57
57
AI and You - 7
Chapter 5: Cybercrimes and Cyber Security
A. Tick (✓) the correct answers.
1. It is a set of procedures, values, and practices that regulate the use of a computer connected to
the Internet.
a. Computer ethics b. Digital footprint c. Firewall
2. Some spams act as a carrier of
a. rumors. b. malware. c. Both a and b
N
3. A copyright is a legal term that protects the rights of
a. artistic. b. original works. c. Both a and b
4. Tampering of the online content of a website falls under
a. cyber vandalism. b. email spoofing. c. phishing.
begins with
a. hppts.
B. Fill in the blanks.
TA
5. To avoid pharming attacks, always enter the login credentials only on the websites whose URL
b. https. c. htpps.
1. ____________ is a malicious act in which bulky emails are sent repeatedly to a particular
address in a short time.
2. A person who uses Internet to stalk or harass a group or an individual is called ____________
AR
3. A ____________ is a legal term that protects the rights of literacy, dramatic, and other original
works.
4. A ____________ is an exclusive legal right related to an invention.
5. The act of stealing someone else’s intellectual property is known as ____________
6. Cyber ____________ refers to an illegal act of destroying or damaging digital data, rather than
stealing or misusing it.
C. Write ‘T’ for True and ‘F’ for False.
AV
1. The time period of copyright protection lasts for the lifetime of an author
with additional 70 years.
2. The time period of patent protection in India is 30 years from the date on
which the application for the patent was filed.
N
TA
AR
AV
Copyright: All rights reserved. No part of this work can be reproduced or utilized in any form or by
any means, electronic or mechanical, or by any information storage and retrieval system without prior
permission, in writing from Avartan. Information contained in this book has been published by Avartan.
Answers of Additional Questions
A. Tick (✓) the correct answers.
1. a 2. b 3. c 4. a 5. b
B. Fill in the blanks.
1. Email bombing
2. cyberstalker
3. copyright
4. patent
5. plagiarism
6. vandalism
C. Write ‘T’ for True and ‘F’ for False.
1. T 2. F 3. F 4. T
5. F 6. F
D. Answer the following questions.
1. Cybercrime refers to an unethical or illegal activity that involves a computer and a network.
These activities are punishable. It is important to note that in some instances, a computer is
used to commit crime, while in some cases the computer itself is the target of a crime.
Cybercrimes in the society are divided into three categories:
a. Cybercrimes against an individual
b. Cybercrimes against property
c. Cybercrimes against an organisation/society
2. Spamming can be inflicted in any of the following forms:
³³ Email spoofing: It is an act of fraudulent emailing, hiding the origin of the email. The sender
intentionally alters parts of the email in order to create an illusion that the email is sent by
some legitimate source, such as a company, bank, magazine, and so on. However, it is sent by
a cybercriminal. The motive behind email spoofing are malicious, like spreading malware into
the system or to gain sensitive personal details.
³³ Email bombing: It is a malicious act in which bulky emails are sent repeatedly to a particular
address in a short period of time. The aim is to overflow a user’s inbox.
³³ Flooding: It refers to the process of posting the same piece of text multiple times. Newsgroup
and social networking forums get flooded with such texts.
3. Cyberbullying in any form can be very disturbing for the victim. To avoid falling prey to
cyberbullying and harassment, you need to keep the following points in mind.
³³ Do not disclose any personal information on social media or to any stranger.
³³ Immediately stop any kind of communication with a cyberbully and block the person.
³³ Share your bullying experience with your elders or parents.
4. Phishing: It is a fraudulent attempt to trick innocent people to obtain their sensitive information,
like username, password, and debit/credit card details. A phishing attacker disguises himself or
herself as a trustworthy entity, so that a victim can easily fall into their trap. Phishing attacks
are generally attempted by sending emails to distribute malicious attachments or links. This
cybercrime is used to steal important information to cause financial damage, and to even block
access to one’s email account. Here are some tips to avoid being a victim to phishing.
³³ First and foremost, learn to identify the phishing emails. These emails pretend to have come from
reliable websites and use trustworthy company names. They lure the targets to claim a huge prize
money by revealing their credentials.
³³ Never log in to the bank websites by clicking on the links sent through such emails. Remember
that banks will never ask you to share your password, credit/debit card numbers, or any other
personal details.
5. Passwords are used for many purposes, some of them are:
³³ Logging into online accounts, such as banking, email Id, social networking, and so on
³³ Accessing applications, database, or network
³³ Using ATM card to withdraw money or shop online