Answer :
Cyber Security: Cyber security involves protecting computer systems, networks, and data from digital attacks, theft, or damage. It includes implementing measures to defend against unauthorized access, hacking, viruses, and other cyber threats.
Main Goal of Cyber Security: The primary goal of cyber security is to protect information and systems from cyber threats. This involves ensuring the confidentiality, integrity, and availability of data, which are key components of the CIA triangle.
CIA Triangle: The CIA triangle stands for Confidentiality, Integrity, and Availability. These are the three main objectives of cyber security:
- Confidentiality: Ensuring that sensitive information is accessed only by authorized individuals.
- Integrity: Maintaining the accuracy and reliability of data by preventing unauthorized modifications.
- Availability: Ensuring that information and resources are accessible to authorized users when needed.
Phishing: Phishing is a fraudulent practice where attackers attempt to obtain sensitive information by disguising themselves as trustworthy entities, often through email or deceptive websites.
Ransomware: Ransomware is a type of malicious software designed to block access to a computer system or data, typically by encrypting it, until a ransom is paid to the attacker.
Malware: Malware, short for malicious software, refers to any software intentionally designed to cause harm to a computer system, network, or user. Examples include viruses, worms, and Trojans.
Identity Theft: Identity theft occurs when someone unlawfully obtains and uses another person's personal data, typically for financial gain, such as opening accounts or making unauthorized purchases.
Multi-Factor Authentication: Multi-factor authentication (MFA) is a security process that requires users to verify their identity in multiple steps before gaining access to a system or application, adding an extra layer of protection.
Cyberbullying: Cyberbullying involves using digital platforms, like social media or messaging apps, to harass, intimidate, or harm individuals through hurtful, intentional acts.
Role of Encryption in Cyber Security: Encryption is the process of converting data into a coded format to prevent unauthorized access. In cyber security, it's used to protect sensitive information, ensuring that only intended recipients can read it.
VPN Usage: A Virtual Private Network (VPN) is used to create a secure and private connection to the internet, helping to protect user's data and maintain privacy by hiding their IP address and encrypting communication data.
Digital Citizenship: Digital citizenship refers to the responsible and ethical use of technology and the internet. It includes understanding online safety, respecting others, and acting appropriately in a digital environment.
Active and Passive Digital Footprint: An active digital footprint consists of the intentional actions and information shared online, like social media posts. A passive digital footprint is data collected without the user’s direct involvement, such as browsing history and cookies.
Private Browsing: The purpose of private browsing is to prevent the storage of browsing history and cookies. This feature helps maintain privacy by ensuring that a user’s online activity isn’t recorded on their device.