Differentiating safe and unsafe usage of Internet
                                
                                    View
                                
                    
            Below is a table that will guide you towards positive and safe internet user.
Comparison: Protected vs. Unprotected Online User
| Aspect | Protected User | Unprotected User | 
|---|---|---|
| 1. Passwords | Uses strong, unique passwords and updates them regularly. | Reuses weak passwords that are easy to guess. | 
| 2. Device Security | Keeps antivirus software and system updates active. | Ignores updates and lacks security software. | 
| 3. Online Accounts | Enables two-factor authentication (2FA) for accounts. | Relies only on a single password for login. | 
| 4. Awareness | Can identify phishing emails, scams, and fake websites. | Falls victim to fraudulent emails or websites. | 
| 5. Social Media | Shares minimal personal information and sets privacy controls. | Overshares personal details without privacy settings. | 
| 6. Online Communication | Engages respectfully and reports cyberbullying or harassment. | Easily becomes a target or participant in online harassment. | 
| 7. Data Backup | Regularly backs up important files on secure platforms. | Loses files permanently after malware or system failure. | 
| 8. Digital Citizenship | Models safe and ethical internet use to learners. | Demonstrates careless or unsafe digital behavior. | 
Last modified: Wednesday, 22 October 2025, 9:26 AM