-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
386 lines (364 loc) · 17.7 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Cyber Security</title>
<link rel="icon" type="image/x-icon" href="/favicon.png">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.12.1/css/all.min.css" integrity="sha256-mmgLkCYLUQbXn0B1SRqzHar6dCnv9oZFPEC1g1cwlkk=" crossorigin="anonymous" />
<link rel="stylesheet" href="style.css">
</head>
<body>
<!-- nav-bar -->
<section id="nav-bar" class="container">
<header class="nav-bar">
<div class="brand"><a href="index.html"><img src="images/logo.png" width="200" height="60" alt=""></a></div>
<div class="nav-list">
<div class="hamburger">
<div class="bar"></div>
</div>
<ul>
<br>
<li><a href="#a"><h6>About</h6></a></li>
<li><a href="#c"><h6>Threats</h6></a></li>
<li><a href="#d"><h6>Counter-Measures</h6></a></li>
<li><a href="#e"><h6>Do's and Dont's</h6></a></li>
<li><a href="/tools.html"><h6>Tools</h6></a></li>
</ul>
</div>
</header>
</section>
<!-- End nav-bar -->
<!-- Hero Section -->
<section id="hero" class="hero container">
<div class="hero-info">
<div class="hero-info-heading">Complete <br><h6>Cyber Secuirty</h6></div>
<br>
<br>
<p class="hero-info-subheading">Secure your cyberspace</p>
<a href="#a" type="button" class="hero-info-button">Learn More</a>
<a href="/tools.html" type="button" class="hero-info-button">Hacking Tools</a>
</div>
<div class="hero-img">
</div>
</section>
<!-- End Hero Section -->
<!-- About section -->
<section id="a">
<div class="hello1">
<br><p> <b>A matter of concern !</b></p>
</div>
<div class="hello2">
<p style="float: right;"><img src="images/img-2.jpg" style="margin:0px 20px" height="400px" width="800px" border="1px"></p>
<p> Technological advances are changing the world in ways
that could not have been imagined. The emergence of
advanced digital innovations are providing new opportunities
to connect and learn, and have begun influencing every aspect
of human life.
Children and young people have shown greater ability to adapt
and adopt digital devices and innovations, which augurs well
for the future. They use the devices and apps for a variety of
functions, including self-expression, communication,
networking, research, entertainment, and much more. The
internet has enabled children to become active social agents
and to mobilise for social, ecological and other causes. They
are increasingly able to project their voices with
unprecedented reach.
However, an assumption is often made that young people
have superior skills with digital technology, which surpass
those of their parents and teachers.
It may or may not be right. Many young people are confident
in using a wide range of technologies and often turn to the
internet for information. They seem able to learn to operate
unfamiliar hardware or software very quickly and may take on
the role of teaching adults how to use computers and the
internet. But the confidence with digital technology can also
be misleading.
Many of them frequently struggle when applying them to
research tasks. They can find it difficult to work out whether
information on an unfamiliar website is trustworthy, and rely
on their chosen search engine’s rankings for their selection of
material. They may not understand how search terms work or
of the powerful commercial forces that can result in a
particular company being top of the search engine’s list. They
may not be aware of the lurking risks and threats and the fact
that some of their actions can invite them trouble.
Furthermore, the digital skills and knowledge are not evenly
spread amongst all young people. Dearth of research on the
subject has prevented a nuanced analysis of who are most
likely to lag behind in the opportunities afforded by
technological advances. However, there is general agreement
among those working on cyber safety and security among
children and young people that gender is a major impediment.
Social norms have impeded girls’ access to opportunities,
including the access and use of digital devices and the
internet. Many of them belonging to socially or economically
marginalised families in rural, semi-urban and urban areas
have either no access, or limited, or supervised access to
digital technologies, which could enable them to exercise their
agency, autonomy and rights in an increasingly
interconnected world.
The exploration of new vistas and acquisition of rich
experiences online require a strong element of caution. After
all, every light has its shadow. The technologies can be
misused or overused in ways that are detrimental to the users
and even non-users.
UNICEF in its Child Online Protection in India report in 2016
had presented the following typology of risks and threats.</p><br><br>
</div></section>
<section id="b">
<div class="hello">
<div class="hello3">
<br> <p> <b>What is Digital Security ?</b></p>
</div>
<div class="hello4" style="clear: left;">
<p style="float: left;"><img src="images/digital.jpeg" height="200" width="200" border="1px" style="margin:0px 20px"></p>
<p><br><br><br><br><h3>Tools such as anti-virus software, biometrics and personal
devices, e.g., the secure chip in a credit card or an ePassport
are digital security devices because they offer freedom to
communicate, work, travel and shop using your digital
identity in a way that is secure.
