13 Practice To Protect Yourself In Cyber World-ICT Education

Learn best practices to protect yourself in the cyber world to help you understand these threats and essential techniques to stay safe.
In today's Cyber world, protecting yourself and your personal information online has become an important aspect of maintaining your privacy and security. With the increasing prevalence of cyber threats such as hacking, phishing, and identity theft, it's important to be proactive in securing your online presence.
By taking simple steps such as using strong passwords, avoiding suspicious emails, and regularly updating your software, you can significantly reduce the risk of falling victim to these threats. in this article, the guide will provide you with some practical tips and techniques to help you stay safe in the cyber world.
cyber threat
Photo by cottonbro studio
What is Cyber Security?

Cybersecurity refers to the practices and technologies designed to protect digital devices, networks, and sensitive information from unauthorized access, theft, or damage. The goal of cybersecurity is to prevent or mitigate the impact of security incidents, such as data breaches or system disruptions, and maintain the confidentiality, integrity, and availability of information and systems.

Cyber ​​security includes website and email hacking, character assassination, data theft, internet blackmailing, and internet banking fraud. The identity of the other is to avoid unauthorized use, credit card, damage to the other's computer, electronic equipment, network, etc.

How can you protect yourself from Cyber-threats?

With the continuous development, increasing use, and mobility of information technology, the problem of unauthorized access to information technology systems is increasing day by day. So we are careful when using information technology. Should be used together and accidents should be avoided threats.

Here are some precautionary measures.
  1. Do not share or like comments after seeing obscene photos, videos, or messages on Facebook or Twitter.
  2. If You find someone obscenely sharing your photo, report it to the police immediately.
  3. Do not take or share personal confidential photos with friends or girlfriends on social media.
  4. Posting anonymous photos or other content using social media can be dangerous.
  5. Photos and videos that insult any religion, race, gender, or sect should not be tagged, commented on, or shared on Facebook.
  6. Don't keep email or social network passwords easily. Keep your Facebook or Twitter account more secure by keeping passwords that you can remember and others don't know as much as possible.
  7. Be aware there is a danger of misuse when opening Facebook or Twitter from any computer or mobile.
  8. Don't give your email to a friend or boyfriend/girlfriend who likes your social network password like Facebook. Your Facebook or email can be misused when you don't get along.
  9. Use the mobile number you are using to recover the password in the social network option. Using someone else's number can lead to abuse.
  10. We made friends with our fathers, mothers, and sisters on Facebook or Twitter. From this, the right advice given by your family members will help you to avoid cybercrime.
  11. Do not accept friend requests from strangers or unknown people. Unknown people can also be cybercriminals and do not respond to messages sent by strangers.
  12. It is important to be aware of the risk of misuse when sharing documents such as your passport, citizenship, bank account number, phone number, etc. with Facebook or Twitter.
  13. Thus, Evidence of cyber-crime can be removed from Facebook or Twitter at any time. When you are a victim of cybercrime, before going to report it to the police, you have to file a complaint by attaching a screenshot of such material and a link to the person's profile. This will further support the criminal investigation as you have also submitted evidence.

CYBERCRIME COMPLAINT STATUS (ABUSE OR CYBERCRIME? )

If someone is criticized in polite and decent language it is considered natural. But in doing so, you should not use subjects prohibited by law like personal insults or terms killing a character. In general, anger and rage towards someone are insulting words or verbal abuse expressed in front of them.

While public disrespect or insult is done to hurt one's dignity, reputation, character, dignity, and status.
In the case of Nepal, it is considered abusive to use abusive words in a speech or utterance to humiliate someone and the abuser is liable to imprisonment for up to one year or a fine of up to ten thousand rupees or both (Civil Code, 2074, Article 305).

Any act that intentionally hurts the dignity of others or kills someone's character or blames it is considered disrespectful. Insult is punishable by up to two years in prison or a fine of up to twenty thousand rupees or both.

Those who insult through electronic or mass media are liable to imprisonment for one more year and a fine of up to ten thousand rupees (Civil Code, 2074, Article 307).

Similarly, Article 14 (c1) of the Printing and Publishing Act, 2048 BS has also prohibited the publication of material in books or magazines which would be character killing or insulting or promoting gender-based violence or discrimination.

Thus, since the National Criminal Code, of 2074, has made the insult through electronic or mass media under the offense of insulting, it seems to have tried to cover the insult through social media, mobile phones, or online communication portals.

Conclusion

In conclusion, protecting yourself in the cyber world requires a proactive and vigilant approach. By taking simple steps such as using strong passwords, avoiding suspicious emails, and regularly updating your software, you can significantly reduce the risk of falling victim to cyber threats.

Additionally, being aware of the latest cybersecurity trends and best practices will help you stay up-to-date and informed about the ever-evolving digital landscape.

Read Also...

  1. 15 Best vehicle detection sensors in 2023. (Click here...)
  2. The guide to using ICT effectively for education and learning. (Click here...)

Post a Comment