Trends in Computing and Ethical Issues 2
Trends in Computing and Ethical Issues 2
Artificial Intelligence, Virtual Reality and Augmented Reality, Internet of 1:hings (loT),
Intellectual property and corresponding laws and rights, software as intellectual
property. Software copyright, Software patents and t~e diffe~ence betweeh th~ t:vvo;
trademarks; software licensing and piracy, Cyber security, Net1quette, Spam, Ph,sh_ing,
Free software foundation and its position on software, open source software, various
types of licensing (e.g. GPL, BSD).
ARTIFICIAL INTELLIGENCE
In today's world of rapidly changing and
advancing technology, our intelligence works
as one of the greatest forces of innovation
and development. In true sense, intelligence
is the human capability of creativity and
problem solving facilitated by using one's
brains. It can also be described as the ability
to perceive information and to retain it,
as knowledge and behaviours within an
environment. Basically, intelligence includes
the following characteristics:
• Knowledge • Reasoning
• Problem solving • Perception
• Learning • Planning
• Thinking • Ability to manipulate
When these charcteristics are applied to machines, is is known as Artificial Intelligence
(AI). Artificial intelligence is commonly implemented in computer systems which are
completely based on software programs. It follows the logic of the computer programming
and acts accordingly. It can also be referred to as the opposite of Natural Intelligence (NI)
which is controlled and regulated by human beings.
Artificial Intelligence (AI) has already changed many aspects of our lives. In today's
world, AI plays a vital role in the modernisation of the society, which further enables us
to carry out our daily work easily and comfortably.
Artificial intelligence (AI) is the technology that makes use of machines such as computer
systems, robots, etc. to think and to learn just like the human mind does. This can be
done by developing computer systems and algorithms which are capable of learning
from data, reasoning, understanding natural language, perceiving their environments and
adapting to new situations. The goal is to create efficient systems, capable of mimicking
or surpassing human intellectual abilities, such as pattern recognition, problem-solving
and decision-making.
r. .l r is t1S
JV daY lives
ed 10 enhance and improve the efficiency of many products that w
like smartphones video
·
. . . ' .
h . .
.
e use m our
games, s oppmg experiences and even some
J8ftrts ability to find effia_e nt solutions for modern-day problems makes it one of the
tof t· sotlght-after technological components of the 21st century
. .
111051 or Artifici~l Intelligence refers, to as the field nf co111putcr sci('ncc that fornses on crC'ating
,.,tt~lige11t machines that can perfo1111 tn.:;/cs rmd 111n/ce derisions that typically require human
' ·//igence.
1
,,1t
' for eXample,
Robots are pr~grammable machines which can execute specific tasks with little or no
1
uinan intervention. Robots are even capable of working in difficult environments where
huinans cannot reach or in areas where the work environment is hazardous. There are
h,arious types of robots that we see in our daily lives, to provide various services to
~- 5ome of them include Humanoid Robot, Restaurant Robot, Business Robot, Security
Robot, etc.
features of Artificial Learning
5ome of the primary features of Artificial Intelligence are mentioned below:
, Learning: AI systems are capable of learning from data and experiences, which helps
them to become more effective over time. They employ algorithms and models to find
patterns, to anticipate the future and to modify their behaviour in response to the
feedback.
• Creativity: AI systems are being developed to exhibit creative capabilities. They can
generate art, compose music, write stories and provide novel solutions to problems.
• Autonomous Decision Making: AI systems can make decisions and take actions
independently without human intervention. They can evaluate information, weigh
different factors and execute actions based on predefined rules or learned patterns.
• Reasoning and Problem-Solving: AI systems are capable of logical reasoning, information
analysis and complicated problem-solving.
• Perception and Understanding: AI systems can perceive and interpret their environment
through sensors, cameras or other input sources. They can understand and extract
meaning from various forms of data, such as text, images or speech, etc.
• Natural Language Processing: AI can process and understand human language. It
enables machines to understand, generate and respond to human speech or text. Natural
language processing is used in chatbots, voice assistants and language translation
systems.
• Computer Vision: AI systems can analyse and interpret visual information from images
or videos by recognising objects, faces, gestures, and other visual patterns. Computer
vision is applied in areas like image recognition, object detection, and autonomous
vehicles.
• Adaptability: AI systems can adapt to changing conditions or new information. They
can adjust their behaviour, strategies or models to handle novel situations or unexpected
inputs.
