Page 73 - TechPluse_C8_Flipbook
P. 73
Some organizations actually employ computer hackers as part of their technical support staff.
These individuals use their skills to find flaws in the company’s security system so that they can
be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft
and other serious computer-related crimes.
Cracking
The process or stealing personal information, changing financial data, breaking security systems
to gain unauthorised access of computer systems is called cracking. The persons who involved
in the process of cracking are called crackers.
Software cracking is considered illegal and cracked software is often called pirated software.
CYBER SECURITY
Security is an important issue for all modern information systems. The process of protecting
computer resources such as networks, devices, programs, and data from unauthorised access,
damage, or attack is called cyber security.
Confidential data and privacy must be safe guarded, and the system must be protected against
malicious acts of theft or disruption. Unfortunately, the number of cyber crime is on rise around
the world. The various reasons for increased cyber crimes are:
Increasing use of Internet Lack of awareness Multi-pronged attacks
Existing loopholes in software Untrained Internet users
Restart
Internet is a global network accessible from all over the world.
Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.
Technique of watching the person while talking to him is called video conferencing.
The most common and popular VoIP services used are Skype and GoogleTalk.
Online chat refers to a communication in the form of small messages among the
computers over the Internet.
Social networking service is a platform where people with common interest or activities
can connect with each other.
In order to avoid misunderstanding in online communication, various rules have been
designed which are called Netiquettes.
Cloud storage is a service where the users are able to store and manage data on remote
server in place of their local computer.
Cyber threat is a criminal activity in which computers are used to damage data, steal
data, or disrupt digital life of a person.
The process of protecting computer resources such as networks, devices, programs, and
data from unauthorised access, damage, or attack is called cyber security.
Internet Services and Cyber Crime 71

