尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
SOCIETY, LAW AND ETHICS
CLASS XII PYTHON
IDENTITY THEFT
Identity Theft
यह तब होता है जब कोई व्यक्तत हमारी पहचान या व्यक्ततगत जानकारी
जैसे कक हमारा नाम, हमारा लाइसेंस, या हमारी अद्वितीय संख्या को बबना
अपराध या धोखाधडी की अनुमतत के चुराता है।
Meaning in Hindi
It occurs when someone steal our identity or personal information such
as our name, our license, or our Unique number without our permission
to commit a crime or fraud.
most common ways identity thieves get hold of our data:
1. Data Breaches: A data breach happens when someone gains access to an
organization's data without authorization.
एक डेटा ब्रीच तब होता है जब कोई प्राधिकरण के बबना ककसी संगठन के डेटा तक पहंच
प्राप्त करता है
2. Unsecure Browsing: if you share any information on an unsecure website
or a website that's been compromised by hackers you could be putting
your sensitive information directly in the hands of a thief.
यदि आप ककसी असरक्षित वेबसाइट या हैकसस द्वारा समझौता की गई वेबसाइट पर
कोई भी जानकारी साझा करते हैं, तो आप सीिे चोर के हाथों में अपनी संवेिनशील
जानकारी डाल सकते हैं।
most common ways identity thieves get hold of our data:
3. Dark Web Marketplaces: The dark web is often where your personally
identifying information ends up after it's been stolen. Hackers may not
necessarily be stealing your information to use it for themselves, but
will instead choose to sell it to others
डाकस वेब अक्सर वह जगह होती है जहां आपकी व्यक्क्तगत पहचान की जानकारी
चोरी होने के बाि समाप्त हो जाती है। हैकसस जरूरी नहीं कक आपकी जानकारी को
अपने ललए इस्तेमाल करने के ललए चरा रहे हों, बक्कक इसे िूसरों को बेचना पसंि
करेंगे।
4. Malware Activity: Malware is malicious software that's designed to steal
your data or spy on your computer activity without you knowing.
मैलवेयर एक िभासवनापूणस सॉफ़्टवेयर है क्जसे आपके कं प्यूटर गततववधि पर आपके
डेटा या जासूसी को चोरी करने के ललए डडजाइन ककया गया है, क्जसे आप जाने बबना।
most common ways identity thieves get hold of our data:
5. Credit Card Theft: One of the simplest forms of identity theft is credit card
theft. If a thief can gain access to your credit card information, they can
use it to make unauthorized purchases.
पहचान की चोरी के सबसे सरल रूपों में से एक क्रे डडट काडस चोरी है। यदि कोई चोर आपके
क्रे डडट काडस की जानकारी तक पहंच प्राप्त कर सकता है, तो वे इसका उपयोग अनधिकृ त
खरीिारी करने के ललए कर सकते हैं
6. Phishing and Spam Attacks: Some scammers use email and text
messages and other forms of electronic communication to steal your
sensitive information. The message often looks like it's coming from a
reputable source and asks victims to give up one or more types of
information.
कछ स्कै मर आपकी संवेिनशील जानकारी को चराने के ललए ईमेल और पाठ संिेश और
इलेक्रॉतनक संचार के अन्य रूपों का उपयोग करते हैं। संिेश अक्सर ऐसा लगता है जैसे
यह एक सम्मातनत स्रोत से आ रहा है और पीड़ितों को एक या अधिक प्रकार की
जानकारी िेने के ललए कहता है।
How to protect identity online:
1. Protect your computer and smartphone with strong, up-to-date security
software.
अपने कं प्यूटर और स्माटसफोन को मजबूत, अप-टू-डेट सरिा सॉफ़्टवेयर के साथ सरक्षित
रखें।
2. Learn to spot spam and scams.
स्पैम और घोटाले िेखना सीखें।
3. Use strong passwords
मजबूत पासवडस का उपयोग करें
4. Freeze your credit
अपने क्रे डडट को फ्रीज करें
5. Only use reputable websites when making purchases
खरीिारी करते समय के वल सम्मातनत वेबसाइटों का उपयोग करें
Biometrics
Biometrics are physical or behavioral human characteristics to that can be used
to digitally identify a person to grant access to systems, devices or data.
Types of biometrics
Fingerprints
Photo and video
Facial recognition
Voice
Signature
DNA
बॉयोमीदरक्स भौततक या व्यवहार संबंिी मानवीय ववशेषताएं हैं क्जनका उपयोग ककसी
व्यक्क्त को लसस्टम, डडवाइस या डेटा तक पहंच प्रिान करने के ललए डडक्जटल रूप से पहचान
करने के ललए ककया जा सकता है।
Unique ID
It is a numeric or alphanumeric string that is associated with a single entity
within a given system. UIDs make it possible to address that entity, so that it can
be accessed and interacted with.
यह एक संख्यात्मक या अकफान्यूमेररक क्स्रंग है जो ककसी दिए गए लसस्टम के भीतर एकल
इकाई से ज़िा होता है। यूआईडी उस इकाई को संबोधित करना संभव बनाता है, ताकक इसे
एक्सेस ककया जा सके और इसके साथ बातचीत की जा सके ।

