Page 57 - PlusGPT_V2.1_C7_Flipbook
P. 57

Virus and Spam Attacks

                 Internet has also increased the cases of virus attacks. Users can lost their data and programs in
                 these virus attacks.


                 Loss of Personal Information

                 We share our personal information over the Internet that can be misused by cyber criminals to
                 harm you.
                 Let us now take a look at some of the unethical practices in the cyber world and some tips to
                 safeguard our personal data.



                       CYBER CRIMES


                 Cyber  crimes  are offences that  are committed
                 using  computers  and  smart  devices  connected
                 through the Internet. The victims of cyber crimes
                 can  be  organisations or individuals.  Most  of  the
                 cyber criminals use e-mails, social media websites
                 or pirated software as a medium to trouble their
                 victims.
                 It is important to remember that data once shared
                 over the Internet  is  rarely  deleted  completely.
                 Cyber criminals use this data unethically to trouble their victims.

                 Let us discuss some of the most commonly used ways to commit cyber crimes.

                      E-mail Spoofing
                 When someone sends e-mails  that  appear
                 genuine from a trusted e-mail ID but in reality
                 they're not to be trusted.

                 For example, a user may receive an e-mail from
                 a portal or social media platform where spelling
                 of service provider or email ID has been slightly
                 changed.

                 For example,
                 mailto:customersupport@tridentportall.com.

                 Notice that the spelling of "portall" is incorrect? These e-mails contain links which will direct
                 the user to another web page where the user would be asked to enter information by which
                 means the user ends up providing personal credentials to cybercriminals. This is also called as
                 phishing.






                                                                                                   Cyber Security  55
   52   53   54   55   56   57   58   59   60   61   62