Page 396 - Computer Science Class 11 With Functions
P. 396
2. Respond to messages promptly.
3. Respect the privacy of all users.
4. Do not accept friend requests/invites from unknown people without verifying their profiles.
5. Use polite language while responding. However, it is fine to click the like or dislike icon.
6. Tagging a friend or acquaintance without their consent on social media is impolite. You should tag only those
persons who are agreeable to tagging.
1. Identify the following social networking platforms:
a.
b.
c.
d.
2. Which of the following is an appropriate social networking etiquette.
a. Respect the privacy of all users.
b. Accept all friend requests.
c. Use all capital letters for commenting a picture.
d. Tag any friend known to you.
15.3 Cyber Threats
We know that the Internet has become an important medium to communicate and share resources. However, the
information exchanged via the Internet is vulnerable to attacks such as:
● Interruption - Network service is made unavailable to the legitimate user.
● Fabrication - Illegitimate information is inserted along with authentic data.
● Modification - Changing, inserting, and/or deleting information.
● Interception - Unauthorised user gains access to private information.
Hacking, eavesdropping, phishing, illegal downloads, child pornography, banking scams, and other types of fraud are
being reported more and more often, which is scary. To guard against these attacks, we must know how to stay safe
while using the Internet. We will now discuss some of the online threats and a set of measures to promote cyber
safety, i.e., safe Internet use.
15.3.1 Hacking
Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information (such
as a password or private files) or damage the system or network. A hacker identifies the vulnerabilities of the system
in order to achieve this. Hackers may be motivated by their own vested interests, or they may act for fun, or as a form
of protest. There are two types of hackers: "good hackers (white hat hackers) and bad hackers (black hat hackers)". A
bad hacker breaks into the system to do something bad, while a good hacker tries to break into the system to find its
weaknesses so they can be fixed. Whereas good hackers are called ethical hackers, bad (unethical) hackers are called
crackers.
394 Touchpad Computer Science-XI

