Adobe Scan 09-Sept-2024

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

production),, without creditingthe source,

use(another's
cormmitliterarytheft.
presenttas newand original,anideaor product derivedfrom an ezisting source,
stionalCopyright Laws also state that "the expression of original ideas is
by copyright laws", just like the original considered as the Intellectual
Iis
etyand protected inventions. Almost allforrs, of expresions fall
copyright
the
protection as long as they arerecordedin somermanner (such as a book or cornputer file).
arismhas become very easy with technological advances, like web searching and
of
havelinked carelessness,laziness,lack finterest, and arrogance as the
copylpaste options. Most
cs major reasons of plagjarisrn.
Plagiarism
psto Prevent
simplestt way to prevent plagiarism is 'Citation. Acknowledging the original writer and source from
terialhassbeen takenis called'Citation'. Itincludes the following steps: where the
AMrosrces areneither accurate nor do they valídate the information as accurate.
he source, which informs the readers regarding the basis of one's ídeas and the
Therefore, one must specity
extent of one's research.
itation gives strength to your resource.
To avoid plaglarism, one can rephrase the material.
Use quotation marks around all the quoted words of another person to avoid plagiarism.
intheeducation sector, students should be encouraged to present their original and innovative ideas. Even if
they wish to refer to the resources, they should be made aware of the pattern of references. in this manner,
plagiarism can be avoided andthestudents should be motlvated to work hard and bring out their originality.
CYBERBULLYING
His an act of harming, harassing, or targeting a person by another
person using the internet, in a deliberate manner. This includes
sulting remarks and threatening messages sent byemall,
spreading
Tunours abbout the person either by emails or soclal networking sites,
POSting embarrassing photos and videos to hurt the person,
Ogatory remarks against gender, race, religion, or nationality.
Stepsto Prevent Cyberbullying
Youshould takethe followinggmeasuresito prevent cyberbullying:
Donot disclose your identity to unknown persons. opportunity
peers. Do not givebullies any
Safeguard your password and all prlvate information from inquisitive
to misuse the information on the social media platform.
e
your hand
know about him fully before extending
Searchnthe whereabouts of the you meet online and
person
for friendship.
friends only. Inyour
Restrict yourr
online profile to be checked by some trusted
action. against it. Do not berepulsive
It you are cyber bullied bysomeone, do not remainsilent but takesharethls problem with your parents.
and
language rather block the communiccation withthe cyberbully
HISHING

Iis an at of seding(anemail to
e t t e e to
believe that it is from a
The user is asked to visit trusted
to update or validate
his
a auspersonewherer,misleadiorganinghisatmion.
website
or
he is
to
hmah teinee the
Username, password, credit personal details,supposed
card Such as
hufte weheitre ft

or harmhl ommodIties
the operators of the fake
commit
details, etc. .\n
website steal your this way,
crimes in your name.
reputation and cause heavy financial
This
coould identity and
Steps to Prevent Phishing loSses.damage your
ldentify suspected phishing
against scam.
Ler's Know More emails that
Defamation is defined as a Do not click on
links, download come from
unrecognised
communication that
senders.
intends to harm or damage
files, or open
the reputation of a person,
business, product, Reware of links in
emai l s th at attachment s Sin se n ders. rt
government, religion, or
nation. Enhance the security of askto rthe personal emal s trom
antivirus, and your
comput er detals unknn
Do not ant
divulge i-
Enter your personal
spyware by
software. protectingit with
starts with sensitive dataininformation over the
httpsl|: and your secured websites onlphone
afirew al , spam fiters,
lock.
browser y. TheunlUFRLess ofyou initiate the
Know the Fact
Keylogger programs are
check your online displaysa green coloured iconsecurofedthewebste
a a

used to check the


user's
keystrokes and get
importantas passwords.
information, such
HACKING unauthorisedtransactaccounts
ions areandmade.bank dosa
statements regularly to ensure that n
Hacking refers to an illegal
system or network. intrusion into a
who secretly
break Hackers
into
are highly comput
technical er
people
to computers
data or to steal
sometimes
important data but alsodestroy it. They not important
to change hack applications andonly steal
program logics. Hackers websites
data for unethical usually tamper with
Let's Know More
break the purposes, just for an obsession
to
Social Engineering refers system's securities. Although hacking is done without any Consent fromthe
user, yet it is not always
to psychologically destructive. Hacking which is done for agood cause,such as
national security, etc., is known as Ethical hacking.
manipulation of people
into performing There is an equivalent term to hacking, i.e., cracking.( Crackersare technical people,wh
actions or
divulging confidential are experts in breaking into systems, to stealimportant data, such as ffinancial
details,or

