Page 57 - Cyber Safety C-7
P. 57
By practising ethical behaviour and digital kindness, everyone can make the online world a better
and safer place.
RECOGNISING AND SAFEGUARDING YOURSELF FROM
CYBER THREATS
In recent years, students have spent more time online and this trend is likely to continue. However,
as more people go online, cybercriminals are also increasing, targeting those who are new to the
digital world. To stay safe, it’s important to understand cyber threats like malware and computer
viruses and learn how to protect yourself.
Malware is a type of software designed to cause harm to your computer or steal information. It’s
a broad term used to describe any harmful software, including viruses, spyware and ransomware.
Malware comes in various types, such as viruses, spyware, ransomware, worms, etc.
A computer virus is a specific type of malware that can spread itself to other programs and files
on your computer. When you run the virus, it can damage, steal or delete data. Viruses often
replicate themselves and spread from one program to another.
Identifying and Mitigating Cyber Threats
Identifying and mitigating cyber threats involves a structured, proactive approach of risk
assessment, control implementation and continuous monitoring. Key strategies involve a
mix of people, processes and technology to defend against evolving threats like phishing and
ransomware. Cyber threats can take many forms and often evolve to exploit new vulnerabilities
and human error.
Some key signs to identify cyber threats are:
Suspicious Emails or Messages: Look out for unsolicited messages asking for personal details
or offering too-good-to-be-true deals, often with urgent requests.
Unexpected Pop-ups or Ads: Be cautious of pop-ups that claim to be security warnings or
prompt you to download unknown software.
Slow or Unresponsive Devices: A sudden drop in device speed or frequent crashes can
indicate malware running in the background.
Unfamiliar Account Activity: Unexplained logins or changes to your account settings may
suggest someone else has gained access.
Strange Device Behaviour: Unexpected software installations or redirects to unfamiliar
websites are signs that your device might be compromised.
Security Software Alerts: Pay attention to warnings from antivirus programs or firewalls
about detected threats or suspicious activity.
Cyberbullying—Recognising and Responding 55