~olog in AI
Prolog stands for PROgramming in LOGics. It is a fourt~ generation lan~age ':hlch is
to~pletely logical and declarative in nature. It is well-swted for d~velopmg logic-based
artificial intelligence applications. It allows the programmer to specify the rules and facts
~ ut a problem domain and thereafter, the Prolog interpreter uses these rules and facts
autornatically infer the solutions to the problems.
Apart from AI, Prolog is used in various other domains. Soi:ne of the ~elds include
Intelligent Database Retrieval, Natural Language Understan dmg, Machine Learning,
Robot Planning, Problem Solving, etc.
Just to Know!
Siri is an intelligent personal assistant and a part of Apple Inc.'s
iOS (Operatin g Systems). The assistant uses voice queries and
a natural language user interface to attempt to answer our
questions, make personalis ed recommen dations and perform Siri
, actions by delegating requests to a set of Internet services.
Areas of applicati on of AI
With the advancem ent in AI technology, we are not restricted to only SIRI but also are
extending the basic concepts of AI in various applicatio ns such as in self-drivin g cars,
while performin_g_ ~ritical s~geries in ~ospitals, in unmanned departmen tal stores and
many more. Artificial Intelligence (AI) 1s progressin g rapidly in the field of Science and
Technology. The areas where Artificial Intelligenc e plays a significan t role in our daily
lives are:
• Robotics
Robotics is a branch of engineerin g
which includes varied branches such
as Mechanica l Engineerin g, Electronic
Engineerin g, Computer Science, etc. It deals
with constructi on, design and control of
sensors and informatio n processing . These
technologi es, when put in a device, is known
as a robot.
• bots are assumed to be vital d .
~,e ro tivities in the near future ur evices which can b
----•••11111111
,,;r ac f . vve may c e used t0
tltc;, the appearance o a human be· reate a robot. · replace hum
#e obots are even useful in sommg. They Walk, talk tinh.anky form but, most ~~sthand
the r f e sensitiv 1 , in and
~;~
ov,,,.cw
-•lt or unsa e such as bomb dete t· e P aces where respond as humans
em
c ion a d b our app h •
.. rt ;\ssistants n omb deacti vati roac es are either
SJllll> on, etc.
' neral, a person who assists so .
Jll ge lk b . meone is call d
,,1nat
vvi-
if we. ta a out. a vrrtual ass1·stant or a e an assistant •
art/ virtua1 assistant is loaded smart assistant?
As01 I h 1 onto the d . .
!k!Tare app. t e ps the user by . ev1ces with the
sow· . th . d answering q .
perforrrung e requrre tasks or serv·ices. ues tions and
, reover, it can also control othe.
l"'10 I smart d ·
sJJlart TV, sma~t light, smart speakers etc S ev1ces such as
norrnallY Wi-F1-enabled and are hand · mart speakers are / J
controlled from a distance using ou y speaker~ which can be .-/
r voice for instructions
5orne well-~own smart assistants include Alex .
Google Assistant by Google. a (Amazon product), Siri (iPhone) and
, Health Care Industries
Al can track patient data more efficient!
than _hu1:1ans can. Using AI, health ~~~ ~::~::- - -.i
.
"' " \ // t///llll/lll//l);Nll/11'\
For example, \
"
.._
• •
I ...~ .. • '-.: 'I.
'/lllltl ~lfll/ U,,
Conclus ions
Many smart home devices have the ability to learn our behaviour al patterns. This helps
us in saving money by adjusting the settings on our thermosta t, or other appliances,
thereby, increasing our convenien ce and saving energy.
For example,
1. Turning the 'Room Heater' off when we leave for work. It can be performed by
adjusting the thermosta t to turn the 'Room Heater' ON, when we are at home. Thus,
it helps us by saving electrical energy when we are out.
2. Lighting is another example, where we might see some basic artificial intelligence
being applied. By setting defaults and preference s, the lights around our house (both
inside and outside) might get adjusted. It depends on different situations like where
we are and what we are doing.
The different settings could be like, dimmer for watching TV, brighter for cooking
and medium light for eating.
Thus, the use of AI will also make our home 'Smart Home'.
