You are on page 1of 11

SUMMER VACATION

HOMEWORK
NAME – Yeshi Dorjee
Class- 11
Subject - computer
CYBER BULLYING
Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means.
Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly
common, especially among teenagers, as the digital sphere has expanded and technology has
advanced. Cyberbullying is when someone, typically a teenager, bullies or harasses others on
the internet and other digital spaces, particularly on social media sites. Harmful bullying behavior
can include posting rumors, threats, sexual remarks, a victims' personal information, or pejorative
labels (i.e. hate speech) Bullying or harassment can be identified by repeated behavior and an intent
to harm.[3] Victims of cyberbullying may experience lower self-esteem, increased suicidal ideation,
and various negative emotional responses, including being scared, frustrated, angry, or depressed
Click to add text
Awareness in the United States has risen in the 2010s, due in part to high-profile cases Several
US states and other countries have passed laws to combat cyberbullying Some are designed to
specifically target teen cyberbullying, while others extend from the scope of physical
harassment. In cases of adult cyberharassment, these reports are usually filed beginning with
local police.] The laws differ by area or state.
Research has demonstrated a number of serious consequences of
cyberbullying victimisation.[ Specific statistics on the negative effects of cyberbullying differ by
country and other demographics. Some researchers point out there could be some way to use
modern computer techniques to determine and stopping cyberbullying.
Internet trolling is a common form of bullying that takes place in an online community (such
as online gaming or social media) in order to elicit a reaction or disruption, or simply just for
someone's own personal amusement] Cyberstalking is another form of bullying or harassment that
uses electronic communications to stalk a victim; this may pose a credible threat to the victim
Not all negative interaction online or on social media can be attributed to cyberbullying.
Research suggests that there are also interactions online that result in peer pressure, which can
have a negative, positive, or neutral impact on those involved.[
-
DEFINITION
• A frequently used definition of cyberbullying is "an aggressive, intentional act or behavior that is carried
out by a group or an individual, using electronic forms of contact, repeatedly and over time against a
victim who cannot easily defend him or herself. There are many variations of the definition, such as
the National Crime Prevention Council's more specific definition: "the process of using the Internet, cell
phones or other devices to send or post text or images intended to hurt or embarrass another person."
• Cyberbullying is often similar to traditional bullying, with some notable distinctions. Victims of
cyberbullying may not know the identity of their bully, or why the bully is targeting them, based on the
online nature of the interaction. The harassment can have wide-reaching effects on the victim, as the
content used to harass the victim can be spread and shared easily among many people and often remains
accessible long after the initial incident
• The terms "cyberharassment" and "cyberbullying" are sometimes used synonymously, though some
people use the latter to refer specifically to harassment among minors or in a school setting
HACKING
• Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply
put, it is the unauthorised access to or control over computer network security systems for some illicit
purposeTo better describe hacking, one needs to first understand hackers. One can easily assume
them to be intelligent and highly skilled in computers. In fact, breaking a security system requires
more intelligence and expertise than actually creating one. There are no hard and fast rules whereby
we can categorize hackers into neat compartments. However, in general computer parlance, we call
them white hats, black hats and grey hats. White hat professionals hack to check their own security
systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat
hackers hack to take control over the system for personal gains. They can destroy, steal or even
prevent authorized users from accessing the system. They do this by finding loopholes and
weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat
hackers comprise curious people who have just about enough computer language skills to enable
them to hack a system to locate potential loopholes in the network security system. Grey hats differ
from black hats in the sense that the former notify the admin of the network system about the
weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds
of hacking are considered illegal barring the work done by white hat hackers.
HACKING TOOLS: how do hackers hack?
• Hacking is typically technical in nature (like creating malvertising that deposits malware in a drive-by
attack requiring no user interaction). But hackers can also use psychology to trick the user into clicking
on a malicious attachment or providing personal data. These tactics are referred to as “social
engineering.”
• In fact, it's accurate to characterize hacking as an over-arching umbrella term for activity behind most if
not all of the malware and malicious cyberattacks on the computing public, businesses, and governments.
Besides social engineering and malvertising, common hacking techniques include:
Botnets
Browser hijacks
Denial of service (DDoS) attacks
Ransomware
Rootkits
Trojans
Viruses
Worms
As such, hacking has evolved from teenage mischief into a billion-dollar
growth business, whose adherents have established a criminal infrastructure
that develops and sells turnkey hacking tools to would-be crooks with less
sophisticated technical skills (known as “script kiddies”). As an example,
see: Emotet.
In another example, Windows users are reportedly the target of a wide-
spread cybercriminal effort offering remote access to IT systems for just $10
via a dark web hacking store—potentially enabling attackers to steal
information, disrupt systems, deploy ransomware, and more. Systems
advertised for sale on the forum range from Windows XP through to
Windows 10. The storeowners even offer tips for how those using the illicit
logins can remain undetected.
INTERNET SECURITY
• Internet security is a branch of computer security. It encompasses
the Internet, browser security, web site security, and network security as
it applies to other applications or operating systems as a whole. Its
objective is to establish rules and measures to use against attacks over
the Internet.[1] The Internet is an inherently insecure channel for
information exchange, with high risk of intrusion or fraud, such
as phishing,[2] online viruses, trojans, ransomware and worms.
• Many methods are used to combat these threats,
including encryption and ground-up engineering
THREATS- malicious software
• Malicious software comes in many forms, such as viruses, Trojan horses, spyware, and worms.
• Malware, a portmanteau of malicious software, is any software used to disrupt computer operation,
gather sensitive information, or gain access to private computer systems. Malware is defined by its
malicious intent, acting against the requirements of the computer user, and does not include
software that unintentionally causes harm due to some deficiency. The term badware applies to
both malware and unintentionally harmful software.
• A botnet is a network of computers that have been taken over by a robot or bot that performs large-
scale malicious acts for its creator.
• Computer viruses are programs that can replicate their structures or effects by infecting other files
or structures on a computer. The typical purpose of a virus is to take over a computer to steal data.
• Computer worms are programs that can replicate themselves throughout a computer network.
DENIAL OF SERVICE ATTACK
• A denial-of-service attack (DoS) or distributed denial-of-service
attack (DDoS) is an attempt to make a computer resource
unavailable to its intended users. It works by making so many
service requests at once that the system is overwhelemed and
becomes unable to process any of them. DoS may target cloud
computing systems According to business participants in an
international security survey, 25% of respondents experienced a
DoS attack in 2007 and another 16.8% in 2010. DoS attacks often
use bots (or a botnet) to carry out the attack.
THANK YOU

You might also like