besidedegree@gmail.com
+9779709005491
Back to Home
School SEE Computer Science

Grade 9|| Cyber Security and Digital Citizenship||Notes

Highlight Save
This chapter teaches you how to stay safe and responsible in the digital world. You’ll learn to protect yourself from online threats like cybercrime and malware, understand the importance of strong passwords and secure browsing, and explore what it means to be a respectful and ethical digital citizen. By mastering these skills, you’ll confidently navigate the internet while safeguarding your privacy and contributing positively online.

1. Introduction to Cybersecurity and Digital Citizenship

Why is this Important?

In today's digital world, we spend significant time online for education, communication, and entertainment. Just as we follow rules and safety measures in the physical world, we need to understand how to protect ourselves and behave responsibly in the digital world.

2. Concept of Cybersecurity

What is Cybersecurity?

Cybersecurity refers to the practice of protecting computers, networks, programs, and data from:

  • Unauthorized access
  • Theft or damage
  • Cyberattacks and malware
  • Data breaches

Types of Cybersecurity:

  1. Network Security – Protecting computer networks
  2. Information Security – Protecting data and information
  3. Application Security – Securing software applications
  4. Operational Security – Protecting business operations

Cyber Threat Landscape:

  • Over 4,000 cyberattacks occur daily worldwide
  • Both individuals and organizations are targets
  • Everyone needs to practice cybersecurity

Remember: Cybersecurity is everyone's responsibility!

3. Concept of Cybercrime

What is Cybercrime?

Criminal activities carried out using computers or the internet. These activities can:

  • Harm individuals financially and emotionally
  • Damage reputations
  • Compromise national security

Types of Cybercrime:

TypeDescriptionExampleIdentity TheftStealing personal informationUsing someone's credit card detailsPhishingFake emails/websites to steal dataEmail pretending to be from a bankMalware AttacksMalicious software installationViruses, ransomwareSocial Media HackingUnauthorized account accessPosting inappropriate content from someone's accountDDoS AttacksOverloading websites to crash themMaking a website unavailableOnline HarassmentBullying through digital meansSending threatening messages

Cyber Law in Nepal:

  • Electronic Transaction Act (ETA), 2063 – Main law governing cybercrime in Nepal
  • Punishment: Up to ₹1 lakh fine and/or 5 years imprisonment
  • Handled by: Cyber Bureau of Nepal Police

4. Prevention Methods from Cybercrime

A. Strong Passwords

Characteristics of strong passwords:

  • Minimum 8-12 characters
  • Mix of uppercase, lowercase, numbers, and symbols
  • No dictionary words or sequences (like "1234", "password")
  • Different passwords for different accounts
  • Changed regularly

Fun Fact: "123456", "password", and "qwerty" are the most commonly used (and weakest) passwords!

B. Multi-Factor Authentication (MFA)

What is MFA?
Using two or more verification methods to access accounts.

Three Factors of Authentication:

FactorDescriptionExamplesSomething You KnowInformation only you knowPassword, PINSomething You HavePhysical object you possessPhone, Smart card, Security tokenSomething You AreBiological characteristicsFingerprint, Face recognition, Voice

C. Software Updates

  • Why? Updates fix security vulnerabilities
  • What to update: Operating systems, applications, antivirus
  • Best practice: Enable automatic updates
  • Systems: Windows, Android, iOS, Linux

D. Firewalls

What is a Firewall?
A security system that monitors and controls network traffic based on predetermined security rules.

Types:

  • Hardware Firewall – Physical device
  • Software Firewall – Program on your computer
  • Built-in Firewall – Windows Firewall, iOS Firewall

Function: Acts as a barrier between your device and the internet, blocking unauthorized access.

E. Antivirus Software

Purpose: Detects, prevents, and removes malware

Popular Antivirus Software:

  • Kaspersky
  • Norton 360
  • Avast
  • Windows Defender (built-in)

Features:

  • Real-time scanning
  • Automatic updates
  • Quarantine for suspicious files
  • System cleanup

5. Safe Web Browsing Techniques

A. Use Secure Connections

  • Look for HTTPS (not HTTP) in URLs
  • Check for padlock icon in address bar
  • Use VPN (Virtual Private Network) for privacy

Examples: NordVPN, Proton VPN, Mozilla VPN

B. Use Secure Browsers

Features of secure browsers:

  • Private browsing mode
  • Tracking protection
  • Ad-blocking
  • Password management

Examples: Chrome, Firefox, Safari, Brave

C. Use Secure Search Engines

  • Google – Most popular
  • DuckDuckGo – Privacy-focused
  • Bing – Microsoft's engine

Statistic: 65.76% of internet users use Google Chrome

D. Recognize Secure Websites

Indicators:

  • HTTPS in URL
  • Padlock symbol
  • Valid SSL certificate
  • Professional design
  • Clear privacy policy

6. Concept of Digital Citizen

What is a Digital Citizen?

A person who uses digital technology responsibly, ethically, and effectively to participate in society.

