What is Cyber Safety,Online Identity? How to be aware of Identity Theft – Cyber safety #1

What is Cyber Safety,Online Identity? How to be aware of Identity Theft – Cyber safety #1

So from today onwards we are going to post a whole detailed articles about Cyber Safety, In total there are going to be 8 parts in the whole series of Cyber Safety, Here is the first part, hope this whole series would be very helpful and knowledgeable for you.

In the first part we will know about:
-Identity Theft
-Identity Protection While Using Internet

Internet is one of the largest information databases available to us today and has become a vital part of our life. Tasks
such as banking, shopping, and communication, which were usually performed through personal interaction earlier, can now be done online. Data and Information can be shared across the globe instantly. Indeed Internet has transformed
the world into smaller and more convenient place to live in. As computers and data have become an integral part of our life, it is impossible to think even a single day without being online. Undoubtedly. Internet is the best resource for us, but the question arises that is it safe. The answer to this question may be yes, if we are aware and use the right tools While
using internet, many types of viruses, malware, and worms may infect your computer. So, we always need to be extra
careful about the program which we download or run on your computer.

We may get a lot of benefits from internet without any risk, if we surf and visit trustworthy links with awareness. It is good to be techno savvy but it is equally important to be safe online. The unprecedented increase in the use of Internet and related services has exposed our information to several threats. Sensitive information loss, online frauds, scams, and Crimes have become a common cause of concern.

In this series, we will learn about the possible threats to our computer and how to protect our personal information from these threats by taking preventive measures


You must have seen your parents visit the bank to operate the locker. What purpose does the locker solve? Your mother keeps her jewellery and valuables in the locker. Your father keeps important and confidential documents in the locker. The locker provides a safe and secure environment for the belongings. What will happen if your parents leave the jewellery, valuables, and documents outside the locker by mistake? They will be stolen and misused.

Similarly, when you access the Internet, you key-in a lot of personal information on the websites you visit and the social networking websites that you are a part of. Though this information and details are password protected, yet a lot of them can be accessed by other people. This unsecured information and details can be
stolen and misused by thieves on the internet. This is called cyber theft.

Cyber theft is stealing confidential, personal and financial information, such as passwords, bank details, credit card details, etc. from a personal computer or device and misusing it to harm the user.

To prevent cyber theft, you need to keep most of your personal, financial information, and online data safe. This is known as cyber safety.


What is the first step to join any social media like Twitter, Facebook, WhatsApp or Instagram? You first have to create a log in, which requires to key-in a lot of personal information such as your name, date of birth, address, etc.

This information creates your online identity or social identity on
the Internet. People actually look at your online identity when they see your profile on the social networking sites.
Remember, you have to be very careful as to what and with whom you are exchanging the information online.

Identity Theft

When someone else uses your online identity to create fraudulent messages or commit crimes, it is known as identity theft. In other words, you can say that Identity theft is any kind of deception, scam, or crime that results in the loss of personal data, including the loss of usernames, passwords, banking information, credit card numbers, Aadhar ID or Unique Identity Number (UID), which is then used without your permission to commit fraud and other crimes. In today’s world, the biggest challenge for every Internet user is to safeguard his or her identity, which is constantly under threat from cyber thieves, hackers, and keyloggers.

Identity Protection While Using Internet

Listed below are some of the ways in which you can be a victim of identity theft!

a. Phishing: It is the act of illegally acquiring personal and sensitive information such as, online banking details, credit card details and other login details, of an individual by sending malicious e-mails or by creating web pages that can collect this information as they appear to come from very famous organizations.

b. Dumpster Diving: It is a technique used to retrieve personal information of a user from his discarded documents. Cyber thieves search your trash to get information about your bills, credit cards and other personal Information, like codes or passwords, which they can use to carry out an attack on a computer network.

c. Shoulder Surfing: It is obtaining personal information, such as a PIN at an ATM machine, personal details while filling up a form, or the lock code of a smartphone through direct observation by looking over a person’s shoulder. This happens in crowded places such as banks, ATMs, and while travelling by metro and bus, Binoculars and vision enhancing devices can also be used to get details from a distance

d. Employment Scam: It is giving to a job seeker a false hope of employment with better salary by paying a certain
amount of money. The thieves keep tracking the accounts of job seekers who are actively updating their CVs. An email is then sent to the id offering them a good job with an attractive salary. In return, the job seeker has to share a lot of personal details, which also includes the bank details and transfer some amount to them. These details are then used to gain access to their bank accounts or personal details for identity thefts.

e. Pretexting: It is the practice of obtaining a person’s personal information using a fake name or fake company and
then selling that information to people who use it to steal that person’s online identity.


Hope, this article might have helped you to understand about Cyber safety, Cyber Theft, types of Cyber Theft, if u think that we have missed something then please let us know in the comment section below,

And stay tuned for the part 2.

You Might Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *