Page 88 - Touchpad_Plus_V3.2_Class 6
P. 88
Avoid All Caps: Writing in all capital letters is often seen as shouting. Use normal capitalization
for your messages.
Ask for Permission: Before sharing pictures or information about someone else, ask for their
permission first.
Report Bad Behavior: If you see something that makes you uncomfortable, like bullying or
inappropriate content, tell an adult or report it.
Following these rules helps ensure clear and respectful online communication.
CYBER THREATS
A cyber threat is a criminal activity in which computers are used to damage or steal data or
disrupt someone’s digital life. Most cyber threats aim for personal gain, though some individuals
may do it to test their skills.
Types of Cyber Threats
There are various types of cyber threats. Some of them are as follows:
Data Diddling: This refers to changing the data before it’s entered into a computer system
or after it’s been processed. For example, if a student hacks into their university’s grade
system and alters their grades from the last semester to boost their GPA, that would be
data diddling.
Phreaking: This crime targets telephone companies using computers to achieve goals such
as making free long-distance calls, impersonating directory assistance or other operator
services, diverting calls to the perpetrator’s chosen numbers, or tapping phone lines.
Cloning: This refers to a fraud where scanners are used to steal the electronic serial numbers
of cell phones. These stolen numbers can be used to create clones that make free calls, with
the charges billed to the original phone’s owner.
Carding: This refers to the act of stealing credit card numbers online to either resell them or
use them to make unauthorized charges on the victim's account.
Hacking: Computer hacking involves altering computer hardware and software to achieve
goals beyond their original design. Individuals who engage in this practice are often referred
to as hackers.
Some organisations hire computer hackers as part of their technical support teams. These
professionals use their skills to identify and fix vulnerabilities in the company's security system,
a practice known as ethical hacking, or "white-hat" hacking. This helps prevent identity theft
and other serious cybercrimes.
Cracking: The process of stealing personal information, altering financial data, and breaking
security systems to gain unauthorised access to computer systems is known as cracking.
Crackers are those who engage in this activity.
Cracking software is illegal, and people often refer to cracked software as pirated software.
86 Plus (Ver. 3.2)-VI