Digital security is an all-encompassing term, which includes
the tools to secure technology, assets and personal identity in
the online and mobile world.</h3>
</p><br>
</div></div></section>
<section id="c">
<div class="hello1">
<p><br><b>Different kinds of Threats</b></p>
</div>
<div class="hello2">
<p style="float: right;"><img src="images/img-3.jpg" style="vertical-align:middle; margin:50px 20px" height="350px" width="600px" ></p>
<p>Viruses on digital devices are malicious programme codes that can corrupt the system and destroy the data within the computer</p>
<ul>
<br><br><li><b><h2>Malware</h2></b></li>
<p>Malware is a type of malicious software designed to gain
unauthorized access or to cause damage to a computer
without the knowledge of the owner, stealing and even
deleting sensitive data, altering or hijacking computer
functions to monitor users’ computer activity</p>
<br><br><li><b><h2>Ransomware</h2></b></li>
<p>Ransomware is a type of malicious software designed to
extort money from the user. The attacker locks the victim’s
computer system files or blocks access to files or the
computer system typically through encryption until the
ransom is paid. Paying the ransom is no guarantee that the
files will be recovered or the system will be restored. </p>
<br><br><li><b><h2>Your One-Up about Hackers</h2></b></li>
<p>A hacker is someone who will gain entry into a computer
without permission, with the intention to use or <br> exploit
technology to cause harm, steal or destroy the data
contained in it. </p>
</ul>
<br><br><p>Usually hackers are well versed with computer technologies
by using various applications or programmes that penetrate
the defence mechanism employed by the target computer
and send back the sensitive information like usernames,
passwords, IP addresses and using them to gain access into
the computer itself.
These applications or programmes can be in the form of
Trojans, worms, malware and viruses, which will install in the
system and compromise its security. After all, if the hacker
can gain administrative rights, they’re free to do anything
with the data contained in the compromised computer
system. Several public locations like shopping malls and airports
among others offer their customers free access to public
Wi-Fi. But public Wi-Fi networks also enable cyber criminals
to spy on unwary customers, take advantage of this
convenience and intercept their data. They can access
sensitive information of users’ banking credentials, account
passwords and other valuable information. </p>
<br><br>
</div></section>
<section id="d">
<div class="hello">
<div class="hello3">
<p><br><b>Preventing And Countering Threats
And Risks</b></p>
</div>
<div class="hello4" style="clear: left;">
<p style="float: right;"><img src="images/img-4.jpg" height="300" width="600" border="1px" style="margin:0px 20px"></p>
<br> <p><br><h2>Install anti-virus software and ensure that is updated as
regularly as possible. Some computers have built-in
anti-virus software too. </h2><br>
</p>
<ol>
<br><br><li><b><h2>Regularly update software and operating systems</h2></b></li>
<br><p>Web browsers, plugins (Java and Adobe Products) and even
Office Suites. It is the most common way hackers and
malware try to gain access to devices and your information</p>
<br><br><li><b><h2>Use privacy settings on mobile phones, apps and browsers</h2></b></li>
<br> <p>Privacy settings on social media platforms enable you to
select who can access your posts online. Try to restrict
access of your profile to your friends only. Remember <b> what
you post online remains there almost forever.</b></p>
<br><br><li><b><h2>Verify if the Wi-Fi link is legitimate and safe</h2></b></li>
<br> <p>Treat all Wi-Fi links with suspicion. Public Wi-Fi is inherently
insecure — so be cautious. The Wi-Fi link could also be a
bogus link set up by a cybercriminal trying to capture
valuable, personal information from unsuspecting users.
Don’t connect to an unknown or unrecognised wireless
access point. Try to use known Wi-Fi links, which are
password protected.</p>
<br><br><li><b><h2>Learn to create VPN to avoid downloading of data through
public Wi-Fi</h2></b></li>
<br> <p>Use your mobile phone to create VPN If you need to access
any websites that store or require the input of any sensitive
information consider accessing them via your mobile phone
network, instead of the public Wi-Fi connection.</p>
<br><br><li><b><h2>Verify if the website is legitimate/authentic</h2></b></li>
<br> <p>Avoid logging into websites where there’s a chance that your
identity, passwords or personal information may be
compromised — for example, online banking services or any
websites that store your credit card information.
</p>
<br><br><li><b><h2>Keep webcams private</h2></b></li>
<br><p>These devices can sometimes be hacked and used to take
pictures or videos of you without your consent. Put a sticker
over your webcam, laptop camera, or phone camera when
they are not in use.</p>
<br><br><li><b><h2> Download apps from trusted sources like Google play, AppStore</h2></b></li>
</ol><br><br><br>
</div>
</div></div></section>
<section id="e">
<div class="hello1">
<p><br><b>Do's and Dont's</b></p>
</div>
<div class="hello2">
<p style="float: right;"><img src="images/img-5.JPG" style="vertical-align:middle; margin:50px 20px" height="400px" width="500px" ></p>
<ul>
<br><br><li><b><h2>Passwords</h2></b></li><br>
<p>Strong, unique but easy to remember, and private passwords
are essential for dealing with unauthorised access to online
accounts. The passwords, when shared with other person(s),
can be misused. They may be stolen by unauthorized users to
collect and misuse your personal information.
