Page 47 - iPlus_Ver_2.0_class_7
P. 47

Hacking

                 It is another common method used by cybercriminals to trouble victims. Using malware or other
                 tricks to obtain your e-mail ID and password, cybercriminals can gain access to your critical
                 information like social media accounts, bank accounts, etc.
                 Cybercriminals may also send offensive emails to the victim’s contacts via hacking the e-mail.
                 But not all hacking is destructive in nature. Some hackers use this technique for national security,
                 creating safer systems, etc. This is known as ethical hacking.

                                                     Keep a strong password for your Wi-Fi
                                                    connection and keep it changing regularly.





                                                                 Some tips to
                               Always download Trusted         safeguard from       Don’t plug in to devices
                             Apps from Internet and check          hacking          you are not sure about.
                            permissions and authentication.





                                                    Always look at the green lock sign ( ) and
                                                  htttps at the address bar of the window before
                                                   accessing any website to check if it is secure.
                 E-mail Spoofing

                 When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
                 not to be trusted.

                 For example, a user may receive an e-mail from a portal or social media platform where spelling
                 of service provider or email ID has been slightly changed.
                 For example, mailto:customersupport@tridentportall.com.
                 Notice that the spelling of "portall" is incorrect. These e-mails contain links which will direct the
                 user to another web page where the user would be asked to enter information by which means
                 the user ends up providing personal credentials to cybercriminals. This is also called as phishing.

                                                  Update the operating system and
                                                          antivirus timely.





                                                           Some tips to
                                                                                Use secure websites by
                                 Frequently update        safeguard from
                                                                               looking at the lock sign or
                                  your passwords.        E-mail Spoofing
                                                                               HTTPS on the address bar.




                                                   Use two-factor authentication to
                                                      log in to e-mail accounts.



                                                                                                                  45
                                                                         Ethics and Safety Measures in Computing
   42   43   44   45   46   47   48   49   50   51   52