C on cl us io n en t pr es en te d to ou r senses in su
ch
en vi ro nm
cr ea tio n of a vi rtu al nm en t. It can be used
for the
Virtual re al ity is th e. in th e sa m e en vi ro
nc e ou r pr es en ce le m so lv in g. We can ex
pe ct m an y
a w ay th at w e ex p~ ne w el l as cr iti ca l pr ob
m en t an d as
pu rp o_ses of ~n te rt am of th e te ch no lo gy in th e ne ar fu tu re .
m or e in no va tiv e us es
L IT Y
AU G M E N T E D R E A w he re w e focus directly or
ve rs io n of re al ity
It is an en ha nc ed al w or ld el em en ts of th e el}vironm
ents.
ys ic al , re pr og ra ms
in di re ct ly on th e ph ar e de si gn ed es pe ci al ly in 3D
re al ity ap ps io n in
Titis ty pe of
ve lo pe r to an im at e th e di gi ta l in fo rm at
w hi ch al lo w th e de
th e co m pu te r pr og ra
m.
s fo r gl ob al po sit io ni ng sy ste m (GPS), to
ne
ns su ch as sm ar tp ho in in g for object an d ge
sture
It in cl ud es ap pl ic at io m ili ta ry, du rin g tra
lo ca tio n or by th e
pi np oi nt th e us er 's
virtual
re co gn iti on . nd in g in to a di gi ta l interface by placing
tu rn s ou r su rr ou are m en tio ne d below :
A ug m en te d Re al ity A ug m en te d Re al ity
ap pl ic at io ns of
objects. So m e of th e
co nc ep t . of
• By us in g this ~ -
surgical
au gm en te d reality, m e m uc h
pr oc es se s will be co
ll re du ce
m or e si m pl er an d wi
pr ob le m s
th e ch an ce s of m ed ic al
plica ted
ar is in g af te r a com
ha s
• A ug m en te d re al ity su rg er y.
gr ea t helps the
he lp ed in of fe rin g
r ex am ple: Ey e De cide is ~ ap p wh ic h
Fo
ga m in g ex pe rie nc es . ab ou t th ei r eye he al th
.
pa tie nt s kn ow m or e
Difference between Augmented Realit y and Virtual Reality
Virtual Reality and Augmented Reality can be considered as the two sides of the same
coin. However, they can be distinguished in the following ways:
• Augmented Reality simulates artificial objects in the real environment whereas Virtual
Reality creates an artificial environment for the user to inhabit.
• In Augmented Reality, the computer uses sensors and sets the position of a camera.
• The AR technology then condenses the 3D graphics in such a way that they would
appear from the viewpoint of the camera which would superimpose the computer
generated images over a user's view of the real world.
• In Virtual Reality, rather than locating a real camera within a physical environment,
the position of the user's eyes are loca ted within the simulated environment. When
the user turns his head, the graphics move accordingly.
• Virtual Reality technology creates a convincing and artificial interactive world for the
user.
(iii) Trademark
A trademark is an identity to preserve a software. Sometimes, a trademark becomes such a
success that it is actually worth more than the product. It helps in selling an image or an
identity of the product rather than the product itself. A trademark or trade mark, identified
by the symbols™ and®, or mark is a distinctive sign or indicator used by an individual
r . organi sation . It identif ies the prod uct sand/ or · .
SJiless origin ates from . service s, with which the tradem ark
1,tJ ppears . The tradem ark
5ig1' a ,ices from those of other entitie s. A tr aaduruq ue ~ource to disting uish its produc ts
r sef' d emark 1s a typ f .
o d typically a name, wor ' phrase , logo, symbo l desi . e o Intellectual proper ty,
aI1 elemen ts. The owner of a re(no:::t ered tr d ' gn, IIDage, or a combi nation of
wese .
infrin o~ a emark may co
tradem ark gemen t to preven t unauth . d mmen ce 1egal procee dings
for . onse use of that tradem ark
referre d to as an dis . . . . .
fhe term trade ~~k IS -~o te by which an
. diVidual is readil y identi fied, such as the well kno tinguis hing _a~nbu
Jil ential functi on of a tradem ark is to exclus ive! 1 .d ~char acteri stics_ of celebrities. The
th source or origin
~sproduc ts or servic es, such that a tradem arky en 1 e corn.i:ne~c1al
md1ca tes the source or
o r,res as a badge of origin . The use of a trade m~tr ~p~ calle~, as trademark use
se m sway 1s known
rights genera ll . f ·
It should be noted that the tradem ark
~: ~:\:,~ :e~r
to m~ta in exclus ive rights over that sign, in relatio n t~ ;;~~:; ~r~d~ '
assuming there are no other tradem ark obJ·ections dunn·g e mg process. th fil'
Infrin geme nt
An ~gem ent ref~rs to as the act of violati ng laws or rights, breach
or an unauth orised
can say that it is the
act with ~espec t to ~telle ctual proper ty right. In other words , we
Someo ne can
act ?f usmg _a no_the_r s pro~ec ted intelle ctual proper ty withou t permis sion.
re of the proper ty
be liable for infrmg mg on mtelle ctual proper ty, even if they are unawa
whfrh is protec ted.
