Page 90 - TP_IT_V1.0_C10_flipbpookl
P. 90
• Identity: Where a hacker steals your personal information and assumes your identity. Using this false identity,
the hacker can gain access to your account information or perform illegal activity.
• Software Piracy: This is stealing of software and includes using or distributing unlicensed and unauthorised
copies of a computer program or software.
(b) Virus: Computer virus is a malicious code that attaches itself to a file and enters your computer system and makes
copies of itself and carries out the harmful tasks in such a way that it damages the important files of an operating
system or application programs or important data files due to which the computer may stop working.
Major types of viruses are Worms and Trojan Horse.
• Worms: Computer worms are a type of malicious software or malware that can replicate and spread on their
own mainly across computer networks.
• Trojan Horse: This malicious software disguises itself as a useful software but is designed to carry out harmful
activities on a computer. The name "Trojan Horse" comes from the ancient Greek story of the wooden horse
used to infiltrate the city of Troy.
(c) Online Predator: Online predators are individuals who use the internet to exploit, manipulate, or abuse
others, particularly targeting vulnerable populations like children and teenagers. They often build trust with
their victims through flattery, gifts, or attention. They may pose as peers or friends to create a sense of
familiarity and trust.
(d) Internet Scams: Internet scams often involve attractive offers that claim you have won a large sum of money in
a lottery or a prize and that you can claim the prize by depositing a certain amount of money. When you deposit
the money using credit card or online banking, you not only lose the deposit money but your card / account
information may be misused later.
Protecting Your Data
Data protection is safeguarding your data from data damage or data access by unauthorised people. It is always
a good practice to maintain and protect your computer by following some precautions and managing a few
computer settings.
Some of the important points to take care are:
• Use Proper Passwords Combinations for Your Computer Login: At the time to allocate passwords take care to use
the combinations of small letters, upper case, numbers, and special characters like $, %, &, etc. These combinations
are difficult to hack and will be able to save your computer from unauthorised access.
88 Trackpad Information Technology (Ver. 1.0)-X

