Page 360 - Computer Science Class 11 Without Functions
P. 360

Let's Summarise


          Ø   A digital footprint is a trail of personal data that one leaves behind while using the Internet.

          Ø   The information you leave willingly is known as an active digital footprint.
          Ø   The information that companies collect without your knowledge or approval is known as a passive digital
              footprint.
          Ø   Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information
              (such as a password or private files) or damage the system or network.

          Ø   When someone steals your personal information to commit fraud, it is known as identity theft.
          Ø   Phishing is the act of sending a user a phoney email purporting to be from a trustworthy, well-known source,
              like a bank or a government agency.
          Ø   Attacks that steal data being transmitted over a communication channel are known as eavesdropping.
          Ø   Trolls are comments or posts that insult or defame other users or their content.

          Ø   When a victim is bullied online, on social media, or in gaming communities, that is known as cyberbullying.
          Ø   Spam is unsolicited junk mail that is typically sent in bulk for advertising purposes.
          Ø   A Denial of Service, or DOS, attack renders a machine or network resource unavailable either temporarily or
              permanently to its intended users.
          Ø   Malware is a program that aims to harm a computer, server, client, or computer network.

          Ø   A virus is a piece of software code that can damage your system by replacing or messing up the system
              files.
          Ø   The boot sector virus is a virus that affects the boot sector of disks. It gets activated when the drive is started
              (booted up).
          Ø   File infectors are viruses that attach themselves to executable files by overwriting a part of their code or
              appending their code to the files.
          Ø   Macroviruses embed themselves in documents. A macro refers to specific instructions within an application.

          Ø   Macroviruses are executable files that may be received as email attachments.
          Ø   A Trojan horse is malware that presents itself as a desirable and helpful program but actually causes harm to
              the system.
          Ø   A worm is a malicious program that replicates itself. So, a networked device could have several copies of a
              worm infecting many files.

          Ø   Spyware secretly collects information from a system.
          Ø   Adware is software that displays advertisements to users of the Internet and mobile applications.
          Ø   Ransomware is a type of malicious software that holds data or devices hostage for a ransom.
          Ø   In incognito or private browsing mode, the browser does not store your browsing history or cookies.

          Ø   When you visit a website, it may store small pieces of text called cookies so that it can keep track of the users’
              preferences and provide the users with a more satisfying experience.

          Ø   A firewall is a piece of hardware, software, or a combination of both that prevents unwanted access to a
              network.
          Ø   While entering any sensitive personal information on a website, look for HTTPS in the address bar to make
              sure your data is encrypted.



         358   Touchpad Computer Science-XI
   355   356   357   358   359   360   361   362   363   364   365