Page 109 - iPlus_Ver_2.0_class_6
P. 109

•  While writing an email, the person(s) whom you want should answer must be marked in the ‘To:’
                    field. The persons marked in the ‘Cc:’ field may or may not respond to the mail.

                 •  Avoid using the “Reply to All” option when not necessary to answer everyone marked in the email.
                 •  Try to overlook the minor typing mistakes made by the sender.

                                                                                          #Digital Literacy

                      Let’s CatCh Up


                   Write 'T' for true and 'F' for false.
                   a. E-banking is useful for bankers as well as customers.                              ...................
                   b. Signatures in an email should be long and complex.                                 ...................
                   c.  The users can access their data from anywhere by logging into their cloud
                     storage account.                                                                    ...................



                  i +  CYBER THREATS

                 Cyber threat is a criminal activity in which computers are used to damage data, steal data, or
                 disrupt the digital life of a person. Most of the cyber threats are carried out in order to gain
                 personal profit. Some people break security only to check their skills.
                 Types of Cyber Threats

                 There are various types of cyber threats. Some of them are as follows:

                 Data Diddling
                 This refers to the process of changing the data going into or out of a computer. For example, a
                 student breaks into his/her university’s grade recording system and changes the grades he/she
                 earned in the last semester or class, thus raising his/her grade point average.
                 Phreaking

                 This crime is committed against telephone companies by using computers with the goal of making
                 free distance calls, impersonating directory assistance or other operator services, diverting calls
                 to numbers of the perpetrator’s choice, or tapping phone lines.
                 Cloning

                 This refers to a fraud in which scanners are used to steal the electronic serial numbers of cellular
                 phones, which may be used for billing purposes and making broadcast calls. With stolen serial
                 numbers, clones can be made to make free calls that are billed to the owner of the original cell phone.
                 Carding

                 This refers to the process of stealing credit card numbers online, to be resold or used to charge
                 merchandise against the victim’s account.
                 Hacking

                 Computer hacking is the practice of modifying computer hardware and software to accomplish a
                 goal outside of the creator’s original purpose. People who engage in computer hacking activities
                 are often called hackers.


                                                                                                                 107
                                                                                 Online Surfing and Cybersecurity
   104   105   106   107   108   109   110   111   112   113   114