Professional Documents
Culture Documents
(a) Hacking: Unauthorized access into any computer system or network. Those who
do hacking is called hackers.
Types of hacker:
(i) White Hat Hackers: White hat hackers try to find out the loopholes of the
security measures of a system. They are also called ‘Ethical Hackers’.
(ii) Black Hat Hackers: Black Hat Hackers get into a system for dishonest
purposes.
(iii) Gray Hat Hackers: Gray hat hackers enact a blend of both black hat and white
hat activities. They often look for vulnerabilities in a system without the owner’s
permission or knowledge. If issues are found, they report them to the owner, sometimes
requesting a small fee to fix them.
(b) Credit Card Fraud: Credit Card Fraud can occur when unauthorized users gain
access to an individual's credit card information in order to make purchases, other
transactions, or open new accounts.
To avoid Credit Card Fraud, the banks are now make a privacy so that one can’t use the
others credit card because of the mobile security code and two steps verification.
The symptoms that the computer and ICT devices are infected by a virus:
Opening a file and program takes longer than the usual time.
The memory has little space, leading to a slow performance of the computer.
Showing unexpected messages incompatible with the works while running the
computer.
Installation of a program takes longer than usual time.
The running files take more space.
The machine shuts down during booting or working time.
The names of the folders are replaced with cryptic names.
(d) Cyber Terrorism: Use of internet based attacks in terrorist activities. There are
laws to prevent cyber crimes.
(f) Software Piracy: Theft of software through the illegal copying of genuine
programs.
(g) Spoofing: The word ‘spoof’ means to trick, or deceive. Therefore, in the IT world,
spoofing refers tricking or deceiving computer systems or other computer users.
Spoofing can take place on the internet in several different ways:
E-mail Spoofing
IP Spoofing
Fake Identity
How do you prevent your computer system free of spoofing?
Answer:
Always keep your computer system updated with a good anti-virus software.
Do not open the mail if you do not recognize the sender.
Ignore any mails which come without sender names.
Ignore any mails which have your name in the sender details.
Do not open any mails if it has only a link in the body of the message.
Cyber law: