Page 411 - Computer Science Class 11 With Functions
P. 411

Let's Summarise


              Ø   A digital footprint is a trail of personal data that one leaves behind while using the Internet.

              Ø   The information you leave willingly is known as an active digital footprint.
              Ø   The information that companies collect without your knowledge or approval is known as a passive digital
                  footprint.
              Ø   Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information
                  (such as a password or private files) or damage the system or network.

              Ø   When someone steals your personal information to commit fraud, it is known as identity theft.
              Ø   Phishing is the act of sending a user a phoney email purporting to be from a trustworthy, well-known source,
                  like a bank or a government agency.
              Ø   Attacks that steal data being transmitted over a communication channel are known as eavesdropping.
              Ø   Trolls are comments or posts that insult or defame other users or their content.

              Ø   When a victim is bullied online, on social media, or in gaming communities, that is known as cyberbullying.
              Ø   Spam is unsolicited junk mail that is typically sent in bulk for advertising purposes.
              Ø   A Denial of Service, or DOS, attack renders a machine or network resource unavailable either temporarily or
                  permanently to its intended users.
              Ø   Malware is a program that aims to harm a computer, server, client, or computer network.

              Ø   A virus is a piece of software code that can damage your system by replacing or messing up the system
                  files.
              Ø   The boot sector virus is a virus that affects the boot sector of disks. It gets activated when the drive is started
                  (booted up).
              Ø   File infectors are viruses that attach themselves to executable files by overwriting a part of their code or
                  appending their code to the files.
              Ø   Macroviruses embed themselves in documents. A macro refers to specific instructions within an application.

              Ø   Macroviruses are executable files that may be received as email attachments.
              Ø   A Trojan horse is malware that presents itself as a desirable and helpful program but actually causes harm to
                  the system.
              Ø   A worm is a malicious program that replicates itself. So, a networked device could have several copies of a
                  worm infecting many files.

              Ø   Spyware secretly collects information from a system.
              Ø   Adware is software that displays advertisements to users of the Internet and mobile applications.
              Ø   Ransomware is a type of malicious software that holds data or devices hostage for a ransom.
              Ø   In incognito or private browsing mode, the browser does not store your browsing history or cookies.

              Ø   When you visit a website, it may store small pieces of text called cookies so that it can keep track of the users’
                  preferences and provide the users with a more satisfying experience.

              Ø   A firewall is a piece of hardware, software, or a combination of both that prevents unwanted access to a
                  network.
              Ø   While entering any sensitive personal information on a website, look for HTTPS in the address bar to make
                  sure your data is encrypted.




                                                                                          Society, Law and Ethics  409
   406   407   408   409   410   411   412   413   414   415   416