Page 72 - TechPluse_C8_Flipbook
P. 72
Some common netiquettes are:
The subject of email must be in relation to the matter of the email.
Signatures in an email should be small and simple.
Avoid sending repeated mails just for publicity of the product or service.
Avoid typing in capital letters as typing in capitals is taken as shouting at the person.
While writing an email, the person(s) whom you want should answer must be marked in the ‘To:’
field. The persons marked in ‘Cc:’ field may or may not respond to the mail.
Avoid using “Reply to All” option when not necessary to answer everyone marked in the email.
Try to overlook the minor typing mistakes done by sender.
CYBER THREATS
Cyber threat is a criminal activity in which computers are used to damage data, steal data, or
disrupt digital life of a person. Most of the cyber threats are carried out in order to gain personal
profit. Some people break security only to check their skills.
Types of Cyber Threats
There are various types of cyber threats. Some of them are as follows:
Data Diddling
Refers to the process of changing the data going into or out of a computer. For example, a
student breaks into his/her university’s grade recording system and changes the grades he/she
earned in last semester’s or class, thus raising his/her grade point average.
Phreaking
This crime is committed against telephone companies by using computers with the goal of making
free distance calls, impersonating directory assistance or other operator services, diverting calls
to numbers of the perpetrator’s choice, or tapping phone lines.
Cloning
This refers to a fraud in which scanners are used to steal the electronic serial numbers of cellular
phones, which may used for billing purposes and making broadcast calls. With stolen serial numbers,
clones can be made to make free calls that are billed to the owner of the original cell phone.
Carding
This refers to the process of stealing credit card numbers online, to be resold or used to charge
merchandise against victim’s account.
Hacking
Computer hacking is the practice of modifying computer hardware and software to accomplish a
goal outside of the creator’s original purpose. People who engage in computer hacking activities
are often called hackers.
70 Premium Edition-VIII

