Page 88 - Touchpad_Plus_V3.2_Class 6
P. 88

Avoid All Caps: Writing in all capital letters is often seen as shouting. Use normal capitalization

                     for your messages.
                       Ask for Permission: Before sharing pictures or information about someone else, ask for their
                     permission first.
                       Report Bad Behavior: If you see something that makes you uncomfortable, like bullying or
                     inappropriate content, tell an adult or report it.

                  Following these rules helps ensure clear and respectful online communication.

                      CYBER THREATS

                  A cyber threat is a criminal activity in which computers are used to damage or steal data or
                  disrupt someone’s digital life. Most cyber threats aim for personal gain, though some individuals
                  may do it to test their skills.
                  Types of Cyber Threats

                  There are various types of cyber threats. Some of them are as follows:

                       Data Diddling: This refers to changing the data before it’s entered into a computer system
                     or after it’s been processed. For example, if a student hacks into their university’s grade
                     system and alters their grades from the last semester to boost their GPA, that would be
                     data diddling.

                       Phreaking: This crime targets telephone companies using computers to achieve goals such
                     as making free  long-distance  calls, impersonating directory  assistance or  other  operator
                     services, diverting calls to the perpetrator’s chosen numbers, or tapping phone lines.
                       Cloning: This refers to a fraud where scanners are used to steal the electronic serial numbers
                     of cell phones. These stolen numbers can be used to create clones that make free calls, with
                     the charges billed to the original phone’s owner.

                       Carding: This refers to the act of stealing credit card numbers online to either resell them or
                     use them to make unauthorized charges on the victim's account.
                       Hacking: Computer hacking involves altering computer hardware and software to achieve

                     goals beyond their original design. Individuals who engage in this practice are often referred
                     to as hackers.
                     Some organisations hire computer hackers as part of their technical support teams. These
                     professionals use their skills to identify and fix vulnerabilities in the company's security system,
                     a practice known as ethical hacking, or "white-hat" hacking. This helps prevent identity theft
                     and other serious cybercrimes.

                       Cracking: The process of stealing personal information, altering financial data, and breaking
                     security systems  to gain unauthorised access  to computer systems  is  known as cracking.
                     Crackers are those who engage in this activity.
                     Cracking software is illegal, and people often refer to cracked software as pirated software.






               86       Plus (Ver. 3.2)-VI
   83   84   85   86   87   88   89   90   91   92   93