Page 84 - ModularV1.1 _c6_flipbook
P. 84
To use Google Drive cloud storage service, follow these steps:
Step 1 Visit www.google.com/drive/ web page.
Step 2 Click on the Go to Google Drive button.
Step 3 Enter your Gmail account‘s username and
then click on the Next button.
Step 4 Enter the password and then click on the
Next button. This will open your Google
Drive web page.
Step 5 Click on My Drive option. This will open a
drop-down list.
Google drive
Step 6 Click on Upload Files to upload and store
your file on the remote server.
Step 7 Click on Upload Folders to upload and store the entire folder on the remote server.
Step 8 Click on Google Docs, Google Sheets, and Google Slides to create an online document,
spreadsheet, and presentation respectively.
CYBER SECURITY
Security is an important issue for all modern information systems. The process of protecting
computer resources such as networks, devices, programs, and data from unauthorised access,
damage, or attack is called cyber security. Confidential data and privacy must be safeguarded,
and the system must be protected against malicious acts of theft or disruption. Unfortunately,
the number of cyber crimes is on the rise around the world. The various reasons for increasing
cyber crimes are:
Increased use of Internet Lack of awareness Multi-pronged attacks
Existing loopholes in software Untrained Internet users
CYBER CRIME
Cyber crime is a criminal activity in which computers are used to do the crime. Most of the cyber
crimes are carried out in order to gain personal profit. Some people break security only to check
their skills.
Types of Cyber Crimes
There are various types of cyber crimes. Some of them are as follows:
Data Diddling: This refers to the process of changing the data going into or out of a computer.
For example, a student breaks into his/her university’s grade recording system and changes
the grades he/she earned in the last semester or class, thus raising his/her grade point average.
Phreaking: This crime is committed against telephone companies by using computers with
the goal of making free distance calls, impersonating directory assistance or other operator
services, diverting calls to numbers of the perpetrator’s choice, or tapping phone lines.
Cloning: This refers to a fraud in which scanners are used to steal the electronic serial numbers
of cellular phones, that may used for billing purposes and making broadcast calls. With stolen
serial numbers, clones can be made to make free calls that are billed to the owner of the original
cell phone.
82 Modular (Ver. 1.1)-VII

