Page 14 - Modular_V1.1_Flipbook
P. 14

Phishing

                  Phishing is a cyber crime in which an e-mail that falsely claims to be from a trusted organisation
                  sends to a user. This type of e-mails generally contain a link of a website. When the users open

                  the link, sender of the e-mail asks the users to enter their private information like credit card
                  details, password and user name on the web page. These fraud activities can cause financial loss
                  to the people. In this way they steal personal confidential information of the users.
                  Measures to avoid Phishing


                  Some of the measures that we can take to avoid Phishing are as follows:
                       Be alert of e-mails that you receive from unrecognised senders and which ask you to confirm
                       personal details.

                       While doing online transactions, look for a lock icon sign at the address bar of the browser
                       window that states that the site is secure.
                       Protect your computer with a Firewall, Anti-virus and Anti-Spyware Software.

                  Hacking

                  Hacking is  the unauthorised  access to computer system  for the purpose of destroying the
                  system or stealing important information from the system. Hackers are people who break into
                  the other’s computer system  to steal important data or to destroy it. In general computer terms,

                  we call them as white hats, black hats and grey hats.
                  Measures to Avoid Hacking

                  To prevent unauthorised access to your computer and Internet we can take following measures:

                       Keep a password for your Wi-Fi connection and computer.
                       Keep changing your passwords.

                       Keep updating your operating system.
                       Don’t plug in to devices you are not sure about.
                       Always look at the lock sign at the address bar of the window before accessing any website
                       that states that the site you are visiting is secure.

                       Always download Trusted Apps from Internet and check permissions and authentication.
                  Spamming


                  Spams are the unwanted mails we received from the companies who want to advertise their
                  products. These e-mails are also called as bulk e-mails. These e-mails enter into our computers
                  in the form of advertisements and attack the computers. The most commonly used form of spam
                  is an e-mail spam. Spam can also contain virus, worms, and is used for cyber-attacks.
                  Measures to Avoid Spam


                  To avoid spam, we can take the following measures:
                       Preview your messages before opening them.


                  12      Touchpad MODULAR (Version 1.1)-IX
   9   10   11   12   13   14   15   16   17   18   19