Page 300 - Informatics_Practices_Fliipbook_Class12
P. 300

Let's Summarise



              A digital footprint is a trail of personal data that one leaves behind while using the Internet.
           Ø
              The information you leave willingly is known as an active digital footprint.
           Ø
              The information that companies collect without your knowledge or approval is known as a passive digital
           Ø
              footprint.
              Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information
           Ø
              (such as a password or private files) or damage the system or network.

              When someone steals your personal information to commit fraud, it is known as identity theft.
           Ø
              Phishing is the act of sending a user a phoney email purporting to be from a trustworthy, well-known source,
           Ø
              like a bank or a government agency.
              Attacks that steal data being transmitted over a communication channel are known as eavesdropping.
           Ø
              Trolls are comments or posts that insult or defame other users or their content.
           Ø
              When a victim is bullied online, on social media, or in gaming communities, that is known as cyberbullying.
           Ø
              Spam is unsolicited junk mail that is typically sent in bulk for advertising purposes.
           Ø
              A Denial of Service, or DOS, attack renders a machine or network resource unavailable either temporarily or
           Ø
              permanently to its intended users.
              Malware is a program that aims to harm a computer, server, client, or computer network.
           Ø
              A virus is a piece of software code that can damage your system by replacing or messing up the system files.
           Ø
              The boot sector virus is a virus that affects the boot sector of disks. It gets activated when the drive is started
           Ø
              (booted up).
              File infectors are viruses that attach themselves to executable files by overwriting a part of their code or
           Ø
              appending their code to the files.

              Macro viruses embed themselves in documents. A macro refers to specific instructions within an application.
           Ø
              Macro viruses are executable files that may be received as email attachments.
           Ø
              A Trojan horse is malware that presents itself as a desirable and helpful program but actually causes harm to
           Ø
              the system.
              A worm is a malicious program that replicates itself. So, a networked device could have several copies of a
           Ø
              worm infecting many files.
              Spyware secretly collects information from a system.
           Ø
              Adware is software that displays advertisements to users of the Internet and mobile applications.
           Ø
              Ransomware is a type of malicious software that holds data or devices hostage for a ransom.
           Ø
              In incognito or private browsing mode, the browser does not store your browsing history or cookies.
           Ø
              When you visit a website, it may store small pieces of text called cookies so that it can keep track of the
           Ø
              users' preferences and provide the users with a more satisfying experience.
              A firewall is a piece of hardware, software, or a combination of both that prevents unwanted access to a
           Ø
              network.
              While entering any sensitive personal information on a website, look for HTTPS in the address bar to make
           Ø
              sure your data is encrypted.
              Data protection is defending sensitive information against loss, tampering, or corruption.
           Ø


          286  Touchpad Informatics Practices-XII
   295   296   297   298   299   300   301   302   303   304   305