Page 396 - Computer Science Class 11 With Functions
P. 396

2.  Respond to messages promptly.
        3.  Respect the privacy of all users.

        4.  Do not accept friend requests/invites from unknown people without verifying their profiles.
        5.  Use polite language while responding. However, it is fine to click the like or dislike icon.
        6.  Tagging a friend or acquaintance without their consent on social media is impolite. You should tag only those
           persons who are agreeable to tagging.


                 1.  Identify the following social networking platforms:

                   a.


                   b.


                   c.

                   d.

                 2.  Which of the following is an appropriate social networking etiquette.
                   a. Respect the privacy of all users.
                   b. Accept all friend requests.
                   c. Use all capital letters for commenting a picture.
                   d. Tag any friend known to you.



        15.3 Cyber Threats

        We know that the Internet has become an important medium to communicate and share resources. However, the
        information exchanged via the Internet is vulnerable to attacks such as:
        ● Interruption - Network service is made unavailable to the legitimate user.
        ● Fabrication - Illegitimate information is inserted along with authentic data.
        ● Modification - Changing, inserting, and/or deleting information.
        ● Interception - Unauthorised user gains access to private information.
        Hacking, eavesdropping, phishing, illegal downloads, child pornography, banking scams, and other types of fraud are
        being reported more and more often, which is scary.  To guard against these attacks, we must know how to stay safe
        while using the Internet. We will now discuss some of the online threats and a set of measures to promote cyber
        safety, i.e., safe Internet use.

        15.3.1 Hacking
        Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information (such
        as a password or private files) or damage the system or network. A hacker identifies the vulnerabilities of the system
        in order to achieve this. Hackers may be motivated by their own vested interests, or they may act for fun, or as a form
        of protest. There are two types of hackers: "good hackers (white hat hackers) and bad hackers (black hat hackers)". A
        bad hacker breaks into the system to do something bad, while a good hacker tries to break into the system to find its
        weaknesses so they can be fixed. Whereas good hackers are called ethical hackers, bad (unethical) hackers are called
        crackers.





         394   Touchpad Computer Science-XI
   391   392   393   394   395   396   397   398   399   400   401