Learn how to create strong passwords and passphrases. A
password must be difficult to guess. But you should be able
to remember it. Writing passwords somewhere is not
advisable. Memorise it. Your password is given to you to
maintain your privacy. Go for an extra layer of security by opting for two-factor
authentication (2FA), also known as two-step verification or
dual factor authentication. This security process requires the
user to provide two different authentication factors to verify
themselves to better protect both the user's credentials and
the resources the user can access.
Log out of your account when you plan to be inactive even for
a short while. Always keep your system locked whenever it is
not in use.</p>
<br><br><li><b><h2>Emails And Messages</h2></b></li><br>
<p>Most email providers offer filtering services.<br><br>
The use of Rich Text Format instead of the standard .DOC
format will retain the formatting but not any macros. This
may prevent you from sending virus to others if you are
already infected by it.</p>
<br><br><li><b><h2>Security Settings On The Browser</h2></b></li>
<p><br><br>• Update anti-virus software regularly.<br><br>
• Adjust the settings in the web-browser. It may limit some
functionality but can provide the best protection from
malicious content.<br><br>
• Enable email accounts for multi-factor authentication. Email
is the gateway to almost every other account a user may
have. When someone loses or forgets an account password,
the reset is sent to his or her email.<br><br>
• Gauge the credibility of the website by checking the URL,
lock.<br><br>
• Look out for warning signals given by web browsers about
exposure to a malicious website or content. Such warnings
can protect the user from malware, phishing and identity
theft. These warnings given by most of the commonly used
browsers like Chrome, Internet Explorer, etc. Remember to
update your browsers regularly to avoid missing out on such
updates.<br><br>
• Exercise caution while giving details about personal
information when registering for access to email accounts,
social networks and chat rooms, and free game downloads.</p>
</ul>
</div></section>
<!-- End About section -->
<!-- Service Section -->
<section id="f" class="services container">
<div class="services-header">
<h1 class="services-header-heading">Remember This...</h1>
<p class="services-header-desc">What you write is clearly your prerogative. But do remember that any production, consumption and distribution of content
which involves other person's defamation is illegal.</p>
</div>
<div class="services-info">
<div class="service">
<div class="service-card">
<div class="service-front">
<i class="fa fa-palette"></i>
<h1 class="service-front-heading">Digital Literacy</h1>
</div>
<div class="service-back">
<h1 class="service-back-heading">Digital Literacy</h1>
<p class="service-back-desc">Digital literacy is the ability to use digital technology
safely while staying within the bounds of social responsibility.
It allows students, who are increasingly getting access to
digital devices and the internet, to learn how to minimise risks
and maximise benefits that come with using digital
technologies.</p>
</div>
</div>
</div>
<div class="service">
<div class="service-card">
<div class="service-front">
<i class="fa fa-laptop-code"></i>
<h1 class="service-front-heading">Digital Security</h1>
</div>
<div class="service-back">
<h1 class="service-back-heading">Digital Security</h1>
<p class="service-back-desc">Digital security is the collective term that describes the resources employed to protect your online identity, data, and other assets. These tools include web services, antivirus software, smartphone SIM cards, biometrics, and secured personal devices.</p>
</div>
</div>
</div>
<div class="service">
<div class="service-card">
<div class="service-front">
<i class="fa fa-building"></i>
<h1 class="service-front-heading">Digital Law</h1>
</div>
<div class="service-back">
<h1 class="service-back-heading">Digital Law</h1>
<p class="service-back-desc">Digital law can be defined as the legal rights and restrictions
governing technology use. Most users are unaware of the
possible consequences of their online activities thereby need
to be made aware of the rules and legal implications of using
the internet. </p>
</div>
</div>
</div>
</div>
</section>
<!-- End Service Section -->
<!-- Hire Section -->
<section id="hire" class="hire container">
<h1 class="hire-heading">If you need any kind of help regarding Cyber Security, Kindly</h1>
<a href="https://cybercrime.gov.in/" target="_blank" type="button" class="hire-button">Click Here</a>
</section>
<!-- End Hire Section -->
<!-- Footer section -->
<footer id="footer" class="footer container">
<div class="footer-contact">
<h1 class="footer-contact-heading">Contact Me</h1>
<p class="footer-contact-info">Email: [email protected]</p>
<p class="footer-contact-info">Mobile: +91 722 399 0578</p>
</div>
<div class="footer-social-follow">
<h1 class="footer-social-follow-heading">Follow Me</h1>
<div class="footer-social-icon">
<a href="https://facebook.com/" target="_blank"><i class="fab fa-facebook"></i></a>
<a href="https://instagram.com/" target="_blank"><i class="fab fa-instagram-square"></i></a>
<a href="https://twitter.com/" target="_blank"><i class="fab fa-twitter-square"></i></a>
</div>
</div>
<footer style="text-align: center; margin-top: 20px; margin-bottom: 10px; color: rgb(255, 255, 255);">
© 2022 by <a href="mailto:[email protected]">Ibrahim Saleem</a>
</footer>
</footer>
<!-- End Footer section -->
<script src="./app.js"></script>
</body>
</html>