26-12-2017, 10:42 AM
Software Piracy
*Unauthorized copying, reproduction, use or manufacture of product is called Software piracy
Password Sniffer
*It is a small program that monitor and retrieve the user name or password of network users during their login.
Cyber Stalking (e-stalking)
*Practice of using internet to harass or threaten some one
*This can be avoided by not disclosing any personal information, avoid sending photographs to strangers and chat friends, proper disconnection of internet after its use.
Extra Info
*Cyber stalking is also known as Cyber Bullying
Web Jacking
*Hacking of websites by password cracking and alteration of contents for fulfilling political objectives or for money.Web Jacking punishes the offender under IPC 383
Data Diddling
*Data Diddling is the unauthorized changing of data before or during their input to a computer system.
egs Forgery, exchanging valid records with prepared replacement etc.
Identity theft
*Procurement of identifying information without permission and using it fraudulently to obtain goods and services is called identity theft.
Hacking
*Process of unauthorized access of information system is known as
Ans : Hacking
*One who does hacking is called
Ans : Hacker
*Hacker destroys, defects or alters the information in a computer resource.Hacking comes under section 66 of IT Act 2000
*Hackers are of different categories such as White Hat Hackers, Black Hat Hackers, Gray Hat Hackers
*White Hat hackers hack system for good reason.
*They are also known as Ethical Hackers.
*Black Hat Hackers hack system for malicious reasons.
*Gray Hat Hackers hack system sometimes for good reason and sometimes for malicious reasons.
*Banking and credit card related crime, E-commerce and investment frauds, online sale of illegal articles, online gambling etc also comes under cyber crime.
*Unauthorized use of internet hours paid for by another person is known as theft of internet hours.
*A computer connects to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used for malicious tasks is called
Ans : Zombie