Page 54 - TP_Play_V2.1_class6
P. 54
must be protected against malicious acts of theft or disruption. Unfortunately, the number of cyber
crime is on the rise around the world. The various reasons for increasing cyber crimes are:
Increasing use of Internet Lack of awareness Multi-pronged attacks
Existing loopholes in software Untrained Internet users
CYBER CRIME
Cyber crime is a criminal activity in which computers are used to do crime. Most of the
cyber crimes are carried out in order to gain personal profit. Some people break security only to
check their skills.
Types of Cyber Crimes
There are various types of cyber crimes. Some of them are as follows:
Data Diddling: Refers to the process of changing the data going into or out of a computer.
For example, a student breaks into his/her university grade recording system and changes the
grades he/she earned in last semester or class, thus raising his/her grade point average.
Phreaking: This crime is committed against telephone companies by using computers with
the goal of making free distance calls, impersonating directory assistance or other operator
services, diverting calls to numbers of the perpetrator’s choice, or tapping phone lines.
Cloning: This refers to a fraud in which scanners are used to steal the electronic serial numbers
of cellular phones, which may be used for billing purposes and making broadcast calls. With
stolen serial numbers, clones can be made to make free calls that are billed to the owner of
the original cell phone.
Carding: This refers to the process of stealing credit card numbers online, to be resold or
used to charge merchandise against victim’s account.
Hacking: It is the unauthorised access to computer system for the purpose of destroying the
system or stealing important information from the system. Hackers are people who break into
the other’s computer system to steal important data or to destroy it.
In general computer terms, we call them as white hats, black hats and grey hats. Hackers,
who are out to steal personal information, change an organization’s financial data, break
security codes to gain unauthorised network access, or conduct other destructive activities
are sometimes called “crackers.”
Cracking: Software cracking is considered illegal and cracked software is often called pirated
software. A cracker gets into all kinds of mischief, including breaking or “cracking” copy protection
on software programs, breaking into systems and causing harm, changing or stealing data.
Recap
Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.
The technique of watching the person while talking to him is called video conferencing.
Online chat refers to a communication in the form of small messages among the
computers over the Internet, just like SMS service on mobiles.
52 Play (Ver. 2.1)-VI

