Page 49 - TP-Play_V-2.0_Book-6
P. 49

This opens a list of the following options:
                        Folder: To create a folder.
                        File upload: To upload a file to Google Drive.
                        Google Docs: To create a document similar to Word document on Google Drive.
                        Google Sheets: To create a workbook similar to Excel workbook on Google Drive.
                         Google Slides: To create a presentation similar to PowerPoint presentation on Google
                       Drive.
                        More: To create Google Forms, Google Drawings, etc.
            Step 6  Click on the New button.

            Step 7  Click on Upload Folders to upload and store the entire folder on the remote server.
            Step 8   Click on Google Docs, Google Sheets, and Google Slides to create an online document,
                     spreadsheet, and presentation respectively.

                CYBER SECURITY
            Security is an important issue for all modern information systems. The process of protecting computer
            resources such as networks, devices, programs, and data from unauthorised access, damage, or
            attack is called cyber security. Confidential data and privacy must be safe guarded, and the system
            must be protected against malicious acts of theft or disruption. Unfortunately, the number of cyber
            crime is on the rise around the world. The various reasons for increasing cyber crimes are:
                Increasing use of Internet            Lack of awareness          Multi-pronged attacks

                Existing loopholes in software     Untrained Internet users
                CYBER CRIME

            Cyber crime is a criminal activity in which computers are used to do crime. Most of the cyber crimes
            are carried out in order to gain personal profit. Some people break security only to check their skills.
            Types of Cyber Crimes

            There are various types of cyber crimes. Some of them are as follows:
                Data Diddling: Refers to the process of changing the data going into or out of a computer.
               For example, a student breaks into his/her university’s grade recording system and changes
               the grades he/she earned in last semester’s or class, thus raising his/her grade point average.
                Phreaking: This crime is committed against telephone companies by using computers with
               the goal of making free distance calls, impersonating directory assistance or other operator
               services, diverting calls to numbers of the perpetrator’s choice, or tapping phone lines.
                Cloning: This refers to a fraud in which scanners are used to steal the electronic serial numbers
               of cellular phones, which may used for billing purposes and making broadcast calls. With
               stolen serial numbers, clones can be made to make free calls that are billed to the owner of
               the original cell phone.
                Carding: This refers to the process of stealing credit card numbers online, to be resold or
               used to charge merchandise against victim’s account.

                 Hacking: It is the unauthorised access to computer system for the purpose of destroying the
               system or stealing important information from the system. Hackers are people who break into
               the other’s computer system to steal important data or to destroy it.

                                                                                    Services on Internet     49
   44   45   46   47   48   49   50   51   52   53   54