KnowledgeBoat Logo
|

Computer Applications

Case Study 2

Yamini recently tried logging into her social media account. She was able to login and post updates on her account but a few days later when she tried to do the same, she couldn't login and when she saw her account through someone else's profile, she noticed that there were many spam posts and stories on her account which were not posted by her. She reported her complaint to the social media company, her account got deleted and she had to make a new one.

Answer the following questions.

(i) What is the term for stealing of required information by seeking a weakness in a computer?

(ii) What had happened to Yamini's account?

(iii) What does a hacker do?

(iv) Mention any two methods to prevent hacking.

Computing Safety & Ethics

5 Likes

Answer

(i) Hacking is the term for stealing of required information by seeking a weakness in a computer.

(ii) Yamini's account experienced unauthorized access and was likely hacked. The hacker posted spam content and stories on her account without her consent.

(iii) The people who are involved in the cyber crime are called Hackers. They try to gain unauthorized access to computer systems or networks with the intent to exploit, manipulate, or steal information. In this scenario, the hacker gained access to Yamini's social media account and posted spam content.

(iv) Two methods to prevent hacking are:

  1. We should create complex and unique passwords for the accounts, incorporating a mix of letters, numbers and special characters.
  2. We should enable Two Factor Authentication. This adds an extra layer of security by requiring a second verification step, such as a code sent to the mobile device, in addition to the password.

Answered By

2 Likes


Related Questions