The infring ement can furthe r be catego rised in the follow ing ways:
• Copyr ight Infrin gemen t
produc tion of
Copyr ight Infrin gemen t occurs when a third party violate s the use or
permis sion of
any of the creato r's exclus ive rights to the work withou t acquir ing the
, broadc asting,
the copyri ght holder. It may includ e variou s distrib utions such as selling
adapta tion or cop ying of the work.
• Patent Infrin gemen t
manuf acture s,
When a third-p arty, other than the patent ee or licensee of the patent ee
permi ssion/
impor ts, uses, sells or offers the patent ed techno logy for sale withou t the
license from the patent ee, it is known as patent infring ement.
someo ne else
In other words , if the rights grante d to the patent ee are exercis ed by
on or patent
who is not authqr ised by the patent ee, it would be consid ered as a violati
the law.
infrige ment and the person is liable to face for the conseq uences under
• Trade mark Infrin gemen t
Tradem ark Infring ement refers to the
unauth orised usage of a mark that
is identic al or decept ively simila r
to a registe red tradem ark. In such
a scenar io, the onlook er may get
4A.~ Origi nal \
~i:y
l ad idol ls
con.fused about the origin of the adidas I
mark of those goods or service s.
ns:
A registe red tradem ark is said to be infring ed under the follow ing situatio
ark.
• If the mark is identic al or decept ively simila r to the registe red tradem
• If the identic al or simila r mark can cause con.fusion in the minds
of genera l public
with the registe red tradem ark.
contra ry to
• If the tradem ark is advert ised and as a result it takes unfair advant age,
. .
the hones t practic es of the registe red tradem ark.
or labelli ng
• If the registe red tradem ark is used in the materi al ~eant for packag mg
of other goods witho ut due author isation of the registe red user.
4
DATA PRO TECT ION ON THE INTE RNE T
When you access the Intern et to get inform ation from a
websi te or to share your inform ation, then you sho.u ld
under stand that it is being made available world w ide.
In this situation, it is crucial to keep your data safe. The i
prim ary threat to data is in the form of viruses, which
enter either tlu'oug h e-mails or while accessing U11wanted
websites.
D11ti1 rrotcl /1<1 1 can be define d as the secul'ity or pro tection
of data or inform ation on
the Intern et, from tl1e comp uter viruses, spamm ers or hackers.
In this regard , ~he Data
Protection Act (DPA) plays an impor tant role in taking care of users
and protec ting their
personal inform ation from going into the wrong hands .
Howe ver, a major proble m arises while protec ting the data which
is comin g throug h the
Intern et. Thus, we must take care of tl1e follow ing points to ensu
re that the information
is protec ted:
• Do not disclose your passw ords to anyone (inclu ding your friend
s). They may open
different w ebsites and misuse your accounts.
• Do not down load unwa nted softw are/fr ee softw are from the
web. It may corrup t
your system.
• Somet imes, you may come across some unwa nted e-mails which
offer you differe nt
schemes or free gifts. Do not read/ open such unwa nted e-mails as
they might contain
viruses.
• It is advis ed that you shoul d install high qualit y antivi rus progr
ams or signat ory
anti.vi rus progr ams of a repute d comp any in your compu ter, to protec
t yours elf and
your system again st comp uter viruses.
0 mm, -
I
1
' dC
you may try to get the softw are from the Int (>Pot Playe r
Free Soft w ~
- · arc is
/:,.1ce -;oft,u • a softw ernet
h , ares ,u,11pa11"
J. .
free o f cos t . Th e 1
· are w ere ~
- ~ Spotify· r.9\ Firefox ~ •-
the user has the freed om to run copv ct·
1s
tr·b
1 ute, ~ ~
h . ' J'
W tx1? S
term . •
~tudy, c ange ~d rmpr ~ve the softw are. The . B1tTorrent-www.tlO ch-.CDm ,_,.,,,.,.. _
Free Softw.
are 1s some time s misu nderS t 00d as It
has noth ing to do with the co s t . M ore preci·sely, It •
the users : refers to four kinds of freedom for
• The freed om to run the prog ram for any purpo se.
t it to your need s.
