Page 61 - KEC Khaitan C6 Flipbook
P. 61

PHISHING
                 Phishing is the illegal practice of obtaining sensitive information through e-mails. The criminals

                 try to get information like user name, password and credit card details from us through e-mails.
                 People  with malicious  intentions  usually  fake their identity  and pose  as a known contact  or
                 organisation.
                 They send e-mails from legitimate-looking

                 websites  with genuine-looking  offers, rewards
                 or concerns as attachments. If opened, it installs
                 malware in our system or directs us to a website
                 for entering our sensitive information.

                 Following are some tips to avoid phishing:
                    Do not  open e-mails  without  verifying the
                   source.

                    Do not share your personal information via e-mails. It must be shared only via smartphone or
                   a secure website.





                                                                   PLAGIARISM

                                                                   Plagiarism is the act of copying information from
                                                                   the Internet and using it in one’s projects or work
                                                                   without  crediting  the  original  creator.  Collins
                                                                   Dictionary defines plagiarism as the practice of
                                                                   using someone else’s work and pretending that it
                                                                   is your own. It is considered academic dishonesty
                                                                   and literary theft.

                 Following are some tips to avoid plagiarism:

                    Do not copy someone else’s work.

                    Do not submit someone’s work without the permission of the contributors involved.
                    Do not keep the same structure of someone else’s work and only modify the text.


                                          1.   What are the trail or records we leave behind after surfing the Internet
                                             called?
                                             ______________________________________________________________
                         uiz    Bee       2.   What is the illegal practice of obtaining sensitive information through
                                             e-mails?
                                             ______________________________________________________________









                                                                                                   Cyber Security  59
   56   57   58   59   60   61   62   63   64   65   66