Page 66 - Cyber Safety C-6
P. 66

21 st
                                           CHECKING MALICIOUS LINKS                     Century   #Leadership & Responsibility
                                                                                         Skills

                  Read the given scenarios and identify whether the person is a hacker or cracker:

                      programmer  called  Aarav  designs  a  powerful  new virus  that  locks  up  a  school's  computer  lab
                      A
                      because they failed him in a test.


                      Priya is a computer expert hired by the Indian government to test the security of their tax website. She
                      is paid to try and hack into the system.



                      A
                      company called CyberTech offers a reward to anyone who can find a bug in their new video game’s
                      network. Kiran finds the bug and reports it to the company to claim the reward.













                  DIGITAL ARMOR

                  Digital armor is a set of tools and practices that protect your personal information and devices
                  from online threats, such as hackers, malware and scammers. Just like you wear armor to protect
                  your body, digital armor helps protect your online world. The pyramid below shows the different

                  levels of digital armor that help keep your personal information and devices safe from online
                  threats.




                                                                      Backup data for recovery in case of loss

                                                                      Regular updates to fix security vulnerabilities

                                                                      HTTPS for encrypted Internet browsing

                                                                      Encryption to safeguard personal data

                                                                      Strong, unique passwords for account security


                                                                      Two-factor authentication for added protection

                                                                      Antivirus and firewalls for initial defense








                   64   Computer Science - VI
   61   62   63   64   65   66   67   68   69   70   71