Page 130 - TrackpadV2.1_Class8
P. 130

NATIONAL CYBER SECURITY POLICY, 2013
                  It is a policy in India that aims to protect public and private infrastructure from cyber-attacks and

                  safeguards personal, financial, and banking information.


                                                                                                          21 st
                                                            Self Reflection                            Century   #Flexibility
                                                                                                         Skills
                     Your teacher asked everyone to write an essay as homework. Your friend was not interested in writing it. So
                                                            Self Reflection
                     he asked if he could copy yours and pretend it as his own and submit it. Do you think it would be ethical for
                     him to do so? What advice will you give him?




                         Hashtag


                       #Plagiarism: An act of copying information from the Internet and using it in our projects or works
                       #Phishing: An illegal practice of obtaining sensitive information from us through e-mails




                       REVISIT


                    ▶   The online or Internet-based illegal acts are called cyber crimes.
                    ▶   Computer ethics are rules that govern our actions when we use computers and the Internet.
                    ▶   Spamming refers to the act of repeatedly sending unwanted e-mails called spam to a large number of recipients.
                    ▶   Hacking is an act of intruding into someone’s computer system for some unwanted purposes by identifying
                      the technical weak points of the security system.
                    ▶   Phishing is the illegal practice of obtaining sensitive information from us through e-mails.
                    ▶   Plagiarism is an act of copying information from the Internet and using it in our projects or works.
                    ▶   Software piracy is the unauthorised copying or stealing of software, movies, music or making these copies
                      available on the Internet.
                    ▶   Intellectual property rights are the exclusive rights given by the government to the owners of intellectual
                      creations.
                    ▶   Digital footprints or Digital Shadow are the traceable digital activities that we leave behind after surfing the
                      Internet.










                  1.  Tick ( ) the correct option.
                     a.   Identify the term used for the act of repeatedly sending unwanted e-mails to a large number of
                        recipients.
                         (i)  Hacking                                 (ii)  Phishing

                        (iii)  Spamming                              (iv)  None of these




                  128   Trackpad (V2.1)-VII
   125   126   127   128   129   130   131   132   133   134   135