Page 117 - iPrime_V2.2_class6
P. 117
Hacking
Hacking is when someone accesses someone else's computer or account without permission.
They might steal information, change things, or cause other problems. People who engage in
computer hacking activities are often called hackers.
Some organisations actually employ computer hackers as part of their technical support staff.
These individuals use their skills to find flaws in the company’s security system so that they can
be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft
and other serious computer-related crimes.
Cracking
The process of stealing personal information, changing financial data, and breaking security
systems to gain unauthorised access to computer systems is called cracking. The people who
are involved in the process of cracking are called crackers.
Software cracking is considered illegal and cracked software is often called pirated software.
CYBER SECURITY
Security is an important issue for all modern information systems. The process of protecting
computer resources such as networks, devices, programs, and data from unauthorised access,
damage, or attack is called cyber security.
Confidential data and privacy must be safeguarded, and the system must be protected against
malicious acts of theft or disruption. Unfortunately, the number of cyber crimes is on the rise
around the world. The various reasons for increased cyber crimes are:
Increasing use of Internet Lack of awareness
Multi-pronged attacks Existing loopholes in software Untrained Internet users
Reb t
The Internet is a global network accessible from all over the world.
Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.
Technique of watching a person while talking to him is called video conferencing.
Online chat refers to a communication in the form of small messages among computers
over the Internet.
A social networking service is a platform where people with common interest or activities
can connect with each other.
In order to avoid misunderstandings in online communication, a set of rules has been
designed which are called Netiquettes.
Cloud storage is a service where the users are able to store and manage data on remote
server in place of their local computer.
Cyber threat is a criminal activity in which computers are used to damage data, steal
data, or disrupt digital life of a person.
The process of protecting computer resources such as networks, devices, programs,
and data from unauthorised access, damage, or attack is called cyber security.
Online Surfing and Cyber Security 115

