Digital Empowerment
Digital Empowerment
EMPOWERMENT
Gmail :- Gmail is a free email service provided by Google. In many ways, Gmail is like any
other email service: You can send and receive emails, block spam, create an address book, and
perform other basic email tasks. But it also has some more unique features that help make it one
of the most popular online email services.
In this lesson, we'll talk about some of the features and advantages of Gmail, and we'll give an
overview of the Gmail window.
Google accounts
Creating a Google account is needed to access Gmail because it is just one of the many services
offered by Google to registered users. Signing up for a Google account is free and easy, and
naming your new Gmail address will be a part of the sign-up process. This means whenever
you're signed in to Gmail, you are automatically signed in to your Google account. You'll be able
to easily access other Google services like Google Docs, Calendar, and YouTube.
Of course, you don't have to use any of these features. You may just want to focus on email for
now. However, if you'd like more information, you can review our Google account tutorial,
Gmail features
Gmail offers several useful features to make your email experience as smooth as possible,
including:
Spam filtering. Spam is another name for junk email. Gmail uses
advanced technologies to keep spam out of your inbox. Most spam is
automatically sent to a separate spam folder, and after 30 days it is
deleted.
Conversation View. An email conversation occurs whenever you send
emails back and forth with another person (or a group of people), often
about a specific topic or event. Gmail groups these emails together by
default, which keeps your inbox more organized.
Built-in chat. Instead of sending an email, you can send someone an
instant message or use the voice and video chat feature if your computer
has a microphone and/or webcam.
Call Phone. This feature is similar to voice chat, except that it allows you
to dial an actual phone number to call any phone in the world. It's free to
make a call to anywhere in the United States or Canada, and you can
make calls to other countries at relatively low rates.
When you're working with Gmail, you'll primarily be using the main Gmail interface. This
window contains your inbox, and it allows you to navigate to your contacts, mail settings, and
more. Also, if you use other Google services like YouTube or Calendar, you'll be able to access
them from the top of the Gmail window.
Click the buttons in the interactive below to learn about the different parts of the Gmail interface.
Google Drive is a free service from Google that allows you to store files online and access them
anywhere using the cloud. Google Drive also gives you access to free web-based applications for
creating documents, spreadsheets, presentations, and more.
a) Why use Google Drive?
Google Drive is one of the most popular cloud storage services available today. If you've never
used a cloud-based storage service like Google Drive before, take a moment to consider the
advantages of keeping your files online. Because files can be accessed from any computer with
an Internet connection, Drive eliminates the need to email or save a file to a USB drive. And
because Drive allows you to share files, working with others becomes much easier.
b) Creating files on Google Drive
Google Drive doesn't just store your files; it also allows you to create, share, and manage
documents with its own productivity apps. If you've ever used a suite like Microsoft Office,
some things about Google Drive's apps might seem familiar. For instance, the types of files you
can work with are similar to files that can be created with various Microsoft Office programs.
Below are the types of files you can create and share on Google Drive:
✔ Documents: For composing letters, flyers, essays, and other text-based files (similar
to Microsoft Word documents)
Google Docs :-
What is Google Docs?
Google Docs, first released in 2006, is a free web-based word processor in which documents can
be created, edited and stored as part of the Google Docs Editors suite of free web applications.
The cloud-based productivity platform also includes Google Sheets, Google Slides, Google
Drawings, Google Forms, Google Sites and Google Keep.
Google Docs users can import, create, edit and update online documents in various fonts and file
formats that can be accessed from any computer with an internet connection and web browser.
Users can also access documents from mobile devices with Android, Chrome or iOS operations
systems, and create new documents to work on from their device.
To use the software, users must create a free Google account. This will also give them a Gmail
email address. To begin, simply go to docs.google.com or by navigating to Google Docs from
their Gmail or Google Drive online storage account.
One of the main benefits of using Google Docs is that collaborators can see the revision history
of any changes made to Google documents and when those alterations were done in the version
history.
Users can also control who sees their work so privacy can be maintained in a business or
personal setting. It also offers built-in commenting tools that let users discuss changes and work
together as they're being made.
Additionally, because documents are stored online and can also be stored on users' computers,
there is no risk of total data loss as a result of a localized catastrophe.
Thus, Google Docs is an ideal word processing option for businesses, blog authors or students
who use it for writing assignments.
Google Sheets :-
Google Sheets allows you to organize, edit, and analyze different types of information using
spreadsheets. In this lesson, you'll learn about the different ways you might use spreadsheets and
how to navigate the Google Sheets interface.
You'll also learn the basic ways to work with cells and cell content, including how to select cells,
insert content, and copy and paste cells.
a) All about Google Sheets
Google Sheets is a web-based spreadsheet application that allows you to store and organize
You may notice that there is no save button. This is because Google Drive uses autosave, which
automatically and immediately saves your files as you edit them.
Google Slides :-
a) Choosing a theme
When you first create a new presentation, Google Slides will prompt you to choose a theme.
Themes give you a quick and easy way to change the overall design of your presentation. Each
theme has a unique combination of colors, fonts, and slide layouts. Select a theme from the panel
on the right side of the window, and it will be applied to your entire presentation.
Google Chat :-
Google Chat is a secure communications tool designed to provide easy business communications
within the Google Workspace ecosystem.
With Google Chat, teams collaborate via text, build collaborative chat rooms, share documents,
deliver presentations, and establish web conferences.
Google Chat
Google Chat was called Hangouts Chat and worked as a more business-oriented version of the
consumer Hangouts. Google Chat expands on the features of the standard version of Hangouts
by adding a plethora of team collaboration features and integrations.
Google Chat is easily accessible in Google Workspace. To access it, use the Google app launcher
button in any Workspace application.
The app launcher appears as a gridded set of dots along the upper right-hand side of your screen.
Click this grid, and a series of apps, including Gmail, Calendar, Contacts, and Drive, will appear.
Google Chat has some handy functions. The software uses predictive text options to automate
replies. For example, if a coworker says, “Good afternoon,” Google will provide you a list of
appropriate answers like, “Hello, how are you?”
Once a chat is established, you share spreadsheets and documents from Google Drive. Any
participant will then be able to access the file via Google Docs.
Additionally, adding things like video meeting links is done very quickly through the chat UI.
Once placed in chat, Google Chat will provide a clickable meeting for colleagues to use.
If you'd like to use Google Chat on your desktop, you can also download the Google Chat app
for a native experience separate from your browser.
For those wondering if Google hangouts is still a thing, the answer is unfortunately not.
In 2022, Google announced that Google Hangouts would cease to be operational. The good
news, however, is that users can use Google Chat and Google Meet to communicate via
messaging and video.
According to Google,
Google Chat is the next evolution of Hangouts. It grants that same one-on-one communication
but expands on it to be more effective in a business setting.
Important features available in Hangouts like read receipts, video and audio conferencing, and
image sharing are all available through Chat.
These include:
● Spaces, direct messages, and group chats: Users can collaborate on every level, from 1:1
direct messages to company or team-wide spaces (the equivalent of channels in Microsoft
Teams or Slack). Messaging features available include message threads for those looking
to delegate individual tasks to specific team members, file collaboration, emojis,
reactions, and everything else you would expect from a modern messaging platform.
● Larger Video Chat Capacities: With Hangouts, you were limited to 10 attendees, but Chat
expands this thanks to its paid structure. With Chat, you’ll have a max of 250 participants
for any video chat.
● Google Meet Integration: This is probably one of the better features of Chat. When you
want to set up a meeting, you simply tag Google Meet with the meeting attendees. After
that, you only need to mention the proposed meeting date, and the calendar appointment
is automatically created.
Google Tasks :-
To access it, simply click the Google Tasks icon in the side panel of Gmail, Calendar, Chat,
Drive, or a file in Google Docs, Sheets, or Slides. If the icon isn't visible, click the Show side
panel icon, which looks like a left-facing arrow, in the bottom-right corner of your app.
With Google Tasks open in the side panel, click Add a task.
If you set a due date, the task will also populate in your Google Calendar, which is helpful if you,
like me,
to complete a task.
Tip: Not all tasks are created equal. Find out which tasks are better suited for your calendar—not
your to-do list
Need to edit a task? Simply click on the task in the side panel and begin editing. Or, click on the
task in Google Calendar, and then click the Edit task icon, which looks like a pencil.
But I'm told that's not how one acts as an adult, so here I am, working on turning a new leaf.
, I prefer to add Gmail emails that need a reply or action as to-do items in my Google Tasks list
purely because there's greater visibility (i.e., fewer opportunities for tasks to get lost within
collapsed folders). There are a few ways to do this.
1. Click the Google Tasks icon in the side panel of Gmail to open the app.
2. Drag an email, or multiple emails at once, from Gmail, and drop it anywhere in the
Google Tasks panel to transform it into a task.
1. Select the emails from your inbox that you want to add to Google Tasks.
2. Click the Add to tasks icon, which looks like the Google Tasks icon with a plus sign
(+), from the inbox menu bar.
1. Select the emails from your inbox that you want to add to Google Tasks.
2. Hit Shift + T, and the email will automatically populate as a task.
By default, any method you use will populate the email subject line as the task name and include
a link to the email for ease of reference. To add more details or to set a task due date, click the
task name to edit.
Let's say you want to reorganize your to-do list. You can do this with just one click using three
preset sorting methods: My order, Date, and Starred recently.
To use one of these methods, click the List options icon, which looks like three dots stacked
vertically (⋮), beside Add a task. Choose your desired sorting method, and Google Tasks will
organize your to-do list accordingly.
If you'd rather reorganize your list manually, it's really straightforward. Simply click on the task
and drag it to the order you want.
If your task has subtasks, the whole task set, by default, will move when you drag the parent
task.
Want to turn a subtask into its own task? Click the task, and drag it to a blank space in the
Google Tasks panel.
Google Meet :-
Google Meet is Google’s secure and easy-to-use video conferencing solution that is available to
schools for free through Google Workspace for Education.
Educators use Meet to connect with your child one-on-one, to facilitate remote instruction and to
hold virtual meetings and conferences with parents and guardians.
Meet works with all modern web browsers (like Chrome, Safari, etc.), meaning you don’t have to
install or download software to your desktop computer in order to use it. For those looking to
join from a mobile device like a tablet or smartphone, Meet has a dedicated mobile app that
optimizes the video conferencing experience for mobile conditions. If you are using Meet on a
Chromebook, we recently made significant performance improvements like audio and video
optimizations and the ability to handle multitasking better.
■ Organize email to let you focus on the messages that matter most.
■ Manage and share your calendar to schedule meetings with ease.
■ Share files from the cloud so recipients always have the latest version.
■ Stay connected and productive wherever you are.
Onedrive
OneDrive is an online cloud storage service from Microsoft. OneDrive integrates with Windows
11 as a default location for saving documents, giving Microsoft account users five gigabytes of
free storage space before giving upgrade options.
OneDrive allows users to save files, photos and other documents across multiple devices. A user
can also save their files in OneDrive and have it automatically sync on other devices. This means
someone can access and work on the same document in multiple locations. OneDrive provides
relatively easy access to cloud storage space, allowing options to share content with others.
How it works
OneDrive integrates with Microsoft Office so users can access Word, Excel and PowerPoint
documents from OneDrive. It doesn’t require a download and should already be a part of
Windows 11. A Microsoft account is required to use One Drive and users will need to sign in
before using it. To sign in, users will need to go to onedrive.com and select “Sign in” which
appears at the top of the page.
The system allows users to simultaneously edit Office documents, edit documents in browsers,
and create and share folders. OneDrive also offers Facebook integration, automatic camera roll
backup and the ability for users to email slide shows. Users can also scan documents and store
them in OneDrive.
Users can choose where to save data -- on OneDrive or File Explorer. Those who want to use
OneDrive as a data backup platform should have data saved in both locations. However, other
users can choose to store their files in either or.
Pricing
OneDrive comes with 5 GB of free storage. Users can add more storage space upgrading to a
different home or business plans. The home plans include the free basic 5 GB plan, a $1.99 a
month 100 GB plan, a $69.99 Microsoft 365 Personal plan with 1 TB of storage space or a
$99.99 Microsoft 365 Family plan with 1 TB for six different users -- offering a total of six
terabytes for that one plan.