More Related Content

What's hot

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
JIJO CLEETUS
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Naveen Sihag
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
AnupmaMunshi
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
Yäsh Chaudhary
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
PranaviVerma
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
RoshiniVijayakumar1
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
Shahbaz Khan
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 

What's hot (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from vikram mahendra

Communication skill
Communication skillCommunication skill
Communication skill
vikram mahendra
 
Python Project On Cosmetic Shop system
Python Project On Cosmetic Shop systemPython Project On Cosmetic Shop system
Python Project On Cosmetic Shop system
vikram mahendra
 
Python Project on Computer Shop
Python Project on Computer ShopPython Project on Computer Shop
Python Project on Computer Shop
vikram mahendra
 
PYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEMPYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEM
vikram mahendra
 
BOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in PythonBOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in Python
vikram mahendra
 
FLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHONFLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHON
vikram mahendra
 
FLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHONFLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHON
vikram mahendra
 
FLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHONFLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHON
vikram mahendra
 
OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1
vikram mahendra
 
OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2
vikram mahendra
 
USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2
vikram mahendra
 
DATA TYPE IN PYTHON
DATA TYPE IN PYTHONDATA TYPE IN PYTHON
DATA TYPE IN PYTHON
vikram mahendra
 
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
vikram mahendra
 
USER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHONUSER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHON
vikram mahendra
 
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
vikram mahendra
 
INTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHONINTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHON
vikram mahendra
 
Python Introduction
Python IntroductionPython Introduction
Python Introduction
vikram mahendra
 
GREEN SKILL[PART-2]
GREEN SKILL[PART-2]GREEN SKILL[PART-2]
GREEN SKILL[PART-2]
vikram mahendra
 
GREEN SKILLS[PART-1]
GREEN SKILLS[PART-1]GREEN SKILLS[PART-1]
GREEN SKILLS[PART-1]
vikram mahendra
 
Dictionary in python
Dictionary in pythonDictionary in python
Dictionary in python
vikram mahendra
 

More from vikram mahendra (20)

Communication skill
Communication skillCommunication skill
Communication skill
 
Python Project On Cosmetic Shop system
Python Project On Cosmetic Shop systemPython Project On Cosmetic Shop system
Python Project On Cosmetic Shop system
 
Python Project on Computer Shop
Python Project on Computer ShopPython Project on Computer Shop
Python Project on Computer Shop
 
PYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEMPYTHON PROJECT ON CARSHOP SYSTEM
PYTHON PROJECT ON CARSHOP SYSTEM
 
BOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in PythonBOOK SHOP SYSTEM Project in Python
BOOK SHOP SYSTEM Project in Python
 
FLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHONFLOW OF CONTROL-NESTED IFS IN PYTHON
FLOW OF CONTROL-NESTED IFS IN PYTHON
 
FLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHONFLOWOFCONTROL-IF..ELSE PYTHON
FLOWOFCONTROL-IF..ELSE PYTHON
 
FLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHONFLOW OF CONTROL-INTRO PYTHON
FLOW OF CONTROL-INTRO PYTHON
 
OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1OPERATOR IN PYTHON-PART1
OPERATOR IN PYTHON-PART1
 
OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2OPERATOR IN PYTHON-PART2
OPERATOR IN PYTHON-PART2
 
USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2USE OF PRINT IN PYTHON PART 2
USE OF PRINT IN PYTHON PART 2
 
DATA TYPE IN PYTHON
DATA TYPE IN PYTHONDATA TYPE IN PYTHON
DATA TYPE IN PYTHON
 
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
USER DEFINE FUNCTIONS IN PYTHON[WITH PARAMETERS]
 