information. Crackersalsocau[t
purpose.
passwords, etc. Sometimes, they use key loggers for this disturb applicationsb
harm to computers by destroying data. Apart fromthis, they
Spreading malware, changing program logicS, and outputs.
oeventA t Hacking
changeethem
periodically.
secretand
rNrpaSswords software,,like antivirus, frequently.
sand other
systems
operating hackers to steal the information and
Ndete our as it
WFi. makes easy for download inappropriate
open
USing
ADNd
ntent.
secure by looking at the green lock sign or httpss on the address bar. This ensures
websites
makeUseof passed from your device, is encrypted, making it difficult for the hacker to
thas
sensitive data, whichis
the
decipher
thet theinformation.

permissionssandauthenticity on the apps beforeiinstalling them. You should also ensurethat the
Anayscheck unnecessaryinformation. For example, a drawing app should not have access to your
accessing
BDDS not
are
information.
list or network
contact
dinformation on a website.
yourrcredit cardi
Neverstore
AMMING
unwanteddbulk emails that comeefrom unknown sources. They are generally sentin
ams are
e
unbersfor commercial advertising. In spamming, millions of copies of the same
SSOge are senttotheeemail users worldwide. Spam is a serious security concern as it can be
d to deliver trojan horses, viruses, worms, spyware, and organise targeted phishing
t3cks.

Sometimes, spam attackers keep sending bulk mails till the mailserver gets full. This practice is known as Mail
Bombing.
towto identify aspam?
Messages that do not include your email address in the To: or Cc:fields are the common forms of spam.
omespams can contain offensive language or links to the websites with inappropriate content.
Seps to Prevent
0 Installspam
Spamming
fitering/blocking software.
fyoususpect that an emailis aspam, do not respond,just delete it.
(
Consider rdisabling theemail client's preview pane and readingemailsin plain text.
0 Reject
allinstanttmessages from persons who are not in yourrcontact list.
Donot click on theeURLlinkS
l known source.
within instant messenger, unless it is received from a
Keepthe software:and security patches up-to-date.
NDIInthisVIdigital
DUALRIera,there
GHTTOohasPRIVACY is progressing,so the
been asignificant increase in the use of technology..As technology such as for personal
Pvacy parameters are
The internet is commonly used for variouS purposes, use of the internet
diminishing.
Communication,
Can affect accessingthe information on any topic, and for financial transactions, etc.
theeprivacy rights and dpersonal data of a person.
The
ivcy is one of the major conerns in one's lifo
Ler Know More the daim of individuals, groups, or The right to
extent the information about them Institutions determine privacy may be
could
to
be
when, hw, and to s defined
informatcommuni
ion cated
come intothe picture when personal
nmething d i n t fmm
the consent of the authorised person
to the
is what
collected,
others.Psrhvaacryeidstuheus
nhat the er neeve
or
he che X cing on Thñt measures should be taken to
avoid4 business used, and
ofconcerned. SoSo, certain prevertive
the
notentialh revealing
mnfidential information or
taking contol oB his
Stepsto Protect Privacy
Be careful while
infringement privacy.
omputer while clicking on
seemingly innocuOUs web
sharing
Never share your login your personal profile on the
Delete any sensitive details with anyone. soial
pages

