Page 345 - Computer Science Class 11 Without Functions
P. 345

2.  Respond to messages promptly.
            3.  Respect the privacy of all users.

            4.  Do not accept friend requests/invites from unknown people without verifying their profiles.
            5.  Use polite language while responding. However, it is fine to click the like or dislike icon.
            6.  Tagging a friend or acquaintance without their consent on social media is impolite. You should tag only those
               persons who are agreeable to tagging.


                     1.  Identify the following social networking platforms:

                       a.



                       b.


                       c.


                       d.

                     2.  Which of the following is an appropriate social networking etiquette?
                       a. Respect the privacy of all users.
                       b. Accept all friend requests.
                       c. Use all capital letters for commenting a picture.
                       d. Tag any friend known to you.




            14.3 Cyber Threats
            We know that the Internet has become an important medium to communicate and share resources. However, the
            information exchanged via the Internet is vulnerable to attacks such as:
            ● Interruption - Network service is made unavailable to the legitimate user.
            ● Fabrication - Illegitimate information is inserted along with authentic data.
            ● Modification - Changing, inserting, and/or deleting information.
            ● Interception - Unauthorised user gains access to private information.
            Hacking, eavesdropping, phishing, illegal downloads, child pornography, banking scams, and other types of fraud are
            being reported more and more often, which is scary.  To guard against these attacks, we must know how to stay safe
            while using the Internet. We will now discuss some of the online threats and a set of measures to promote cyber
            safety, i.e., safe Internet use.

            14.3.1 Hacking

            Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information (such
            as a password or private files) or damage the system or network. A hacker identifies the vulnerabilities of the system
            in order to achieve this. Hackers may be motivated by their own vested interests, or they may act for fun, or as a form
            of protest. There are two types of hackers: "good hackers (white hat hackers) and bad hackers (black hat hackers)". A
            bad hacker breaks into the system to do something bad, while a good hacker tries to break into the system to find its
            weaknesses so they can be fixed. Whereas good hackers are called ethical hackers, bad (unethical) hackers are called
            crackers.




                                                                                          Society, Law and Ethics  343
   340   341   342   343   344   345   346   347   348   349   350