Page 80 - PlusGPT_V2.1_C1_Flipbook
P. 80
It is important to remember that data once shared over the Internet is rarely deleted completely.
Cyber criminals use this data unethically to trouble their victims.
Let us discuss some of the most commonly used ways to commit cyber crimes.
E-mail Account Hacking
It is another common method used by cybercriminals to trouble victims. Using malware or other tricks
to obtain your e-mail ID and password, cybercriminals can gain access to your critical information like
social media accounts, bank accounts, etc.
Cybercriminals may also send offensive emails to a victim’s contacts via hacking the e-mail. But not
all hacking is destructive in nature. Some hackers use this technique for national security, creating
safer systems, etc. This is known as ethical hacking.
Tech Fact
Cracking refers to the act of breaking into systems to steal or destroy data. Crackers may
disturb applications by using malware or changing the program of the applications.
Measures to Avoid Hacking
To prevent unauthorised access to your computer and Internet, we can take the following measures:
• Keep a password for your Wi-Fi connection and computer.
• Keep changing your passwords.
• Keep updating your operating system.
• Don’t plug in to devices you are not sure about.
• Always look at the green lock sign at the address bar of the window before
accessing any website that states that the site you are visiting is secure.
• Always download Trusted Apps from Internet and check permissions and authentication.
Cyber Bullying
Cyber Bullying refers to the use of Internet, e-mail, instant messaging, chat rooms or social networks,
such as Facebook, Twitter, etc. to harass, demean, embarrass or intimidate someone else.
Measures to Prevent Cyber Bullying INSULTS
• Remember never to share personal details such as age, address, date of LIES HARASS THREATS
birth, etc. with unknown people on social media. RUMOURS
• Restrict the access to your personal data on social media platforms. For
example, only your friends must be able to see any pictures on Facebook.
• Try avoiding friend requests from unknown people on social media.
78 Premium Edition-VI

