Page 121 - Trackpad_ipro 4.1_Class6
P. 121

CYBER SECURITY

                 Security is an important issue for all modern information systems. The process of protecting
                 computer resources such as networks, devices, programs, and data from unauthorised access,
                 damage, or attack is called cyber security.
                 Confidential data and privacy must be safeguarded, and the system must be protected against
                 malicious acts of theft or disruption. Unfortunately, the number of cyber crimes is on the rise
                 around the world. The various reasons for increased cyber crimes are:
                    Increasing use of Internet                           Lack of awareness
                    Multi-pronged attacks                                Existing loopholes in software
                    Untrained Internet users


                    Reb            t


                         The Internet is a global network accessible from all over the world.
                         Some of the popular e-mail service providers are Gmail, Yahoo Mail, etc.
                         Technique of watching a person while talking to him is called video conferencing.
                         Online chat refers to a communication in the form of small messages among computers
                        over the Internet.
                         A social networking service is a platform where people with common interest or activities
                        can connect with each other.
                         In order to avoid misunderstandings in online communication, a set of rules has been
                        designed which are called Netiquettes.
                         Cloud storage is a service where the users are able to store and manage data on remote
                        server in place of their local computer.
                         Cyber threat is a criminal activity in which computers are used to damage data, steal
                        data, or disrupt digital life of a person.
                         The process of protecting computer resources such as networks, devices, programs,
                        and data from unauthorised access, damage, or attack is called cyber security.






                  OneOne Touch           Learn                                              Section A (Objective)



                 A.  Tick ( ) the correct option.
                    1.  Which of the following is not a cloud storage service provider?

                       a.  Google Drive                                b.  Dropbox
                       c.  Instagram                                   d.  Hard Disk

                    2.  What is the technique for watching a person while talking to him called?
                       a.  Video conferencing                          b.  E-mail

                       c.  Cracking                                    d.  E-banking




                                                                               Online Surfing and Cyber Security  119
   116   117   118   119   120   121   122   123   124   125   126