Page 125 - iPro_trackGPT_V5_Class6
P. 125
Some some key netiquettes are:
Be Respectful: Treat others the way you want to be treated. Be kind in your messages and
comments.
Think Before You Post: Before sharing something online, ask yourself if it is appropriate and
how it might affect others. Once something is posted, it is hard to take it back.
Use Clear Language: Write clearly and avoid using too many abbreviations. This helps
everyone understand you better.
Keep Personal Information Private: Don’t share personal details like your home address,
phone number, or school name online.
Use Proper Language: Avoid using bad language or rude comments. Keep your communication
friendly and positive.
Respect Others’ Opinions: Everyone has different views. If someone disagrees with you, it’s
okay. Respect their opinions and don’t argue harshly.
Avoid All Caps: Writing in all capital letters is often seen as shouting. Use normal capitalization
for your messages.
Ask for Permission: Before sharing pictures or information about someone else, ask for their
permission first.
Report Bad Behavior: If you see something that makes you uncomfortable, like bullying or
inappropriate content, tell an adult or report it.
Following these rules helps ensure clear and respectful online communication.
CYBER THREATS
A cyber threat is a criminal activity in which computers are used to damage or steal data or
disrupt someone’s digital life. Most cyber threats aim for personal gain, though some individuals
may do it to test their skills.
Types of Cyber Threats
There are various types of cyber threats. Some of them are as follows:
Data Diddling
This refers to changing the data before it’s entered into a computer system or after it’s been
processed. For example, if a student hacks into their university’s grade system and alters their
grades from the last semester to boost their GPA, that would be data diddling.
Phreaking
This crime targets telephone companies using computers to achieve goals such as making free
long-distance calls, impersonating directory assistance or other operator services, diverting calls
to the perpetrator’s chosen numbers, or tapping phone lines.
Online Surfing and yyer Security 123