USER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHONUSER DEFINE FUNCTIONS IN PYTHON
USER DEFINE FUNCTIONS IN PYTHON
 
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]FUNCTIONS IN PYTHON[RANDOM FUNCTION]
FUNCTIONS IN PYTHON[RANDOM FUNCTION]
 
INTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHONINTRODUCTION TO FUNCTIONS IN PYTHON
INTRODUCTION TO FUNCTIONS IN PYTHON
 
Python Introduction
Python IntroductionPython Introduction
Python Introduction
 
GREEN SKILL[PART-2]
GREEN SKILL[PART-2]GREEN SKILL[PART-2]
GREEN SKILL[PART-2]
 
GREEN SKILLS[PART-1]
GREEN SKILLS[PART-1]GREEN SKILLS[PART-1]
GREEN SKILLS[PART-1]
 
Dictionary in python
Dictionary in pythonDictionary in python
Dictionary in python
 

Recently uploaded

PORTFOLIO class 10 Hindi . I hope it will be usefull
PORTFOLIO class 10 Hindi . I hope it will be usefullPORTFOLIO class 10 Hindi . I hope it will be usefull
PORTFOLIO class 10 Hindi . I hope it will be usefull
pranavsawarbandhe24
 
Understanding Honorary Doctorate in Hindi - Eduminds Learning
Understanding Honorary Doctorate in Hindi - Eduminds LearningUnderstanding Honorary Doctorate in Hindi - Eduminds Learning
Understanding Honorary Doctorate in Hindi - Eduminds Learning
Eduminds Learning
 
Advanced English Structures. .pdf
Advanced English Structures.          .pdfAdvanced English Structures.          .pdf
Advanced English Structures. .pdf
sukhchainkukeyala
 
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESHTHE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
142rakeshraj142
 
Art Intergrated Project of Odisha in Hindi
Art Intergrated Project of Odisha  in HindiArt Intergrated Project of Odisha  in Hindi
Art Intergrated Project of Odisha in Hindi
joe S
 
Pinnacle TCS GK Hindi for Competitions.pdf
Pinnacle TCS GK Hindi for Competitions.pdfPinnacle TCS GK Hindi for Competitions.pdf
Pinnacle TCS GK Hindi for Competitions.pdf
Yuvraj Singh
 

Recently uploaded (6)

PORTFOLIO class 10 Hindi . I hope it will be usefull
PORTFOLIO class 10 Hindi . I hope it will be usefullPORTFOLIO class 10 Hindi . I hope it will be usefull
PORTFOLIO class 10 Hindi . I hope it will be usefull
 
Understanding Honorary Doctorate in Hindi - Eduminds Learning
Understanding Honorary Doctorate in Hindi - Eduminds LearningUnderstanding Honorary Doctorate in Hindi - Eduminds Learning
Understanding Honorary Doctorate in Hindi - Eduminds Learning
 
Advanced English Structures. .pdf
Advanced English Structures.          .pdfAdvanced English Structures.          .pdf
Advanced English Structures. .pdf
 
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESHTHE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
THE HIDDEN HINDU PART_3 HINDI DOWNLOAD BY MR_RAKESH
 
Art Intergrated Project of Odisha in Hindi
Art Intergrated Project of Odisha  in HindiArt Intergrated Project of Odisha  in Hindi
Art Intergrated Project of Odisha in Hindi
 
Pinnacle TCS GK Hindi for Competitions.pdf
Pinnacle TCS GK Hindi for Competitions.pdfPinnacle TCS GK Hindi for Competitions.pdf
Pinnacle TCS GK Hindi for Competitions.pdf
 

