Page 87 - TP_Modular_V2.1_Class7
P. 87

Google Forms: To create forms, in order to receive information in a form format by

                            sharing link of the form.
                            More: To create Google Drawings, Google Apps Script, etc.
                 Step 8  Click on Folder upload to upload and store the entire folder on the remote server.

                 Step 9   Click on Google Docs, Google Sheets, and Google Slides to create an online document,
                         spreadsheet, and presentation respectively.
                    CYBER SECURITY

                 Security is an important issue for all modern information systems. The process of protecting computer
                 resources such as networks, devices, programs, and data from unauthorised access, damage, or
                 attack is called cyber security. Confidential data and privacy must be safe guarded, and the system
                 must be protected against malicious acts of theft or disruption. Unfortunately, the number of cyber
                 crime is on the rise around the world. The various reasons for increasing cyber crimes are:

                    Increasing use of Internet            Lack of awareness          Multi-pronged attacks
                    Existing loopholes in software     Untrained Internet users
                    CYBER CRIME

                 Cyber crime is a criminal activity in which computers are used to do crime. Most of the
                 cyber crimes are carried out in order to gain personal profit. Some people break security only to
                 check their skills.
                 Types of Cyber Crimes

                 There are various types of cyber crimes. Some of them are as follows:

                    Data Diddling: Refers to the process of changing the data going into or out of a computer.
                    For example, a student breaks into his/her university grade recording system and changes the
                    grades he/she earned in last semester or class, thus raising his/her grade point average.
                    Phreaking: This crime is committed against telephone companies by using computers with
                    the goal of making free distance calls, impersonating directory assistance or other operator
                    services, diverting calls to numbers of the perpetrator’s choice, or tapping phone lines.
                    Cloning: This refers to a fraud in which scanners are used to steal the electronic serial numbers
                    of cellular phones, which may be used for billing purposes and making broadcast calls. With
                    stolen serial numbers, clones can be made to make free calls that are billed to the owner of
                    the original cell phone.

                    Carding: This refers to the process of stealing credit card numbers online, to be resold or
                    used to charge merchandise against victim’s account.
                     Hacking: It is the unauthorised access to computer system for the purpose of destroying the
                    system or stealing important information from the system. Hackers are people who break into
                    the other’s computer system to steal important data or to destroy it.

                      In general computer terms, we call them as white hats, black hats and grey hats. Hackers,
                    who are out to steal personal information, change an organization’s financial data, break
                    security codes to gain unauthorised network access, or conduct other destructive activities
                    are sometimes called “crackers.”

                                                                                         Services on Internet     85
   82   83   84   85   86   87   88   89   90   91   92