Escolar Documentos
Profissional Documentos
Cultura Documentos
Chairperson
Member Coordinator
Member
Dr. Indu Kumar, Associate Professor and Head, Department of ICT& Training Division,
Central Institute of Educational Technology, NCERT, New Delhi.
Dr. Mohd. Mamur Ali, Assistant Professor, Central Institute of Educational Technology,
NCERT, New Delhi.
Dr. Rejaul Karim Barbhuiya, Assistant Professor, Department of Education in Science and
Mathematics, NCERT, New Delhi.
Dr. Ramanujam Meganathan, Associate Professor, Department of Education in Languages,
NCERT, New Delhi.
D. Varada M. Nikalje, Associate Professor, Department of Elementary Education,
NCERT, New Delhi.
Ms. Surbhi, Assistant Professor, Central Institute of Educational Technology, NCERT, New Delhi.
Mr. I L Narasimha Rao, Project Manager II, Center for Development of Advanced Computing
(CDAC), Hyderabad.
Ms. Sujata Mukherjee, Global Research and APAC Outreach Lead, Google India Pvt Ltd,
Hyderabad.
Capt. Vineet Kumar, Founder and President, Cyber Peace Foundation, Ranchi, Jharkand.
Ms. Chandni Agarwal, National ICT Awardee and Head, Department of Computer Science,
Maharaja Agrasen Model School, ,Delhi.
Ms. Vineeta Garg, Head, Department of Computer Science, Shaheed Rajpal DAV Public
School, Delhi.
Cybersafety is the safe and responsible use of information and
communication technology. It is not just about keeping information
safe and secure, but also about being responsible with that
information, being respectful of other people online, and practising
good 'netiquette' (internet etiquette).
4
sensitive data
Respond to
5 and recover
from
cyber security
incidents
Educate your
stakeholders
Identify threat
. . .
vulnerability OOOOO P S
&
assess risk
exposure
Slow and sluggish behavior of the system.
Inexplicable disappearance of system screen while working.
1
Unexpected pop ups or unusual error messages.
Drainage of system battery life before expected period.
Appearance of the infamous BSOD (Blue Screen of Death).
2 &
detection measures
Invest in a robust firewall.
Use only verified open source or licensed software and operating systems.
Ensure that computer systems and labs are accessed only by authorized
personnel.
Set up your computer for automatic software and operating system updates.
Consider blocking of file extensions such as .bat, .cmd, .exe, .pif by using
content filtering software.
Develop protection
&
detection measures
2
Read the freeware and shareware license agreement to check if adware
and spyware are mentioned, before installing them on systems.
Use encryption such as SSL or VPN for remote access to office or school
lab, through internet.
Ensure that third-party vendors (who have contract with the school) have
strong security measures in place.
Protect your Wi-Fi Connection with secure password, WEP encryption, etc.
Encrypt the network traffic.
Backup critical data (contact numbers, email IDs, aadhaar number etc.)
in an off-site location.
4 cyber security
incidents
Advocate, model and teach safe, legal, and ethical use of digital information
and technology.
Follow guidelines, policies and procedures to keep the school safe and
secure in cyberspace.
Modification Destruction Curiosity Money Pornography Slander False Websites Insults Teasing Name Calling Sexual
Accusations Activities
Unauthorised Libel Lies Rumors Threats
Revenge Fake
Access IM Threats
Account including Grooming
committed
Defamation E-mails
Disruption from Attention through
for is
Identity Cyber Repeated Online
Disclosure Information & Cyber Bullying Harassments
Fun Theft Stalking Harassment Groups Online
Devices Phone
Predators
Use/Misuse
Theft Social
Share Cyber Crime include uses
Website Spyware Engineering
Changed should be Spam Piracy
do not from E-Mail Defacement Virus
Morphing Scareware
save Bombing
Securely Password Websites
MAJOR THREATS Malware
PROTECTING include Spoofing
Hoax Ransomware
shoud use
Strong Hacking
be means Scam
Firewall CYBER Worms E-mail
SAFE PRACTICE Trojans Spoofing
Password Phishing
protect use SECURITY Adware
for Latest through
Software update Copyright obtaining
legal Browser Click
Content in using Violation Before
backup Desktop/ Sensitive jacking
Filtering Discarding Authorised
Laptop Information
Data Friendship Store
Cyber WiFi use
no to use format
use & Laws in avoid with Phone Tab
Pirated update secure download Call Napping
Mobile
Software use current/ Internet update Browser Unknown app from
Antivirus E-mail use Devices
updated Pluggins People Online
Tracer access Instant
use like
Operating any never only
regular/ any check do not Messaging
System visit Untrusted
automatic avoid accept Auto
Social Media Threats Website Lock
Scan Call from Password
avoid URL Meeting record
inform do not Weired Number
do not share beware of in Person Authorised
open avoid
Strangers switch on WiFi
Parents clean and do not User Name
use do not
Personal ensure E-mail Referral
approach Spy Camera IMEI
Informtion Attachments Links Call back
from only Number Credit Card
save
Be Scared Details
instead
Privacy Security User to be Cyber browser’s Unknown When
Options Options Old Enough Police Chat Screen cookies and cache Persons Type the URL Bluetooth Needed CC:BY:SA-M.U.Paily
For more details visit
www.ncert.nic.in
www.ciet.nic.in
www.ictcurriculum.gov.in
www.infosecawareness.in
www.cyberswachhtakendra.gov.in