Page 92 - modular4.0
P. 92
Chapter Profile
CYBER SECURITY Recap
Security is an important issue for all modern information systems. The process of protecting
computer resources such as networks, devices, programs, and data from unauthorised access, Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.
damage, or attack is called cyber security. Confidential data and privacy must be safe guarded, The technique of watching the person while talking to him is called video conferencing.
and the system must be protected against malicious acts of theft or disruption. Unfortunately, the Online chat refers to a communication in the form of small messages among the computers over the
number of cyber crime is on the rise around the world. Internet, just like SMS service on mobiles.
The most common and popular VoIP services used in India are Skype and GoogleTalk.
The various reasons for increasing cyber crimes are:
Blogs are generally like a detailed explanation of a subject or sometimes they are also used as a
Increasing use of Internet Lack of awareness Multi-pronged attacks
Diary of Events.
Existing loopholes in software Untrained Internet users Cloud storage is a service where the users are able to store and manage data on remote server in
place of their local computer.
CYBER CRIME The process of protecting computer resources such as networks, devices, programs, and data from
unauthorised access, damage, or attack is called cyber security.
Cyber crime is a criminal activity in which computers are used to do crime. Most of the cyber crimes Cyber crime is a criminal activity in which computers are used to do crime.
are carried out in order to gain personal profit. Some people break security only to check their
skills.
Types of Cyber Crimes Exercise
There are various types of cyber crimes. Some of them are as follows:
Data Diddling: It refers to the process of changing the data going in or out of a computer. For A. Tick ( ) the correct option.
example, a student breaks into his/her university’s grade recording system and changes the
grades he/she earned in last semester’s or class, thus raising his/her grade point average. 1. Which of the following devices is not mandatory for video conferencing?
a. Internet connection b. Webcam
Phreaking: This crime is committed against telephone companies by using computers with the
goal of making free distance calls, impersonating directory assistance or other operator services, c. Microphone d. Scanner
diverting calls to numbers of the perpetrator’s choice, or tapping phone lines. 2. Which service allows the users to store and manage data on a remote server in place of their local
Cloning: This refers to a fraud in which scanners are used to steal the electronic serial numbers computer?
of cellular phones, which may used for billing purposes and making broadcast calls. With stolen a. Sky Storage b. Blog
serial numbers, clones can be made to make free calls that are billed to the owner of the original
cell phone. c. Newsgroup d. Cloud Storage
Carding: This refers to the process of stealing credit card numbers online, to be resold or used 3. Which layout shows files as a series of lines stacked one above the other?
to charge merchandise against victim’s account. a. Grid Layout b. List Layout
Hacking: It is the unauthorised access to computer system for the purpose of destroying the c. Serial Layout d. Line Layout
system or stealing important information from the system. Hackers are people who break 4. For how many days do the deleted files stay in trash before they are deleted permanently from
into the other’s computer system to steal important data or to destroy it. In general computer Google Drive?
terms, we call them as white hats, black hats and grey hats. Hackers, who are out to steal
personal information, change an organisation’s financial data, break security codes to gain a. 10 days b. 20 days
unauthorised network access, or conduct other destructive activities are sometimes called c. 30 days d. 31 days
“crackers.”
B. Fill in the blanks using the words given below:
Cracking: Software cracking is considered illegal and cracked software is often called pirated
software. A cracker get into all kinds of mischief, including breaking or “cracking” copy protection Wordpress, Newsgroups,one drive
on software programs, breaking into systems and causing harm, changing data, or stealing.
1. Discussion groups are also known as .
90 Modular (Ver. 4.0)-VII

