Professional Documents
Culture Documents
Ans: Multimodal Authentication
Ans: Multimodal Authentication
2
Want to Get All Subject Notes of 9th and 10th Class? Visit TopStudyWorld.com
Chapter 6
• Hackers
Software have in-depth knowledge of network programming and can create
Piracy:
tools
x. Name any
Software
andthree
malicious
piracyplaces
software
meanswheremaking
for others to break
authentication-of
illegal copies ofpeople
intc networks and create
is required.
software for use or sale for
problems
Ans: Username and computer
password users
are used
financial benefit When buytolicensed
authorizesoftware,
users to they
have have
accessthe to right to
Example:
use it on a single computer. Software Copyright Law does not allow to makeonillegal
computer systems, e-mail account, bank account and other services available
For example
computer.
copies of software a Hacker develops
and install It onsoftware
other incomputers
which a dictionary
or sell file
it. is
It loaded
allows that
software
contains dictionary
developers to PINS
benefit words. When
arefinancially
most commonlythe software
used with debit and credit cards inword
from their work. is run it tries all the dictionary retailbystores
word
as and
password
Information toother
manyPrivacy:hack places
a computer. This method
for payment worksIt ifisusers
of bills. alsohave
useda simple
with ATM password
cards thatto
exists inInformation
withdrawthe cash
dictionary
from ATM machines •
privacy refers to an individual's right to the privacy of personal
Cracker:
information Access cards
In modern informationare commonly used to
age, people areopen securitythat
concerned gates in offices
computers may where
be
Cracker
unauthorized
taking is a
away theirpeople computer
privacy user
areThe who
not Data
allowed breaks into
to enter.Act
Protection computer
Access(Law)cardssystems
are also
protects without permission
used to
the rights of open
the
using
barriers hacking
in parking tools for are
areas.ofThey personal gainto key orfor opening
damagehoteland room. commits
individuals against misuse personalaninformation
alternative by organizations. Organizations that
cybercrimes
hold the information should not allow unauthorized people to have access to information
• disclose
or Most of the outside
it to anyone crackers do not have professional computer skill to hack
the organization.
Internet computer
and Privacy: systems but they have knowledge about using hacking tools
• Crackers break into computers and cause serious damage. They also break
People
into Webwho use Internet
servers and replaceare worried
the home that pageit may of be eroding with
a website their aprivacy.
page of
their own design.
Internet users post their personal information such as full name, date of birth, place
These criminals
• residence.
of are dangerous
phone numbers, and harder
pictures. videos toetc.catch.on the Web and it stays
Example:
there Internet users enter personal information in websites to sign up or register for
services Forwithoutexample,
realizinga cracker
that thiscan mayinstall
lead ato key logger ofonprivacy.
invasions anotherThis user's computer
information
through Internet A key-logger is software which
can be accessed by hackers and used for harmful purpose. This poses a seriousrecords every typed letter on the
keyboard
threat to Whenprivacytheasuser uses Facebook
unauthorized peopleandcanenters accessthe Facebook account details,
personal information of
it will get recorded
individuals. Therefore, in the cracker's
people are computer.
concerned Now, about he invasion
can easilyofhack the Facebook
computer and
account.technology into people's privacy.
Internet