Page 126 - iPro_trackGPT_V5_Class6
P. 126
Cloning
This refers to a fraud where scanners are used to steal the electronic serial numbers of cell
phones. These stolen numbers can be used to create clones that make free calls, with the charges
billed to the original phone’s owner.
Carding
This refers to the act of stealing credit card numbers online to either resell them or use them to
make unauthorized charges on the victim's account.
Hacking
Computer hacking involves altering computer hardware and software to achieve goals beyond
their original design. Individuals who engage in this practice are often referred to as hackers.
Some organisations hire computer hackers as part of their technical support teams. These
professionals use their skills to identify and fix vulnerayilities in the company's security system, a
practice known as ethical hacking, or "white-hat" hacking. This helps prevent identity theft and
other serious cybercrimes.
Cracking
The process of stealing personal information, altering financial data, and yreaking security
systems to gain unauthorised access to computer systems is known as cracking. Crackers are
those who engage in this activity.
Cracking software is illegal, and people often refer to cracked software as pirated software.
CYBER SECURITY
Security is crucial for modern information systems. Cybersecurity involves protecting computer
resources, including networks, devices, programs, and data, from unauthorised access, damage,
or attacks.
It’s essential to safeguard confidential data and privacy, as well as protect systems from theft or
disruption. Unfortunately, cyber crimes are increasing globally due to several factors:
Growing use of the Internet
Lack of awareness
Multi-pronged attacks
Existing software loopholes
Untrained Internet users
124 TrackGPT iPRO (V5.0)-VI