For enterprise customers, Microsoft offers OneDrive for Business. OneDrive for Business is a
standalone product separate from Microsoft 365 but is included with Office Online. It includes
multifactor authentication, built-in compliance standards and auditing and reporting capabilities.
OneDrive for Business offers four plans at four different prices. Each plan, from cheapest to
most expensive, will increase the features and amount of storage space with cost. Business Plan
Word
Microsoft Word is a widely used commercial word processor designed by Microsoft. Microsoft
Word is a component of the Microsoft Office suite of productivity software, but can also be
purchased as a stand-alone product.
Microsoft Word was initially launched in 1983, and has since been revised numerous times. It is
available for both Windows and Apple operating systems.
In 1981, Microsoft hired Charles Simonyi to develop a word-processing application. The first
version was released in 1983.
Initially, MS Word was not very popular, owing to its radically different look compared to
WordPerfect, the leading word processor at that time. However, Microsoft improved Word
continually over the years, including a 1985 version that could run on a Mac. The second major
release of Word, in 1987, included an upgrade of major features, in addition to new
functionalities such as support for rich text format (RTF).
In 1995, Microsoft increased its market share in the word processor business with the release of
Windows 95 and Office 95, which offered a bundled set of office productivity software.
In addition, MS Word has a built-in dictionary for spell checking; misspelled words are marked
In 2007, .docx became the default file format, replacing the “.doc” extension.
As Microsoft Word modernized over time, so did Microsoft operating systems. Since the
Microsoft Office suite is inherently tied to the Microsoft operating system, its use featured in
user frustrations around end-of-life for Microsoft XP and the successive Vista and Windows 7, 8
and 10 additions.
At the same time, Microsoft was getting on the cloud bandwagon. Its new offering, Microsoft
Office 365, replaces old out of the box or single machine licensing methods with a
cloud-delivered set of software applications that users can access from anywhere.
With subscription pricing, many customers are now accessing Microsoft Word and Office suites
through office 365 instead of buying it through downloads with license keys. Theoretically, the
cloud-delivered method allows for more versatile use on multiple devices, although some users
have reported trouble trying to get new devices authorized.
One other popular aspect of the cloud-delivered software is that there’s no need to load it onto
the local hard drive, leaving the end device less cluttered by drivers and other types of software
infrastructure. At the same time, Microsoft has added other complementary cloud applications
like OneNote, OneDrive and SharePoint for enterprise users, and a mobile Office suite for Apple
and Android.
Excel
What is MS Excel?
MS Excel is a spreadsheet program where one can record data in the form of tables. It is easy to
analyse data in an Excel spreadsheet. The image given below represents how an Excel
spreadsheet looks like:
● Click on Start
● Then All Programs
● Next step is to click on MS Office
● Then finally, choose the MS-Excel option
Alternatively, you can also click on the Start button and type MS Excel in the search option
available.
What is a cell?
A spreadsheet is in the form of a table comprising rows and columns. The rectangular box at the
intersection point between rows and columns forms a cell. Given below is an image of a cell:
The cell address is the name by which is cell can be addressed. For example, if row 7 is
interested in column G, then the cell address is G7.
Features of MS Excel
Various editing and formatting can be done on an Excel spreadsheet. Discussed below are the
various features of MS Excel.
● Home
● Comprises options like font size, font styles, font colour, background colour,
alignment, formatting options and styles, insertion and deletion of cells and
editing options
●
● Insert
● Comprises options like table format and style, inserting images and figures,
MS Excel is widely used for various purposes because the data is easy to save, and information
can be added and removed without any discomfort and less hard work.
● Easy To Store Data: Since there is no limit to the amount of information that can be saved
in a spreadsheet, MS Excel is widely used to save data or to analyse data. Filtering
information in Excel is easy and convenient.
● Easy To Recover Data: If the information is written on a piece of paper, finding it may
take longer, however, this is not the case with excel spreadsheets. Finding and recovering
data is easy.
● Application of Mathematical Formulas: Doing calculations has become easier and less
time-taking with the formulas option in MS excel
● More Secure: These spreadsheets can be password secured in a laptop or personal
computer and the probability of losing them is way lesser in comparison to data written in
registers or piece of paper.
● Data at One Place: Earlier, data was to be kept in different files and registers when the
paperwork was done. Now, this has become convenient as more than one worksheet can
be added in a single MS Excel file.
● Neater and Clearer Visibility of Information: When the data is saved in the form of a
Powerpoint
The image given below shows the main page of MS PowerPoint, where a person lands when the
program is opened on a computer system:
A blank presentation is open on the screen. According to the requirement, a person can modify
the template for a presentation and start using the program.
Answer: A combination of various slides depicting a graphical and visual interpretation of data,
to present information in a more creative and interactive manner is called a PowerPoint
presentation or PPT.
Answer: When all the slides of a PowerPoint presentation are set in series and then presented to a
group of people, where each slide appears one after the other, is a set pattern, this is known as a
PowerPoint slide show.
1. Clip Art
2. Graphs
3. Tables
4. Photographs
5. Charts
6. Media Clips
7. Videos
All these elements are mainly used to enhance presentation skills and make the slide more
interactive.
Features of MS PowerPoint
There are multiple features that are available in MS PowerPoint which can customise and
optimise a presentation. The same have been discussed below.
● Slide Layout
Multiple options and layouts are available based on which a presentation can be created. This
option is available under the “Home” section and one can select from the multiple layout options
provided.
The image below shows the different slide layout options which are available for use:
Under the “Insert” category, multiple options are available where one can choose what feature
they want to insert in their presentation. This may include images, audio, video, header, footer,
symbols, shapes, etc.
● Slide Design
MS PowerPoint has various themes using which background colour and designs or textures can
be added to a slide. This makes the presentation more colourful and attracts the attention of the
people looking at it.
This feature can be added using the “Design” category mentioned on the homepage of MS
PowerPoint. Although there are existing design templates available, in case someone wants to
add some new texture or colour, the option to customise the design is also available. Apart from
this, slide designs can also be downloaded online.
● Animations
During the slide show, the slides appear on the screen one after the other. In case, one wants to
add some animations to the way in which a slide presents itself, they can refer to the
“Animations” category.
Apart from all these options; font size, font style, font colour, word art, date and time, etc. can
also be added to a PPT.
PowerPoint presentations are useful for both personal and professional usage. Given below are a
few of the major fields where PPT is extremely useful:
● Education – With e-learning and smart classes being chosen as a common mode of
education today, PowerPoint presentations can help in making education more interactive
and attract students towards the modified version of studying
Teams
Having an excellent team space is key to being able to make creative decisions and communicate
with one another. Shared workspace software makes this much easier to achieve, especially if a
particular team is based in a very large company, has many remote employees, or is made up of a
significant amount of team members.
Microsoft Teams features make it stand out from other collaboration software:
● Teams and channels. Teams are made up of channels, which are conversation boards
between teammates.
● Conversations within channels and teams. All team members can view and add to
different conversations in the General channel and can use an @ function to invite other
members to different conversations, not unlike Slack.
● A chat function. The basic chat function is commonly found within most collaboration
apps and can take place between teams, groups, and individuals.
● Document storage in SharePoint. Every team who uses Microsoft Teams will have a
site in SharePoint Online, which will contain a default document library folder. All files
shared across all conversations will automatically save to this folder. Permissions and
security options can also be customized for sensitive information.
● Online video calling and screen sharing. Enjoy seamless and fast video calls to
employees within your business or clients outside your business. A good video call
feature is great to have on a collaboration platform. One can also enjoy simple and fast
desktop sharing for technical assistance and multi-user real-time collaboration.
● Online meetings. This feature can help enhance your communications, company-wide
meetings, and even training with an online meetings function that can host up to 10,000
users. Online meetings can include anyone outside or inside a business. This feature also
includes a scheduling aid, a note-taking app, file uploading, and in-meeting chat
messaging.
● Audio conferencing. This is a feature you won’t find in many collaboration platforms.
With audio conferencing, anyone can join an online meeting via phone. With a dial-in
You can choose to do something involving both of these approaches or something somewhere in
between. What is right for a particular business depends on its culture and use cases. Teams can
be controlled and configured directly from the Teams admin centre.
From the user standpoint, Teams is very intuitive and the learning curve is quite small compared
to more complicated collaboration tools.
Bespoke training can be provided if needed for team members, but there are also excellent online
user training materials available from Microsoft. These materials are presented as a series of very
short videos on how to do different things and execute different functions within Microsoft
Teams. Because of how easy and simple it is to share documents within Microsoft Teams to
multiple or all members, custom training materials and business guidelines can be made
available within the platform for new users or employees to access.
Teams is a powerful and extremely useful collaboration environment that will only get more
popular. Microsoft Teams is included in Office 365 for free, so any Office user can enjoy all the
benefits of this collaboration solution. In summary, it brings simplicity to teamwork by
collaborating, sharing, communicating and doing it all under one platform.
To-do
In each list you can add as many tasks as you like. Keep everything on track by setting due dates
and reminders for each task and starring your most important tasks. Use steps to break down
your larger tasks in to more manageable pieces and notes to record extra details. Since all of your
tasks are stored on Exchange Online servers, they'll also appear automatically in Outlook tasks.
Microsoft To Do is a simple and intelligent to-do list that helps you manage all your tasks in one
place. You can work through your tasks for the day in My Day and create any number of
additional lists to organize your work, groceries, travel, shopping, movies to watch - you get the
idea!
Microsoft to-do is super easy to set up and get started with. It is easy to share list with other users
and collaborate on tasks. The pricing isn't as even available for personal users for free. There is
no natural to-do input unlike competitors.
Access to digital infrastructure: Individuals need access to reliable and affordable internet
connectivity, computers, smartphones, and other digital devices. Access to broadband internet is
particularly important for ensuring equitable digital empowerment.
Digital literacy and skills: People need the knowledge and skills to effectively use digital tools,
platforms, and services. This includes basic digital literacy skills, such as understanding how to
use email, browse the internet, and use productivity software. It also extends to more advanced
skills like coding, data analysis, and cybersecurity.
Education and training: Providing educational opportunities and training programs that focus on
digital skills is crucial. These programs can be formal or informal and should be designed to
cater to different age groups, skill levels, and learning styles. Education and training should not
only focus on technical skills but also on critical thinking, problem-solving, and digital
citizenship.
Digital confidence and motivation: Building individuals confidence in using digital technologies
is important. Many people may feel hesitant or intimidated by new technologies, especially if
they lack prior experience or have had negative interactions. Digital empowerment efforts should
foster a positive and supportive environment that encourages individuals to explore, experiment,
and take risks with digital tools.
Content relevance and diversity: Ensuring that digital content is relevant, inclusive, and
representative of diverse perspectives is essential for digital empowerment. People should have
access to content that meets their needs and interests, promotes cultural diversity, and addresses
local and global challenges.
Policy and regulatory framework: A supportive policy and regulatory environment is essential
for digital empowerment. Governments should implement policies that promote affordable
access, protect digital rights and privacy, and foster innovation and digital entrepreneurship.
Adequate regulations should also be in place to address issues like cybersecurity, digital literacy
in schools, and digital inclusion for marginalized communities.
Digital empowerment faces several challenges that can hinder its effectiveness and widespread
implementation. Some of the key challenges include:
Digital divide: The digital divide refers to the unequal distribution of access to digital
technologies and resources. Disparities in internet access, connectivity, and availability of digital
devices can prevent certain groups or regions from fully participating in digital empowerment
initiatives. Bridging the digital divide requires addressing infrastructure gaps, affordability
issues, and ensuring access for marginalized communities.
Limited digital skills and literacy: Many individuals lack the necessary digital skills and literacy
to effectively use and navigate digital technologies. This can be due to factors such as limited
educational opportunities, lack of training programs, or inadequate awareness about the benefits
of digital literacy. Closing the digital skills gap requires comprehensive educational programs
and training initiatives that cater to diverse populations and skill levels.
Technological advancements and digital literacy: Rapid advancements in technology can pose
challenges for digital empowerment efforts. As new technologies emerge, individuals need to
continually update their digital skills and adapt to changing platforms and tools. Keeping up with
technological advancements and ensuring ongoing digital literacy becomes crucial to prevent
skill obsolescence and exclusion.
