Page 272 - CA_Blue( J )_Class9
P. 272
Grooming
This is a method of influencing a minor for sexual abuse without their consent.
Cyberstalking
It refers to a person or an organisation keeping a check on another organisation’s or person’s activities throughout
the day and night through the Internet with the intent to collect data on that person.
IP snooping
It is a technique that is used to gain illegal access to computers, whereby the trespasser sends messages to a
computer with an IP address indicating that the message is coming from a trusted host.
Cyberwarfare
Cyberwarfare is the digital attack from one nation against another, causing similar harm as done in actual
warfare and/or interrupting vital computer systems such as banking systems, hacking confidential and strategical
documents of the government, etc.
11.5.2 Protecting oneself from Cybercrimes
You can follow these guidelines to stay safe from cybercrime:
1. Use a good internet security suite.
2. Use strong passwords for money transaction apps such as Google Pay, Paytm, and email accounts.
3. Use original software and keep it updated.
4. Social site settings should be strong enough.
5. Children also should know about the threats on the Internet so that before downloading they ask their parents
every time. Also make sure they know that they can come to you if they’re experiencing any kind of online
harassment, stalking, or bullying.
If you are or you know someone who faced any cybercrime, then you may follow these guidelines:
1. Always keep your parents/guardians aware of any malicious incident the happened to you.
2. Parents can visit the police station to file a complaint or they can lodge an FIR through the online portal.
3. You can call the cybercrime helpline number: 1930
11.6 HACKING
Hacking refers to the illegal act of breaking into someone else’s computer with the intent of stealing information,
installing malware, or disrupting their services. Some of the most common reasons for hacking are:
1. Data Theft: This is one of the main motives behind hacking. Every year the world loses about $15.4 billion due
to theft.
2. Industrial Espionage: It refers to the act of spying or stealing information from an organisation with the intent
to sell it or hold it hostage for a ransom.
3. Publicity: Hacking is a criminal act that requires an significant amount of technical knowledge and skill. Hence,
hacking into a well-known website is going to attract public attention, which is a good motive.
4. Revenge: As the name suggests, it is done to harm a person in return for something bad that they did.
5. Fun: Plenty of new hackers enjoy the act of breaking through the security walls of different websites. These
hackers are mostly harmless; they just do it for fun or to pull a prank on the victim.
6. Knowledge: Technology is getting better every day, and with it, the security measures are also developing. To
break through these secured walls, one needs to be constantly updated with the latest trends. Hence, some
people do it for the knowledge, in case they need it someday.
270 Touchpad Computer Applications-IX

