Page 300 - Informatics_Practices_Fliipbook_Class12
P. 300
Let's Summarise
A digital footprint is a trail of personal data that one leaves behind while using the Internet.
Ø
The information you leave willingly is known as an active digital footprint.
Ø
The information that companies collect without your knowledge or approval is known as a passive digital
Ø
footprint.
Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information
Ø
(such as a password or private files) or damage the system or network.
When someone steals your personal information to commit fraud, it is known as identity theft.
Ø
Phishing is the act of sending a user a phoney email purporting to be from a trustworthy, well-known source,
Ø
like a bank or a government agency.
Attacks that steal data being transmitted over a communication channel are known as eavesdropping.
Ø
Trolls are comments or posts that insult or defame other users or their content.
Ø
When a victim is bullied online, on social media, or in gaming communities, that is known as cyberbullying.
Ø
Spam is unsolicited junk mail that is typically sent in bulk for advertising purposes.
Ø
A Denial of Service, or DOS, attack renders a machine or network resource unavailable either temporarily or
Ø
permanently to its intended users.
Malware is a program that aims to harm a computer, server, client, or computer network.
Ø
A virus is a piece of software code that can damage your system by replacing or messing up the system files.
Ø
The boot sector virus is a virus that affects the boot sector of disks. It gets activated when the drive is started
Ø
(booted up).
File infectors are viruses that attach themselves to executable files by overwriting a part of their code or
Ø
appending their code to the files.
Macro viruses embed themselves in documents. A macro refers to specific instructions within an application.
Ø
Macro viruses are executable files that may be received as email attachments.
Ø
A Trojan horse is malware that presents itself as a desirable and helpful program but actually causes harm to
Ø
the system.
A worm is a malicious program that replicates itself. So, a networked device could have several copies of a
Ø
worm infecting many files.
Spyware secretly collects information from a system.
Ø
Adware is software that displays advertisements to users of the Internet and mobile applications.
Ø
Ransomware is a type of malicious software that holds data or devices hostage for a ransom.
Ø
In incognito or private browsing mode, the browser does not store your browsing history or cookies.
Ø
When you visit a website, it may store small pieces of text called cookies so that it can keep track of the
Ø
users' preferences and provide the users with a more satisfying experience.
A firewall is a piece of hardware, software, or a combination of both that prevents unwanted access to a
Ø
network.
While entering any sensitive personal information on a website, look for HTTPS in the address bar to make
Ø
sure your data is encrypted.
Data protection is defending sensitive information against loss, tampering, or corruption.
Ø
286 Touchpad Informatics Practices-XII

