Page 14 - Modular_V1.1_Flipbook
P. 14
Phishing
Phishing is a cyber crime in which an e-mail that falsely claims to be from a trusted organisation
sends to a user. This type of e-mails generally contain a link of a website. When the users open
the link, sender of the e-mail asks the users to enter their private information like credit card
details, password and user name on the web page. These fraud activities can cause financial loss
to the people. In this way they steal personal confidential information of the users.
Measures to avoid Phishing
Some of the measures that we can take to avoid Phishing are as follows:
Be alert of e-mails that you receive from unrecognised senders and which ask you to confirm
personal details.
While doing online transactions, look for a lock icon sign at the address bar of the browser
window that states that the site is secure.
Protect your computer with a Firewall, Anti-virus and Anti-Spyware Software.
Hacking
Hacking is the unauthorised access to computer system for the purpose of destroying the
system or stealing important information from the system. Hackers are people who break into
the other’s computer system to steal important data or to destroy it. In general computer terms,
we call them as white hats, black hats and grey hats.
Measures to Avoid Hacking
To prevent unauthorised access to your computer and Internet we can take following measures:
Keep a password for your Wi-Fi connection and computer.
Keep changing your passwords.
Keep updating your operating system.
Don’t plug in to devices you are not sure about.
Always look at the lock sign at the address bar of the window before accessing any website
that states that the site you are visiting is secure.
Always download Trusted Apps from Internet and check permissions and authentication.
Spamming
Spams are the unwanted mails we received from the companies who want to advertise their
products. These e-mails are also called as bulk e-mails. These e-mails enter into our computers
in the form of advertisements and attack the computers. The most commonly used form of spam
is an e-mail spam. Spam can also contain virus, worms, and is used for cyber-attacks.
Measures to Avoid Spam
To avoid spam, we can take the following measures:
Preview your messages before opening them.
12 Touchpad MODULAR (Version 1.1)-IX