Know the Fact


Never click on allink datathatis not in use.
Protect your onlinesentto youvi atext or email
networkingsites.
Acookieis asmall textprivacy
Vishing is the criminal
practice of using sOcial
theinforsecurity
mation software,
by

online onyour Computer'


lfromastranger.
file storeddisabling tthe cookies in
influence over the
telephone system, most
often using features
facilitated by Voice over IP
Install
system
againstintr
of your

usions
activity
like andr
antivirus, eportsb sbt
r
ackthoe
ow
wseeb
r
the rodN
ire
hostSce
tornythabteingcu
os
l e
et
c.ts
(VoiP), tO gain access to
sensitive information. The Lockyour system when infections. antispyware,
and
notinuse.
or
firewal to protect y
term is a
combination of
"Voice" and "Phishing". SOFTWARE PIRACY
When software is
copied and
cYouencourage distributed
opyrightisrequisofredtwtoarecopytpiracywhen: il egally, called software
itis
Let's KnowMore you purchase a
hegenuine programs someone piracy.Alicer a
of
else. w
Bot is one of the
most
sophisticated types of software and loadsingleit onto
licenced copy of the
several
crime-ware applications Computers contrary to the licence's
that perform a wide terms. This is called
ariety of automated tasks you make Softlifting.
copyrightedunauthorised
on behalf of the
cyber copies of the
criminals. software distribute them.
and
you install
unauthorised copies of software on the hard disks of pers
computers.
you make unauthorised seling of
Know the Fact software for temporary use or sell or buy
software CDs/DVDs on rent.
yberespionage is the act
or practice of
obtaining Stepsto Prevent Software Piracy
secrets from individuals, thelicene
Buy the licenced copy of a software. Followthe terms anddcconditionsofthem.
ompetitors, rivals, groups, circulate
for each software product youpurchase.. Never makeccopiesand Avodusi!
overnments and enemies isgenuine.
for military, political, or dsellerto ensure thatit watchmovies.
Purchasesoftware CDs from areputed
economic advantage. friends to listentoyourfavourite
musicor
illegal CDs givenby your
V•ilableeonline, download it directlyfromnthe manufacturer's website.

softwaretoavoidsoftlifting.
t
ATUALPROPERTYRIGHTS
tePropertyisatermthat refers to the legal property rights of a person over his/her creations of mind.
stkandcommercial. Under Intellectual Property Law,the owners are granted certain exclusive rights to
tthecreator'shard workisssafe and protected fromthe unauthorisedcopyingand piracy.

Intellectuall Property Rights


Protect
NIventions:A
patent is aright, relating to the new inventions that grants the inventor the soleright to
USE.andsellthatinvention for aspecific period of time. The validity period for apatent in India is 20 years from
application.
fingthepatent
tyour Art and Publications: Acopyright is a legal right grantedby the law to the creator for his original
enightsprovidedunderthe Copyright law prohibit tthe othersto create acopy of the work, translation of the
andthedistribution of the work to the public. Legal action can be taken if someone copies the work without
mSSIon ofthe author or organisation. It covers artistic and literary creations, such as novels, plays, poems,
compositions, and architectural designs. The copyright of a work lasts for morethan seventy years, even
tedeath ofits author.
wor1ur Trademarks:This protects your brand names, logos, packaging, and the other distinctive designs that
and distinguish the products of one manufacturer or seller from that of the other's. The validity period for a
ak is ten years and can be renewed.

1SAFETY MEASURES WHILE USING COMPUTER AND THE INTERNET


orthe internet:
Ls03k at the various safety measures that should be undertaken while usinga computer
TNnors should always surf the internet under the supervision oftheir parents.
zets shoulddecide and suggest age appropriate websites to their children.
passwords. Astrong
crackers, one should use strong
I To minimise the chances of the attack of hackers and that are a
characters, stronger the password)
255Word rmust consist of at least six characters (more the

(ombinationnof letters, numbers, and symbols (@,##, $,7,etc.)ifallowed. site to another, encryption can be
one
transmitting the data from an encrypted
code. The result is Decryption,
losing data privacy while
datainto
unreadable
called
mplemented. Encryption is the process of transformingreceiving end it undergoes a process
file, which is At the
transferred over the network. form.
which convertsthe encryptedinformationintoareadable updatesto makeit
robust.
I operating ssystem
Setup your Computerfor automatic software and method of data
protection.
comefrom
and most reliable forms inemailsthat
Taingrregular data backup istthe primary
gnore unwanted and strange emailsand be
cautious of
attachments.links. and

unauthorised people
to access
implemented theon
your

Unknown people. systemthat


preventsthe
combination of both.
Itis
firewall is a security
Make
use of firewalls. A
either hardware
or software
or a
System and network. It can be
127
Kips

You might also like