Page 127 - TrackpadV2.1_Class8
P. 127

They choke the Internet and waste our time. Stopping these spam e-mails is difficult, but there are
                 many services available on the Internet which can prevent spammers from sending these e-mails.

                 Following are some tips to avoid spams:
                   Avoid sharing your e-mail id with everyone.

                    Set up filters to scan your e-mails and segregate      Name of the first hacker
                   spam or junk e-mails into a separate folder.
                   Never revert to any spam e-mail.


                 HACKING

                 Hacking is the act of intruding into a computer
                 system  for harmful purposes  by  identifying  the
                 technical  weak points  of the security  system
                 using smart programming solutions. The person
                 involved in these activities is called a hacker.




                 Following are some tips to avoid hacking:
                                                                                         21 st
                    Update  your operating  system,  web                              Century   #Initiative
                                                                                        Skills
                   browser and anti-virus.
                                                                  “You  should change your  passwords
                    Install a firewall on your computer as it     regularly. Same  password  should  not  be
                   does not allow hackers and viruses to          kept for more than one account.”

                   get attached to your computer.

                 PHISHING

                 Phishing is the illegal practice of obtaining sensitive information through e-mails. The criminals
                 try to get information like user name, password and credit card details from us through e-mails.
                 People  with malicious  intentions  usually  fake their identity  and pose  as a known contact  or
                 organisation.

                 They send e-mails from legitimate-looking
                 websites  with genuine-looking  offers, rewards
                 or concerns as attachments. If opened, it installs
                 malware in our system or directs us to a website

                 for entering our sensitive information.
                 Following are some tips to avoid phishing:

                    Do not  open e-mails  without  verifying the
                   source.

                    Do not share your personal information via e-mails. It must be shared only via smartphone or
                   a secure website.




                                                                                                   Cyber Security  125
   122   123   124   125   126   127   128   129   130   131   132