Page 216 - LECTURETTE
TOPICS eBOOK
P. 216
shop.ssbcrack.com
Virus attach themselves to files and delete or alter the data. Virus attacks can affect
the data of any individual or organisation hereby causing a loss.
Phishing
Obtaining personal and sensitive information through messages and email spoofing
is phishing. It further has types like clone phishing, spear phishing , whaling etc.
Software Piracy
Creating and distributing copies of original programs and violating the copyrights and
patents is piracy. The problem here is that often the users are not able to distinguish
between the original and pirated versions.
Pornography
Using the internet for any sexual abuse and acts is pornography. The situations have
gone worse with increase in cases of child pornography.
Other Frauds
Privacy intrusion, investment frauds, data diddling, cyber defamation etc are other
ways of committing a cybercrime.
Cyberterrorism
Cyberterrorism is the modern form of terrorism where terrorists use electronic media
to complete their evil missions. It targets the population on a massive scale and is
extremely dangerous.
Information Technology Act 2000
• The Information Technology Act 2000 is an act of the Parliament that
addresses the issues relating to cybercrime in India.
• In 2011, data privacy rules have been introduced in the Act.
• In February 2017, M/s Voucha Gram India Pvt Ltd an e-commerce portal
www.gyftr.com filed a complaint against hacking and hackers were arrested
for digital shoplifting under the provisions of the act.
What can be done
• Set difficult passwords but make sure you are able to remember them.
210 | P a g e shop.ssbcrack.com