• The freed om to stu~ y how the prog ram work s, and adap
/frien ds.
• The freed om to redis tribu te copie s to help your neigh bours
impr ovem ents to the public,
• The freed om to im~r ove the prog ram, and release your
so that they can enJoy the bene fit of the upda tes.
oms (as f
A l:'rog ram is a free softw are, if the users have these freed
m~nt ione~ abov e). So, you shou ld be free to redis tribu te copie
s, eithe r -~ -
anyw here.
with or with out modi ficat ions for distri butio n, to anyo ne OFRE E
SOETWAR E
modi ficati ons and use
You shou ld also have the freed om to make ~
g that they
them priva tely in your own work with out even ment ionin t
exist.
ram must be available for
Free softw are does not mean non-c omm ercia l. A free prog
ercia l distri butio n. Commercial
comm ercia l use, comm ercia l deve lopm ent, and comm
such free commercial softwares
deve lopm ent of free softw are is no longe r unus ual and
are very impo rtant .
there are limits on what kinds
Most free softw are licen ses are base d on copy right , and
copy right -base d license respects
of restri ction s can be impo sed throu gh copy right . If a
any other sort of unan ticipa ted
freed om in the ways descr ibed abov e, it is unlik ely to have
some free softw~re lice~ e~ are
probl em (alth ough this does happ en often). How ever,
r range of possible restrictions.
based on contr acts, and contr acts can impo se a much large
ft
.Joorrlar
Software developers may want to publish
their softwares with an open source license, ~nott- ---• -··= ~
WoRDPn:ss
Note: GNU stands for GNU's not UNIX. It is an operating system and free
software as a
replacement for UNIX. Sometimes, it is also written as GNU General Public
License .
•f }Mtt
e (G PL )
Ge ne ra l P ub lic Li ce ns NU GPL
ne ra l Pu bli c Li ce ns e (G
The GN U Ge
is a wi de ly us ed fre e so ftw are le\./f~'i,j.!'~~~''
or sim ply GP L)
by Ri ch ar d St all ma n for
lic en se, ori gin all y wr itt en
L is the mo st po pu lar an d General Public License
the GN U proJ· ec t. Th e GP ftw are .
fre e so
we ll- kn ow n ex am ple of a
GP L is sai d to gr an t
Un de r thi s ph ilo so ph y, the
ute r pr og ram , the rig hts d, ev en wh en
the rec ipi en ts of a co mp d en su res tha t the fre ed om is pre ser ve
fin iti on an ces, of
of the fre e so ftw are de
Th is is dis tin ct fro m pe rm iss ive free so ftw are licen
de d.
the wo rk is ch an ge d or ad
s are the sta nd ard ex am ple s.
Which the BS D lic en ce L) is a mo dif ied , mo re pe rm
iss ive ve rsi on
ral Pu bli c Lic en se (L GP Free
The GN U Le sse r Ge ne
for so me so ftw are lib rar ies . Th ere is als o a GN U
en de d cu me nta tio n of
of the GP L, ori gin all y int s ori gin all y int en de d for us e wi th do
wh ich wa
Do cu me nta tio n Lic en se,
en ad op ted for oth er us es.
GNU so ftw are , bu t ha s als o be NU AG PL ) is a sim ila r lic en se
wi th a focus on
Pu bli c Li ce ns e (G bli c License,
The Af fer o Ge ne ral U AG PL is sim ila r to the GN U Ge ne ral Pu
. Th e GN ,
networking se rv er so ftw are us e of the so ftw are ov er a co mp ute r ne tw ork
co ve rs the the AG PL ed
excep t tha t it ad dit ion all y be ma de av ail ab le to an y ne tw ork us er of
ur ce co de
re9ltiring the co mp let e so
:~n
◄
work. For example, a web application.
The Free Software Foundati on recomme nds that this license be considered for any
software that will be common ly run over the network.
SPAM:
Sometim es, when you connect to a website and open
your e-mail account, you may find that a number
of unwante d mails have come into your inbox.
Sometim es, the titles of these message s are very
fascinating. In fact, these titles compel you to read
the mail/ message . These unwante d message s in the
mailbox are called Spam. It is an attempt to force the
message s on to people who would otherwis e not
choose to receive it. Most spams contain commercial advertisi ng, dubious products or
get-rich- quick schemes . Spam costs the sender very little but the user a lot.
