Page 90 - AI Ver 3.0 class 10_Flipbook
P. 90
Brainy Fact
20 to 50 million metric tons of e-waste are disposed worldwide every year. Only 12.5% of e-waste is
currently recycled.
Computer Security and Privacy
Computer security and privacy is about measures we can take to protect your computer, personal information, and
online activities from unauthorized access, cyber threats, and privacy breaches. For example To access your online
banking account, you use a combination of a strong password and a two-factor authentication (2FA) method, such
as receiving a verification code on your mobile device. In another example of a Health Information Management
System, used by healthcare providers, employs strict access controls. Only authorised personnel with unique login
credentials can access patient records.
Reasons for Security Break
Security break refers to the unauthorised access of sensitive information stored in a computer. Personal information
can be lost or leaked in two ways:
• We are not careful in giving out personal information over the Internet. For example, we share our account
details and passwords on unsecure sites.
• A person gets unauthorised access to our computer. This can happen in the office if we leave the computer
without logging out.
Threats to Computer
Threats refers to the potential risk or dangers in which personal information can be leaked from a computer
without our knowledge.
Some of the common threats to the computer are:
(a) Theft: Theft means stealing of information or sensitive or confidential data stored on a computer. These maybe
of three types:
• Physical: Where a person may steal your desktop computer or laptop.
• Identity: Where a hacker steals your personal information and assumes your identity. Using this false identity,
the hacker can gain access to your account information or perform illegal activity.
• Software Piracy: This is stealing of software and includes using or distributing unlicensed and unauthorised
copies of a computer program or software.
(b) Virus: Computer virus is a malicious code that attaches itself to a file and enters your computer system and
makes copies of itself and carries out the harmful tasks in such a way that it damages the important files of
an operating system or application programs or important data files due to which the computer may stop
working.
Major types of viruses are Worms and Trojan Horse.
• Worms: Computer worms are a type of malicious software or malware that can replicate and spread on their
own mainly across computer networks.
• Trojan Horse: This malicious software disguises itself as a useful software but is designed to carry out harmful
activities on a computer. The name "Trojan Horse" comes from the ancient Greek story of the wooden horse
used to infiltrate the city of Troy.
88 Touchpad Artificial Intelligence (Ver. 3.0)-X