Characteristics of Good Digital Citizens:

  1. Think before posting online
  2. Protect personal information
  3. Use multiple search engines to limit tracking
  4. Change passwords regularly
  5. Report illegal or inappropriate content
  6. Respect others' digital property
  7. Contribute positively to online communities

7. Concept of Netiquette and Online Behaviors

What is Netiquette?

Network + Etiquette = Rules for polite and respectful online behavior

Netiquette Guidelines:

 

Do'sDon'tsBe respectful in communicationUse offensive languageRespect others' privacyShare personal information without consentGive credit for shared workPlagiarize others' contentThink before postingPost impulsively or emotionallyReport abusive behaviorEngage in cyberbullyingBe open to criticismReact defensively to feedbackMaintain positive online presenceSpread negativity or hate

Remember:

"The same manners you use in person should be used online."

8. Digital Footprint and Online Privacy

What is Digital Footprint?

The trail of data you create while using the internet. Also called "Digital Shadow" or "Electronic Footprint."

Types of Digital Footprints:

 

TypeDescriptionExamplesActive FootprintData you intentionally shareSocial media posts, emails, online formsPassive FootprintData collected without your knowledgeSearch history, location data, cookies

Advantages of Digital Footprint:

 

AdvantageExplanationHealth MonitoringWearables track fitness dataSocial ConnectionsHelps build relationships onlineTargeted AdvertisingRelevant ads based on interestsLaw EnforcementHelps in investigations

Disadvantages of Digital Footprint:

 

DisadvantageExplanationSecurity RisksHackers can track activitiesPrivacy IssuesPersonal data can be misusedExploitative PracticesCompanies sell user dataCriminal ExploitationFraud, identity theftOnline AbuseStalking, harassment

Protecting Your Digital Footprint:

 

ActionPurposeReview privacy settingsControl what others seeDelete old accountsReduce exposureUse strong passwordsPrevent unauthorized accessDisable location trackingProtect physical locationRegular software updatesFix security vulnerabilitiesThink before postingControl active footprint

Incognito/Private Browsing:

  • What it does: Doesn't save browsing history, cookies, or form data
  • What it doesn't do: Doesn't make you anonymous to websites or ISP
  • Shortcut: Ctrl + Shift + N (Windows), Cmd + Shift + N (Mac)

9. Practical Activities and Safety Measures

Activity 1: Using Antivirus and Firewall

Steps:

  1. Open antivirus software
  2. Run a quick scan
  3. Update virus definitions
  4. Check firewall settings
  5. Configure basic rules

Activity 2: Safe Browsing Practice

Checklist:

  • Browser updated
  • HTTPS used
  • Pop-ups blocked
  • Cookies cleared regularly
  • Strong passwords used

Activity 3: Digital Footprint Analysis

What to track:

  • Email addresses used
  • Social media usernames
  • Devices regularly used
  • Online accounts created

Activity 4: Password Strength Test

Create passwords that:

  • Are at least 12 characters long
  • Mix character types
  • Are unique for each account
  • Are changed every 3-6 months

10. Important Legal Information

Electronic Transaction Act (ETA), 2063:

  • Section 47: Punishment for publishing illegal material
  • Maximum penalty: ₹1 lakh fine and/or 5 years imprisonment
  • What's illegal: Material against morals, hate speech, harassment

Where to Report Cybercrime in Nepal:

  1. Cyber Bureau of Nepal Police
  2. Local police stations
  3. Online portal: www.nepalpolice.gov.np

11. Key Terms and Definitions

 

TermDefinitionCybersecurityProtection of digital systems and dataCybercrimeIllegal activities using computersMalwareMalicious software (viruses, ransomware)PhishingFake attempts to steal sensitive informationFirewallSecurity barrier between network and internetDigital FootprintTrail of data left onlineNetiquetteRules for polite online behaviorDigital CitizenResponsible user of digital technologyMFAMulti-Factor AuthenticationETAElectronic Transaction Act

12. Safety Checklist for Students

Daily Practices:

✅ Use strong, unique passwords
✅ Enable MFA where possible
✅ Keep software updated
✅ Think before clicking links
✅ Verify website security (HTTPS)
✅ Log out of shared computers
✅ Backup important data regularly

Social Media Safety:

✅ Adjust privacy settings
✅ Don't share personal information
✅ Be selective about friend requests
✅ Report inappropriate content
✅ Take regular digital breaks

When in Doubt:

✅ Ask a trusted adult
✅ Research before sharing
✅ Verify information sources
✅ Report suspicious activities

13. Cyber Hygiene Tips

Daily: Clear browsing history, check for updates
Weekly: Change passwords, backup data
Monthly: Review privacy settings, check account activity
Yearly: Audit online accounts, delete unused ones

14. The Golden Rules of Digital Citizenship

Protect Yourself – Use security measures

Respect Others – Practice netiquette

Protect Others – Report abuse

Protect Property – Respect copyright

Stay Informed – Keep learning about digital safety

Related Videos

Video on Cyber Security and Digital Citizenship by Guru Sciency

Important Links