Page 271 - CA_Blue( J )_Class9
P. 271

3.  End User Piracy: If a legal user breaks the copyright rules and makes copies of the software without authorisation,
                    then it is called "end user piracy."
                 4.  Client-Server Overuse:  The protocol of Client-Server is that the defined number of users can access the software
                    on a server. Client-Server Overuse occurs when more users than allowed, under the software license agreement,
                    access the software on the server. This is called overuse of software in Client-Server machines.
                 5.  Hard-Disk Loading: Sometimes while selling a new computer, the vendor installs the copies of the software on
                    the hard disk, which makes the purchase more lucrative.

                 11.4.2 Avoiding Software Piracy
                 Software piracy must be avoided and to do so we can take the following measures:
                 1.  We should always purchase legal software and that too from reputed vendors or directly from the website.
                 2.  While buying, we should always check for the license documentation, original disc, etc.
                 3.  We should never copy the software and give it to our employees or friends for use. We should always encourage
                    others to buy original software.
                 4.  Check for the serial number or activation keys that has been provided and any difference should be avoided.
                 5.  As soon as the software is purchased, we should register the software so others will not be able to use the
                    serial number or activation keys.


                      11.5 CYBERCRIME
                 Any crime that is committed through the internet and by using a computer, mobile, or laptop and software is
                 known a cybercrime. This type of crime can be committed from any location, even from remote areas, without
                 being present in the crime area.

                 These types of crimes can be  committed against individuals, corporates, banks, or even governments of different
                 countries. Thus, the criminals involved in cybercrime know no borders, either physical or virtual, and cause serious
                 harm and pose very real threats to victims worldwide.

                 These  types  of  crimes  involve  illegal  copying  of  software,  injecting  computer  computer  viruses  into  others'
                 computers, stealing information from other computers' hardware such as personal details, bank details, confidential
                 information from government and corporate servers, etc.

                 As new technologies evolve, new categories of Cybercrime develop. So, police and cyber security personnel need
                 to be accustomed to the new technologies and upgrade them regularly.


                 11.5.1 Common Types of Cybercrimes
                 These days cybercrime is a very common phenomenon. Let us take a look at some of the most common
                 cybercrime:


                 Phishing
                 It is a form of Cybercrime where fraudulent email messages are sent to different people to get personal information.

                 Hacking
                 It refers to getting illegal access to someone’s computer with the intent of stealing sensitive data or causing damage.

                 Cyber terrorism
                 Spreading hate messages against other communities and inciting terrorism using a computer network.

                 Cyber Abuse
                 This is a way of abusing a person by hurting their integrity using the internet.




                                                                                           Computing and Ethics  269
   266   267   268   269   270   271   272   273   274   275   276