Digital safety and security: Cybersecurity threats, online scams, and privacy concerns pose
significant challenges to digital empowerment. Many individuals may be hesitant to engage with
digital technologies due to fears of cybercrime or privacy breaches. Promoting digital safety and
security through education, awareness campaigns, and robust cybersecurity measures is essential
for building trust and confidence in the digital ecosystem.
Inclusion of marginalized groups: Ensuring digital empowerment for all requires particular
attention to marginalized groups, such as low-income individuals, rural communities, persons
with disabilities, and older adults. These groups may face additional barriers, including
affordability issues, lack of accessibility features, language barriers, and limited awareness of
available resources. Tailoring digital empowerment initiatives to address the specific needs and
challenges of marginalized groups is crucial for achieving true inclusivity.
Resistance to change and digital culture: Some individuals may be resistant to adopting digital
technologies due to cultural or personal preferences, lack of awareness, or fear of change.
Overcoming resistance to change and fostering a positive digital culture requires effective
communication, community engagement, and demonstrating the value and benefits of digital
empowerment.
Sustainable funding and resources: Digital empowerment initiatives require sustained funding
and resources to be effective and impactful. Securing long-term funding and resources can be a
challenge, especially for non-profit organizations and initiatives targeting marginalized
communities. Sustainable funding models, partnerships with stakeholders, and advocacy for
The Digital India Initiative holds the potential to reshape the very fabric of our nation, fostering
innovation, connectivity, and empowerment across every stratum of society. In this article, you
will get all about Digital India Mission, its pillars, vision, impact, advantages and challenges in
detail for your exam preparation.
Digital Infrastructure
One of the primary visions of the Digital India initiative is to establish a robust and inclusive
digital infrastructure. This includes the expansion of high-speed internet connectivity to every
corner of the country, ensuring that even remote areas have access to the digital world. By
bridging the digital divide, the initiative aims to promote equitable access to information,
education, and opportunities, levelling the playing field for all citizens.
Digital Empowerment
Digital empowerment of citizens is a cornerstone vision of the initiative. Through digital literacy
programs and skill development initiatives, citizens are empowered to effectively use digital
tools and technologies. This empowerment goes beyond mere access to technology; it enables
individuals to participate in the digital economy, access educational resources, and engage in
various socio-economic activities. This vision aligns with India’s aspirations to create a digitally
savvy population that can harness the opportunities offered by the digital age.
Digital Literacy
Universal digital literacy is closely linked to the initiative’s vision. By providing digital literacy
training to every citizen, regardless of age or background, Digital India aims to equip individuals
with the skills needed to navigate the digital world confidently. This becomes particularly
significant in a country as diverse as India, where digital literacy can bridge gaps and foster
social inclusion.
In the pursuit of these visions, Digital India places a strong emphasis on cybersecurity. As digital
systems become more prevalent, protecting sensitive data and digital infrastructure becomes
paramount. The initiative aims to bolster the cybersecurity ecosystem, ensuring a secure digital
environment for both citizens and businesses.
Access to Services: Digital India has significantly improved access to government services,
reducing bureaucratic hurdles and making services more transparent and efficient. Citizens can
now access a wide range of services online, such as applying for passports, licenses, and
certificates.
Financial Inclusion: Initiatives like the BHIM UPI have revolutionized digital payments,
Financial Inclusion
Digital India has played a pivotal role in advancing financial inclusion across the country. The
Pradhan Mantri Jan Dhan Yojana (PMJDY) aimed to provide banking services to the unbanked
population. This initiative has successfully brought millions of people into the formal banking
system. For instance, Jan Dhan accounts offer access to debit cards, insurance, and overdraft
facilities. This inclusion in the formal financial sector not only facilitates secure transactions but
also fosters economic growth and poverty reduction.
Educational Revolution
Digital India has revolutionized education by democratizing access to quality learning resources.
The SWAYAM platform offers free online courses from top institutions, enabling individuals to
pursue higher education and upskilling irrespective of their geographical location. Additionally,
initiatives like Diksha provide digital content for teachers and students, making education
interactive and engaging. This educational revolution has the potential to bridge the urban-rural
education gap and create a skilled workforce for the future.
Healthcare Accessibility
The National Digital Health Mission (NDHM) is transforming healthcare accessibility by
creating digital health records for citizens. This initiative enables seamless sharing of medical
information across healthcare providers, ensuring accurate diagnosis and treatment. Telemedicine
platforms like eSanjeevani have facilitated remote consultations, especially during the
COVID-19 pandemic. These digital healthcare solutions bridge the gap between urban and rural
healthcare services, ensuring quality medical assistance to all.
Efficiency in Governance
The adoption of digital platforms has streamlined government processes and improved the
efficiency of public services. Initiatives like Digital Locker provide citizens with a secure digital
space to store essential documents. This eliminates the need for physical copies and reduces
bureaucratic delays. Similarly, the introduction of the Goods and Services Tax Network (GSTN)
has simplified tax administration, benefiting both businesses and the government through
enhanced revenue collection.
Entrepreneurial Opportunities
Digital India has fostered a conducive environment for entrepreneurship and innovation. Startups
in sectors like fintech, e-commerce, and edtech have flourished, creating job opportunities and
RTI Portal :The Right to Information Act, 2005 provides citizens of India with the right to access
information held by public authorities. The RTI portal, managed by the Government of India, is
an online platform that facilitates the filing of RTI applications and appeals.
Filing RTI Applications: The RTI portal allows individuals to file RTI applications online,
making the process more convenient and accessible. Users can submit their queries, requests for
information, or seek clarification from various government departments and public authorities.
Online Payment: The portal enables users to pay the prescribed RTI application fees online
securely. This streamlines the payment process and eliminates the need for physical transactions.
Tracking Application Status: Once an RTI application is filed, the portal provides a unique
registration number that allows users to track the status of their applications. It ensures
transparency and helps individuals stay informed about the progress of their requests.
Submission of First Appeals: In case the applicant is dissatisfied with the response received or
does not receive a response within the specified time frame, the RTI portal also allows for the
online submission of first appeals. This ensures that individuals can seek further recourse if their
right to information is not adequately addressed.
Information Repository: The portal serves as a repository of frequently asked questions (FAQs),
circulars, guidelines, and other relevant information related to the Right to Information Act. It
provides users with comprehensive resources to understand and navigate the RTI process
effectively.
Accessibility: The online platform makes the RTI process accessible to a wider population,
eliminating the need for physical visits to government offices.
Efficiency: The portal streamlines the application filing process, reducing paperwork and
administrative burden, thereby improving efficiency and reducing response times.
Transparency: The tracking feature of the portal enhances transparency, ensuring that citizens
Convenience: With the availability of online payment options and round-the-clock accessibility,
the portal offers convenience to users, allowing them to file applications at their convenience.
Digital India is owned company by experts who have been in the e-gov services industry since
2017. The company establishes business relationships with operators, consumers, merchants and
vendors networks, financial institutions and infrastructure providers. Digital India plays a critical
role ensuring the success of the system, allowing to all parties to maximize the benefits.
Digital India is a allied services provider company that offers e-governance services , high
successful electronic payment solutions and services for telecommunications operators, utility
operators within the region.
Digital India brings in a great opportunity for retailer to make use of various web based services
to serve their clients with a low investment cost DigitalIndia Portal.
Digital India Portal provides consumers this convenience by creating a franchise network of
conventional mom and pop stores located in the consumer's neighborhood. These franchisees are
equipped with a multifunctional terminal, which is connected to the service providers' servers
and executes transactions on a real-time basis. DigitalIndia Portal has contractual agreements
with service providers and is authorized to issue legally valid reservations and receipts to
consumers.
Mission
Connecting the middle and low-income groups and providing world-class service
Bring convenience to the consumer's doorstep, enabling them to access a diversified range of
services through a vibrant delivery mechanism
We wish to create innovative products and solutions catering to vast audience and contributing
positively to the growth of our nation "Sab Kuch DIGITAL"
Empower the youth with entrepreneurial opportunities while contributing to the country's
growth.
We wish to create innovative products and solutions catering to vast audience and contributing
positively to the growth of our nation
To be the most preferred cutting-edge solution provider in the sphere of Travel and IT related
services globally.
In India, several government portals and initiatives have been launched to promote digital
empowerment and provide citizens with easy access to various public services. Here are some of
the key portals and their features:
1. DigiLocker
● Website: DigiLocker
● Description: A secure cloud-based platform for storage, sharing, and verification of
documents and certificates. It aims to eliminate the use of physical documents.
● Services: Digital document storage, sharing with government authorities, and verification
of documents.
● Website: UMANG
● Description: A single mobile app providing access to various government services from
central, state, and local bodies.
● Services: Access to services like EPFO, PAN, Aadhaar, DigiLocker, and more.
3. e-Sign
● Website: e-Sign
● Description: An online electronic signature service that allows citizens to sign documents
digitally.
4. BharatNet
● Website: BharatNet
● Description: A project to provide high-speed broadband connectivity to rural areas,
enhancing digital inclusion.
● Services: Broadband infrastructure to facilitate e-governance, e-health, e-education, and
more.
● Website: CSC
● Description: Access points for delivery of essential public utility services, social welfare
schemes, healthcare, financial, education, and agriculture services.
● Services: Aadhaar services, banking, telemedicine, education, and more.
6. Aadhaar
● Website: UIDAI
● Description: The world's largest biometric ID system, providing a unique identification
number to residents of India.
● Services: Authentication services, e-KYC, linking Aadhaar to various services like
banking, mobile numbers, etc.
7. MyGov
● Website: MyGov
● Description: A citizen engagement platform to promote participatory governance.
● Services: Opportunities to participate in discussions, tasks, and contribute to government
policies and programs.
8. e-Governance Services
● Website: PMJDY
● Description: A financial inclusion program to provide affordable access to financial
services like banking, savings, deposits, remittance, credit, insurance, and pensions.
● Services: Opening of zero-balance bank accounts, issuance of debit cards, and access to
microfinance.
● Website: NSP
● Description: A one-stop solution for various scholarship schemes offered by the
government.
● Services: Application, processing, sanction, and disbursal of scholarships.
These portals collectively contribute to the digital empowerment of citizens by providing them
with accessible, efficient, and transparent services.
When you are by yourself, scrolling through your go-to social media app, you are physically
alone. However, you are also “watched or interrupted by other people.” While they may not be in
the same room, you are still a number on a screen for someone. On top of that, you are constantly
interrupted by ads that interfere with your videos, articles, and browsing.
That is why the definition of online privacy covers your natural (and justified) expectation to
have your personal data protected and your behavior not tracked when you are connected to the
Internet. At least not without your explicit consent.
But what exactly does “personal data” include? Let’s find out.
Online privacy is deeply rooted in our fundamental need for safety. If you find it natural to
protect your home and physical belongings, the same applies to your digital life. No matter what
technology you use (or do not), privacy gives you control over your identity and all the things it
is made of.
But because things are not as palpable or visible to everyone, online privacy is not on the priority
list for most people. Moreover, the complex technological, legal, commercial, and social combo
does not make online privacy easy to achieve. However, it does make it essential.
"It’s not just the way we interact with the Internet, it’s also the way the world interacts with
us. For instance, we’re shopping somewhere, maybe in a mall or at the corner shop, and our
face and voice get actively recorded by surveillance cameras. This information is also stored
and processed in a way that we cannot oppose, which makes things even worse."
Bogdan Botezatu (Director of Threat Research and Reporting, Bitdefender)
Because privacy is not considered a standard in our connected world, it may appear so. But for
those who believe in this right, online privacy is achievable. Not everywhere and not all the time
but when and where it matters the most.
Online privacy exists and it is up to each and every one of us to make it the norm instead of the
exception.
Online privacy is involved in everything from how technology evolves to how this evolution
impacts your personal safety and security. The real, “offline” dangers that poor online privacy
creates include doxing, harassment, extortion, and swatting, to name a few.
You probably do not want thieves to know you live alone or the exact time you are not home,
giving them an opportunity to break into your apartment. You do not want to give scammers a
chance to use your date and place of birth and other personal data to take out loans in your name.