Society, law and ethics identitytheft

  • 1. SOCIETY, LAW AND ETHICS CLASS XII PYTHON IDENTITY THEFT
  • 2. Identity Theft यह तब होता है जब कोई व्यक्तत हमारी पहचान या व्यक्ततगत जानकारी जैसे कक हमारा नाम, हमारा लाइसेंस, या हमारी अद्वितीय संख्या को बबना अपराध या धोखाधडी की अनुमतत के चुराता है। Meaning in Hindi It occurs when someone steal our identity or personal information such as our name, our license, or our Unique number without our permission to commit a crime or fraud.
  • 3. most common ways identity thieves get hold of our data: 1. Data Breaches: A data breach happens when someone gains access to an organization's data without authorization. एक डेटा ब्रीच तब होता है जब कोई प्राधिकरण के बबना ककसी संगठन के डेटा तक पहंच प्राप्त करता है 2. Unsecure Browsing: if you share any information on an unsecure website or a website that's been compromised by hackers you could be putting your sensitive information directly in the hands of a thief. यदि आप ककसी असरक्षित वेबसाइट या हैकसस द्वारा समझौता की गई वेबसाइट पर कोई भी जानकारी साझा करते हैं, तो आप सीिे चोर के हाथों में अपनी संवेिनशील जानकारी डाल सकते हैं।
  • 4. most common ways identity thieves get hold of our data: 3. Dark Web Marketplaces: The dark web is often where your personally identifying information ends up after it's been stolen. Hackers may not necessarily be stealing your information to use it for themselves, but will instead choose to sell it to others डाकस वेब अक्सर वह जगह होती है जहां आपकी व्यक्क्तगत पहचान की जानकारी चोरी होने के बाि समाप्त हो जाती है। हैकसस जरूरी नहीं कक आपकी जानकारी को अपने ललए इस्तेमाल करने के ललए चरा रहे हों, बक्कक इसे िूसरों को बेचना पसंि करेंगे। 4. Malware Activity: Malware is malicious software that's designed to steal your data or spy on your computer activity without you knowing. मैलवेयर एक िभासवनापूणस सॉफ़्टवेयर है क्जसे आपके कं प्यूटर गततववधि पर आपके डेटा या जासूसी को चोरी करने के ललए डडजाइन ककया गया है, क्जसे आप जाने बबना।
  • 5. most common ways identity thieves get hold of our data: 5. Credit Card Theft: One of the simplest forms of identity theft is credit card theft. If a thief can gain access to your credit card information, they can use it to make unauthorized purchases. पहचान की चोरी के सबसे सरल रूपों में से एक क्रे डडट काडस चोरी है। यदि कोई चोर आपके क्रे डडट काडस की जानकारी तक पहंच प्राप्त कर सकता है, तो वे इसका उपयोग अनधिकृ त खरीिारी करने के ललए कर सकते हैं 6. Phishing and Spam Attacks: Some scammers use email and text messages and other forms of electronic communication to steal your sensitive information. The message often looks like it's coming from a reputable source and asks victims to give up one or more types of information. कछ स्कै मर आपकी संवेिनशील जानकारी को चराने के ललए ईमेल और पाठ संिेश और इलेक्रॉतनक संचार के अन्य रूपों का उपयोग करते हैं। संिेश अक्सर ऐसा लगता है जैसे यह एक सम्मातनत स्रोत से आ रहा है और पीड़ितों को एक या अधिक प्रकार की जानकारी िेने के ललए कहता है।
  • 6. How to protect identity online: 1. Protect your computer and smartphone with strong, up-to-date security software. अपने कं प्यूटर और स्माटसफोन को मजबूत, अप-टू-डेट सरिा सॉफ़्टवेयर के साथ सरक्षित रखें। 2. Learn to spot spam and scams. स्पैम और घोटाले िेखना सीखें। 3. Use strong passwords मजबूत पासवडस का उपयोग करें 4. Freeze your credit अपने क्रे डडट को फ्रीज करें 5. Only use reputable websites when making purchases खरीिारी करते समय के वल सम्मातनत वेबसाइटों का उपयोग करें
  • 7. Biometrics Biometrics are physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data. Types of biometrics Fingerprints Photo and video Facial recognition Voice Signature DNA बॉयोमीदरक्स भौततक या व्यवहार संबंिी मानवीय ववशेषताएं हैं क्जनका उपयोग ककसी व्यक्क्त को लसस्टम, डडवाइस या डेटा तक पहंच प्रिान करने के ललए डडक्जटल रूप से पहचान करने के ललए ककया जा सकता है।
  • 8. Unique ID It is a numeric or alphanumeric string that is associated with a single entity within a given system. UIDs make it possible to address that entity, so that it can be accessed and interacted with. यह एक संख्यात्मक या अकफान्यूमेररक क्स्रंग है जो ककसी दिए गए लसस्टम के भीतर एकल इकाई से ज़िा होता है। यूआईडी उस इकाई को संबोधित करना संभव बनाता है, ताकक इसे एक्सेस ककया जा सके और इसके साथ बातचीत की जा सके ।
  翻译: