Page 130 - TrackpadV2.1_Class8
P. 130
NATIONAL CYBER SECURITY POLICY, 2013
It is a policy in India that aims to protect public and private infrastructure from cyber-attacks and
safeguards personal, financial, and banking information.
21 st
Self Reflection Century #Flexibility
Skills
Your teacher asked everyone to write an essay as homework. Your friend was not interested in writing it. So
Self Reflection
he asked if he could copy yours and pretend it as his own and submit it. Do you think it would be ethical for
him to do so? What advice will you give him?
Hashtag
#Plagiarism: An act of copying information from the Internet and using it in our projects or works
#Phishing: An illegal practice of obtaining sensitive information from us through e-mails
REVISIT
▶ The online or Internet-based illegal acts are called cyber crimes.
▶ Computer ethics are rules that govern our actions when we use computers and the Internet.
▶ Spamming refers to the act of repeatedly sending unwanted e-mails called spam to a large number of recipients.
▶ Hacking is an act of intruding into someone’s computer system for some unwanted purposes by identifying
the technical weak points of the security system.
▶ Phishing is the illegal practice of obtaining sensitive information from us through e-mails.
▶ Plagiarism is an act of copying information from the Internet and using it in our projects or works.
▶ Software piracy is the unauthorised copying or stealing of software, movies, music or making these copies
available on the Internet.
▶ Intellectual property rights are the exclusive rights given by the government to the owners of intellectual
creations.
▶ Digital footprints or Digital Shadow are the traceable digital activities that we leave behind after surfing the
Internet.
1. Tick ( ) the correct option.
a. Identify the term used for the act of repeatedly sending unwanted e-mails to a large number of
recipients.
(i) Hacking (ii) Phishing
(iii) Spamming (iv) None of these
128 Trackpad (V2.1)-VII