You also expect cyber-criminals to be stopped before they can trick you into opening malicious
emails that install malware which records everything you type.
"We can look at our personal data as something hackers either directly exploit or use as soon as
they get a hold of it. It’s also something they can trade with other cybercriminal organizations.
So, personal data is commoditized. It has a price. Your medical data, your financial history, your
credit card data, your online shopping preferences have a price."
Liviu Arsene (Senior E-Threat Analyst, Bitdefender)
Take a moment to list your most important online accounts. They may include your online
banking account, your email address, and your favorite social media platform.
Now try to list the types of information they have about you. You don’t have to look far, just start
with your social media profiles! You probably shared your phone number and contacts, email,
your place and date of birth, where you work, where you went to school, and your relationship
status.
This is an opportunity to evaluate whether the trade-off between your privacy and the benefits
you get by using that service is still fair. Remember you can revoke their rights at any time, even
if you have been comfortable using a product or a service until now.
Internet privacy is important because it gives you control over your identity and personal
information. Without that control, anyone with the intention and means can manipulate your
identity to serve their goals, whether it is selling you a more expensive vacation or stealing your
savings.
What you post on social media, what you write about in the comments section of websites, and
That is why everything you do for your own privacy also has a positive impact on others.
Reusing weak passwords is one of the leading causes for the massive data breaches you see in
the news. That is because it allows cyber criminals to break into multiple accounts at once and
engage in identity theft or financial fraud - often both.
Oversharing
Social media and other technology advancements have made it incredibly easy to share every
aspect of our lives to expand our social ties. Oversharing is a consequence of that which often
goes unnoticed because so many people do it.
Oversharing gives malicious onlookers more information about you than you would ever want to
divulge. Posting videos of your home gives them a full map of your belongings and how to get to
them. Pictures of your boarding passes reveal how long you will be gone and where you are
traveling. With every post, you create a clearer picture of your life, habits, key relationships, and
possessions.
IoT Devices
Another threat to your online privacy: all the Internet-connected devices that are constantly
listening, recording, and gathering data about you.
Our shopping lists, our body temperature, the contents of our fridge – we have been producing
this personal data for years, but no one has been interested in it before. Now we have connected
toothbrushes, toasters, and TVs all over the place.
IoT devices are easy to use, and they keep getting better and better, increasing the risks to your
online privacy on the way.
Cyber-criminals know that too! And they’re going after everything in it through malicious
extensions, infected ads, links that lead to scam websites, and a lot more.
Security Vulnerabilities
It is not just your habits and the mechanisms of the platforms and devices you use that weaken
your privacy on the Internet. Security vulnerabilities also create massive issues. They range from
data breaches, where a set of your personal data ends up in publicly accessible places online, to
security issues that make devices… misbehave.
Security vulnerabilities leak data that hurts not only your personal privacy online but also that of
millions of users which weakens the overall security level for all of us.
“There are two ways people usually find out their information was exposed online. They either
read the news and discover that a service provider or a company they use has been breached and
some of their personal information may have been leaked online. Or, if it doesn’t make the news,
they sometimes get an email from the breached company notifying them that <Hey, there’s been a
breach. Your personal information may have been affected.>”
Liviu Arsene (Senior E-Threat Analyst, Bitdefender)
Cyber-Attacks
Your online privacy has everything to do with your security on and off the Internet.
Relying on default settings for everything and using the simplest passwords you can set makes
you an easy target for cyber criminals.
Malicious hackers combine their tech skills with psychological manipulation to exploit your
habits and preferences so that you will click, tap, download, and open their traps.
They bait you into opening deceiving emails (phishing), taping links in misleading messages on
your phone (smishing), or even provide personal data in fake phone calls (vishing). Their attacks
almost always include malicious software designed to capture everything you type on your
device (keyloggers) and collect your usernames and passwords. They will later use them against
you to steal your money, access confidential information, or simply make your life hell.
“The information we have might be trivial for us. We all know where we live, what our date of
birth is, what shopping history we have and so on. But aggregated, this information depicts a
very, very complex and accurate overview of what our lives look like. And most of the time, we
cannot revoke the access we have already granted to organizations.”
Bogdan Botezatu (Director of Threat Research and Reporting, Bitdefender)
Anyone can become a target. Most ongoing cyber-attacks are automated and simply search for
people with unprotected accounts, apps, and devices, which are easy to hack into and maliciously
exploit.
One of the first things you can do is set up an early-warning system that patrols the Internet for
you. Bitdefender Digital Identity Protection helps you take control of your online privacy and
personal data so you can take decisive action when something pops up on its radar. The service
monitors your digital footprint starting with just your email address and phone number and alerts
you if your personal data is leaked in new breaches and through privacy threats, including social
media impersonators.
With this automatic and constant scanning keeping watch for you, you can now work to build
your own privacy-protecting ecosystem.
Cybersecurity Threats
Threats to Infrastructure
Emerging Threats
1. Artificial Intelligence (AI) Exploits: The use of AI to automate attacks, such as creating
deepfakes for fraudulent purposes or developing AI-driven malware.
2. Cryptojacking: Unauthorized use of someone’s computer to mine cryptocurrency.
3. Quantum Computing Threats: Potential future threats from quantum computing, which
could break current encryption methods, compromising data security.
Insider Threats
By understanding and addressing these threats, individuals and organizations can better protect
themselves in the digital world.
Traditional database technologies present several challenges for recording financial transactions.
For instance, consider the sale of a property. Once the money is exchanged, ownership of the
property is transferred to the buyer. Individually, both the buyer and the seller can record the
monetary transactions, but neither source can be trusted. The seller can easily claim they have not
received the money even though they have, and the buyer can equally argue that they have paid the
money even if they haven’t.
To avoid potential legal issues, a trusted third party has to supervise and validate transactions. The
presence of this central authority not only complicates the transaction but also creates a single point
of vulnerability. If the central database was compromised, both parties could suffer.
Energy
Energy companies use blockchain technology to create peer-to-peer energy trading platforms and
streamline access to renewable energy. For example, consider these uses:
● Blockchain-based energy companies have created a trading platform for the sale of
electricity between individuals. Homeowners with solar panels use this platform to sell their
excess solar energy to neighbors. The process is largely automated: smart meters create
transactions, and blockchain records them.
● With blockchain-based crowd funding initiatives, users can sponsor and own solar panels in
communities that lack energy access. Sponsors might also receive rent for these
communities once the solar panels are constructed.
Finance
Traditional financial systems, like banks and stock exchanges, use blockchain services to manage
online payments, accounts, and market trading. For example, Singapore Exchange Limited, an
investment holding company that provides financial trading services throughout Asia, uses
blockchain technology to build a more efficient interbank payment account. By adopting
blockchain, they solved several challenges, including batch processing and manual reconciliation of
several thousand financial transactions.
Companies in media and entertainment use blockchain systems to manage copyright data.
Copyright verification is critical for the fair compensation of artists. It takes multiple transactions to
record the sale or transfer of copyright content. Sony Music Entertainment Japan uses blockchain
services to make digital rights management more efficient. They have successfully used blockchain
Retail
Retail companies use blockchain to track the movement of goods between suppliers and buyers. For
example, Amazon retail has filed a patent for a distributed ledger technology system that will use
blockchain technology to verify that all goods sold on the platform are authentic. Amazon sellers
can map their global supply chains by allowing participants such as manufacturers, couriers,
distributors, end users, and secondary users to add events to the ledger after registering with a
certificate authority.
Decentralization
Decentralization in blockchain refers to transferring control and decision making from a centralized
entity (individual, organization, or group) to a distributed network. Decentralized blockchain
networks use transparency to reduce the need for trust among participants. These networks also
deter participants from exerting authority or control over one another in ways that degrade the
functionality of the network.
Immutability
Immutability means something cannot be changed or altered. No participant can tamper with a
transaction once someone has recorded it to the shared ledger. If a transaction record includes an
error, you must add a new transaction to reverse the mistake, and both transactions are visible to the
network.
A blockchain system establishes rules about participant consent for recording transactions. You can
record new transactions only when the majority of participants in the network give their consent.
A distributed ledger
A distributed ledger is the shared database in the blockchain network that stores the transactions,
such as a shared file that everyone in the team can edit. In most shared text editors, anyone with
editing rights can delete the entire file. However, distributed ledger technologies have strict rules
about who can edit and how to edit. You cannot delete entries once they have been recorded.
Smart contracts
Companies use smart contracts to self-manage business contracts without the need for an assisting
third party. They are programs stored on the blockchain system that run automatically when
predetermined conditions are met. They run if-then checks so that transactions can be completed
confidently. For example, a logistics company can have a smart contract that automatically makes
payment once goods have arrived at the port.
Public key cryptography is a security feature to uniquely identify participants in the blockchain
network. This mechanism generates two sets of keys for network members. One key is a public key
that is common to everyone in the network. The other is a private key that is unique to every
member. The private and public keys work together to unlock the data in the ledger.
While underlying blockchain mechanisms are complex, we give a brief overview in the following
steps. Blockchain software can automate most of these steps:
A blockchain transaction shows the movement of physical or digital assets from one party to
another in the blockchain network. It is recorded as a data block and can include details like these:
Most participants on the distributed blockchain network must agree that the recorded transaction is
valid. Depending on the type of network, rules of agreement can vary but are typically established
at the start of the network.
Once the participants have reached a consensus, transactions on the blockchain are written into
blocks equivalent to the pages of a ledger book. Along with the transactions, a cryptographic hash is
Thus, the blocks and chains link securely, and you cannot edit them. Each additional block
strengthens the verification of the previous block and therefore the entire blockchain. This is like
stacking wooden blocks to make a tower. You can only stack blocks on top, and if you remove a
block from the middle of the tower, the whole tower breaks.
The system distributes the latest copy of the central ledger to all participants.
There are four main types of decentralized or distributed networks in the blockchain:
Public blockchains are permissionless and allow everyone to join them. All members of the
blockchain have equal rights to read, edit, and validate the blockchain. People primarily use public
blockchains to exchange and mine cryptocurrencies like Bitcoin, Ethereum, and Litecoin.
A single organization controls private blockchains, also called managed blockchains. The authority
determines who can be a member and what rights they have in the network. Private blockchains are
only partially decentralized because they have access restrictions. Ripple, a digital currency
exchange network for businesses, is an example of a private blockchain.
Hybrid blockchains combine elements from both private and public networks. Companies can set
up private, permission-based systems alongside a public system. In this way, they control access to
specific data stored in the blockchain while keeping the rest of the data public. They use smart
contracts to allow public members to check if private transactions have been completed. For
example, hybrid blockchains can grant public access to digital currency while keeping bank-owned
currency private.
The term blockchain protocol refers to different types of blockchain platforms that are available for
application development. Each blockchain protocol adapts the basic blockchain principles to suit
specific industries or applications. Some examples of blockchain protocols are provided in the
following subsections:
Hyperledger fabric
Hyperledger Fabric is an open-source project with a suite of tools and libraries. Enterprises can use
it to build private blockchain applications quickly and effectively. It is a modular, general-purpose
framework that offers unique identity management and access control features. These features make
Ethereum
Ethereum is a decentralized open-source blockchain platform that people can use to build public
blockchain applications. Ethereum Enterprise is designed for business use cases.
Corda
Corda is an open-source blockchain project designed for business. With Corda, you can build
interoperable blockchain networks that transact in strict privacy. Businesses can use Corda's smart
contract technology to transact directly, with value. Most of its users are financial institutions.
Quorum
Blockchain technology has its roots in the late 1970s when a computer scientist named Ralph
Merkle patented Hash trees or Merkle trees. These trees are a computer science structure for storing
data by linking blocks using cryptography. In the late 1990s, Stuart Haber and W. Scott Stornetta
used Merkle trees to implement a system in which document timestamps could not be tampered
with. This was the first instance in the history of blockchain.
In 2008, an anonymous individual or group of individuals known only by the name Satoshi
Nakamoto outlined blockchain technology in its modern form. Satoshi's idea of the Bitcoin
blockchain used 1 MB blocks of information for Bitcoin transactions. Many of the features of
Bitcoin blockchain systems remain central to blockchain technology even today.
