Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

topic

 1. Digital footprints , Digital Society and Netizen


 2 . Data Protection
 3 . Cyber Crime
 4 . Cyber Safety
 5 . Malware
 6 . E- Waste Management , Indian Information Technology Act and
Technology and Society
1. digital footprint
Define - A digital footprint – sometimes called a digital shadow or an electronic footprint – refers
to the trail of data you leave when using the internet. It includes websites you visit, emails you send,
and information you submit online. A digital footprint can be used to track a person’s online
activities and devices. Internet users create their digital footprint either actively or passively.

Types of Digital footprints

Active digital footprints Passive digital footprints


 An active digital footprint is where the user has  A passive digital footprint is created when
deliberately shared information about themselves – information is collected about the user without
for example, through posting or participating on them being aware that this is happening. For
social networking sites or online forums. If a user is example, this occurs when websites collect
logged into a website through a registered information about how many times users visit,
username or profile, any posts they make form part where they come from, and their IP address. This is
of their active digital footprint. Other activities that a hidden process, which users may not realize is
contribute to active digital footprints include taking place. Other examples of passive footprints
completing an online form – such as subscribing to include social networking sites and advertisers
a newsletter – or agreeing to accept cookies on using your likes, shares, and comments to profile
your browser you and target you with specific content.
Digital Society

 Define - A modern, progressive society that is formed as a result of the adoption and integration of Information and
Communication Technologies (ICT) at home, work, education and recreation, and supported by advanced telecommunications
and wireless connectivity systems and solutions .
A. Benefits -Digital technology makes it easy to stay in touch with friends, family, and work remotely, even if you are in another
part of the world. You can communicate by words, video, audio, and exchange other media.
B. There's no doubt that digitalization has led to a revolution in financial matters. Online banking is done either through a laptop,
tablet, or phone app is now the norm. Bank users can now check their incoming and outgoing payments remotely, as well as
arrange money transfers and bill payments.
C. The nature of work has been transformed by digital technology. Increased connectivity options mean that many people now
have far more opportunities for working from home, as remote working becomes increasingly common.
 Social Connectivity, Communication Speeds, Versatile Working, Learning Opportunities, Automation, Information Storage,
Editing
2 . Data Protection

 Data protection is a set of strategies and processes you can use to secure the privacy,
availability, and integrity of your data. It is sometimes also called data security. A data
protection strategy is vital for any organization that collects, handles, or stores sensitive
data
 Backup and archiving, for example, have been treated as two separate functions. Backup's
purpose was to restore data after a failure, while an archive provided a searchable copy
of data. However, that led to redundant data sets. Today, some products back up, archive
and index data in a single pass. This approach saves organizations time and cuts down on
the amount of data in long-term storage.
impact
3 . Cyber crime

 Cybercrime is any criminal activity that involves a computer, networked device or a


network. While most cybercrimes are carried out in order to generate profit for the
cybercriminals, some cybercrimes are carried out against computers or devices directly to
damage or disable them
Impact

 A . Society - The impact of cybercrime on society is far-reaching and can be devastating. Financial cybercrime can result in
significant financial losses for individuals and businesses, leading to bankruptcy and unemployment. Identity theft can result
in ruined credit scores, loss of reputation, and legal troubles .
4 . Cyber safety

 Digital security is implemented to protect your network/ security from any malicious digital cyber-
attacks. Cyber Safety can be implemented in organizations and in individual systems/ networks. It is
usually generated against cyber-attacks that are caused through a publically accessible internet
connection, phishing emails, suspicious links, downloadable documents or apps, and more of similar
nature.
 Cyber Safety protects the computer/ network from cyber attack’s consequences as well. This is
exceptionally helpful when cyber-attacks are generated in such a way that the attack leaves a lasting
impression on the organization’s overall functionality.
 One of the prime reasons for implementing Cyber Safety is the protection of confidential data. Cyber
Safety can protect these data to a great extent. These data protection go a long way, especially in
cases of government-related data. Breach of such data of national importance can cause serious
disturbance to the nation.

You might also like