Page 66 - Code Craft Computer-7
P. 66

methods that provide an enterprise an economic advantage and a competitive edge over its
                 competitors. If a trade secret is leaked, it could negatively affect the business. Disclosing a

                 trade secret is considered unfair and illegal. Trade secrets usually include sales methods,
                 consumer lists, advertising strategies, manufacturing processes, and so on.

            Different Forms of Cybercrimes Against Properties
            There are different forms of cybercrimes against properties. They are as follows:

            Identity Theft
            As the name suggests, it is a type of crime in which the criminal steals someone else's identity to
            gain financial advantage or other benefits using a fake identity. Millions of Internet users who do

            online shopping, money transactions, and share personal information over social media are prone
            to such attacks. The identity theft includes stealing a person's name, date of birth, bank details,
            credit/debit  card  numbers,  passwords,  digital  signature,  fingerprints,  and  so  on.  A  person's
            identity can be used to commit crimes against organisations and nations.

            Phishing
            It is a fraudulent attempt to trick innocent people to obtain their sensitive information, such as
            username, password, and debit/credit card details. A phishing attacker disguises himself or herself

            as  a  trustworthy  entity,  so  that  a  victim  can  easily  fall  into  their  trap.  Phishing  attacks  are
            generally  attempted  by  sending  emails  to  distribute  malicious  attachments  or  links.  This
            cybercrime is used to steal important information to cause financial damage, and to even block
            access to one's email account.

            Here are some tips to avoid being a victim to phishing:

            1.   Learn to identify the phishing emails. These emails pretend to have come from reliable
                 websites and use trustworthy company names. They lure the targets to claim their huge prize
                 money by revealing their credentials.

            2.   Never log in to the bank websites by clicking on the links sent through such emails.
                 Remember that banks will never ask you to share your password, credit/debit card numbers,
                 or any other personal details.

            Plagiarism
            Searching information on any possible topic is just a click away. The advent of Internet has made
            looking for information on any topic easy. But, you cannot use the available information to claim

            as your own creation. This information not only includes text, but also images, audio, video,
            design, and any other form of information which is protected by copyright laws. This means that
            if anyone uses such information without obtaining written permission from the rightful owners or
            without acknowledging its source, it is considered stealing someone else's creative property. The
            act of stealing someone else’s intellectual property is known as plagiarism      .

            You can use the following tips to avoid plagiarism.
            1.  Obtaining  Permission:  Before  using  any  copyright  protected  creation,  obtain  written
                 permission from the rightful owner.



                                                                 66
   61   62   63   64   65   66   67   68   69   70   71