1. Introduction to Cybersecurity and Digital Citizenship
Why is this Important?
In today's digital world, we spend significant time online for education, communication, and entertainment. Just as we follow rules and safety measures in the physical world, we need to understand how to protect ourselves and behave responsibly in the digital world.
2. Concept of Cybersecurity
What is Cybersecurity?
Cybersecurity refers to the practice of protecting computers, networks, programs, and data from:
- Unauthorized access
- Theft or damage
- Cyberattacks and malware
- Data breaches
Types of Cybersecurity:
- Network Security – Protecting computer networks
- Information Security – Protecting data and information
- Application Security – Securing software applications
- Operational Security – Protecting business operations
Cyber Threat Landscape:
- Over 4,000 cyberattacks occur daily worldwide
- Both individuals and organizations are targets
- Everyone needs to practice cybersecurity
Remember: Cybersecurity is everyone's responsibility!
3. Concept of Cybercrime
What is Cybercrime?
Criminal activities carried out using computers or the internet. These activities can:
- Harm individuals financially and emotionally
- Damage reputations
- Compromise national security
Types of Cybercrime:
TypeDescriptionExampleIdentity TheftStealing personal informationUsing someone's credit card detailsPhishingFake emails/websites to steal dataEmail pretending to be from a bankMalware AttacksMalicious software installationViruses, ransomwareSocial Media HackingUnauthorized account accessPosting inappropriate content from someone's accountDDoS AttacksOverloading websites to crash themMaking a website unavailableOnline HarassmentBullying through digital meansSending threatening messages
Cyber Law in Nepal:
- Electronic Transaction Act (ETA), 2063 – Main law governing cybercrime in Nepal
- Punishment: Up to ₹1 lakh fine and/or 5 years imprisonment
- Handled by: Cyber Bureau of Nepal Police
4. Prevention Methods from Cybercrime
A. Strong Passwords
Characteristics of strong passwords:
- Minimum 8-12 characters
- Mix of uppercase, lowercase, numbers, and symbols
- No dictionary words or sequences (like "1234", "password")
- Different passwords for different accounts
- Changed regularly
Fun Fact: "123456", "password", and "qwerty" are the most commonly used (and weakest) passwords!
B. Multi-Factor Authentication (MFA)
What is MFA?
Using two or more verification methods to access accounts.
Three Factors of Authentication:
FactorDescriptionExamplesSomething You KnowInformation only you knowPassword, PINSomething You HavePhysical object you possessPhone, Smart card, Security tokenSomething You AreBiological characteristicsFingerprint, Face recognition, Voice
C. Software Updates
- Why? Updates fix security vulnerabilities
- What to update: Operating systems, applications, antivirus
- Best practice: Enable automatic updates
- Systems: Windows, Android, iOS, Linux
D. Firewalls
What is a Firewall?
A security system that monitors and controls network traffic based on predetermined security rules.
Types:
- Hardware Firewall – Physical device
- Software Firewall – Program on your computer
- Built-in Firewall – Windows Firewall, iOS Firewall
Function: Acts as a barrier between your device and the internet, blocking unauthorized access.
E. Antivirus Software
Purpose: Detects, prevents, and removes malware
Popular Antivirus Software:
- Kaspersky
- Norton 360
- Avast
- Windows Defender (built-in)
Features:
- Real-time scanning
- Automatic updates
- Quarantine for suspicious files
- System cleanup
5. Safe Web Browsing Techniques
A. Use Secure Connections
- Look for HTTPS (not HTTP) in URLs
- Check for padlock icon in address bar
- Use VPN (Virtual Private Network) for privacy
Examples: NordVPN, Proton VPN, Mozilla VPN
B. Use Secure Browsers
Features of secure browsers:
- Private browsing mode
- Tracking protection
- Ad-blocking
- Password management
Examples: Chrome, Firefox, Safari, Brave
C. Use Secure Search Engines
- Google – Most popular
- DuckDuckGo – Privacy-focused
- Bing – Microsoft's engine
Statistic: 65.76% of internet users use Google Chrome
D. Recognize Secure Websites
Indicators:
- HTTPS in URL
- Padlock symbol
- Valid SSL certificate
- Professional design
- Clear privacy policy
6. Concept of Digital Citizen
What is a Digital Citizen?
A person who uses digital technology responsibly, ethically, and effectively to participate in society.
Characteristics of Good Digital Citizens:
- Think before posting online
- Protect personal information
- Use multiple search engines to limit tracking
- Change passwords regularly
- Report illegal or inappropriate content
- Respect others' digital property
- Contribute positively to online communities
7. Concept of Netiquette and Online Behaviors
What is Netiquette?