A few years after first-generation currencies emerged, developers began to consider blockchain
applications beyond cryptocurrency. For instance, the inventors of Ethereum decided to use
blockchain technology in asset transfer transactions. Their significant contribution was the smart
contracts feature.
As companies discover and implement new applications, blockchain technology continues to evolve
and grow. Companies are solving limitations of scale and computation, and potential opportunities
are limitless in the ongoing blockchain revolution.
Blockchain technology brings many benefits to asset transaction management. We list a few of
them in the following subsections:
Advanced security
Blockchain systems provide the high level of security and trust that modern digital transactions
require. There is always a fear that someone will manipulate underlying software to generate fake
money for themselves. But blockchain uses the three principles of cryptography, decentralization,
and consensus to create a highly secure underlying software system that is nearly impossible to
Improved efficiency
Business-to-business transactions can take a lot of time and create operational bottlenecks,
especially when compliance and third-party regulatory bodies are involved. Transparency and smart
contracts in blockchain make such business transactions faster and more efficient.
Faster auditing
Enterprises must be able to securely generate, exchange, archive, and reconstruct e-transactions in
an auditable manner. Blockchain records are chronologically immutable, which means that all
records are always ordered by time. This data transparency makes audit processing much faster.
● The advancement in the Indian Computer Emergency Response Team (CERT-In), which
operates as the national agency to address the country’s cyber security, has helped reduce
the rate of cyber attacks on government networks
● The Indian Government has published a written guideline for CISOs of government
organizations, outlining best practices for safeguarding apps, infrastructure, and
compliance
● Chief Information Security Officers (CISOs) can identify and document the security
requirements that may arise with each technical innovation
● The most important one for Indian citizens is the approval of the Personal Data Protection
Bill by the Union Government to protect Indian users from global breaches, which
focuses on data localization
● The bill involves the storage and processing of any critical information related to people
● The “Digital Swachhta Kendra” (Botnet Cleaning and Malware Analysis Center) is a part
of the Government of India’s Digital India drive, overseen by the Ministry of Electronics
and Information Technology (MeitY), determined to make secure cyberspace all through
India by distinguishing botnet contaminations and advising, empowering cleaning, and
end-client security systems to forestall new diseases
● The “Cyber Swachhta Kendra” (Botnet Cleaning and Malware Analysis Center) is
intended to address the goals of the “National Cybersecurity Policy,” which calls for the
development of a secure cybernetic ecosystem in the country
● The centre works in close coordination and collaboration with Internet service providers
and antivirus/product companies
● The website provides users with information and tools to help them protect their
systems/devices. Following Section 70B of the Information Technology Act 2000, this
centre is run by the Indian Computer Emergency Response Team (CERT-In)
● The Policy’s goal is to create safe and resilient cyberspace for citizens, businesses, and
the Government
● The mission is to provide protection to cyberspace information and infrastructure,
develop capabilities to prevent and respond to cyberattacks, and minimize damage
through coordinated efforts of institutional structures, people, processes, and technology
Netiquette is a combination of the words network and etiquette and is defined as a set of rules for
acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online
resources in an online social environment.
Both phrases are frequently interchanged and are often combined with the concept of a ’netizen’
which itself is a contraction of the words internet and citizen and refers to both a person who
uses the internet to participate in society, and an individual who has accepted the responsibility
of using the internet in productive and socially responsible ways.
Underlying this overall concept of socially responsible internet use are a few core pillars, though
the details underneath each pillar are still subject to debate.
For Society:
● Recognizing that the internet is an extension of society. The internet isn’t a new world in
which anything goes, but rather, a new dimension of the world around us.
● Applying the same standards online as we do in public. In simple terms, this means that
the values society has in place against hate speech and bigotry, child exploitation, and
child pornography, copyright violations and other forms of theft, remain intact. Values
around courtesy, kindness, openness, and treating others with the same respect we wish to
receive should also be adhered to.
● Refusing to empower abuse and harassment while online. Accepting that the laws which
are currently in place to protect the rights and dignity of citizens apply online and that
where needed, laws are updated to reflect these rights in the extended environment. Theft,
harassment, and bullying while online is still theft, harassment, and bullying, period.
● Acknowledging cultural differences. Even when national boundaries no longer apply,
cultural respect and tolerance should remain. This requires finding a way to accept that
the social values and norms of some netizens will not be the social values and norms of
all netizens.
For companies, being a good netizen, applying online ethics, and using netiquette include:
Most internet users automatically apply the same responsible respectful behavior online as they
do in every other environment and by nature apply netiquette and online ethics, and are good
netizens. The minority that fails to apply societal values in some or any environment- including
the internet- are quickly identified as exceptions to be dealt with on a social, or criminal level.
When you choose to partner with technology companies, especially for something as important
as internet security, it’s imperative you ensure that the partner shares your understanding of what
it means to act ethically online.
Below you will find 20 general recommendations for conduct on the internet that you should
follow when communicating online.
1. Stick to the rules of conduct online that you follow in real life
When communicating online, remember the rules of etiquette that you follow in your everyday
life. Refrain from insulting, provoking, threatening or insulting others. Respect the opinions of
your chat counterparts and express constructive criticism. Remember that you can be prosecuted
for insulting people online.
Think of the person behind the computer when you compose your messages. You are not
communicating with a machine, but with real people. Also, consider what and how you write.
Because the internet doesn't forget anything! A screenshot or a copy of your messages is quickly
made and still exists even if you delete your messages afterward.
Communication on the internet comes with a certain anonymity that does not exist in real life
when you are talking to someone face to face. Often this anonymity leads to a lower inhibition
threshold for many users and they behave rudely online if, for example, you disagree with them.
Make sure that you show your best side online. Remain friendly and respectful, even if you
disagree. Good netiquette is characterized by respect, politeness and professionalism.
A tip: You should generally refrain from writing messages or individual words entirely in capital
letters – even if you want to give these sections more expression. After all, capital letters on the
internet mean shouting and are generally considered impolite.
Do you have a question about something? Then take the time to carefully read the answers in the
previous discussion posts first. There is a good chance that someone has already answered your
question. If you write an answer similar to someone else's, it shows the other chat participants
that you have paid little attention to the conversation so far.
Remember that conversations online can happen very quickly. It is therefore important to gather
all the information before responding or asking questions.
Take time to read through your answers again. Check them for grammar, punctuation and correct
spelling. It can be very frustrating for the other person if they have to decipher poorly written
sentences in order grasp the meaning behind them. In addition, faulty grammar distracts from the
goal of your message.
Grammar, spelling and punctuation become especially important when composing emails or
other correspondence that you submit to colleagues or superiors. If you have a weakness in
grammar and spelling, don't be discouraged. Use spelling aids before you send messages.
Another tip: When composing emails, always remember to use the appropriate salutation and
parting formula as well. These are also part of netiquette.
This rule should be followed not only in everyday use of online communication, but also at
work. Do not simply forward information that has been sent to you without first obtaining
permission from the original sender. When sending private emails to multiple recipients, use
BCC (blind carbon copy) instead of CC (carbon copy). Many people do not like their names and
email addresses being passed on to people they do not know themselves.
This rule on the internet also applies to uploading and sharing photos or videos that show other
people. Before circulating such private files, be sure to check with the people concerned before
Last but not least: Respect the privacy of others and do not sign up for newsletters, forums or the
like with someone else's name or email address.
We live in a much faster world than our parents or grandparents are used to. Information can be
sent to different people around the world in a matter of seconds – and without much effort.
Nevertheless, the bandwidth, that is to say the information capacity of wires and channels, is
limited. It is similar with humans. Think of this limited receptivity of information when you send
messages to your friends, colleagues or superiors.
Do you get to the point quickly enough in your emails? Are your arguments formulated correctly
and clearly recognizable? No one wants to waste time unnecessarily on an email whose core
message is only at the end of the email. That consumes time and effort, and is simply annoying.
Also, consider who really needs to be on the list of recipients. After all, respect for other people's
time and bandwidth is also part of netiquette.
Everyone who goes online to forums and networks was once a beginner. As in any other field,
you can make mistakes as a beginner. In online communication, these can be a lack of etiquette
or manners.
Often these are spelling mistakes, superfluous questions or answers that are too long. With this in
mind, it's important to forgive your counterparts' mistakes. If they are only minor mistakes, it is
best not to react to them at all. In the event of a major error, for example a wrong quote,
messages written only in capital letters or missing grammar and punctuation, then it is best to
point it out to the person in a private message.
A tip: Sarcasm in written form is not always recognizable to everyone on the internet. It is
therefore better to remain objective. If you still want to express sarcasm among friends or close
colleagues, use emojis such as smileys or GIFs. Carefully chosen, emojis can reinforce your
message.
On the internet, as in real life, some people have more power than others. Moderators in a forum,
experts in companies or system administrators. If you have more power than others, you do not
have the right to exploit this power.
Don't spy on colleagues or chat participants just because you have the technical means to do so.
For example, system administrators should never read private emails or find out about the salary
structure in the company.
Also remember that insults and threats on the internet can have legal consequences for you. For
this reason, do not be tempted to make such comments, even in heated discussions. Instead,
demonstrate exemplary conduct on the internet.
Netiquette is interpreted differently in different places on the internet. For example, it is perfectly
normal to spread gossip in a TV discussion group. However, if you do this in a serious discussion
group, you will quickly make yourself unpopular. It is therefore important that you know where
you are on the internet.
This also means that if you are in a new area that is unfamiliar to you, you need to look around
and learn the ropes. Get an idea of how other people in this area of cyberspace communicate with
each other and adapt to them.
So-called hate speech on the internet is an increasing problem, especially in social media. It is
often found in offensive comments under photos or posts. However, time and again there are
coordinated actions by specific actors who join forces for the sole purpose of spreading hate
comments. Not infrequently, social or religious fringe groups, foreigners or black people become
victims of such actions.
What can you do against hate speech? If you come across such statements on the internet, you
should report them to the provider of the website. Often you will find the option to report a post
directly underneath it on social media. The providers are legally obliged to delete content which
is evidently illegal within 24 hours.
In addition, you can actively approach the spreaders of hate speech and try to invalidate their
statements and subsequently educate theperpetrators. It is advisable to ask for the alleged "facts"
and take a clear position against hate. Steer the discussion in a more positive direction. However,
under no circumstances should you react with hate or insults. You could also be held accountable
for this.
The internet is an enrichment for everyone – in everyday life, at school and at work. However, it
brings with it some risks and downsides, such as the dark net. Talk to your child and explain the
possible risks of the internet. Respect your child's privacy and explain the following rules for
children on the internet:
In these times of social media, identity theft and social engineering, keeping personal
information secret is essential! Under no circumstances should your child share passwords or
personal information such as their name, address or telephone number online. The name of the
school or clubs should also be kept secret.
Make sure that your child uses a neutral nickname in chat rooms. This should under no
circumstances reveal your child's identity. In addition, a neutral nickname ensures that other
people do not feel insulted or ridiculed.
So-called bots are computer programs that usually automatically follow up on a task without
requiring any interaction with humans. In social media channels, bots often post comments or
even their own posts.
They often spam in forums or in the comments under posts. This is annoying and
time-consuming, as these responses have to be identified and removed. Bots are therefore not
part of netiquette and should be avoided if at all possible.
16. Rules for children on the internet: Do not trust chat participants
Your child should always approach strangers with a healthy skepticism. You never know who is
really hiding behind the funny profile name and picture. For example, your child should never
meet a stranger just because they got along well in a chat conversation. It could be an adult with
bad intentions.
Similarly, you should explain to your child that they should not add strangers as friends on social
media such as Facebook or Instagram. Your child should also not simply open emails and other
messages and download attachments. In doing so, your child could accidentally download a
Trojan or other malware.
If your child is communicating in a private group, they should refrain from making insider jokes
that not everyone in the group will understand. It is better to send a private message to this
person. Other chat participants should not feel excluded. Netiquette includes values such as
tolerance, respect and helpfulness. This also means that only the language used by everyone
should be used.
In a school group chat, your child should always make sure that all chat members are on the
same level, for example during a review or presentation. When your child is explaining a topic
that may not be clear to everyone, it is a good idea to answer questions about the topic.
