Page 112 - IT_V5.0_Class8
P. 112
Hacking can be of two types:
Ethical Hacking: It refers to the authorised access
to the computer for legally testing of computer
systems, networks, and applications for security
reasons. This will help them identify weaknesses
in systems and help the organisations improve
their cybersecurity defences.
Unethical Hacking: This involves hacking
activities carried out with the intentions of
stealing sensitive information, spreading
malware, disrupting services, or causing financial
harm.
NETIQUETTES
It is short for network etiquette and refers to the set of rules or guidelines to be followed at the
time of online interaction using the Internet. It is always a good practice to follow these rules to
ensure respectful communication and prevent misunderstandings and hard feelings.
Some of the basic netiquettes are:
Treat others online with courtesy and respect, just like in person.
Never share personal information and introduce yourself before chatting.
Use correct spelling and grammar, and avoid typing in all caps to prevent misunderstandings.
Respect others’ privacy, give credit to original creators, and follow community rules.
Be open-minded toward different perspectives and report abusive behavior to protect yourself
and others.
CYBER LAW
Cyber Law refers to the legal rules or laws that govern the digital world. The main objective of the
cyber law is to safeguard the digital world from cybercrimes. It promotes trust and confidence in
digital interactions and facilitates the continued growth of the digital economy. Hence, there is a
need for cyber laws in India. Some of the important factors of cyber laws are:
Cyber law sets rules to protect individual rights online.
It addresses cybersecurity by establishing standards for data protection and preventing
cybercrimes.
Cyber law provides guidelines for legal transactions, dispute resolution, and consumer
protection in the online world.
It ensures global cooperation to maintain consistent legal standards across borders.
Cyber law supports digital economy growth by safeguarding the rights of individuals and
businesses.
110 Information Technology (V5.0)-VIII

