Page 47 - 2611_SmartGPT Pro V(5.0) C-7
P. 47

They choke the Internet and waste our time. Stopping these spam e-mails is difficult, but there are
 many services available on the Internet which can prevent spammers from sending these e-mails.
                                                                   PLAGIARISM
 Following are some tips to avoid spams:                           Plagiarism is the act of copying information from
   Avoid sharing your e-mail id with everyone.                     the Internet and using it in one’s projects or work

    Set up filters to scan your e-mails and segregate spam or junk e-mails into a separate folder.  without  crediting  the  original  creator.  Collins
   Never revert to any spam e-mail.                                Dictionary defines plagiarism as the practice of
                                                                   using someone else’s work and pretending that it
                                                                   is your own. It is considered academic dishonesty
                                                                   and literary theft.
 What is the name of the first hacker?
                 Following are some tips to avoid plagiarism:

 HACKING            Do not copy someone else’s work.

 Hacking  is the act  of intruding  into  a computer      Do not submit someone’s work without the permission of the contributors involved.
 system  for  harmful  purposes  by  identifying  the      Do not keep the same structure of someone else’s work and only modify the text.
 technical weak points of the security system using
 smart programming solutions. The person involved   1.   What are the trail or records we leave behind after surfing the Internet
                                             called?
 in these activities is called a hacker.     ______________________________________________________________

 Following are some tips to avoid hacking:  uiz  Bee  2.   What is the illegal practice of obtaining sensitive information through
                                                             21 st
                                                                #Initiative
    Update  your  operating  system,  web  browser   e-mails?  Century
                                                            Skills
                                             ______________________________________________________________
 and anti-virus.
    Install a firewall on your computer as it does not allow hackers and viruses to get attached to
 your computer.  SOFTWARE PIRACY
                 Software piracy is the unauthorised copying or stealing of software, movies, music and making
 PHISHING        these copies available on the Internet. Every software has a license. When we buy a software, we

 Phishing is the illegal practice of obtaining sensitive information through e-mails. The criminals   become an authorised user of that software.
 try to get information like user name, password and credit card details from us through e-mails.   But, if we make copies of the software and give it to others to use, then it is against the law. There
 People  with malicious  intentions  usually  fake their identity  and pose  as a known contact  or   are different types of software piracy including borrowing and installing a copy of the software
 organisation.   from someone, installing and selling unauthorised copies of the software, duplicating and selling

 They send e-mails from legitimate-looking   copyrighted programs and downloading illegal software from the Internet.
 websites  with genuine-looking  offers, rewards   Following are some tips to avoid software piracy:
 or concerns as attachments. If opened, it installs      Do not download any software without license.
 malware in our system or directs us to a website      Register yourself on the company’s official website before using the software.
 for entering our sensitive information.

 Following are some tips to avoid phishing:   INTELLECTUAL PROPERTY RIGHTS

    Do not  open e-mails  without  verifying the   The property that arises from human intelligence is called intellectual property. It includes  creations
 source.         of the mind like books, paintings, music compositions, movies, video games, software, etc.

    Do not share your personal information via e-mails. It must be shared only via smartphone or   Intellectual Property Rights are the exclusive rights given by the government to the owners of
 a secure website.  intellectual creations. We can protect our creations by creating copyrights on them.



                                                                                                   Cyber Security  45
   42   43   44   45   46   47   48   49   50   51   52