Page 271 - CA_Blue( J )_Class9
P. 271
3. End User Piracy: If a legal user breaks the copyright rules and makes copies of the software without authorisation,
then it is called "end user piracy."
4. Client-Server Overuse: The protocol of Client-Server is that the defined number of users can access the software
on a server. Client-Server Overuse occurs when more users than allowed, under the software license agreement,
access the software on the server. This is called overuse of software in Client-Server machines.
5. Hard-Disk Loading: Sometimes while selling a new computer, the vendor installs the copies of the software on
the hard disk, which makes the purchase more lucrative.
11.4.2 Avoiding Software Piracy
Software piracy must be avoided and to do so we can take the following measures:
1. We should always purchase legal software and that too from reputed vendors or directly from the website.
2. While buying, we should always check for the license documentation, original disc, etc.
3. We should never copy the software and give it to our employees or friends for use. We should always encourage
others to buy original software.
4. Check for the serial number or activation keys that has been provided and any difference should be avoided.
5. As soon as the software is purchased, we should register the software so others will not be able to use the
serial number or activation keys.
11.5 CYBERCRIME
Any crime that is committed through the internet and by using a computer, mobile, or laptop and software is
known a cybercrime. This type of crime can be committed from any location, even from remote areas, without
being present in the crime area.
These types of crimes can be committed against individuals, corporates, banks, or even governments of different
countries. Thus, the criminals involved in cybercrime know no borders, either physical or virtual, and cause serious
harm and pose very real threats to victims worldwide.
These types of crimes involve illegal copying of software, injecting computer computer viruses into others'
computers, stealing information from other computers' hardware such as personal details, bank details, confidential
information from government and corporate servers, etc.
As new technologies evolve, new categories of Cybercrime develop. So, police and cyber security personnel need
to be accustomed to the new technologies and upgrade them regularly.
11.5.1 Common Types of Cybercrimes
These days cybercrime is a very common phenomenon. Let us take a look at some of the most common
cybercrime:
Phishing
It is a form of Cybercrime where fraudulent email messages are sent to different people to get personal information.
Hacking
It refers to getting illegal access to someone’s computer with the intent of stealing sensitive data or causing damage.
Cyber terrorism
Spreading hate messages against other communities and inciting terrorism using a computer network.
Cyber Abuse
This is a way of abusing a person by hurting their integrity using the internet.
Computing and Ethics 269

