Page 67 - Code Craft Computer-7
P. 67

2.  By  citing  sources:  Acknowledging  the  source  from  where  certain  material  or  idea  is
                 borrowed.

            3.  Rephrasing: One can rephrase the content instead of copying it.

            Pharming
            It is a form of cyberattack in which attackers redirect the victims to a malicious or fraudulent
            website of their choice even if they have entered the correct website URL. The aim of this crime is
            to gain sensitive information.

            To avoid pharming attacks, always enter the login credentials only on the websites whose URL
            begins with https. In https, 's' stands for secure. These are protected sites which are indicated by a
            lock icon.

            Software Piracy
            Piracy  refers  to  the  unauthorised  duplication  of  products  which  are  protected  by  Intellectual
            Property laws.

            Software piracy is the unauthorised use, duplication, and distribution of software that is protected
            by copyright laws. It means that to use a copyright protected software legally, one has to buy its
            license.
            Software  piracy  takes  place  when  duplicate  software  is  used  or  distributed  in  the  form  of  a

            CD/DVD  or  links  of  a  single  licensed  copy  of  a  software  is  loaded  onto  multiple  computer
            systems. It is not possible to completely stop software piracy, however, it can be prevented by
            following some simple computer ethics.
            1.  Always buy a licensed copy of software.

            2.  Do not make copies of a software or distribute them. If you purchase a single licensed copy
                 of a software, then use it only on one computer system.
            3.  Avoid using pirated CDs and software. Buy genuine products only.



                      Try It Out                                                                   #Problem Solving

              Identify the type of cybercrime.

              1.  Sending bulky emails to an address in a short time period              _______________
              2.  Stealing someone’s identity to gain a financial advantage               _______________
              3.  Unauthorized duplication of products that are protected

                   by Intellectual Property Rights                                       _______________


            CYBERCRIMES AGAINST ORGANISATION/SOCIETY
            Apart from attacking individuals or stealing someone's intellectual property, cybercrime includes

            forgery,  online  fraud,  and  cheating  pertaining  to  credit  cards,  and  sending  bogus  mails  or
            messages to obtain passwords of credit cards illegally. The motive behind such cybercrimes is to
            create  fear,  to  gain  monetary  benefits,  or  to  steal  confidential  data  and  information  of  an
            organisation or a society.

                                                                 67
   62   63   64   65   66   67   68   69   70   71   72