Page 67 - Code Craft Computer-7
P. 67
2. By citing sources: Acknowledging the source from where certain material or idea is
borrowed.
3. Rephrasing: One can rephrase the content instead of copying it.
Pharming
It is a form of cyberattack in which attackers redirect the victims to a malicious or fraudulent
website of their choice even if they have entered the correct website URL. The aim of this crime is
to gain sensitive information.
To avoid pharming attacks, always enter the login credentials only on the websites whose URL
begins with https. In https, 's' stands for secure. These are protected sites which are indicated by a
lock icon.
Software Piracy
Piracy refers to the unauthorised duplication of products which are protected by Intellectual
Property laws.
Software piracy is the unauthorised use, duplication, and distribution of software that is protected
by copyright laws. It means that to use a copyright protected software legally, one has to buy its
license.
Software piracy takes place when duplicate software is used or distributed in the form of a
CD/DVD or links of a single licensed copy of a software is loaded onto multiple computer
systems. It is not possible to completely stop software piracy, however, it can be prevented by
following some simple computer ethics.
1. Always buy a licensed copy of software.
2. Do not make copies of a software or distribute them. If you purchase a single licensed copy
of a software, then use it only on one computer system.
3. Avoid using pirated CDs and software. Buy genuine products only.
Try It Out #Problem Solving
Identify the type of cybercrime.
1. Sending bulky emails to an address in a short time period _______________
2. Stealing someone’s identity to gain a financial advantage _______________
3. Unauthorized duplication of products that are protected
by Intellectual Property Rights _______________
CYBERCRIMES AGAINST ORGANISATION/SOCIETY
Apart from attacking individuals or stealing someone's intellectual property, cybercrime includes
forgery, online fraud, and cheating pertaining to credit cards, and sending bogus mails or
messages to obtain passwords of credit cards illegally. The motive behind such cybercrimes is to
create fear, to gain monetary benefits, or to steal confidential data and information of an
organisation or a society.
67

