1. Introduction to Cybersecurity and Digital Citizenship
Why is this Important?
In today's digital world, we spend significant time online for education, communication, and entertainment. Just as we follow rules and safety measures in the physical world, we need to understand how to protect ourselves and behave responsibly in the digital world.
2. Concept of Cybersecurity
What is Cybersecurity?
Cybersecurity refers to the practice of protecting computers, networks, programs, and data from:
- Unauthorized access
- Theft or damage
- Cyberattacks and malware
- Data breaches
Types of Cybersecurity:
- Network Security – Protecting computer networks
- Information Security – Protecting data and information
- Application Security – Securing software applications
- Operational Security – Protecting business operations
Cyber Threat Landscape:
- Over 4,000 cyberattacks occur daily worldwide
- Both individuals and organizations are targets
- Everyone needs to practice cybersecurity
Remember: Cybersecurity is everyone's responsibility!
3. Concept of Cybercrime
What is Cybercrime?
Criminal activities carried out using computers or the internet. These activities can:
- Harm individuals financially and emotionally
- Damage reputations
- Compromise national security
Types of Cybercrime:
TypeDescriptionExampleIdentity TheftStealing personal informationUsing someone's credit card detailsPhishingFake emails/websites to steal dataEmail pretending to be from a bankMalware AttacksMalicious software installationViruses, ransomwareSocial Media HackingUnauthorized account accessPosting inappropriate content from someone's accountDDoS AttacksOverloading websites to crash themMaking a website unavailableOnline HarassmentBullying through digital meansSending threatening messages
Cyber Law in Nepal:
- Electronic Transaction Act (ETA), 2063 – Main law governing cybercrime in Nepal
- Punishment: Up to ₹1 lakh fine and/or 5 years imprisonment
- Handled by: Cyber Bureau of Nepal Police
4. Prevention Methods from Cybercrime
A. Strong Passwords
Characteristics of strong passwords:
- Minimum 8-12 characters
- Mix of uppercase, lowercase, numbers, and symbols
- No dictionary words or sequences (like "1234", "password")
- Different passwords for different accounts
- Changed regularly
Fun Fact: "123456", "password", and "qwerty" are the most commonly used (and weakest) passwords!
B. Multi-Factor Authentication (MFA)
What is MFA?
Using two or more verification methods to access accounts.
Three Factors of Authentication:
FactorDescriptionExamplesSomething You KnowInformation only you knowPassword, PINSomething You HavePhysical object you possessPhone, Smart card, Security tokenSomething You AreBiological characteristicsFingerprint, Face recognition, Voice
C. Software Updates
- Why? Updates fix security vulnerabilities
- What to update: Operating systems, applications, antivirus
- Best practice: Enable automatic updates
- Systems: Windows, Android, iOS, Linux
D. Firewalls
What is a Firewall?
A security system that monitors and controls network traffic based on predetermined security rules.
Types:
- Hardware Firewall – Physical device
- Software Firewall – Program on your computer
- Built-in Firewall – Windows Firewall, iOS Firewall
Function: Acts as a barrier between your device and the internet, blocking unauthorized access.
E. Antivirus Software
Purpose: Detects, prevents, and removes malware
Popular Antivirus Software:
- Kaspersky
- Norton 360
- Avast
- Windows Defender (built-in)
Features:
- Real-time scanning
- Automatic updates
- Quarantine for suspicious files
- System cleanup
5. Safe Web Browsing Techniques
A. Use Secure Connections
- Look for HTTPS (not HTTP) in URLs
- Check for padlock icon in address bar
- Use VPN (Virtual Private Network) for privacy
Examples: NordVPN, Proton VPN, Mozilla VPN
B. Use Secure Browsers
Features of secure browsers:
- Private browsing mode
- Tracking protection
- Ad-blocking
- Password management
Examples: Chrome, Firefox, Safari, Brave
C. Use Secure Search Engines
- Google – Most popular
- DuckDuckGo – Privacy-focused
- Bing – Microsoft's engine
Statistic: 65.76% of internet users use Google Chrome
D. Recognize Secure Websites
Indicators:
- HTTPS in URL
- Padlock symbol
- Valid SSL certificate
- Professional design
- Clear privacy policy
6. Concept of Digital Citizen
What is a Digital Citizen?
A person who uses digital technology responsibly, ethically, and effectively to participate in society.
Characteristics of Good Digital Citizens:
- Think before posting online
- Protect personal information
- Use multiple search engines to limit tracking
- Change passwords regularly
- Report illegal or inappropriate content
- Respect others' digital property
- Contribute positively to online communities
7. Concept of Netiquette and Online Behaviors
What is Netiquette?
