Professional Documents
Culture Documents
T
PU CT
OM JE
C RO
P
NAME: POOJA V. SHARMA
ROLL NO: 09
CLASS: 11TH SCIENCE
SCHOOL: BHASKARDYUTI VIDYALAYA
SOCIAL
NETWORKING
ABOUT
Targated advertising
Time waster
Cyber stalking
Virus attacks
UNAUTHORIZED ACCESS AND
HACKING
Unauthorized access means any kind of access without
the permission of either of the rightful or person in
charge of the computer, computer system or computer
network.
Hacking means an illegal intrusion into a computer
system and/or network.
WEB HIJACKING
Web hijacking means taking foreceful control of another
persons website. in this case the owner of the website
loses control over his website and its content.
CYBER STALKING
Cyber stalking means repeated acts of harassment or
threat+ning behavior of the cyber criminal towards the
victim by using internet services. Both kind of stalkers
i.e., online and offline-have desire to control the victims
life. Stalking may be followed by serious violent acts
such as physical harm to the victim.
DENIAL OF SERVICE ATTACK
This is an attack in which the criminal floods the
bandwith of the victim’s network or fills his e-mail box
with spam mail depriving him of the services he is
entitled to access or provide. This kind of attack is
designed to bring the network to crash by flooding it
with useless traffic.
VIRUS ATTACKS
Viruses are the programs that have the capability to
infect other programs and make copies of itself and
spread into other program. Programs that multiply like
viruses but spread from computer to computer are called
worms.
CYBER
ETHICS
Cyberethics is the philosophic study of
ethics pertaining to computers ,
encompassing user behavior and what
computers are programmed to do,and how
this affects individuals and society.for
years ,various governments have enacted
regulations while organizations have
defined policies about cyberethics.
Cyber ethics is the study of ethics
pertaining to computers,covering user
behaviour and what computers are
programmed to do, and how this affects
individuals and society. For years, various
governments have enacted regulations
while organizations have explained
policies about cyber ethics.
CRIME AND PUNISHMENT
Children do not believe that they will get into any real
problem from neglecting the use of cyber ethics. It has
become easy to track the origin of wrong activity over
the internet to an individual user . There is not much
anonymity as a child may trust .
HOW TO
SMARTLY USE
INTERNET
Surf smart
Choose email addresses and passwords that aren’t guessable