besidedegree@gmail.com
+9779709005491
Enquiry
Back to Home
School SEE

Grade 9|| Cyber Security and Digital Citizenship||Notes

Highlight Save
This chapter teaches you how to stay safe and responsible in the digital world. You’ll learn to protect yourself from online threats like cybercrime and malware, understand the importance of strong passwords and secure browsing, and explore what it means to be a respectful and ethical digital citizen. By mastering these skills, you’ll confidently navigate the internet while safeguarding your privacy and contributing positively online.

1. Introduction to Cybersecurity and Digital Citizenship

Why is this Important?

In today's digital world, we spend significant time online for education, communication, and entertainment. Just as we follow rules and safety measures in the physical world, we need to understand how to protect ourselves and behave responsibly in the digital world.

2. Concept of Cybersecurity

What is Cybersecurity?

Cybersecurity refers to the practice of protecting computers, networks, programs, and data from:

  • Unauthorized access
  • Theft or damage
  • Cyberattacks and malware
  • Data breaches

Types of Cybersecurity:

  1. Network Security – Protecting computer networks
  2. Information Security – Protecting data and information
  3. Application Security – Securing software applications
  4. Operational Security – Protecting business operations

Cyber Threat Landscape:

  • Over 4,000 cyberattacks occur daily worldwide
  • Both individuals and organizations are targets
  • Everyone needs to practice cybersecurity

Remember: Cybersecurity is everyone's responsibility!

3. Concept of Cybercrime

What is Cybercrime?

Criminal activities carried out using computers or the internet. These activities can:

  • Harm individuals financially and emotionally
  • Damage reputations
  • Compromise national security

Types of Cybercrime:

TypeDescriptionExampleIdentity TheftStealing personal informationUsing someone's credit card detailsPhishingFake emails/websites to steal dataEmail pretending to be from a bankMalware AttacksMalicious software installationViruses, ransomwareSocial Media HackingUnauthorized account accessPosting inappropriate content from someone's accountDDoS AttacksOverloading websites to crash themMaking a website unavailableOnline HarassmentBullying through digital meansSending threatening messages

Cyber Law in Nepal:

  • Electronic Transaction Act (ETA), 2063 – Main law governing cybercrime in Nepal
  • Punishment: Up to ₹1 lakh fine and/or 5 years imprisonment
  • Handled by: Cyber Bureau of Nepal Police

4. Prevention Methods from Cybercrime

A. Strong Passwords

Characteristics of strong passwords:

  • Minimum 8-12 characters
  • Mix of uppercase, lowercase, numbers, and symbols
  • No dictionary words or sequences (like "1234", "password")
  • Different passwords for different accounts
  • Changed regularly

Fun Fact: "123456", "password", and "qwerty" are the most commonly used (and weakest) passwords!

B. Multi-Factor Authentication (MFA)

What is MFA?
Using two or more verification methods to access accounts.

Three Factors of Authentication:

FactorDescriptionExamplesSomething You KnowInformation only you knowPassword, PINSomething You HavePhysical object you possessPhone, Smart card, Security tokenSomething You AreBiological characteristicsFingerprint, Face recognition, Voice

C. Software Updates

  • Why? Updates fix security vulnerabilities
  • What to update: Operating systems, applications, antivirus
  • Best practice: Enable automatic updates
  • Systems: Windows, Android, iOS, Linux

D. Firewalls

What is a Firewall?
A security system that monitors and controls network traffic based on predetermined security rules.

Types:

  • Hardware Firewall – Physical device
  • Software Firewall – Program on your computer
  • Built-in Firewall – Windows Firewall, iOS Firewall

Function: Acts as a barrier between your device and the internet, blocking unauthorized access.

E. Antivirus Software

Purpose: Detects, prevents, and removes malware

Popular Antivirus Software:

  • Kaspersky
  • Norton 360
  • Avast
  • Windows Defender (built-in)

Features:

  • Real-time scanning
  • Automatic updates
  • Quarantine for suspicious files
  • System cleanup

5. Safe Web Browsing Techniques

A. Use Secure Connections

  • Look for HTTPS (not HTTP) in URLs
  • Check for padlock icon in address bar
  • Use VPN (Virtual Private Network) for privacy

Examples: NordVPN, Proton VPN, Mozilla VPN

B. Use Secure Browsers

Features of secure browsers:

  • Private browsing mode
  • Tracking protection
  • Ad-blocking
  • Password management

Examples: Chrome, Firefox, Safari, Brave

C. Use Secure Search Engines

  • Google – Most popular
  • DuckDuckGo – Privacy-focused
  • Bing – Microsoft's engine

Statistic: 65.76% of internet users use Google Chrome

D. Recognize Secure Websites

Indicators:

  • HTTPS in URL
  • Padlock symbol
  • Valid SSL certificate
  • Professional design
  • Clear privacy policy

6. Concept of Digital Citizen

What is a Digital Citizen?

A person who uses digital technology responsibly, ethically, and effectively to participate in society.

