Page 92 - modular4.0
P. 92

Chapter Profile

                         CYBER SECURITY                                                                                                               Recap

                  Security  is  an  important  issue  for all  modern  information  systems. The  process of  protecting

                  computer  resources such           as networks,  devices,  programs, and  data from unauthorised  access,                         Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.
                  damage, or attack is called cyber security. Confidential data and privacy must be safe guarded,                                   The technique of watching the person while talking to him is called video conferencing.
                  and the system must be protected against malicious acts of theft or disruption. Unfortunately, the                                Online chat refers to a communication in the form of small messages among the computers over the

                  number of cyber crime is on the rise around the world.                                                                          Internet, just like SMS service on mobiles.
                                                                                                                                                    The most common and popular VoIP services used in India are Skype and GoogleTalk.
                  The various reasons for increasing cyber crimes are:
                                                                                                                                                    Blogs are generally like a detailed explanation of a subject or sometimes they are also used as a
                      Increasing use of Internet                 Lack of awareness             Multi-pronged attacks
                                                                                                                                                  Diary of Events.
                      Existing loopholes in software         Untrained Internet users                                                               Cloud storage is a service where the users are able to store and manage data on remote server in
                                                                                                                                                  place of their local computer.
                         CYBER CRIME                                                                                                                The process of protecting computer resources such as networks, devices, programs, and data from
                                                                                                                                                  unauthorised access, damage, or attack is called cyber security.
                  Cyber crime is a criminal activity in which computers are used to do crime. Most of the cyber crimes                              Cyber crime is a criminal activity in which computers are used to do crime.
                  are carried out in order to gain personal profit. Some people break security only to check their
                  skills.

                  Types of Cyber Crimes                                                                                                     Exercise
                  There are various types of cyber crimes. Some of them are as follows:
                      Data Diddling: It refers to the process of changing the data going in or out of a computer. For                       A.   Tick ( ) the correct option.
                     example, a student breaks into his/her university’s grade recording system and changes the
                     grades he/she earned in last semester’s or class, thus raising his/her grade point average.                                 1.  Which of the following devices is not mandatory for video conferencing?
                                                                                                                                                     a.  Internet connection                       b.  Webcam
                      Phreaking: This crime is committed against telephone companies by using computers with the
                     goal of making free distance calls, impersonating directory assistance or other operator services,                              c.   Microphone                               d.  Scanner
                     diverting calls to numbers of the perpetrator’s choice, or tapping phone lines.                                             2.   Which service allows the users to store and manage data on a remote server in place of their local

                      Cloning: This refers to a fraud in which scanners are used to steal the electronic serial numbers                              computer?
                     of cellular phones, which may used for billing purposes and making broadcast calls. With stolen                                 a.  Sky Storage                               b.  Blog
                     serial numbers, clones can be made to make free calls that are billed to the owner of the original
                     cell phone.                                                                                                                     c.  Newsgroup                                 d.  Cloud Storage

                      Carding: This refers to the process of stealing credit card numbers online, to be resold or used                           3.  Which layout shows files as a series of lines stacked one above the other?
                     to charge merchandise against victim’s account.                                                                                 a.  Grid Layout                               b.  List Layout
                      Hacking: It is the unauthorised access to computer system for the purpose of destroying the                                    c.  Serial Layout                             d.  Line Layout
                     system or stealing important information from the system. Hackers are people who break                                      4.   For how many days do the deleted files stay in trash before they are deleted permanently from
                     into the other’s computer system to steal important data or to destroy it. In general computer                                  Google Drive?
                     terms, we call them as white hats, black hats and grey hats. Hackers, who are out to steal
                     personal  information,  change an  organisation’s  financial  data,  break  security  codes  to  gain                           a.  10 days                                   b.  20 days
                     unauthorised network access, or conduct other destructive activities are sometimes called                                       c.  30 days                                   d.  31 days
                     “crackers.”
                                                                                                                                            B.   Fill in the blanks using the words given below:
                       Cracking: Software cracking is considered illegal and cracked software is often called pirated
                     software. A cracker get into all kinds of mischief, including breaking or “cracking” copy protection                                                      Wordpress, Newsgroups,one drive
                     on software programs, breaking into systems and causing harm, changing data, or stealing.
                                                                                                                                                 1.  Discussion groups are also known as                  .





                90   Modular (Ver. 4.0)-VII
   87   88   89   90   91   92   93   94   95   96   97