Page 88 - Cyber Safety C-5
P. 88

21 st
                                                                                              Century   #Critical Thinking
                                                                                               Skills
                                            KIRAN'S HACKED SOCIAL MEDIA ACCOUNT


                    One day, Kiran was chatting with her friends on a popular social media platform
                    when she noticed something strange. Her account had sent a few posts to her friends
                    that she hadn’t written. She then tried to log into her account, but her password
                    no longer worked. She received an alert that her password had been changed.

                    This situation made her realise that someone had hacked into her account and
                    changed the password without her consent.

                    Based on the above case, answer the following questions:

                    1.  What are the signs that Kiran's account was hacked?



                    2.  From whom should Kiran ask for help to recover her account?








                  COMMON TYPES OF HACKING


                  Hacking  can happen  in different  ways.  Hackers  use  various  methods  to  enter
                  computers,  phones  or  online accounts  without  permission.  Some  methods  are

                  simple, while others are more clever and tricky. Understanding the types of hacking
                  helps you recognise danger signs and stay safe while using the Internet.

                  Some common types of hacking are:


                      Phishing: A  type  of hacking  where hackers

                       pretend to be trusted people or companies, such
                       as  banks  or email  services,  to  trick  users  into
                       sharing passwords or personal information.






                                                            Malware Attacks: Malware is harmful software
                                                             that enters a device through unsafe downloads

                                                             or links. It can damage files or steal information.





                   86   Computer Science - V
   83   84   85   86   87   88   89   90   91   92   93