Characteristics of Good Digital Citizens:

  1. Think before posting online
  2. Protect personal information
  3. Use multiple search engines to limit tracking
  4. Change passwords regularly
  5. Report illegal or inappropriate content
  6. Respect others' digital property
  7. Contribute positively to online communities

7. Concept of Netiquette and Online Behaviors

What is Netiquette?

Network + Etiquette = Rules for polite and respectful online behavior

Netiquette Guidelines:

Do'sDon'ts
Be respectful in communicationUse offensive language
Respect others' privacyShare personal information without consent
Give credit for shared workPlagiarize others' content
Think before postingPost impulsively or emotionally
Report abusive behaviorEngage in cyberbullying
Be open to criticismReact defensively to feedback
Maintain positive online presenceSpread negativity or hate

Remember:

"The same manners you use in person should be used online."

8. Digital Footprint and Online Privacy

What is Digital Footprint?

The trail of data you create while using the internet. Also called "Digital Shadow" or "Electronic Footprint."

Digital Footprint Types

TypeDescriptionExamples
Active FootprintData you intentionally shareSocial media posts, emails, online forms
Passive FootprintData collected without your knowledgeSearch history, location data, cookies

Advantages of Digital Footprint

AdvantageExplanation
Health MonitoringWearables track fitness data
Social ConnectionsHelps build relationships online
Targeted AdvertisingRelevant ads based on interests
Law EnforcementHelps in investigations

Disadvantages of Digital Footprint

DisadvantageExplanation
Security RisksHackers can track activities
Privacy IssuesPersonal data can be misused
Exploitative PracticesCompanies sell user data
Criminal ExploitationFraud, identity theft
Online AbuseStalking, harassment

Protecting Your Digital Footprint

ActionPurpose
Review privacy settingsControl what others see
Delete old accountsReduce exposure
Use strong passwordsPrevent unauthorized access
Disable location trackingProtect physical location
Regular software updatesFix security vulnerabilities
Think before postingControl active footprint

Incognito/Private Browsing:

  • What it does: Doesn't save browsing history, cookies, or form data
  • What it doesn't do: Doesn't make you anonymous to websites or ISP
  • Shortcut: Ctrl + Shift + N (Windows), Cmd + Shift + N (Mac)

9. Practical Activities and Safety Measures

Activity 1: Using Antivirus and Firewall

Steps:

  1. Open antivirus software
  2. Run a quick scan
  3. Update virus definitions
  4. Check firewall settings
  5. Configure basic rules

Activity 2: Safe Browsing Practice

Checklist:

  • Browser updated
  • HTTPS used
  • Pop-ups blocked
  • Cookies cleared regularly
  • Strong passwords used

Activity 3: Digital Footprint Analysis

What to track:

  • Email addresses used
  • Social media usernames
  • Devices regularly used
  • Online accounts created

Activity 4: Password Strength Test

Create passwords that:

  • Are at least 12 characters long
  • Mix character types
  • Are unique for each account
  • Are changed every 3-6 months

10. Important Legal Information

Electronic Transaction Act (ETA), 2063:

  • Section 47: Punishment for publishing illegal material
  • Maximum penalty: ₹1 lakh fine and/or 5 years imprisonment
  • What's illegal: Material against morals, hate speech, harassment

Where to Report Cybercrime in Nepal:

  1. Cyber Bureau of Nepal Police
  2. Local police stations
  3. Online portal: www.nepalpolice.gov.np

11 .Key Terms and Definitions

TermDefinition
CybersecurityProtection of digital systems and data
CybercrimeIllegal activities using computers
MalwareMalicious software (viruses, ransomware)
PhishingFake attempts to steal sensitive information
FirewallSecurity barrier between network and internet
Digital FootprintTrail of data left online
NetiquetteRules for polite online behavior
Digital CitizenResponsible user of digital technology
MFAMulti-Factor Authentication
ETAElectronic Transaction Act

12. Safety Checklist for Students

Daily Practices:

✅ Use strong, unique passwords
✅ Enable MFA where possible
✅ Keep software updated
✅ Think before clicking links
✅ Verify website security (HTTPS)
✅ Log out of shared computers
✅ Backup important data regularly

Social Media Safety:

✅ Adjust privacy settings
✅ Don't share personal information
✅ Be selective about friend requests
✅ Report inappropriate content
✅ Take regular digital breaks

When in Doubt:

✅ Ask a trusted adult
✅ Research before sharing
✅ Verify information sources
✅ Report suspicious activities

13. Cyber Hygiene Tips

Daily: Clear browsing history, check for updates
Weekly: Change passwords, backup data
Monthly: Review privacy settings, check account activity
Yearly: Audit online accounts, delete unused ones

14. The Golden Rules of Digital Citizenship

Protect Yourself – Use security measures

Respect Others – Practice netiquette

Protect Others – Report abuse

Protect Property – Respect copyright

Stay Informed – Keep learning about digital safety

Related Videos

Video on Cyber Security and Digital Citizenship by Guru Sciency

Important Links