Posts, answers and even questions should be kept as short and clear as possible. No one wants to
read an unnecessary amount of text that does not contribute to answering the issue.
Cumbersome language and repetitions only clog up chats and forums; in addition, spelling
mistakes can make it more difficult to read and understand what is being said. Forwarding chain
letters also has no place in respectful online communication.
In the wake of the COVID-19 pandemic, most teaching in schools was done online. So-called
homeschooling – teaching from home – was a new challenge that pupils, teachers and parents
had to overcome together. Here are some tips for teaching from home:
Children should support one another, for example by responding to classmates' questions
on a chat thread.
Instruct your children not to digitally record or take screenshots of lessons without first
getting the teacher's permission.
A polite and respectful tone is an absolute must in homeschooling.
Passwords and credentials given by the school must not be passed on by children to third
parties under any circumstances.
Children should be ready a few minutes before class starts in order to start on time.
Teaching materials should be ready and the camera for the video conference should
always be switched on. You should also make sure that your child dresses as they would
appear at school.
Pupils should speak up if they have any questions or comments. Afterwards, they should
mute their microphone again so as not to disturb the lesson with any background noise.
Last but not least, the most important rule for children's use of the internet: Trust your child.
After all, you cannot permanently look over their shoulder, whether your child is learning via
computer, smartphone or tablet. Your child learns best through their own experiences. Trust in
your offspring's abilities, and refrain from constantly monitoring their internet activities. It is
usually enough to know that your child can ask you for help if the worst happens.
Most PR experts seem to agree that the key to ethical communication is to prioritize transparency
and truthfulness.
Blair Huddy, a PR expert with more than 15+ years of industry experience, says, “With
technology the way it is, brands can’t hide anything anymore, so it’s always best to be open.
Otherwise, you’ll be found out, and it’ll cause a worse PR situation for your brand.”
Other experts, like Stefanie Magness, the PR agent at Elevate U PR, say you have to cultivate
and nurture every interaction with transparency and truth to build credibility with your audience
over time.
So, what’s the one practical way to prioritize transparency?
Michelle Mackel (publicist at Plugstar Entertainment) provides a simple tip: Communicate with
your clients and network without resorting to exaggeration.
By using the best practices of effective communication, such as accuracy, preciseness, and
politeness, you can effectively build and maintain trust with your clients.
For divorce mediator firms, this includes clear communication of processes, fees, and
expectations, as well as ensuring the confidentiality of client information in all digital
interactions.
As divorce mediation involves highly personal and sensitive matters, upholding ethical
communication standards is key for fostering trust and credibility in the digital age.
Remember, honest communication is the best policy and prevents unethical behavior.
Another thing most PR experts agree on? Respecting user privacy and asking for the necessary
permissions to use and share data. This is especially important at a time when you can buy large
sheets of customer data for only a few dollars.
3. Reconsider your partnerships with those who don’t have the same ethos
Michael Toebe, the communications specialist and consultant at Reputation Quality, says
executives and middle managers should ideally model ethical communication to those they lead
and with whom they collaborate and serve.
To them, he recommends taking a stand that shows ethical communication is the non-negotiable
standard and you won’t pay trust taxes in the long run.
Adding to this insight, he said, “Disinvest from those, including leadership, that won’t engage
and communicate in this manner. It will save you a flimsy standard, risk, embarrassment, and
inevitable, costly consequences for shortcomings or failure.”
4. Think about not only your clients but also the end user
Oftentimes, when we communicate with our audience, we only consider our direct audience.
However, our focus should be on our audience (aka our customers) as well as the customers’
audience— and that’s the argument of Vicki Bohlsen, the founder of Bohlsen Group, a marketing
and PR firm.
She recommends finding the end audience for all communications and crafting your content
accordingly. For example, if they’re members of the media, consider how your story will connect
with their audiences.
In her own words, “The single most important factor in all communications is emotional
intelligence—aim for honest, vulnerable, open communication geared individually to each
stakeholder audience.”
Emily Bergh, the founder of R Public Relations, says that it’s time for the PR industry to bring
back the practice of meeting people in real life and building those connections organically, as
opposed to leaning on AI tools to create communication scripts on our behalf.
She also highly recommends:
● Going back to basics, developing connections over phone calls, and building brand trust
through the traditional route.
● Relying on authentic content and not using solutions like ChatGPT.
Media communications might look easy, but we all know a lot goes behind building and
nurturing those relationships
For example, battling challenges like communication ethics is a big one. But you might also go
through challenges like:
● Not having critical contacts or not being able to identify the right stakeholders
● Difficulty in assessing brand insights, reputation, real-time crisis, etc.
● Not knowing all the potential risks associated with all media actions
● Being unsure about audience sentiments regarding your clients
● Constantly staying updated (and monitoring) brand mentions
Cyberethics is a branch of computer technology behavior that defines the best practices that must
be adopted by a user when he uses the computer system. In simple terms, cyberethics refers to
the basic ethics and etiquette that must be followed while using a computer system. Ethics, in
general, refers to propagating good behavior, similarly by cyber ethics we refer to propagating
good behavior online that is not harsh or rude. Cyberethics governs rules that individuals must be
polite and responsible when they use the internet. Cyberethics aim to protect the moral, financial,
social behavior of individuals. Cyberethics engages the users to use the internet safely and use
technology responsibly and sensibly. Cyberethics empathizes the behavior that must be adopted
while using cyber technology.
Some of the breaches of cyberethics are listed below:
● Cyber Bullying: Cyberbullying is a form of bullying carried out via internet
technology such as social media where individuals are mocked on their physical
1. Privacy:
● The content that is available on the internet should not hurt any moral, emotional, or
personal ethics of individuals.
● Users should have the right to protect any information which they don’t want to share
openly.
● Private information like user’s contact details, address, security-related information
like bank details, credit card/debit card details, are all included in basic cyber ethics
of user privacy and must not be breached in any case.
● Any breach of privacy is theft/fraud of user identity and user personal information,
which is punishable as per the rules of law.
3. Security:
● Security on the internet is the most basic ethical right that every user must be
accessible.
● Users of the internet should feel safe while they surf the net.
● Security, in general means only authorized users to have access to the content on the
computer.
● And confidential information is safe, without any risk of loss of information/content.
4. Accuracy:
● The content available on the internet is accessed by billions of users.
● If there is no reliability of the information that is posted online, then it would mislead
the masses.
● Cyberethics assert the importance of posting content on the internet that is correct in
all aspects.
● Users trust the content of the internet and rely heavily on the internet for facts,
therefore it is highly needed that the asked information is correct and reliable.
Best policies that individuals must adopt while using the internet or any kind of technology
should include the following:
● Being Polite and not using harsh words.
Cybercrime is any criminal activity that uses or targets a computer, network, or networked
device. Cybercriminals may be motivated by profit, politics, or personal reasons. Some types of
cybercrime include:
Identity theft
Criminals gain access to a user's personal information to steal funds, access confidential
information, or commit fraud.
Phishing
Cybercriminals trick users into revealing sensitive information by manipulating their
emotions and psyche.
Cyberstalking
Cybercriminals harass and remain in contact with their victims to fulfill a goal or fantasy.
Banking fraud
Cybercriminals target financial institutions or their customers and stakeholders to steal
money or identities.
DDoS attacks
Cybercriminals may be motivated by financial gain, political agendas, or a desire to make a
name for themselves.
Cyber terrorism
Cybercriminals use the internet or computers to cause destruction, steal confidential
information, or spread propaganda.
Malware
Cybercrime can have a negative impact on individuals, organizations, and society in many ways,
including:
● Individuals: Cybercrime can lead to financial losses, identity theft, emotional trauma,
and damage to reputation. Cybercriminals can use various methods, such as phishing,
hacking, and malware, to steal personal data and financial information, and post
damaging content online.
● Organizations: Cybercrime can impact organizations in several ways, including:
● Increased costs: Businesses may need to hire experts and lawyers to stay
compliant with cybersecurity regulations.
● Insider threats: Insider threats can lead to the destruction of an organization's
internal network system and information leakage.
● Society: Cybercrime can have a negative impact on society as a whole.
Cybercrime has negative impacts on individuals, resulting in financial losses, identity theft,
emotional trauma, and reputation damage. Cybercriminals use multiple approaches like phishing,
hacking, and malware to access financial information, steal personal data, and post damaging
content online.
As a result, individuals should understand the negative impact of cybercrimes and must take all
Cybercrimes can have a drastic financial impact on businesses, resulting in financial loss,
reputation damage, legal repercussions, and intellectual property loss. The financial
Cybercrimes can expose confidential customer information and cause permanent damage to the
reputation of businesses, resulting in loss of loyal customers, decreased revenue, and reduced
market share.
Data breaches can lead to legal action, fines, and penalties, especially in heavily regulated
industries. Cybercriminals target businesses to steal intellectual property, including trade secrets
and patents, delivering a severe blow to businesses, especially those that rely on research and
Cybercrime can have disastrous effects on the economy, resulting in the depletion of financial
assets for individuals, businesses, and governments, which can further lessen consumer
Cybercrime can severely harm national security by compromising confidential information and
It can also harm healthcare and public safety by compromising sensitive patient data and
emotional and psychological harm; and spread misinformation causing severe social and political
repercussions. Social media platforms are used to influence, deceive, or manipulate people and is
Cybersecurity threats are evolving becoming more intricate and widespread in the digital age and
individuals, businesses, and society can employ multiple prevention and mitigation approaches
Some of the protective measures that individuals can take include creating strong passwords,
implementing two-factor authentication, regularly updating software and systems, and being
cautious of suspicious emails and messages. Additionally, it’s essential to back up important data
regularly and educate themselves about cybersecurity risks and best practices.
Some of the best practices for businesses to protect themselves from cybercrime include
conducting frequent security risk inspections, implementing access controls and continual
monitoring for security breaches, providing cybersecurity training for employees, using strong
effective backup and recovery framework, and keeping software and hardware systems
up-to-date.
Content creators can secure their creative assets with creator insurance and protect themselves
from financial loss due to legal disputes and other threats. Creator insurance offers
comprehensive coverage which includes legal fees, reimbursements and other costs associated
with legal claims, protects intellectual property, and covers injuries or damage to property or
equipment. It helps content creators dedicate themselves to their work without the anxiety of
Increased awareness and preventive measures are the need-of-the-hour to combat cybercrime
which is a growing threat, causing devastating financial and reputational losses. They include
cybersecurity best practices, cyber insurance, prioritizing cybersecurity and training, and
Software companies typically provide software updates for 3 reasons: to add new features, fix
known bugs, and upgrade security.
Always update to the latest version of your software to protect yourself from new or existing
security vulnerabilities.
Someone might be impersonating another individual or company to gain access to your personal
information. Sometimes the emails may also include attachments or links that can infect your
devices.
Outdated computer hardware may not support the most recent software security upgrades.
Additionally, old hardware makes it slower to respond to cyber-attacks if they happen. Make sure
to use computer hardware that’s more up-to-date.
If you regularly share confidential information, you absolutely need to start using a secure
file-sharing solution. Regular email is not meant for exchanging sensitive documents, because if
the emails are intercepted, unauthorized users will have access to your precious data.
On the other hand, using a secure file-sharing solution like TitanFile will automatically encrypt
sensitive files so that you don’t have to worry about a data breach. Remember, your files are only
as secure as the tools you chose to share them with.
As long as you’re connected to the web, it’s impossible to have complete and total protection
from malware. However, you can significantly reduce your vulnerability by ensuring you have
an anti-virus and at least one anti-malware installed on your computers.
For a more secure and privatized network, use a virtual private network (VPN). It’ll encrypt your
connection and protect your private information, even from your internet service provider.
Links can easily be disguised as something they’re not so it’s best to double check before you
click on a hyperlink. On most browsers, you can see the target URL by hovering over the link.
Do this to check links before you click on them.
Put more effort into creating your passwords. You can use a tool like
howsecureismypassword.net to find out how secure your passwords are.
Devices can be hacked via Bluetooth and subsequently your private information can be stolen. If
there’s no reason to have your Bluetooth on, turn it off!