These unwante d message s not only waste the valuable time of the users but also occupy
memory space of the system. Some people also send viruses through these message s and
try to corrupt the compute r systems.
CYBER CRIME
In today's world, crimes are increasin g exponen tially
day by day in all the various fields. In the same way,
crimes are also prevalen t in the field of compute rs.
Althoug h, there are various types of compute r-related
crimes that are widespre ad, online criminal activities
such as illegal copying of software , compute r viruses,
stealing of hardwar e data, etc. continue to affect
compute r systems worldwi de. Thus, the online crime
that involves a compute r and a net-work , is known
as Cylicr Crime.
In addition to cyber-crime, there is also 'Comput er Supporte d Crime' which refers to
1111111111
,.,,'/Ye of co1nputers by criminals f
tlt ' ll~ or commurucati
JJ~,1 storage . on and documentation as well as
\'B£R L.\\\'~
Crtth ,the invention of the Internet, the
'°'
v-7or
Id has come on a common platform
.
· ere peop 1e can commurucate with
:ch other through . the cyber space.
'fhi5 ~ a revolutionary _s te~ for
uinaruty but also poses a significant
heed for the regulation of cyber
fl tt\rities. India became the 21 st nation
ac = - -:..._-:.;:_~~~.1JJ1 ~
NETIQUETTE
When you are working in an Internet environment, then
it is expected by the people or the society around this
environme nt to work under a set of rules. Thus, the term
'Netiquette' comes into play which is a combination of the
words 'network' and 'etiquette'. So, 'Netiquette' is defined
as a set of rules for acceptable online behaviour. It also
focuses on online ethics and governs by the acceptable
use of online resources in an online social environment.
Moreover, the concept of a 'netizen' is also involved
in this environment. It is derived from the words
'Internet' and 'citizen'. It is referred to as a person who
uses the Internet to participate in the society and an
individual who has accepted the responsibility of using the Internet in a productiv e and
a socially responsible way.
Internet etiquette(Netiquette) simply means the use of good
manners in online communication such as e-mail, blogs and social
networking sites. It is important to emphasize netiquette because it
defines the online communication as well as the non-verbal ways. In
this type of communication, one is unable to see the facial expressions,
body language, etc. as a result of which the messages can often be
misinterpreted. By following netiquette, these types of problems can
be overcome and a healthy environme nt can be established. It also
ensures the use of correct spelling, grammar punctuatio n including
the use of emoticons (such as:):(;) and others) to explain an emotion.
Applying online ethics and being a good netizen means being responsibl e and showing
respectful behaviour online. Sometimes, people may fail to realise the social values in
any environme nt including the Internet. The following points will certainly help you to
understan d Internet etiquette and make your online experience more enjoyable. They are:
1. The term 'Shouting' states that you are never to type in all capital letters. The people
may not like it when you shout at them on the net.
2. When you borrow something from someone, give them the credit. It may be the name
of a site or any similar kind of informatio n that you may have forgotten.
3. Avoid un-necessary gossiping and keeping personal informatio n online. This can save
you from an unpleasan t situation online.
4. Never try to steal photograp hs off the web, even if they are a perfect fit for what you
need.
5. Be patient with the new online learners, realising that they are just learning like you
did once upon a time.
6. Spam is an unwanted electronic message, so sending the same electronic message
over the Internet is unwanted . It can get you into a lot of trouble on some sites.
r 7. fhde keep your Intern
.
excess use of emoti cons tend to irritat e
et conne ctions hap peodp
1
e. So, avoid overu se of emoticons
health y b 11 .
a11 PY an
Y a owing more social
irlteractions.
fBER SECURITY
C the world of Intern. et,. it is a matte r of great concer n for all of t
111
cybercrime or simila r attack s. So, the d at b us, 0 protec t our data
a muSt e secure d from gettin g into the
v•
fro~s of unaut horise d acces s.
ha!\ . d fin d Jr
'Cyber Security l S e e as a set of techniques
I •
PHIS HING
In the cyber -worl d, phishi ng (also know n as cardin g and spoofi
ng) is a form of illegal act
passw ords and credit
whereby fraud ulentl y sensit ive inform ation is acquired, such as
perso n or busin ess
card detail s, by a perso n/ entity, masq uerad ing as a trustw orthy
e-mail or instan taneo us
in an appar ently official electr onic comm unica tion, such as an
comm unica tion.