Differentiating safe and unsafe usage of Internet
View
Below is a table that will guide you towards positive and safe internet user.
Comparison: Protected vs. Unprotected Online User
| Aspect | Protected User | Unprotected User |
|---|---|---|
| 1. Passwords | Uses strong, unique passwords and updates them regularly. | Reuses weak passwords that are easy to guess. |
| 2. Device Security | Keeps antivirus software and system updates active. | Ignores updates and lacks security software. |
| 3. Online Accounts | Enables two-factor authentication (2FA) for accounts. | Relies only on a single password for login. |
| 4. Awareness | Can identify phishing emails, scams, and fake websites. | Falls victim to fraudulent emails or websites. |
| 5. Social Media | Shares minimal personal information and sets privacy controls. | Overshares personal details without privacy settings. |
| 6. Online Communication | Engages respectfully and reports cyberbullying or harassment. | Easily becomes a target or participant in online harassment. |
| 7. Data Backup | Regularly backs up important files on secure platforms. | Loses files permanently after malware or system failure. |
| 8. Digital Citizenship | Models safe and ethical internet use to learners. | Demonstrates careless or unsafe digital behavior. |
Last modified: Wednesday, 22 October 2025, 9:26 AM