Many platforms now allow you to enable 2-factor authentication to keep your accounts more
secure. It’s another layer of protection that helps verify that it’s actually you who is accessing
your account and not someone who’s unauthorized. Enable this security feature when you can.
Adware collects information about you to serve you more targeted ads. It’s best to rid your
computer of all forms of adware to maintain your privacy. Use AdwCleaner to clean adware and
unwanted programs from your computer.
When you’re on a website that isn’t using HTTPS, there’s no guarantee that the transfer of
information between you and the site’s server is secure. Double-check that a site’s using HTTPS
before you give away personal or private information.
External storage devices are just as prone to malware as internal storage devices. If you connect
an infected external device to your computer, the malware can spread. Always scan external
devices for malware before accessing them.
When you connect to a public network, you’re sharing the network with everyone who is also
connected. Any information you send or retrieve on the network is vulnerable. Stay away from
public networks or use a VPN when you’re connected to one.
Unless you’re completely isolated from the rest of the world, there’s no such thing as being
“secure enough.” Big companies like Facebook invest a fortune into security every year but are
still affected by cyber attacks.
Following the previous tip, try to invest in security upgrades when they’re available. It’s better to
eat the costs of security than pay for the consequences of a security breach!
Important data can be lost as a result of a security breach. To make sure you’re prepared to
restore data once it’s lost, you should ensure your important information is backed up frequently
on the cloud or a local storage device.
The key to making cybersecurity work is to make sure your employees well trained, in sync, and
consistently exercising security practices. Sometimes, one mistake from an improperly trained
employee can cause an entire security system to crumble.
Not all hackers are bad. Some hackers expose security risks for the sake of helping others
improve their cybersecurity by keeping them aware of security flaws and patching them. These
hackers are known as “white hat” hackers. It might benefit you to hire one to help you find risks
you never knew you had.
The purpose of the cyber security principles is to provide strategic guidance on how an
organisation can protect their information technology and operational technology systems,
applications and data from cyber threats. These cyber security principles are grouped into five
functions:
Govern principles
Identify principles
● IDENTIFY-1: The business criticality of systems, applications and data is determined and
documented.
Protect principles
Detect principles
● DETECT-1: Event logs are collected and analysed in a timely manner to detect cyber
security events.
● DETECT-2: Cyber security events are analysed in a timely manner to identify cyber
security incidents.
Respond principles
● RESPOND-1: Cyber security incidents are reported internally and externally to relevant
bodies and stakeholders in a timely manner.
● RESPOND-2: Cyber security incidents are analysed, contained, eradicated and recovered
from in a timely manner.
● RESPOND-3: Incident response, business continuity and disaster recovery plans support
the recovery of normal business operations during and following cyber security incidents.
Maturity modelling
When implementing the cyber security principles, an organisation can use the following maturity
model to assess the implementation of individual principles, individual functions or the cyber
security principles as a whole. The five levels of the maturity model are:
● Incomplete: The cyber security principles are partially implemented or not implemented.
● Initial: The cyber security principles are implemented, but in a poor or ad hoc manner.
● Developing: The cyber security principles are sufficiently implemented, but on a
project-by-project basis.
● Managing: The cyber security principles are established as standard business practices
and robustly implemented throughout the organisation.
● Optimising: A deliberate focus on optimisation and continual improvement exists for the
implementation of the cyber security principles throughout the organisation.
Before heading to the different types of cyber attacks, we will first walk you through a cyber
attack. When there is an unauthorized system/network access by a third party, we term it as a
cyber attack. The person who carries out a cyberattack is termed as a hacker/attacker.
Cyber-attacks have several negative effects. When an attack is carried out, it can lead to data
breaches, resulting in data loss or data manipulation. Organizations incur financial losses,
customer trust gets hampered, and there is reputational damage. To put a curb on cyberattacks,
The COVID-19 situation has also had an adverse impact on cybersecurity. According to Interpol
and WHO, there has been a notable increase in the number of cyberattacks during the COVID-19
pandemic.
Now that you know what a cyber attack is, let look at the different types of cyberattacks.
There are many varieties of cyber attacks that happen in the world today. If we know the various
types of cyberattacks, it becomes easier for us to protect our networks and systems against them.
Here, we will closely examine the top ten cyber-attacks that can affect an individual, or a large
business, depending on the scale.
Elevate your cybersecurity acumen with our intensive Cyber security Bootcamp, where you'll
delve into the diverse landscape of cyber attacks. From phishing to malware, ransomware to
DDoS attacks, our comprehensive program equips you with the skills to anticipate, prevent, and
mitigate a wide range of threats.
1. Malware Attack
This is one of the most common types of cyberattacks. “Malware” refers to malicious software
viruses including worms, spyware, ransomware, adware, and trojans.
The trojan virus disguises itself as legitimate software. Ransomware blocks access to the
Malware breaches a network through a vulnerability. When the user clicks a dangerous link, it
downloads an email attachment or when an infected pen drive is used.
● Use antivirus software. It can protect your computer against malware. Avast Antivirus,
Norton Antivirus, and McAfee Antivirus are a few of the popular antivirus software.
● Use firewalls. Firewalls filter the traffic that may enter your device. Windows and
Mac OS X have their default built-in firewalls, named Windows Firewall and Mac
Firewall.
● Stay alert and avoid clicking on suspicious links.
● Update your OS and browsers, regularly.
2. Phishing Attack
Phishing attacks are one of the most prominent widespread types of cyberattacks. It is a type of
social engineering attack wherein an attacker impersonates to be a trusted contact and sends the
victim fake mails.
Unaware of this, the victim opens the mail and clicks on the malicious link or opens the mail's
attachment. By doing so, attackers gain access to confidential information and account
credentials. They can also install malware through a phishing attack.
● Scrutinize the emails you receive. Most phishing emails have significant errors like
3. Password Attack
It is a form of attack wherein a hacker cracks your password with various programs and
password cracking tools like Aircrack, Cain, Abel, John the Ripper, Hashcat, etc. There are
different types of password attacks like brute force attacks, dictionary attacks, and keylogger
attacks.
4. Man-in-the-Middle Attack
As seen below, the client-server communication has been cut off, and instead, the
communication line goes through the hacker.
● Be mindful of the security of the website you are using. Use encryption on your
devices.
A Structured Query Language (SQL) injection attack occurs on a database-driven website when
the hacker manipulates a standard SQL query. It is carried by injecting a malicious code into a
vulnerable website search box, thereby making the server reveal crucial information.
This results in the attacker being able to view, edit, and delete tables in the databases. Attackers
can also get administrative rights through this.
6. Denial-of-Service Attack
When this happens, catering to the incoming requests becomes overwhelming for the servers,
resulting in the website it hosts either shut down or slow down. This leaves the legitimate service
requests unattended.
It is also known as a DDoS (Distributed Denial-of-Service) attack when attackers use multiple
compromised systems to launch this attack.
7. Insider Threat
As the name suggests, an insider threat does not involve a third party but an insider. In such a
case; it could be an individual from within the organization who knows everything about the
organization. Insider threats have the potential to cause tremendous damages.
Insider threats are rampant in small businesses, as the staff there hold access to multiple accounts
with data. Reasons for this form of an attack are many, it can be greed, malice, or even
carelessness. Insider threats are hard to predict and hence tricky.
8. Cryptojacking
The term Cryptojacking is closely related to cryptocurrency. Cryptojacking takes place when
attackers access someone else’s computer for mining cryptocurrency.
● Update your software and all the security apps as cryptojacking can infect the most
unprotected systems.
● Have cryptojacking awareness training for the employees; this will help them detect
crypotjacking threats.
● Install an ad blocker as ads are a primary source of cryptojacking scripts. Also have
extensions like MinerBlock, which is used to identify and block crypto mining scripts.
9. Zero-Day Exploit
Depending on the vulnerability, the vendor or the developer could take any amount of time to fix
the issue. Meanwhile, the attackers target the disclosed vulnerability. They make sure to exploit
the vulnerability even before a patch or solution is implemented for it.
The victim here is a particular group of an organization, region, etc. In such an attack, the
attacker targets websites which are frequently used by the targeted group. Websites are identified
either by closely monitoring the group or by guessing.
After this, the attackers infect these websites with malware, which infects the victims' systems.
The malware in such an attack targets the user's personal information. Here, it is also possible for
the hacker to take remote access to the infected computer.
Let's now see how we can prevent the watering hole attack:
● Update your software and reduce the risk of an attacker exploiting vulnerabilities.
Make sure to check for security patches regularly.
● Use your network security tools to spot watering hole attacks. Intrusion prevention
systems(IPS) work well when it comes to detecting such suspicious activities.
● To prevent a watering hole attack, it is advised to conceal your online activities. For
this, use a VPN and also make use of your browser’s private browsing feature. A VPN
delivers a secure connection to another network over the Internet. It acts as a shield for
your browsing activity. NordVPN is a good example of a VPN.
11. Spoofing
Perform to steal or manipulate others' personal information, like login someone's PINs to steal
Performed by inserting malicious code into a software application to manipulate data. For
example, the attacker puts malicious code into a SQL database to steal data.
Attacker uses the Domain Name System (DNS) to bypass security measures and communicate
with a remote server.
Cyberattack in which an attacker manipulates the DNS records from a website to control its
traffic.
Exploit vulnerabilities in the Internet of Things (IoT), like smart thermostats and security
cameras, to steal data.
18. Ransomware
20. Spamming
Hackers get close to a bank's computer systems to withdraw large amounts of cash from ATMs.
Target specific individuals or groups under an organization. Attackers use social engineering
techniques to get sensitive information.
A web browser interprets a URL (Uniform Resource Locator) and requests the corresponding
web page to exploit vulnerabilities in the URL interpretation.
An attacker gets unauthorized access to a system by trying various passwords until the correct
one is found. It can be highly effective against weak passwords.
Targets websites and can insert SQL injection, cross-site scripting (XSS) and file inclusion.
Malware that appears to be a legitimate program but which contains malicious code. Once
installed, it can perform malicious actions like stealing data and controlling the system.
The user's system is flooded with malware by visiting its compromised website to exploit
vulnerabilities in other software to insert the malware without the user's knowledge.
An attacker inserts unauthorized code into a legitimate website to access the user's information to
steal sensitive information like the user's passwords and credit card details.
A cryptographic attack exploits the birthday paradox to access a collision in a hash function. The
attacker successfully generates two inputs to get the same output hash value. This can be used to
compromise to bypass access controls.
The attacker floods a system with heavy data to make it inaccessible to legitimate users. For
instance, DDoS attacks in which various compromised computers flood a specific website with
traffic to crash it.
Targets the application layer of a system, aiming to exploit vulnerabilities in applications or web
servers.
An attacker attempts to guess a user's password by trying a list of common words. This attack
becomes successful because many users use weak or easy passwords.
38. Virus
Malicious software can replicate itself and spread to other computers. Viruses can cause
significant damage to systems, corrupt files, steal information, and more.
Replicates itself and spreads to other computers, but unlike viruses, worms don't require human
interaction.
40. Backdoors
This vulnerability allows attackers to bypass standard authentication procedures and gain
unauthorized access to a system or network.
41. Bots
These software programs automate network or internet tasks. They can be used for malicious
purposes, such as Distributed Denial of Service (DDoS) attacks.
Targets businesses and organizations by using email. The attackers impersonate a trusted source
to trick the victim into transferring funds or sensitive information to the attacker.
Targets web applications by injecting malicious code into a vulnerable website to steal sensitive
information or to perform unauthorized attacks.
Use artificial intelligence and machine learning to bypass traditional security measures.
45. Rootkits
Provide attackers privileged access to a victim's computer system. Rootkits can be used to hide
46. Spyware
Is malware designed to collect sensitive information from a victim's computer system. This can
include passwords, credit card numbers, and other sensitive data.
is a technique cybercriminals use to manipulate users to make them divulge sensitive information
or perform actions that are not in their best interest.
48. Keylogger
Is a malware designed to capture keystrokes a victim enters on their computer system. This can
include passwords, credit card numbers, and other sensitive data.
49. Botnets
Are networks of compromised computers controlled by a single attacker. Botnets can launch
distributed denial of service (DDoS) attacks, steal sensitive information, or perform other
malicious activities.
50. Emotet
Is malware designed to steal sensitive information and spread it to other computers on a network.
