Page 133 - TrackpadV5.1_class7
P. 133

NATIONAL CYBER SECURITY POLICY, 2013
                 It is a policy in India that aims to protect public and private infrastructure from cyber-attacks and

                 safeguards personal, financial, and banking information.



                                                                                                        21 st
                                                          Self Reflection                             Century   #Flexibility
                                                                                                        Skills
                    Your teacher asked everyone to write an essay as homework. Your friend was not interested in writing it. So
                                                          Self Reflection
                    he asked if he could copy yours and pretend it as his own and submit it. Do you think it would be ethical for
                    him to do so? What advice will you give him?





                        Hashtag

                      #Plagiarism: An act of copying information from the Internet and using it in our projects or works
                      #Phishing: An illegal practice of obtaining sensitive information from us through e-mails




                      REVISIT


                   ▶   The online or Internet-based illegal acts are called cyber-crimes.
                   ▶   Computer ethics are rules that govern our actions when we use computers and the Internet.
                   ▶   Spamming refers to the act of repeatedly sending unwanted e-mails called spam to a large number of recipients.
                   ▶   Hacking is an act of intruding into someone’s computer system for some unwanted purposes by identifying
                     the technical weak points of the security system.
                   ▶   Phishing is the illegal practice of obtaining sensitive information from us through e-mails.
                   ▶   Plagiarism is an act of copying information from the Internet and using it in our projects or works.
                   ▶   Software piracy is the unauthorised copying or stealing of software, movies, music or making these copies
                     available on the Internet.
                   ▶   Intellectual property rights are the exclusive rights given by the government to the owners of intellectual
                     creations.
                   ▶   Digital footprints or Digital Shadow are the traceable digital activities that we leave behind after surfing the
                     Internet.











                 1.  Tick ( ) the correct option.

                    a.  How does the practice of protecting computers from malicious attacks function?
                        (i)  Cyber space                            (ii)  Cyber crime

                       (iii)  Cyber security                        (iv)  Computer ethics



                                                                                                   Cyber Security  131
   128   129   130   131   132   133   134   135   136   137   138