that looks like it is from your bank, The email says "Your account will be blocked. Click here to verify", The link takes you to a fake website that looks exactly like your bank's site, When you enter your password, the criminals steal it
How to Identify Phishing:
- Check the sender's email address carefully
- Look for spelling and grammar mistakes
- Do not click on suspicious links
- Legitimate organizations never ask for passwords via email
- Check the URL, look for
https://and the correct domain name
3. Hacking
Hacking is the unauthorized access to a computer system or network. A person who hacks is called a hacker.
| Type of Hacker | Also Known As | Intent |
|---|---|---|
| White Hat | Ethical Hacker | Tests security with permission |
| Black Hat | Cracker | Malicious intent, illegal |
| Grey Hat | - | Hacks without permission but without malicious intent |
4. Identity Theft
Identity theft occurs when someone steals your personal information and uses it to pretend to be you. They may use your name, Aadhaar number, or bank details for fraud.
5. Cyberbullying
Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. It includes:
- Sending threatening messages, Spreading rumors online, Posting embarrassing photos without permission, Creating fake profiles to mock someone, Excluding someone from online groups deliberately
How to Deal with Cyberbullying:
- Do not respond to the bully
- Save evidence - take screenshots
- Block the person on all platforms
- Report the behavior to the platform
- Tell a trusted adult - parent, teacher, or counselor
- If serious, report to cyber crime authorities
6. Cyber Stalking
Cyber Stalking is the repeated use of the Internet or electronic communication to harass or frighten someone. It includes following someone's online activity, sending threatening emails, and monitoring their location.
7. Spam
Spam refers to unwanted, unsolicited messages sent in bulk, usually by email. Spam can:
- Clog your inbox, Contain phishing links, Carry malware in attachments, Waste your time and bandwidth
Online Safety Measures
Password Safety
A strong password is your first line of defense.
Rules for creating a strong password:
- Use at least 8-12 characters
- Include a mix of uppercase and lowercase letters
- Include numbers (0-9)
- Include special characters (!@#$%^&*)
- Do not use personal information (name, birthday)
- Do not use dictionary words
- Use different passwords for different accounts
- Change passwords regularly
Example of a weak password: password123, rahul2010
Example of a strong password: R@hul#2k10!Mx
Safe Browsing Practices
- Use HTTPS websites (look for the padlock icon)
- Do not click on suspicious links or pop-ups
- Do not download software from untrusted sources
- Keep your browser updated
- Clear browsing history and cookies regularly
- Use private/incognito mode on shared computers
- Log out of accounts after use, especially on shared computers
Social Media Safety
- Set profiles to private
- Do not share personal information (phone number, address, school name)
- Do not accept friend requests from strangers
- Think before you post - once online, always online
- Review privacy settings regularly
- Do not share your location publicly
- Report suspicious accounts or behavior
Email Safety
- Do not open attachments from unknown senders
- Do not click links in suspicious emails
- Verify the sender's email address
- Use spam filters
- Do not share sensitive information via email
Antivirus Software
Antivirus software is a program designed to detect, prevent, and remove malware from your computer.
How Antivirus Works:
- Scanning - Checks files and programs for known malware patterns
- Real-time protection - Monitors activity in real-time
- Quarantine - Isolates suspicious files
- Updates - Downloads new virus definitions regularly
Popular Antivirus Software:
- Quick Heal, Norton, Kaspersky, Avast, Windows Defender (built into Windows)
Firewall
A firewall is a network security system that monitors and controls incoming and outgoing network traffic. It acts as a barrier between a trusted network and an untrusted network (like the Internet).
Types of firewall:
- Hardware firewall - A physical device between your network and the Internet
- Software firewall - A program installed on your computer (e.g., Windows Firewall)
Cookies
Cookies are small text files that websites store on your computer to remember your preferences and login information.
| Type | Purpose | Duration |
|---|---|---|
| Session cookies | Temporary, deleted when browser closes | One session |
| Persistent cookies | Stored for a set period | Days to years |
| Third-party cookies | Placed by advertising networks | Varies |
Are cookies dangerous? Cookies themselves are not harmful, but they can be used to track your browsing habits. You should clear cookies regularly for privacy.
Indian Cyber Laws
The Information Technology Act, 2000 (IT Act) is the primary law in India dealing with cybercrime and electronic commerce. Important provisions:
| Section | Offense | Punishment |
|---|---|---|
| Section 43 | Unauthorized access to computer systems | Compensation up to Rs. 1 crore |
| Section 66 | Computer-related offenses (hacking) | Up to 3 years imprisonment and/or fine |
| Section 66C | Identity theft | Up to 3 years imprisonment and fine up to Rs. 1 lakh |
| Section 67 | Publishing obscene material online | Up to 5 years imprisonment and fine up to Rs. 10 lakh |
Cyber Crime Helpline in India: 1930 (National Cyber Crime Reporting Portal: cybercrime.gov.in)
Important Questions
Q1. What is the difference between a virus and a worm?
A virus attaches itself to a file and requires the user to execute the file to spread. A worm is a standalone program that replicates itself and spreads across networks automatically without requiring user action.
Q2. What is phishing? How can you protect yourself?
Phishing is a cyber attack where criminals create fake emails or websites that look legitimate to steal personal information like passwords and bank details. To protect yourself, verify the sender's email address, do not click suspicious links, check for HTTPS in the URL, and never share passwords via email.
Q3. List five rules for creating a strong password.
A strong password should have at least 8 characters, include uppercase and lowercase letters, include numbers, include special characters, and should not contain personal information like your name or birthday.
Q4. What is cyberbullying? How should you respond to it?
Cyberbullying is the use of technology to harass, threaten, or embarrass someone. If you face cyberbullying, do not respond to the bully, save the evidence by taking screenshots, block the person, report the behavior to the platform, and inform a trusted adult.
Q5. What is a firewall?
A firewall is a security system that monitors and controls incoming and outgoing network traffic. It acts as a barrier between your trusted internal network and untrusted external networks like the Internet. It can be hardware-based or software-based.
Quick Revision
- Malware = malicious software (virus, worm, Trojan, spyware, ransomware)
- Virus needs a host file; worm spreads on its own; Trojan disguises as useful software
- Phishing = fake emails/websites to steal information, Strong password = 8+ characters, mixed case, numbers, special characters
- Firewall = barrier between trusted and untrusted networks
- Cookies = small files stored by websites on your computer
- IT Act, 2000 = India's primary cyber law, Cyber crime helpline: 1930
Want to learn more?
Explore free chapter-wise notes with quizzes and code playground
Prefer watching over reading?
Subscribe for free.