Network + Etiquette = Rules for polite and respectful online behavior
Netiquette Guidelines:
Do'sDon'tsBe respectful in communicationUse offensive languageRespect others' privacyShare personal information without consentGive credit for shared workPlagiarize others' contentThink before postingPost impulsively or emotionallyReport abusive behaviorEngage in cyberbullyingBe open to criticismReact defensively to feedbackMaintain positive online presenceSpread negativity or hate
Remember:
"The same manners you use in person should be used online."
8. Digital Footprint and Online Privacy
What is Digital Footprint?
The trail of data you create while using the internet. Also called "Digital Shadow" or "Electronic Footprint."
Types of Digital Footprints:
TypeDescriptionExamplesActive FootprintData you intentionally shareSocial media posts, emails, online formsPassive FootprintData collected without your knowledgeSearch history, location data, cookies
Advantages of Digital Footprint:
AdvantageExplanationHealth MonitoringWearables track fitness dataSocial ConnectionsHelps build relationships onlineTargeted AdvertisingRelevant ads based on interestsLaw EnforcementHelps in investigations
Disadvantages of Digital Footprint:
DisadvantageExplanationSecurity RisksHackers can track activitiesPrivacy IssuesPersonal data can be misusedExploitative PracticesCompanies sell user dataCriminal ExploitationFraud, identity theftOnline AbuseStalking, harassment
Protecting Your Digital Footprint:
ActionPurposeReview privacy settingsControl what others seeDelete old accountsReduce exposureUse strong passwordsPrevent unauthorized accessDisable location trackingProtect physical locationRegular software updatesFix security vulnerabilitiesThink before postingControl active footprint
Incognito/Private Browsing:
- What it does: Doesn't save browsing history, cookies, or form data
- What it doesn't do: Doesn't make you anonymous to websites or ISP
- Shortcut: Ctrl + Shift + N (Windows), Cmd + Shift + N (Mac)
9. Practical Activities and Safety Measures
Activity 1: Using Antivirus and Firewall
Steps:
- Open antivirus software
- Run a quick scan
- Update virus definitions
- Check firewall settings
- Configure basic rules
Activity 2: Safe Browsing Practice
Checklist:
- Browser updated
- HTTPS used
- Pop-ups blocked
- Cookies cleared regularly
- Strong passwords used
Activity 3: Digital Footprint Analysis
What to track:
- Email addresses used
- Social media usernames
- Devices regularly used
- Online accounts created
Activity 4: Password Strength Test
Create passwords that:
- Are at least 12 characters long
- Mix character types
- Are unique for each account
- Are changed every 3-6 months
10. Important Legal Information
Electronic Transaction Act (ETA), 2063:
- Section 47: Punishment for publishing illegal material
- Maximum penalty: ₹1 lakh fine and/or 5 years imprisonment
- What's illegal: Material against morals, hate speech, harassment
Where to Report Cybercrime in Nepal:
- Cyber Bureau of Nepal Police
- Local police stations
- Online portal: www.nepalpolice.gov.np
11. Key Terms and Definitions
TermDefinitionCybersecurityProtection of digital systems and dataCybercrimeIllegal activities using computersMalwareMalicious software (viruses, ransomware)PhishingFake attempts to steal sensitive informationFirewallSecurity barrier between network and internetDigital FootprintTrail of data left onlineNetiquetteRules for polite online behaviorDigital CitizenResponsible user of digital technologyMFAMulti-Factor AuthenticationETAElectronic Transaction Act
12. Safety Checklist for Students
Daily Practices:
✅ Use strong, unique passwords
✅ Enable MFA where possible
✅ Keep software updated
✅ Think before clicking links
✅ Verify website security (HTTPS)
✅ Log out of shared computers
✅ Backup important data regularly
Social Media Safety:
✅ Adjust privacy settings
✅ Don't share personal information
✅ Be selective about friend requests
✅ Report inappropriate content
✅ Take regular digital breaks
When in Doubt:
✅ Ask a trusted adult
✅ Research before sharing
✅ Verify information sources
✅ Report suspicious activities
13. Cyber Hygiene Tips
Daily: Clear browsing history, check for updates
Weekly: Change passwords, backup data
Monthly: Review privacy settings, check account activity
Yearly: Audit online accounts, delete unused ones
14. The Golden Rules of Digital Citizenship
Protect Yourself – Use security measures
Respect Others – Practice netiquette
Protect Others – Report abuse
Protect Property – Respect copyright
Stay Informed – Keep learning about digital safety