Page 110 - iPlus_Ver_2.0_class_6
P. 110
Some organisations actually employ computer hackers as part of their technical support staff.
These individuals use their skills to find flaws in the company’s security system so that they can
be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft
and other serious computer-related crimes.
Cracking
The process of stealing personal information, changing financial data, and breaking security
systems to gain unauthorised access to computer systems is called cracking. The people who
are involved in the process of cracking are called crackers.
Software cracking is considered illegal and cracked software is often called pirated software.
i + CYBERSECURITY
Security is an important issue for all modern information systems. The process of protecting
computer resources such as networks, devices, programs, and data from unauthorised access,
damage, or attack is called cybersecurity.
Confidential data and privacy must be safeguarded, and the system must be protected against
malicious acts of theft or disruption. Unfortunately, the number of cybrcrimes is on the rise
around the world. The various reasons for increased cybrcrimes are:
• Increasing use of Internet • Multi-pronged attacks
• Lack of awareness • Existing loopholes in software
• Untrained Internet users
To Sum Up
Internet is a global network of millions of computers and computer networks all over
the world.
Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.
Video conference is a live meeting held between two or more geographically separated
people.
The most common and popular VoIP services used are Skype and GoogleTalk.
Online chat refers to a communication in the form of small messages among the
computers over the Internet.
Social networking service is a platform where people with common interest or activities
can connect with each other.
In order to avoid misunderstanding in online communication, various rules have been
designed which are called Netiquettes.
Cloud storage is a service where the users are able to store and manage data on
remote server in place of their local computer.
Cyber threat is a criminal activity in which computers are used to damage data, steal
data, or disrupt digital life of a person.
The process of protecting computer resources such as networks, devices, programs,
and data from unauthorised access, damage, or attack is called cybersecurity.
108
iPlus (Ver. 2.0)-VI