Network + Etiquette = Rules for polite and respectful online behavior
Netiquette Guidelines:
| Do's | Don'ts |
|---|---|
| Be respectful in communication | Use offensive language |
| Respect others' privacy | Share personal information without consent |
| Give credit for shared work | Plagiarize others' content |
| Think before posting | Post impulsively or emotionally |
| Report abusive behavior | Engage in cyberbullying |
| Be open to criticism | React defensively to feedback |
| Maintain positive online presence | Spread negativity or hate |
Remember:
"The same manners you use in person should be used online."
8. Digital Footprint and Online Privacy
What is Digital Footprint?
The trail of data you create while using the internet. Also called "Digital Shadow" or "Electronic Footprint."
Digital Footprint Types
| Type | Description | Examples |
|---|---|---|
| Active Footprint | Data you intentionally share | Social media posts, emails, online forms |
| Passive Footprint | Data collected without your knowledge | Search history, location data, cookies |
Advantages of Digital Footprint
| Advantage | Explanation |
|---|---|
| Health Monitoring | Wearables track fitness data |
| Social Connections | Helps build relationships online |
| Targeted Advertising | Relevant ads based on interests |
| Law Enforcement | Helps in investigations |
Disadvantages of Digital Footprint
| Disadvantage | Explanation |
|---|---|
| Security Risks | Hackers can track activities |
| Privacy Issues | Personal data can be misused |
| Exploitative Practices | Companies sell user data |
| Criminal Exploitation | Fraud, identity theft |
| Online Abuse | Stalking, harassment |
Protecting Your Digital Footprint
| Action | Purpose |
|---|---|
| Review privacy settings | Control what others see |
| Delete old accounts | Reduce exposure |
| Use strong passwords | Prevent unauthorized access |
| Disable location tracking | Protect physical location |
| Regular software updates | Fix security vulnerabilities |
| Think before posting | Control active footprint |
Incognito/Private Browsing:
- What it does: Doesn't save browsing history, cookies, or form data
- What it doesn't do: Doesn't make you anonymous to websites or ISP
- Shortcut: Ctrl + Shift + N (Windows), Cmd + Shift + N (Mac)
9. Practical Activities and Safety Measures
Activity 1: Using Antivirus and Firewall
Steps:
- Open antivirus software
- Run a quick scan
- Update virus definitions
- Check firewall settings
- Configure basic rules
Activity 2: Safe Browsing Practice
Checklist:
- Browser updated
- HTTPS used
- Pop-ups blocked
- Cookies cleared regularly
- Strong passwords used
Activity 3: Digital Footprint Analysis
What to track:
- Email addresses used
- Social media usernames
- Devices regularly used
- Online accounts created
Activity 4: Password Strength Test
Create passwords that:
- Are at least 12 characters long
- Mix character types
- Are unique for each account
- Are changed every 3-6 months
10. Important Legal Information
Electronic Transaction Act (ETA), 2063:
- Section 47: Punishment for publishing illegal material
- Maximum penalty: ₹1 lakh fine and/or 5 years imprisonment
- What's illegal: Material against morals, hate speech, harassment
Where to Report Cybercrime in Nepal:
- Cyber Bureau of Nepal Police
- Local police stations
- Online portal: www.nepalpolice.gov.np
11 .Key Terms and Definitions
| Term | Definition |
|---|---|
| Cybersecurity | Protection of digital systems and data |
| Cybercrime | Illegal activities using computers |
| Malware | Malicious software (viruses, ransomware) |
| Phishing | Fake attempts to steal sensitive information |
| Firewall | Security barrier between network and internet |
| Digital Footprint | Trail of data left online |
| Netiquette | Rules for polite online behavior |
| Digital Citizen | Responsible user of digital technology |
| MFA | Multi-Factor Authentication |
| ETA | Electronic Transaction Act |
12. Safety Checklist for Students
Daily Practices:
✅ Use strong, unique passwords
✅ Enable MFA where possible
✅ Keep software updated
✅ Think before clicking links
✅ Verify website security (HTTPS)
✅ Log out of shared computers
✅ Backup important data regularly
Social Media Safety:
✅ Adjust privacy settings
✅ Don't share personal information
✅ Be selective about friend requests
✅ Report inappropriate content
✅ Take regular digital breaks
When in Doubt:
✅ Ask a trusted adult
✅ Research before sharing
✅ Verify information sources
✅ Report suspicious activities
13. Cyber Hygiene Tips
Daily: Clear browsing history, check for updates
Weekly: Change passwords, backup data
Monthly: Review privacy settings, check account activity
Yearly: Audit online accounts, delete unused ones
14. The Golden Rules of Digital Citizenship
Protect Yourself – Use security measures
Respect Others – Practice netiquette
Protect Others – Report abuse
Protect Property – Respect copyright
Stay Informed – Keep learning about digital safety