Global searching is not enabled.
Skip to main content

Cyber Security FAQ Part – 5


Cyber Security FAQ Part – 5

Q 1)What Google knows about me?

Google stores the information we give them while using their services. But they store almost everything, and they keep a historical record of it, so the data can be available when we search it next time. However, these are the most common information knows about us: Whatever information we have given to them while using their services The date of birth we have mentioned in the google service Location • Search history Mobile contact Email contacts Mobile photo Gallery Any personal and credit card information we have stored online Downloaded Apps and videos

Q 2)How can I stop google to gather my data?

The only way to stop google to gather your data is to stop using their services but this is not practical. We must have to use google in our everyday life. So, we have to limit the scope of Google’s data gathering. These can be achieved by: Toggle what Google tracks in the Google Activity controls. You can turn off location tracking, web and app activity, device information, voice and audio activity, and YouTube search and watch history. You can also customize the privacy settings on your Google account. If you click Get Started under the Review your privacy settings section, Google will walk you through a privacy check-up. Google Analytics is a service Google provides to help analyze website visitors. You can opt out from Google sharing your information when visiting websites that use the service.

Q 3)How to create a strong password?

Long password is always strong so make your password at least 8 characters long. The below tips can help you to create a strong and easy to remember password: A lyric from a song or poem A meaningful quote from a movie or speech A passage from a book A series of words that are meaningful to you An abbreviation: Make a password from the first letter of each word in a sentence Strong password (I was born on 01 April 84! => Iwbo01A84!) Can use Avoid choosing passwords that could be guessed by: People who know you People looking at easily accessible info (like your social media profile)

Q 4)Is hacking legal in India?

No, hacking without permission is not legal in India. But you can do vulnerability assessment and penetration testing on a web site and network if you are a certified hacker and you have full approval and authorization from the owner of the web site and network.

Q 5)What is the benefit of social media platform?

There are many benefits of social media if it is used with precaution and care. Few of the benefits are as follows: It gives you a platform to increase contacts all around the world You can learn plethora of innovative ideas related to you work and study It can connect you with the people having same interest as you have It can increase you brand image You can explore and learn

Q 6)What is cyberbullying?

Cyberbullying is an act to harass, threaten, embarrass, or target another person by using technology and social media platform. The cyberbullying can be frequently seen in school and colleges. The effect of cyberbullying on individual is devastating and sometimes a threat on individual’s life. If you face any cyberbullying anywhere either in school, college or one social media platform immediately inform your parents and guardian.

Q 7)What is clickjacking?

Clickjacking is a malicious technique by a hacker of tricking a user into clicking on a link and a page which has malicious content and potentially revealing confidential information or allowing others to take control of their computer once the user clicked.

Q 8)What is Identity theft?

When a hacker tricks an individual to reveal his identity like Full name, Date of birth, Hometown, Relationship status, mobile numbers etc then it is called identity theft. Identity theft is a crime in whole world. The identity of a person is used for doing crimes and in stealing money from an individual.

Q 9)What is Social engineering attack?

A Social engineering attack is a form of techniques used by cybercriminals to exploit human nature and psychology to lure a victim into sending them their confidential data, infecting their computers with malware or opening links to infected sites. In addition, hackers may try to exploit a user's lack of knowledge about the technology and various governmental and banking system.

Q 10)What are deepfakes – and how can you spot them?

The word deepfake combines the terms “deep learning” and “fake,” and is a form of artificial intelligence. In simplistic terms, deepfakes are falsified videos made by means of deep learning. Deep learning is “a subset of AI,” and refers to arrangements of algorithms that can learn and make intelligent decisions on their own. A deep-learning system can produce a persuasive counterfeit by studying photographs and videos of a target person from multiple a angles, and then mimicking its behaviour and speech patterns

Q 11)What is Spear Phishing?

Spear phishing is an email scam targeted towards a specific individual, organisation or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer.

Q 12)What are the biggest security threats to children?

Children and teens can be caught by the same kinds of security threats that affect adults (drive-by downloads, links to malicious sites, viruses and malware, etc.). But there are some special ways criminals get to children, such as links to “fan sites” that contain malicious links or “free stuff,” messages that look like they're from friends, offers of free music or movies or ring tones or anything else that a child might be tempted to download. Cyberbullying is another threat any children can have.

Q 13)How do we protect our family's computers?

It’s important to use up-to-date security software and make sure that your operating system and the software you use are up-to-date. Software companies sometimes find and then fix security flaws via updates. Always keep different profile for general user and keep strong password. If you are connecting to internet, make sure you browse only secure sites.

Q 14)What are mobile Security Threats?

Mobile device security threats are on the rise and almost most every mobile users are getting malicious programs on every day. Here are the list of some threats which any mobile device can have: Data Leakage Unsecured Wi-Fi use Network Spoofing Phishing Attacks Spyware SMiShing

Q 15)How can i remove virus from a mobile?

If your phone is bahaving improperly, it may be infected with virus. However mobile phone getting a virus is rare but it is not full proof. Here are the tips to remove virus from a mobile: Never use a jailborken device Delete apps that look suspicious Clear your data and history Power off and restart Restore your phone from a previous backup Restore factory settings Run antivirus program

Q 16)How to Avoid Public WiFi Security Risks?

Public Wi-Fi users are always at risk from hackers so whenever you use public wifi you must be follow certain rules and safeguards, which are: Turn Off Sharing Never do any financial transaction Treat all the wifi links with suspicion Try to verify if the free wifi is from a known source or it is a trap Use VPN while connecting to site or sharing any information

Q 17)How to make Facebook account secure?

Facebook is a great way of keeping in touch with friends. However, you need to be very careful about the type of information that you reveal. You must have to protect yourself from falling into the wrong hands. Here are some tips for protecting your Facebook account: Verify every Facebook contact Protect your banking and financial information Be wary of strangers Keep your password secure Secure your computer, your mobile devices, and your data Always keep your privacy setting up to date