Page 40 - Cyber Safety C-5
P. 40

Smishing: Phishing attacks carried out via SMS to steal personal information.


                         Malware: Malicious software intended to damage or gain unauthorised access to
                         devices or networks.


                         Vishing: Phishing  through  voice  calls where attackers  impersonate  legitimate
                         entities.


                         Virtual Private Network (VPN): A service that encrypts Internet traffic for secure
                         online activity, especially on public networks.











                           Phishing is a common online trick used to fool people into sharing personal information.
                           Phishing messages often contain spelling or grammatical mistakes that are not typical
                            of trusted companies.

                           Update passwords for the affected accounts and ensure they are strong and unique.
                           Online shopping scams are designed to trick people into paying for goods or services
                            that never arrive.

                           A strong password is your first line of defence against phishing.

                           Phishing attacks can affect anyone and one of the best ways to protect yourself and
                            others is by spreading awareness.











                  A.  Tick ( ) the correct option.
                     1.  Select the most accurate definition of phishing in online security.


                                 (i)  Protecting information                (ii)  A scam to steal details

                                (iii)  A type of malware                    (iv)  A security feature


                     2.  Choose the type of phishing that uses voice calls to steal personal information.

                                 (i)  Smishing                              (ii)  Vishing


                                (iii)  Email Scams                          (iv)  Fake Support


                   38   Computer Science - V
   35   36   37   38   39   40   41   42   43   44   45