Page 73 - TechPluse_C8_Flipbook
P. 73

Some organizations actually employ computer hackers as part of their technical support staff.

                 These individuals use their skills to find flaws in the company’s security system so that they can
                 be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft
                 and other serious computer-related crimes.
                 Cracking

                 The process or stealing personal information, changing financial data, breaking security systems
                 to gain unauthorised access of computer systems  is called cracking. The persons who involved
                 in the process of cracking are called crackers.

                 Software cracking is considered illegal and cracked software is often called pirated software.
                     CYBER SECURITY

                 Security is an important issue for all modern information systems. The process of protecting

                 computer resources such as networks, devices, programs, and data from unauthorised access,
                 damage, or attack is called cyber security.
                 Confidential data and privacy must be safe guarded, and the system must be protected against
                 malicious acts of theft or disruption. Unfortunately, the number of cyber crime is on rise around
                 the world. The various reasons for increased cyber crimes are:

                    Increasing use of Internet                Lack of awareness              Multi-pronged attacks

                    Existing loopholes in software            Untrained Internet users

                        Restart


                       Internet is a global network accessible from all over the world.
                       Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.

                      Technique of watching the person while talking to him is called video conferencing.
                      The most common and popular VoIP services used are Skype and GoogleTalk.
                      Online chat refers to a communication in the form of small  messages  among the
                      computers over the Internet.
                      Social networking service is a platform where people with common interest or activities
                      can connect with each other.

                      In order to avoid misunderstanding in online communication, various rules have been
                      designed which are called Netiquettes.
                      Cloud storage is a service where the users are able to store and manage data on remote
                      server in place of their local computer.

                      Cyber threat is a criminal activity in which computers are used to damage data, steal
                      data, or disrupt digital life of a person.
                      The process of protecting computer resources such as networks, devices, programs, and
                      data from unauthorised access, damage, or attack is called cyber security.





                                                                             Internet Services and Cyber Crime        71
   68   69   70   71   72   73   74   75   76   77   78