Login
Register
×
Home
About
Services
Punjabi Tutor
English Tutor
Punjabi Practice
English Practice
Punjabi Mock
English Mock
Punjabi Chunk
English Chunk
Blog
Verify
Contact us
☰
Home
About
Services
Typing
Punjabi Tutor
English Tutor
Punjabi Practice
English Practice
Punjabi Mock
English Mock
Punjabi Chunk
English Chunk
Blog
Verify
Contact us
Ranjeet Online Typing
Name:
ID:
Time:
10
SET Time
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Auto Scroll
Font Size:
Paragraph Words:
XXX
Typing paragraph
The past two decades have witnessed an invasion by technology in almost all the spheres of human life. This has led to an increased dependency on technology. Thanks to information technology, the world is making paradigm shifts from the offline to the online domain. Everything from banking, stock exchange, healthcare, education can be controlled and monitored using technology. As there are two sides of a coin, the technology also has two sides to it i.e. its pros and cons. One of the major cons of the technology is cyber-crime. Cyber-crime is defined as a crime in which a computer is the object of the crimes such as, hacking, phishing, spamming or is used as a tool to commit an offense (child pornography, hate crimes). Cyber criminals may use computer technology to access personal information, business trade secrets or use the interment for malicious purposes such as online monitoring of another person's activities, unauthorised users who can access their personal and sensitive information. A person who gains unauthorised access to the system is known as a hacker. Theft involves the download of copyrighted material by violating the copyrights. In the case of electronic fund transfer crime, a person illegally gains access to another person's bank details and this may lead to financial losses. E-mail bombing involves sending a large number of mails over the network in order to crash the server. A very common cyber-crime act is sending the virus as an attachment via mails. This virus can be used to extract the data from the system and jeopardise it in some cases. National and international financial people tend to share a lot over the social media platforms. This information is used by cyber criminals to extract personal and sensitive information of others which can be misused later on. The imposters create fake social media accounts and post misleading information about the e concerned person. This commonly happens with public figures and is done with an intention to malign and harm the image of the person. In this world dominated by technology, smartphones have become imperative. The smartphones have given way to mobile applications. A large number of private and public sector banks, e-commerce websites, railways and airlines have launched their mobile applications. The ease of operations of smartphone applications prompts the users to install and operate them. With millions of users, these applications are a lucrative source of data. Many times, the users unknowingly grant certain permissions to the application, which allows it to access their personal information. This gives the application provider with personal information about the individual. 30, the user needs to be careful while installing mobile applications and be sure of the permissions granted to them. India is taking giant strides towards digitalisation with initiatives such as 'Digital India'. This necessitates the people to learn to tackle with the different aspects of cyber-crime. Although, people have become tech-savvy, their knowledge about cyber-crime is limited. The cyber-crime needs to be dealt at two levels-one will be at the individual level and the other will be at the service provider level. People need to be very careful about their acquaintances and the degree to which they divulge their personal information on social media. It is best to stay away and not accept invites, as well as requests, from unknown people. One should avoid sharing sensitive information such as passwords with anyone the passwords need to be strong enough so that the hacker cannot crack them. In order to increase the strength of the password, one can make use of alpha-numeric values and special symbols. In fact, one needs to make sure that there is never a common password for all accounts. It is best to refrain from clicking on the pop-ups and unknown website links. One needs to make sure that all the transactions that are done online happen through a secured gateway. One must abstain from saving the bank account details on the websites. The mails which make claims about winning prize money are malicious and must be ignored. A good quality anti-virus must be installed in the system. This anti-virus must be regularly updated E-mail service providers as well as many other online platforms, have started multi-step verification process in order to secure the user's account It is always better to spend some extra amount of time and go in for the verification in order to secure one's account. The service provider can encrypt the data in order to protect it. Encryption is a technique to convert plain text into cipher text. Cipher text is the coded text and it is only the recipient of the data who can decrypt it using a special private key. In this
Type Here
Paragraph By :
Ranjeet Kaur
App. Ver.:
4.0.24.2
Fully compatible with Latest Firefox & Chrome browser.