Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Code

<html>
<head>
<title>Cyber Safety Assignment</title>
<style>
Section {
Margin: 10px;
}
H2 {
Color: #7d00de;
Font-size:70px;
Text-align:center;
}
Li {
Font-size:25px;
Text-align:left;
}
P{
Line-height: 1.6;
Font-size:25px;
}
</style>
</head>
<body>
<center><img src=”1.png” width=”100%”></center>
<hr><hr><hr>
<section>
<h2>Introduction</h2>
<p>
<big><b>Cybersecurity</b></big> is the protection to defend internet-connected devices and services from
malicious attacks by hackers, spammers, and cybercriminals. The practice is used by companies to protect against
phishing schemes, ransomware attacks, identity theft, data breaches, and financial losses. Cyber security is a
discipline that covers how to defend devices and services from electronic attacks by nefarious actors such as hackers,
spammers, and cybercriminals. While some components of cyber security are designed to strike first, most of today’s
professionals focus more on determining the best way to defend all assets, from computers and smartphones to
networks and databases, from attacks.
<br><br>
Additionally, Cyber Safety protects the computer/ network from cyber attack’s consequences as well. This is
exceptionally helpful when cyber-attacks are generated in such a way that the attack leaves a lasting impression on
the organization’s overall functionality.
</p>
</section>
<hr><hr>
<center><img src=”2.jpg” width=”100%”></center>

<section>
<h2>Importance of Cyber Safety</h2>
<p>
One of the prime reasons for implementing Cyber Safety is the protection of confidential data. Cyber Safety can
protect these data to a great extent. These data protection go a long way, especially in cases of government-related
data. Breach of such data of national importance can cause serious disturbance to the nation.
<br><br>
Additionally, a breach of personal data would result in personal losses such as reputation damage, etc. There are high
chances of an extortion threat. By giving in to the threat, there are chances of financial damages.
<br><br>
Data privacy is important in this digital world. For example, breach of personally identifiable information (PII),
intellectual property, and protected health information (PHI) would make people lose faith in the service and the
possibility of recovering lost customers or building faith again is a herculean task. This is usually applicable in the
sectors of hospitals and other healthcare institutions, financial service programs, and power plants.
<br><br>
However, the most fearsome aspect of the data breach through any cyberattack is the mishandling of data.
<br><br>
A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed,
stolen, altered or used by an individual unauthorized to do so. Other terms are unintentional information disclosure,
data leak, information leakage and data spill.<br><br>
Whenever there is any Cyber breach, there will be a need to upgrade your Cyber Safety system. This will incur
additional expenses. The expense is inclusive of new/up-gradation of Cyber Security Technology, Cyber Safety
insurance, public relations support, and more of similar nature. Notifying the affected parties of a particular breach
could even result in loss of customers.<br><br>
Cyber Safety breach results in the disruption of operation. When there is any cyber-attack, the operation of business
comes to a halt for various reasons. If the business operation is continued, the hacker would continue to get access
to the confidential information. <br><br>
On the other hand, when certain types of Cyber Safety breaches render the computer/ network inoperable, it would
sometimes take weeks to even months to recover the computer/ network. Furthermore, sometimes the access to
backup data would also be troublesome.
</p>
</section>
<hr><hr>
<center>
<img src=”3.jpg” width=”100%”>
</center>
<section>
<h2>Tips for Cyber Safety</h2>
<table border=”10” cellpadding=”20”>
<tr>
<td>
<ul type=”square”>
<li> Create a strong password for all platforms. Try to create unique passwords. Most importantly, the
passwords are not related at all. In this way, hackers will not succeed in their password guessing methodology.</li>
</td>
</tr>
<tr>
<td>
<li>
Always read the terms and conditions of any site. In this way, you will know whether your information will be
collected or not.</li>
</td>
</tr>
<tr>
<td>
<li>
Never type your financial information on any site, especially, if the site lacks padlock on the page. Always ensure that
the permissions required by the particular site are reasonable. <br>
For example, if your calculator app requests permission to access your gallery/ any of such nature, it is extremely
suspicious. In such cases, uninstall the app immediately.</li>
</td>
</tr>
<tr>
<td>
<li>
Always turn on two-factor authentication on your social media platforms. In that way, you will be alerted whenever
there is an attempt to access your account.</li>
</td>
</tr>
<tr>
<td>
<li>
Avoid using unsecure WiFi networks in public places:Unsecure networks leave you vulnerable to man-in-the-middle
attacks.</li>
</td>
</tr>
<tr>
<td>
<li>
Do not click on links in emails from unknown senders or unfamiliar websites:This is a common way that malware is
spread.</li>
</td>
</tr>
<tr>
<td>
<li>
Always backup your data. By doing that you can protect your data in case of breach too.</li>
</td>
</tr>
</ul>
</table>
</section>
<center>
<table border=”50” cellpadding=”10”>
<tr>
<td><h2>Thank You</h2></td>
</tr>
</table>
</center>
</body>
</html>

Output

You might also like