Page 125 - iPro_trackGPT_V5_Class6
P. 125

Some some key netiquettes are:

                     Be Respectful: Treat others the way you want to be treated. Be kind in your messages and
                    comments.
                     Think Before You Post: Before sharing something online, ask yourself if it is appropriate and
                    how it might affect others. Once something is posted, it is hard to take it back.

                     Use  Clear  Language:  Write clearly and  avoid using too many abbreviations.  This helps
                    everyone understand you better.

                     Keep Personal Information Private: Don’t share personal details like your home address,
                    phone number, or school name online.

                     Use Proper Language: Avoid using bad language or rude comments. Keep your communication
                    friendly and positive.
                     Respect Others’ Opinions: Everyone has different views. If someone disagrees with you, it’s

                    okay. Respect their opinions and don’t argue harshly.
                     Avoid All Caps: Writing in all capital letters is often seen as shouting. Use normal capitalization
                    for your messages.

                     Ask for Permission: Before sharing pictures or information about someone else, ask for their
                    permission first.

                     Report Bad Behavior: If you see something that makes you uncomfortable, like bullying or
                    inappropriate content, tell an adult or report it.
                 Following these rules helps ensure clear and respectful online communication.

                    CYBER THREATS


                 A cyber threat is a criminal activity in which computers are used to damage or steal data or
                 disrupt someone’s digital life. Most cyber threats aim for personal gain, though some individuals
                 may do it to test their skills.
                 Types of Cyber Threats


                 There are various types of cyber threats. Some of them are as follows:
                 Data Diddling

                 This refers to changing the data before it’s entered into a computer system or after it’s been
                 processed. For example, if a student hacks into their university’s grade system and alters their

                 grades from the last semester to boost their GPA, that would be data diddling.
                 Phreaking

                 This crime targets telephone companies using computers to achieve goals such as making free
                 long-distance calls, impersonating directory assistance or other operator services, diverting calls

                 to the perpetrator’s chosen numbers, or tapping phone lines.





                                                                               Online Surfing and  yyer Security  123
   120   121   122   123   124   125   126   127   128   129   130