Page 84 - ModularV1.1 _c6_flipbook
P. 84

To use Google Drive cloud storage service, follow these steps:

                  Step 1  Visit www.google.com/drive/ web page.
                  Step 2  Click on the Go to Google Drive button.
                  Step 3  Enter  your  Gmail  account‘s username and
                          then click on the Next button.
                  Step 4  Enter  the password  and  then click on the
                          Next button.  This  will open your Google
                          Drive web page.

                  Step 5  Click on My Drive option. This will open a
                          drop-down list.
                                                                                          Google drive
                  Step 6  Click on Upload Files to upload and store
                          your file on the remote server.

                  Step 7  Click on Upload Folders to upload and store the entire folder on the remote server.
                  Step 8  Click on Google Docs, Google Sheets, and Google Slides to create an online document,
                          spreadsheet, and presentation respectively.
                      CYBER SECURITY

                  Security is an important issue for all modern information systems. The process of protecting
                  computer resources such as networks, devices, programs, and data from unauthorised access,
                  damage, or attack is called cyber security. Confidential data and privacy must be safeguarded,
                  and the system must be protected against malicious acts of theft or disruption. Unfortunately,
                  the number of cyber crimes is on the rise around the world. The various reasons for increasing
                  cyber crimes are:

                      Increased use of Internet             Lack of awareness         Multi-pronged attacks
                      Existing loopholes in software     Untrained Internet users

                      CYBER CRIME
                  Cyber crime is a criminal activity in which computers are used to do the crime. Most of the cyber
                  crimes are carried out in order to gain personal profit. Some people break security only to check
                  their skills.
                  Types of Cyber Crimes

                  There are various types of cyber crimes. Some of them are as follows:
                       Data Diddling: This refers to the process of changing the data going into or out of a computer.
                     For example, a student breaks into his/her university’s grade recording system and changes
                     the grades he/she earned in the last semester or class, thus raising his/her grade point average.
                      Phreaking: This crime is committed against telephone companies by using computers with
                     the goal of making free distance calls, impersonating directory assistance or other operator
                     services, diverting calls to numbers of the perpetrator’s choice, or tapping phone lines.
                      Cloning: This refers to a fraud in which scanners are used to steal the electronic serial numbers
                     of cellular phones, that may used for billing purposes and making broadcast calls. With stolen
                     serial numbers, clones can be made to make free calls that are billed to the owner of the original
                     cell phone.


                  82      Modular (Ver. 1.1)-VII
   79   80   81   82   83   84   85   86   87   88   89