Page 131 - ConceptGP_C7_Fb
P. 131

They choke the Internet and waste our time. Stopping these spam e-mails are difficult but there are
                 many services available on the Internet which can prevent spammers from sending these e-mails.

                 Following are some tips to avoid spams:
                   Avoid sharing your e-mail id with everyone.

                     Set up filters to scan your e-mails and               Name of the first hacker
                   segregate spam or junk e-mails into a
                   separate folder.

                   Never revert to any spam e-mail.

                 HACKING

                 Hacking is the act of intruding into a computer
                 system  for harmful purposes  by  identifying  the
                 technical  weak points  of the security  system
                 using smart programming solutions. The person
                 involved in these activities is called a hacker.




                 Following are some tips to avoid hacking:

                    Update  your operating  system,  web
                   browser and anti-virus.                        “You  should change your  passwords
                                                                  regularly. Same  password  should  not  be
                    Install a firewall on your computer as it     kept for more than one account.”
                   does not allow hackers and viruses to                                     -Mr. Techie
                   get attached to your computer.


                 PHISHING
                 Phishing is the illegal practice of obtaining sensitive information through e-mails. The criminals
                 try to get information like user name, password and credit card details from us through e-mails.
                 People  with malicious  intentions  usually  fake their identity  and pose  as a known contact  or
                 organisation.

                 They send e-mails from legitimate-looking
                 websites  with genuine-looking  offers, rewards
                 or concerns as attachments. If opened, it installs

                 malware in our system or directs us to a website
                 for entering our sensitive information.
                 Following are some tips to avoid phishing:

                    Do not  open e-mails  without  verifying the
                   source.

                    Do not share your personal information via e-mails. It must be shared only via smartphone or
                   a secure website.


                                                                                                   Cyber Security  129
   126   127   128   129   130   131   132   133   134   135   136