Emotet is often spread through phishing emails and can be very difficult to detect and remove.
51. Adware
Is malware that displays unwanted advertisements on a victim's computer system. Adware can be
Doesn’t rely on files to infect a victim's computer system. Instead, fileless malware executes
malicious code using existing system resources, such as memory or registry keys.
Target individuals or organizations using highly targeted and personalized emails. Angler
phishing attacks can be difficult to detect and are often successful in stealing sensitive
information.
Although we had a look at several ways to prevent the different types of cyberattacks we
discussed, let's summarize and look at a few personal tips which you can adopt to avoid a
cyberattack on the whole.
1. Change your passwords regularly and use strong alphanumeric passwords which are
difficult to crack. Refrain from using too complicated passwords that you would tend
to forget. Do not use the same password twice.
2. Update both your operating system and applications regularly. This is a primary
prevention method for any cyber attack. This will remove vulnerabilities that hackers
tend to exploit. Use trusted and legitimate Anti-virus protection software.
These are the tips you must implement to protect your systems and networks from a cyber attack.
The term "cybercrime" was introduced after the latest evolution in the computer industry and
networks.
Cybercrimes are considered a major risk because they can have devastating effects like financial
What is Cybercrime?
Cybercrime can be defined as “The illegal usage of any communication device to commit or
facilitate in committing any illegal act”.
Cybercrimes are committed using computers and computer networks. They can be targeting
individuals, business groups, or even governments.
A cybercriminal is a person who uses his skills in technology to do malicious acts and illegal
activities known as cybercrimes. They can be individuals or teams.
Cybercriminals are widely available in what is called the “Dark Web” where they mostly provide
their illegal services or products.
Not every hacker is a cybercriminal because hacking itself is not considered a crime as it can be
used to reveal vulnerabilities to report and batch them which is called a “white hat hacker”.
However, hacking is considered a cybercrime when it has a malicious purpose of conducting any
harmful activities and we call this one “black hat hacker” or a cyber-criminal.
It is not necessary for cybercriminals to have any hacking skills as not all cyber crimes include
hacking.
Cybercriminals can be individuals who are trading in illegal online content or scammers or even
drug dealers. So here are some examples of cybercriminals:
Cybercriminals who conduct targeted attacks are better to be named Threat Actors.
Cybercriminals take advantage of security holes and vulnerabilities found in systems and exploit
them in order to take a foothold inside the targeted environment.
The security holes can be a form of using weak authentication methods and passwords, it can
also happen for the lack of strict security models and policies.
The world is constantly developing new technologies, so now, it has a big reliance on
technology. Most smart devices are connected to the internet. There are benefits and there are
also risks.
One of the risks is the big rise in the number of cybercrimes committed, there are not enough
security measures and operations to help protect these technologies.
Computer networks allow people in cyberspace to reach any connected part of the world in
seconds.
Cybercrimes can have different laws and regulations from one country to another, mentioning
also that covering tracks is much easier when committing a cybercrime rather than real crimes.
We are listing different below reasons for the big increase in cybercrimes:
- Vulnerable devices:
As we mentioned before, the lack of efficient security measures and solutions introduces a wide
range of vulnerable devices which is an easy target for cybercriminals.
- Financial motivation:
The most common motivation of cybercriminals and hacker groups, most attacks nowadays are
committed to profit from it.
This type of cybercrimes includes every possible way that can lead to harm to computer devices
for example malware or denial of service attacks.
- Using computers
This type includes the usage of computers to do all the classifications of computer crimes.
Classifications of Cybercrimes
This type is targeting individuals. It includes phishing, spoofing, spam, cyberstalking, and more.
The main target here is organizations. Usually, this type of crime is done by teams of criminals
including malware attacks and denial of service attacks.
3. Property Cybercrimes:
This type targets property like credit cards or even intellectual property rights.
4. Society Cybercrimes:
Now that you understand what cybercrimes are, let’s discuss some common cybercrimes.
Phishing is a type of social engineering attack that targets the user and tricks them by sending
fake messages and emails to get sensitive information about the user or trying to download
malicious software and exploit it on the target system.
2. Identity Theft
Identity theft occurs when a cybercriminal uses another person’s personal data like credit card
numbers or personal pictures without their permission to commit a fraud or a crime.
3. Ransomware Attack
Ransomware attacks are a very common type of cybercrime. It is a type of malware that has the
capability to prevent users from accessing all of their personal data on the system by encrypting
them and then asking for a ransom in order to give access to the encrypted data.
This term refers to the crime of unauthorized access to private computers or networks and misuse
of it either by shutting it down or tampering with the data stored or other illegal approaches.
5. Internet Fraud
Internet fraud is a type of cybercrimes that makes use of the internet and it can be considered a
general term that groups all of the crimes that happen over the internet like spam, banking frauds,
theft of service, etc.
1. Cyber Bullying
It is also known as online or internet bullying. It includes sending or sharing harmful and
2. Cyber Stalking
Cyberstalking can be defined as unwanted persistent content from someone targeting other
individuals online with the aim of controlling and intimidating like unwanted continued calls and
messages.
3. Software Piracy
Software piracy is the illegal use or copy of paid software with violation of copyrights or license
restrictions.
An example of software piracy is when you download a fresh non-activated copy of windows
and use what is known as “Cracks” to obtain a valid license for windows activation. This is
considered software piracy.
Not only software can be pirated but also music, movies, or pictures.
The use of social media fake accounts to perform any kind of harmful activities like
impersonating other users or sending intimidating or threatening messages. And one of the
easiest and most common social media frauds is Email spam.
With the big rise of cryptocurrency technology, it became easy to transfer money in a secured
private way and complete drug deals without drawing the attention of law enforcement. This led
to a rise in drug marketing on the internet.
Illegal drugs such as cocaine, heroin, or marijuana are commonly sold and traded online,
especially on what is known as the "Dark Web".
Also known as transaction laundering. It is based on unknown companies or online business that
makes approvable payment methods and credit card transactions but with incomplete or
inconsistent payment information for buying unknown products.
It is by far one of the most common and easy money laundering methods.
8. Cyber Extortion
Cyber extortion is the demand for money by cybercriminals to give back some important data
they've stolen or stop doing malicious activities such as denial of service attacks.
9. Intellectual-property Infringements
It is the violation or breach of any protected intellectual-property rights such as copyrights and
industrial design.
One of the less common cybercrimes that are also growing to become more popular is the fake
job opportunities released by fake companies for the purpose of obtaining a financial benefit
from applicants or even making use of their personal data.
The incident happened when one of the Kaseya's company's products was deploying the famous
SODINOKIBI REvil ransomware to endpoints of Kaseya's customer network that attack surface
was over 1000 Kaseya's customers worldwide.
A few hours later REvil took credit for the attack by posting on their Happy Blog website on the
dark web and demanded a $70 million ransom to release a public decryptor that they claim can
The attack was so impactful that the United States government offered $10 million bounties to
anyone that can give any information for arresting REvil members.
Yaroslav Vasinskyi, a 22 years Ukrainian, was charged with conducting the attack and
unleashing the ransomware against Kaseya and other companies.
- Stuxnet
The Stuxnet incident is a famous incident that happened in 2010. Stuxnet is the name of a
computer worm (type of malware) that targets SCADA (supervisory control and data acquisition)
systems.
Stuxnet malware left devastating damage to Iran’s nuclear power program. It was spreading
through USB drives and affected mainly Microsoft Windows operating systems.
The malware functionality was to search for machines that are working as PLCs (programmable
logic controllers) and if it was found the malware updates its code over the internet through the
attackers.
- Marriott Hotels
In November 2018, Marriott hotels group suffered from a massive data breach that affected more
than 500 million customers.
The compromise happened for the guest reservation database by an unknown party. The
information that was leaked contained payment information, mailing addresses, passport
numbers, and phone numbers for customers.
Marriott Group has immediately conducted incident investigations with a group of security
experts plus setting up a website and a call center.
They also sent emails to the affected customers and gave them free access to monitoring tools
that monitor the internet and give an alert if any evidence of sharing personal information is
found.
RockYou is a company that works in the game field and was founded in 2005 by Lance Tokuda
and Jia Shen. The company was working well until December 2009 when what is called “the
biggest data breach of all time” happened.
The data breach exposed and leaked more than 32 million user account information from
RockYou database.
The company was storing passwords in an unencrypted plain text format which made it easier for
the hacker to have access to all passwords stored. The hacker used a very old and popular SQL
vulnerability to leak all data from the database.
After this major breach, the total set of passwords that were leaked became a very helpful
resource in penetration testing as hackers use this wordlist of passwords to test the security and
password strength of accounts and products.
You can read more about top data breaches in this article.
There are many tips and guidelines to protect yourself and your environment from the risk of
cybercrimes such as:
1. Be sure that you are using up-to-date security software like antivirus and firewalls.
2. Implement the best possible security settings and implementations for your environment.
3. Don't browse untrusted websites and be careful when downloading unknown files, and also be
careful when viewing Email attachments.
4. Use strong authentication methods and keep your passwords as strong as possible.
6. Educate your children about the risks of internet usage and keep monitoring their activities.
Cybersecurity threats have become prevalent in all online transactions. Topping the list of the
most vulnerable areas for online fraud are e-commerce stores.
As customers move from brick-and-mortar stores to e-commerce platforms for their buying
needs, securing customer journeys from online frauds is imperative for e-commerce stores.
E-commerce frauds are illicit online transactions by cyber criminals. These crimes directly
impact merchants and customers. Frauds like illicit and illegal activities cause heavy losses.
Besides, online fraud can have a deep impact on a business’s reputation and customer
relationships. One of the worst consequences of e-commerce fraud is the loss of customer trust
and loyalty.
To prevent these, individuals should educate themselves on common fraud tactics, use secure
devices, verify transactions, use reputable platforms, monitor accounts regularly, and be cautious
online.
If they suspect fraud, they should report it immediately, document all communication, and file a
police report. Many countries have laws and regulations to protect consumers from digital
payment fraud.
Additionally, individuals should stay vigilant and adapt to new security measures and best
practices. By understanding these types of frauds, implementing preventive measures, and
staying informed about legal protections, individuals can better protect themselves from financial
losses and other online fraud consequences.
Card-present fraud can result in unauthorized charges, financial losses, and identity theft, while
card-not-present fraud can result in unauthorized transactions and identity theft. Merchants may
also face financial losses from chargebacks, reputational damage, and increased costs associated
with fraud prevention measures.
To prevent and address merchant fraud, collaboration between consumers, businesses, financial
institutions, and regulatory authorities is essential. Effective fraud detection, prevention, and
enforcement measures are crucial for preventing and addressing these types of fraud.
eCommerce platforms
Types of eCommerce Platforms:
Preventative Measures
To reduce risks in direct bank transfers, use secure channels, verify recipient and merchant
account details, enable two-factor authentication, monitor account activity, set transaction limits,
update security software, be cautious of wire transfer scams, educate yourself about fraud trends,
and report suspicious activity. Regularly monitor account activity and update security software.
Keep devices and software updated with the latest security patches, use antivirus software,
firewalls, and secure Wi-Fi networks. Avoid sharing sensitive information over email, phone, or
social media unless necessary, and shop safely online with secure websites and reputable
Stay informed about common scams, fraud tactics, and cybersecurity threats, and report
suspicious activity immediately.
To find vulnerabilities and uphold a safe online payment terminal environment, do security
checks and audits, monitor transactions, analyze transaction data, and update software regularly.
● Identity theft: Scammers can use publicly available information to steal someone's
identity.
● False information: People can spread disinformation quickly on social media.
● Malware: Social media platforms can be used to deliver malware, which can steal
sensitive data.
● Impersonation: Scammers can impersonate brands or other people.
● Fake ads: Scammers can use fake ads to defraud people.
● False job offerings: Scammers can offer fake jobs to defraud people.
● Honey traps: Scammers can use honey traps to defraud people.
● Phishing: Scammers can use phishing to defraud people.
● Pumping up a company: Scammers can use online discussions to pump up a company.
● Pretending to reveal "inside" information: Scammers can pretend to reveal "inside"
information about upcoming announcements, new products, or lucrative contracts.